Cisco Unified Communications Manager Security Guide, Release 7.0(1)
Index
Downloads: This chapterpdf (PDF - 485.0KB) The complete bookPDF (PDF - 4.69MB) | Feedback

Index

Table Of Contents

A - B - C - D - E - F - H - I - J - L - M - P - S - T - V -

Index

A

authentication

device 1-17

digest 1-17

interactions 1-6, 1-7

overview 1-17

restrictions 1-6, 1-7

with CTI/JTAPI/TAPI applications 13-2

authentication string

entering on phone 7-9

finding phones using 7-8

with CAPF 7-1

with CTI/JTAPI/TAPI applications 13-4

authorization

configuration settings (table)

for SIP trunk 16-4

configuring for SIP trunk 16-3

interactions 1-7

overview 1-17

B

barge

encryption restrictions with 1-13

security 11-1

security icons 11-3

C

Certificate Authority Proxy Function (CAPF)

activating service 7-5, 13-8

authentication string

entering on phone 7-9

CAPF service 3-5

configuration checklist (table) 7-4

configuration settings (table)

for CTI/JTAPI/TAPI applications 13-11

for phones 7-7

configuring an application user or end user CAPF profile 13-10

configuring in Cisco Unified Serviceability 7-4

deleting an application user or end user CAPF profile 13-12

finding an application user or end user CAPF profile 13-9

finding phones using LSC or authentication string 7-8

generating CAPF report 7-8

installing 1-13

interactions and requirements 7-3

interaction with Cisco Unified IP Phone 7-2

overview 7-1

updating service parameters 7-5

using for phone certificate operations 7-6

viewing certificate operation status for application user or end user 13-14

with CTI/JTAPI/TAPI applications

interactions and requirements 13-5

overview 13-4

updating service parameters 13-8

certificates

external CAs 1-14

Internet Explorer certificate 2-2

Netscape certificate 2-6

types 1-14

Certificate Signing Requests (CSRs) 1-14

Cisco Unified IP Phone

authentication string

entering on phone 7-9

configuration checklist (table) for security 4-2

configuration settings (table)

for CAPF 7-7

configuration tips for phone security profiles 5-1

deleting CTL file 3-18

disabling the GARP setting 10-1

disabling the PC Port setting 10-2

disabling the PC Voice VLAN Access setting 10-2

disabling the Setting Access setting 10-2

disabling the Web Access setting 10-1

encrypted configuration file 8-1

interaction with CAPF 7-2

secure conference support 11-5

security icons 1-6

understanding security 4-1

viewing security settings 4-2

computer telephony integration (CTI)

configuration checklist (table) for securing 13-5

secure user groups

adding application users and end users 13-7

conference bridge

conference list 11-3

configuration checklist (table) for security 11-9

configuration tips for security 11-8

configuring minimum Meet-Me security 11-11

configuring packet capture on a secure conference bridge 11-12

configuring security 11-10

minimum Meet-Me security level 11-3

security 11-1

security icons 11-3

security interactions 11-6

security requirements 11-2

security restrictions 11-6

configuration file

encryption 1-21

CTL client

CAPF service 3-5

cluster security mode

updating 3-14

configuration checklist (table) 3-4

configuration settings (table) 3-14

configuration tips 3-3

configuring

CTL client 3-9

TLS port 3-6

CTL Provider service 3-5

deleting CTL file on phone 3-18

installing 1-13, 3-7

migrating 3-8

overview 3-2

security mode

verifying 3-16

security token

changing password 3-18

configuring CTL client 3-9

setting the Smart Card service 3-17

uninstalling 3-19

upgrading 3-8

verifying 3-19

version

determining 3-19

CTL file

deleting entry 3-13

deleting on phone 3-18

updating 3-12

CTL Provider

activating service 3-5

D

device authentication

configuration settings (table)

for SCCP phone 5-4

for SIP phones 5-6

for SIP trunk 16-4

configuring for phones 5-3

configuring for SIP trunk 16-3

overview 1-17

digest authentication

associating digest user with a phone 9-4

cluster ID 17-2

configuration checklist (table)

for phones 9-1

for SIP trunk 17-1

configuration settings (table)

