PDF

Secure SIP Client Configuration Feature Module
Revised: April 16, 2008
This document describes the Secure Session Initiation Protocol (SIP) Client Configuration feature for
Release 5.0 MR2 of the Cisco BTS 10200 Softswitch and explains how to use it.
Understanding the Secure SIP Client Configuration Feature
The Secure Session Initiation Protocol (SIP) Client Configuration feature enables the shielding of the
BTS 10200 from external, possibly malignant, traffic. The shielding is enabled by the securing of the
client session through use of a session border controller (SBC) and edge proxy (EP). After the initial
registration the client session does not need to be challenged when the shielding is enabled.
The SBC and EP adds the path header on the REGISTER transaction and asserts the P-AID header for
subsequent session-initiating INVITE transactions from the SIP client. Additionally, the Record-Route
header is added by the SBC to every session-initiating INVITE, in either direction to enable the
forwarding of the request between the internal and external networks.
For user privacy, the client adds the privacy ID field or, if the client invite is entered as
[email protected], the SBC adds the privacy ID field. Subscriber invites are transmitted
to the BTS 10200 with the P-AID header.
As shown in Figure 1, the connection between each SIP client and each SBC is protected by a firewall.
The SBC is securely connected to the BTS 10200 inside the firewall. The SBC/EP is configured on the
BTS 10200 as a soft switch trunk group with ANI-based routing enabled.
Americas Headquarters:
Cisco Systems, Inc., 170 West Tasman Drive, San Jose, CA 95134-1706 USA
© 2008 Cisco Systems, Inc. All rights reserved.
Secure SIP Client Configuration Feature Module
Understanding the Secure SIP Client Configuration Feature
Figure 1
Secure SIP Client-to-BTS 10200 Connection
Interconnect
SBC
BTS
To Interconnect
BTS
Secure network
MG
EP/P-cscf/SBC
EP/P-cscf/SBC
M
IP
IP IP
IP
IP IP
SIP client
Call Flows
This section contains the following examples of call flows:
•
Registration
•
Origination
•
Mid-call Signaling
•
Termination
Release 5.0 MR2
2
SIP client
203229
Firewall
Secure SIP Client Configuration Feature Module
Understanding the Secure SIP Client Configuration Feature
Registration
Figure 2 provides an example of the registration call flow.
Figure 2
Registration Call Flow
SIP Client1
Proxy/SBC
BTS
Register
Path added
(Stores path)
200 OK with path
203228
200 OK
(P-Associated-Uri
header)
(Stores Passoc-URI)
Origination
Figure 3 provides an example of the origination call flow.
Origination Call Flow
SIP Client1
Proxy/SBC
Invite (Will have the
path as route)
BTS
Client2
Invite (Will have a
Record-Route added
to the INVITE)
Invite
203227
Figure 3
Release 5.0 MR2
3
Secure SIP Client Configuration Feature Module
Understanding the Secure SIP Client Configuration Feature
Mid-call Signaling
Figure 4 provides an example of the mid-call signaling call flow.
Figure 4
Mid-call Signaling Call Flow
SIP Client1
Proxy/SBC
BTS
Update (Using route
built from
RecordRoute)
Client2
Update
203226
Update
Termination
Figure 5 provides an example of the termination call flow.
Termination Call Flow
SIP Client1
Proxy/SBC
Bye (Using route
built from
RecordRoute)
Bye
Release 5.0 MR2
4
BTS
Client2
Bye
203230
Figure 5
Secure SIP Client Configuration Feature Module
Understanding the Secure SIP Client Configuration Feature
PATH Header
The following are assumptions concerning the PATH header:
•
The PATH header is inserted by edge proxy (secure P-CSCF or other) in the REGISTER message.
•
A client can associate with different edge proxies at different times and registrations; it does not
concern the BTS 10200.
The following lists the BTS 10200 behavior when the PATH header is used:
•
When registration is successful for a SIP subscriber, the BTS 10200 stores the PATH header received
in REGISTER, along with the registered contact of the subscriber.
•
When an INVITE is received from a subscriber who has registered with a PATH header, the INVITE
is processed without a challenge which validates the (presumed secure) SIP client.
•
When the BTS 10200 receives the initial INVITE from the local SIP client, the call is accepted
without authentication if the client was associated with the PATH header during registration and has
a valid unexpired contact.
•
If a REGISTER message arrives with a PATH header but without a Supported: path option tag, the
BTS 10200 rejects it with a 420 if the BTS 10200 configuration requires rejecting it.
•
In the 200 OK response to REGISTER, the BTS 10200 echoes the PATH header received in the
request (initial as well as refresh Register responses).
