Security Guide for Cisco Unity Connection Release 8.x
Index
Downloads: This chapterpdf (PDF - 97.0KB) The complete bookPDF (PDF - 1.43MB) | Feedback

Index

Table Of Contents

A - C - E - I - M - N - O - P - Q - R - S - T - U - V -

Index

A

administrative accounts

best practices 4-16

summary of purposes 4-15

Application Administration account 4-15

authentication rules 6-28

C

call signaling, modification threat 3-11

Cisco PCA, securing access to Cisco Unity Connection 9-39

Cisco Unified CM

call signaling modification 3-11

identity theft 3-12

man-in-the-middle attacks on connection to CiscoUnity Connection 3-11

media (RTP) stream modification 3-12

network traffic sniffing (eavesdropping) 3-11

Connection service ports 1-1

E

eavesdropping CiscoUnified CM connections 3-11

I

identity theft

CiscoUnified CM server 3-12

CiscoUnity Connection voice messaging port 3-12

IMAP clients

securing access to Cisco Unity Connection 9-39

security options 10-59

IP phones, network traffic sniffing (eavesdropping) 3-11

M

mailbox-size quotas, customizing for users or templates 10-56

man-in-the-middle attacks for CiscoUnified CM connections 3-11

Media Master, preventing users from saving messages 10-57

media stream, modification threat 3-12

messages

shredding files for secure deletes 10-57

message security

option to disable saves in Media Master 10-57

overview of options 10-53

security options for IMAP client access 10-59

sensitivity options for users and unidentified callers 10-53

N

network traffic sniffing CiscoUnified CM connections 3-11

O

Operating System Administration account 4-15

P

passwords

changing for Connection web application access 5-21, 6-27, 7-33

unique and secure, assigning 6-26

used to access Connection applications 5-19, 6-26, 7-31

PINs

changing Connection phone PINs 5-22, 6-28, 7-33

unique and secure, assigning 6-26

used to access Connection applications 5-19, 6-26, 7-31

ports, voice messaging, and identity theft 3-12

Q

quotas for mailboxes, customizing for users or templates 10-56

R

restriction tables, using to prevent toll fraud 2-9

RTP stream, modification threat 3-12

S

secure deletes, shredding message files for 10-57

securing Cisco PCA and IMAP client access to Cisco Unity Connection 9-39

security

controlling access, distribution, and storage of voice messages 10-53

IMAP client 10-59

user and unidentified caller messages 10-53

server, identity theft 3-12

shredding message files for secure deletes 10-57

SSL certificate, using to secure Cisco PCA and IMAP client access to Cisco Unity Connection 9-39

T

TCP ports

used for inbound connections 1-1

used for outbound connections 1-5

toll fraud 2-9

U

UDP ports

used for inbound connections 1-1

used for outbound connections 1-5

V

voice messaging ports and identity theft 3-12