Solved

Cisco Phone Proxy versus Cisco Phone VPN

Posted on 2014-10-15
3
617 Views
Last Modified: 2014-10-15
What is the difference between phone VPN and CIsco proxy phone? I notice that in 9.x ASA that phone VPN is supported but no longer Cisco proxy phone.  What's the difference between the two methods of allowing outside phones to register to your CUCM server?
0
Comment
Question by:amigan_99
  • 2
3 Comments
 
LVL 20

Accepted Solution

by:
José Méndez earned 500 total points
ID: 40383573
In short, the phones now have their own TLS VPN client built into their firmware. The provisioning is done now both in CM  and in the ASA, mostly the certificate exchange (ASA to CM and backwards).

Phone Proxy is the legacy method, no longer supported, ASA  VPN is the current choice.

Phones are provisioned in house first, then you take them out of the HQ and plug them to the home network. They request a URL resolvable from the INternet,and then they start talking to the ASA.
0
 
LVL 1

Author Comment

by:amigan_99
ID: 40383641
Thanks much. Sounds like I'll need to buy a few phones and start a rotation to the new method.
0
 
LVL 1

Author Closing Comment

by:amigan_99
ID: 40383642
Very helpful - thanks.
0

Featured Post

Free Tool: Port Scanner

Check which ports are open to the outside world. Helps make sure that your firewall rules are working as intended.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

So you think no one can listen in on your VOIP conversations, eh? Well... if you haven't setup Secure Real Time Transport (SRTP), your voice communications can be hacked into by just about anyone! First, let's talk about the intended audience for…
Every year the snow affects people and businesses. According to the Federation of Small Businesses (FSB), in 2009, UK businesses lost an estimated £1.2bn (http://news.bbc.co.uk/1/hi/business/7864804.stm) because of bad weather. This article was c…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
I've attached the XLSM Excel spreadsheet I used in the video and also text files containing the macros used below. https://filedb.experts-exchange.com/incoming/2017/03_w12/1151775/Permutations.txt https://filedb.experts-exchange.com/incoming/201…

829 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question