Businesses are looking for solutions that support both voice and data communications for a wide range of teleworkers, from premier employees such as corporate executives or full-time teleworkers who require permanent, secure connectivity for multiple remote devices to casual teleworkers who want secure connectivity for soft phones, IP phones, mobile phones, and third-party endpoints such as iPhones. In addition to Secure Sockets Layer (SSL) and IP Security (IPsec) VPN connectivity, Cisco ASA 5500 Series Adaptive Security Appliances Unified Communications proxy features extend unified communications services to remote users, providing a more complete, converged, multifunction security and VPN services within a single platform.
ASA Phone Proxy
The Cisco ASA Phone Proxy enables termination of Secure Real-Time Transport Protocol (SRTP)/Transport Layer Security (TLS)-encrypted endpoints for secure connectivity across the Internet. The ASA Phone Proxy allows large-scale, secure deployments of phones without a large-scale deployment of VPN remote access hardware.
ASA Mobility Proxy
The Cisco ASA Mobility Proxy enables secure connectivity between Cisco Unified Mobile Communicator software and the Cisco Unified Mobility Advantage server. The Cisco ASA is able to intercept the TLS connection between the Cisco Unified Mobile Communicator software and server and inspect and apply policies to the mobility traffic using a Mobility Multiplexing Protocol (MMP) inspection engine.
ASA Presence Federation Proxy
The Cisco ASA enables secure presence federation between Cisco Presence and the Microsoft Office Communications Server presence solutions, allowing two organizations to collaborate more efficiently by sharing presence information about how best to reach and communicate with other users.
ASA TLS Proxy
The ASA TLS Proxy is able to decrypt encrypted signaling from Cisco endpoints, apply the required threat protection and access control, and help ensure confidentiality by re-encrypting the traffic onto the Cisco Unified Communications Manager servers. This is an ideal way to address confidentiality and maintain security policies.