The documentation set for this product strives to use bias-free language. For the purposes of this documentation set, bias-free is defined as language that does not imply discrimination based on age, disability, gender, racial identity, ethnic identity, sexual orientation, socioeconomic status, and intersectionality. Exceptions may be present in the documentation due to language that is hardcoded in the user interfaces of the product software, language used based on RFP documentation, or language that is used by a referenced third-party product. Learn more about how Cisco is using Inclusive Language.
Book Contents Book ContentsCisco Unified Border Element Configuration Guide Through Cisco IOS XE 17.5
Transcoding is a process of converting one voice codec to another. For example, transcoding between iLBC and G.711 or iLBC and G.729.
In every transcoding operation, media flows through CUBE .
LTI based Transcoding
Device(config)# dspfarm profile 1 transcode Device(config-dspfarm-profile)# associate application CUBE
SCCP based Transcoding
Device(config)# dspfarm profile 1 transcode Device(config-dspfarm-profile)# associate application SCCP
Integrated Services Routers Generation 1 series and Integrated Services Routers Generation 2 Series devices support SCCP-based Transcoding only.
Device> enable
Enables privileged EXEC mode.
Device> configure terminal
Enters global configuration mode.
Device(config)# voice-card 0/2
Configures a voice card and enters voice-card configuration mode.
dsp services dspfarm
Enable voice-only DSP services on the Voice Card.
Exits the voice-card configuration mode.
dspfarm profile profile-identifier transcode
Device(config)# dspfarm profile 2 transcode
Device(config-dspfarm-profile)# codec opus
Add a list of codecs that you wish to transcode.
maximum sessions sessions
associate application CUBE
Device(config)# associate application CUBE
! Enabling dspfarm services under voice-card Device(config)# voice-card 0/2 Device(config-voicecard)# dsp services dspfarm Device(config-voicecard)# exit ! Configuring dspfarm profile Device(config)# dspfarm profile 2 transcode Device(config-dspfarm-profile)# codec g711ulaw Device(config-dspfarm-profile)# codec g711alaw Device(config-dspfarm-profile)# codec g729r8 Device(config-dspfarm-profile)# maximum sessions 10 Device(config-dspfarm-profile)# associate application CUBE Device(config-dspfarm-profile)# no shutdown ! Starting Service Engine Device(config)# interface ServiceEngine0/1/0 Device(config-if)# no shutdown Device(config-if)# exit
!Client trustpoints use HTTP to receive certificate from CA. Device(config)#ip http server
!Generate an RSA Keypair. !(This step generates Private and Public keys. In this example, CUBE is just a label. It can be anything.) crypto key generate rsa general-keys label CUBE modulus 1024 The name for the keys will be: CUBE % The key modulus size is 1024 bits % Generating 1024 bit RSA keys, keys will be non-exportable. [OK] (elapsed time was 0 seconds)
!Configure IOS CA Server. In this example, CA Server is named cube-ca. crypto pki server cube-ca database level complete no database archive grant auto lifetime certificate 1800 Secure-CUBE(cs-server)#no shut %Some server settings cannot be changed after CA certificate generation. % Please enter a passphrase to protect the private key % or type Return to exit Password: Re-enter password: % Generating 1024 bit RSA keys, keys will be non-exportable. [OK] (elapsed time was 0 seconds) % Certificate Server enabled.
!Create PKI trustpoints for cube for TLS communication. crypto pki trustpoint CUBE-TLS enrollment url http://X.X.X.X:80 serial-number none fqdn none ip-address none subject-name CN=Secure-CUBE revocation-check none rsakeypair CUBE
!Authenticate the trustpoint with CA server and accept certificate of CA crypto pki authenticate CUBE-TLS Certificate has the following attributes: Fingerprint MD5: BCEBB5A1 1AC882F7 24BE476D 06537711 Fingerprint SHA1: CE2FEEA5 42515B33 3EF6A8F6 7E31D6DF 8E32BEB6 % Do you accept this certificate? [yes/no]: yes Trustpoint CA certificate accepted.
!Enroll the trustpoint with CA server. !In this step the CUBE receives a signed certificate from CA. Secure-CUBE(config)#crypto pki enroll CUBE-TLS % % Start certificate enrollment .. % Create a challenge password. You will need to verbally provide this password to the CA Administrator in order to revoke your certificate. For security reasons your password will not be saved in the configuration. Please make a note of it. Password: Re-enter password: % The subject name in the certificate will include: CN=Secure-CUBE % The fully-qualified domain name will not be included in the certificate Request certificate from CA? [yes/no]: yes % Certificate request sent to Certificate Authority % The 'show crypto pki certificate verbose CUBE-TLS' commandwill show the fingerprint.
!Configure TCP TLS as transport protocol voice service voip sip session transport tcp tls
!Assign trustpoint for sip-ua, this trustpoint is used for all SIP signaling between CUBE and CUCM. sip-ua crypto signaling remote-addr 255.255.255.255 trustpoint CUBE-TLS crypto signaling remote-addr 255.255.255.255 trustpoint CUBE-TLS !or or default trustpoint can be configured for all SIP signaling from CUBE. sip-ua crypto signaling default trustpoint CUBE-TLS
!Enable SRTP. Voice service voip srtp fallback
!Configure secure transcoder is required. dspfarm profile 1 transcode universal security codec g711ulaw codec g711alaw codec g729ar8 codec g729abr8 maximum sessions 10 associate application CUBE
Device> enable