•
When routing is to a local SIP subscriber, if there is a PATH vector stored, the BTS 10200 builds a
Route list from it, when sending the initial INVITE to that subscriber. The INVITE is sent to the
top-most route (that is the top-most entry from the stored Path header). Subsequent requests sent for
that same dialog do not use the preloaded route. They are routed based on any record-routing that
occurs during that dialog establishment.
If the BTS 10200 is directly accessible from the external internet and a SIP client registers directly with
the BTS 10200, bypassing the proxy (for example, without the PATH header), the BTS 10200 accepts it.
In this case, every request from the client is authenticated.
Release 5.0 MR2
5
Secure SIP Client Configuration Feature Module
Provisioning
Provisioning
This section explains how to provision and configure the following:
Note
•
Secure P-CSCF/Edge Proxy Configuration
•
Trunk Group as Secure P-CSCF/Edge Proxy Configuration
For complete CLI information, see the Cisco BTS 10200 Softswitch Command Line Interface Database.
Secure P-CSCF/Edge Proxy Configuration
Before the introduction of this feature, the BTS 10200 supported SIP endpoints directly without any
proxy between the BTS 10200 and the client. This behavior is still supported when the SIP client is
supported. However in SIP client deployment, it is expected that the P-CSCF/Edge proxy is required to
support client behind the NAT (STUN), security, and so forth firewall.
P-CSCF/edge proxy related assumptions are
•
When a SIP client is successfully registered, P-CSCF stores the P-associated-uri in 200 OK (sent by
the BTS 10200) for the REGISTER.
•
In the SIP client-initiated requests (non-REGISTER), P-CSCF inserts the stored PAID based on
stored identity (P-associated-uri) before forwarding the requests to the BTS 10200.
•
P-CSCF inserts a PATH header in the REGISTER request (detailed later).
The BTS 10200 requirements:
•
A trunk group corresponding to the P-CSCF must be configured in the BTS 10200 (existing soft
switch trunk group).
•
The BTS 10200 provides service to a SIP client behind an edge proxy (p-cscf or other) only if it is
registered and has an associated PATH during registration.
•
When the request is not through any configured soft switch trunk, the client is considered to be
connected directly to the BTS 10200.
The BTS 10200 uses the presence of a PATH header in REGISTER as verification that the SIP client is
secure and accepts INVITEs from that client, without a challenge authentication sequence.
Trunk Group as Secure P-CSCF/Edge Proxy Configuration
Use the following steps to configure a trunk group as a secure P-CSCF edge proxy:
Step 1
Enable anti_based_routing for the trunk group.
Step 2
Disable voice_mail_trunk_group in the trunk group profile.
Step 3
Enable use_pai_hdr_for_ani for the trunk group.
Release 5.0 MR2
6
Secure SIP Client Configuration Feature Module
Provisioning
CCDE, CCENT, Cisco Eos, Cisco Lumin, Cisco StadiumVision, the Cisco logo, DCE, and Welcome to the Human Network are trademarks; Changing
the Way We Work, Live, Play, and Learn is a service mark; and Access Registrar, Aironet, AsyncOS, Bringing the Meeting To You, Catalyst, CCDA,
CCDP, CCIE, CCIP, CCNA, CCNP, CCSP, CCVP, Cisco, the Cisco Certified Internetwork Expert logo, Cisco IOS, Cisco Press, Cisco Systems, Cisco
Systems Capital, the Cisco Systems logo, Cisco Unity, Collaboration Without Limitation, EtherFast, EtherSwitch, Event Center, Fast Step, Follow
Me Browsing, FormShare, GigaDrive, HomeLink, Internet Quotient, IOS, iPhone, iQ Expertise, the iQ logo, iQ Net Readiness Scorecard, iQuick
Study, IronPort, the IronPort logo, LightStream, Linksys, MediaTone, MeetingPlace, MGX, Networkers, Networking Academy, Network Registrar,
PCNow, PIX, PowerPanels, ProConnect, ScriptShare, SenderBase, SMARTnet, Spectrum Expert, StackWise, The Fastest Way to Increase Your
Internet Quotient, TransPath, WebEx, and the WebEx logo are registered trademarks of Cisco Systems, Inc. and/or its affiliates in the United States
and certain other countries.
All other trademarks mentioned in this document or Website are the property of their respective owners. The use of the word partner does not imply
a partnership relationship between Cisco and any other company. (0804R)
Copyright © 2008 Cisco Systems, Inc. All rights reserved.
Release 5.0 MR2
7
Secure SIP Client Configuration Feature Module
Provisioning
Release 5.0 MR2
8