Index A
administrative accounts
summary of purposes 5-1
Application Administration account 5-1
authentication rules 7-5
C
call signaling, modification threat 3-1
Cisco PCA, securing access to Cisco Unity Connection 10-1
Cisco Unified CM
call signaling modification 3-1
identity theft 3-2, 4-1
man-in-the-middle attacks on connection to Cisco Unity Connection 3-1, 4-1
media (RTP) stream modification 3-2, 4-1
network traffic sniffing (eavesdropping) 3-1, 4-1
Connection service ports 1-1
E
eavesdropping Cisco Unified CM connections 3-1, 4-1
I
identity theft
Cisco Unified CM server 3-2, 4-1
Cisco Unity Connection voice messaging port 3-2
IMAP clients
securing access to Cisco Unity Connection 10-1
security options 11-5
IP phones, network traffic sniffing (eavesdropping) 3-1, 4-1
M
mailbox-size quotas, customizing for users or templates 11-4
man-in-the-middle attacks for Cisco Unified CM connections 3-1, 4-1
media stream, modification threat 3-2, 4-1
messages
shredding files for secure deletes 11-4
message security
overview of options 11-1
security options for IMAP client access 11-5
sensitivity options for users and unidentified callers 11-1
N
network traffic sniffing Cisco Unified CM connections 3-1, 4-1
O
Operating System Administration account 5-1
P
passwords
changing for Connection web application access 6-3, 7-3, 8-3
unique and secure, assigning 7-2
used to access Connection applications 6-1, 7-2, 8-1
PINs
changing Connection phone PINs 6-4, 7-4, 8-3
unique and secure, assigning 7-2
used to access Connection applications 6-1, 7-2, 8-1
ports, voice messaging, and identity theft 3-2
Q
quotas for mailboxes, customizing for users or templates 11-4
R
restriction tables, using to prevent toll fraud 2-1
RTP stream, modification threat 3-2, 4-1
S
sec-01-1 1-1
secure deletes, shredding message files for 11-4
securing Cisco PCA and IMAP client access to Cisco Unity Connection 10-1
security
controlling access, distribution, and storage of voice messages 11-1
IMAP client 11-5
user and unidentified caller messages 11-1
server, identity theft 3-2, 4-1
shredding message files for secure deletes 11-4
SSL certificate, using to secure Cisco PCA and IMAP client access to Cisco Unity Connection 10-1
T
TCP ports
used for inbound connections 1-1
used for outbound connections 1-6
toll fraud 2-1
U
UDP ports
used for inbound connections 1-1
used for outbound connections 1-6
V
voice messaging ports and identity theft 3-2
Index
A
administrative accounts
summary of purposes 5-1
Application Administration account 5-1
authentication rules 7-5
C
call signaling, modification threat 3-1
Cisco PCA, securing access to Cisco Unity Connection 10-1
Cisco Unified CM
call signaling modification 3-1
identity theft 3-2, 4-1
man-in-the-middle attacks on connection to Cisco Unity Connection 3-1, 4-1
media (RTP) stream modification 3-2, 4-1
network traffic sniffing (eavesdropping) 3-1, 4-1
Connection service ports 1-1
E
eavesdropping Cisco Unified CM connections 3-1, 4-1
I
identity theft
Cisco Unified CM server 3-2, 4-1
Cisco Unity Connection voice messaging port 3-2
IMAP clients
securing access to Cisco Unity Connection 10-1
security options 11-5
IP phones, network traffic sniffing (eavesdropping) 3-1, 4-1
M
mailbox-size quotas, customizing for users or templates 11-4
man-in-the-middle attacks for Cisco Unified CM connections 3-1, 4-1
media stream, modification threat 3-2, 4-1
messages
shredding files for secure deletes 11-4
message security
overview of options 11-1
security options for IMAP client access 11-5
sensitivity options for users and unidentified callers 11-1
N
network traffic sniffing Cisco Unified CM connections 3-1, 4-1
O
Operating System Administration account 5-1
P
passwords
changing for Connection web application access 6-3, 7-3, 8-3
unique and secure, assigning 7-2
used to access Connection applications 6-1, 7-2, 8-1
PINs
changing Connection phone PINs 6-4, 7-4, 8-3
unique and secure, assigning 7-2
used to access Connection applications 6-1, 7-2, 8-1
ports, voice messaging, and identity theft 3-2
Q
quotas for mailboxes, customizing for users or templates 11-4
R
restriction tables, using to prevent toll fraud 2-1
RTP stream, modification threat 3-2, 4-1
S
sec-01-1 1-1
secure deletes, shredding message files for 11-4
securing Cisco PCA and IMAP client access to Cisco Unity Connection 10-1
security
controlling access, distribution, and storage of voice messages 11-1
IMAP client 11-5
user and unidentified caller messages 11-1
server, identity theft 3-2, 4-1
shredding message files for secure deletes 11-4
SSL certificate, using to secure Cisco PCA and IMAP client access to Cisco Unity Connection 10-1
T
TCP ports
used for inbound connections 1-1
used for outbound connections 1-6
toll fraud 2-1
U
UDP ports
used for inbound connections 1-1
used for outbound connections 1-6
V
voice messaging ports and identity theft 3-2