for application user digest credentials 17-3

for end user 9-3

for SIP phones 5-6

for SIP realm 17-5

for SIP trunk 16-4

configuring a SIP realm 17-4

configuring digest credentials

for application user 17-2

for end user 9-3

configuring for phones 5-3

configuring for SIP trunk 16-3

configuring service parameters 9-2

deleting a SIP realm 17-5

finding a SIP realm 17-3

overview 1-17

E

encrypted configuration file

configuration checklist (table) 8-5

configuration settings (table)

for manual key 8-7

configuration tips 8-4

configuring manual key distribution 8-6

disabling 8-9

enabling 8-6

entering symmetric key 8-7

manual key configuration checklist (table) 8-7

manual key distribution 8-2

phone support 8-4

symmetric key encryption with public key 8-3

understanding 8-1

using symmetric key encryption w/public key 8-8

verifying 8-9

encryption

configuration checklist (table) for gateways and trunks 15-3

configuration settings (table)

for SCCP phone 5-4

for SIP phone 5-6

for SIP trunk 16-4

configuring for phones 5-3

configuring SRTP allowed check box 15-5

configuring with barge 1-13

for H.323/H.225/H.245 trunk 15-2

for H.323 gateway 15-2

for MGCP gateway 15-1

for SIP trunk 15-3

installing 1-13

interactions 1-6, 1-7, 11-6

overview 1-21

restrictions 1-6, 1-7, 11-6

signaling

configuring for phones 5-3

configuring for SIP trunk 16-3

with CTI/JTAPI/TAPI applications 13-3

etoken

changing password 3-18

configuring CTL client 3-9

F

file authentication

configuring for phones 5-3

overview 1-17

H

HTTPS

overview 2-1

virtual directories (table) 2-2

with Internet Explorer 2-2

with Netscape 2-6

I

image authentication

overview 1-17

integrity

overview 1-17

IPSec 1-13

configuration checklist (table) for IPSec 15-3

configuring 15-4

gateway or trunk considerations 15-5

infrastructure considerations 15-4

recommendations 15-4, 15-5

J

JTAPI

configuration checklist (table) for securing 13-5

configuring security service parameters 13-13

L

locally significant certificate (LSC)

finding phones using 7-8

with CTI/JTAPI/TAPI applications 13-4

M

media encryption (See also encryption)

overview 1-21

MGCP gateway

configuration checklist (table) for security 15-3

configuring 15-4, 15-5

P

phone hardening

configuring 10-2

disabling the GARP setting 10-1

disabling the PC Port setting 10-2

disabling the PC Voice VLAN Access setting 10-2

disabling the Setting Access setting 10-2

disabling the Web Access setting 10-1

port

CTL Provider 3-6

Ethernet phone 3-6

SIP secure 3-6

S

secure conference

Cisco Unified IP Phone support 11-5

conference bridge requirements 11-2

conference list 11-3

configuration checklist (table) 11-9

configuration tips 11-8

configuring minimum Meet-Me security 11-11

configuring packet capture 11-12

configuring secure conference bridge 11-10

CTI support 11-6

interactions 11-6

minimum Meet-Me security level 11-3

restrictions 11-6

security icons 11-3

security overview 11-1

trunks and gateways 11-6

secure sockets layer (SSL)

installing 1-13

with HTTPS 2-1

security

authentication overview 1-17

authorization overview 1-17

best practices 1-11

certificate types 1-14

configuration checklist for authentication and encryption (table) 1-24

CTL client overview 3-2

encryption overview 1-21

external CAs 1-14

features list 1-5

HTTPS 2-1

installing 1-13

interactions 1-6, 1-7, 11-6

rebooting the cluster 1-12

rebooting the server 1-12

resetting devices 1-12

restarting Cisco Unified Communications Manager service 1-12

restrictions 1-6, 1-7, 11-6

SCCP calls (table) 1-5

SIP calls (table) 1-6

system requirements 1-5

terminology (table) 1-2

tokens 3-2, 3-7, 3-9, 3-12, 3-18

using barge with encryption 1-13

where to find more information 1-28

security mode

cluster

configuring 3-14

verifying 3-16

security profile

applying for SIP trunk 16-7

applying to CUMA Server 18-4

applying to phones 5-9

configuration settings (table)

for SCCP phone 5-4

for SIP phones 5-6

for SIP trunk 16-4

configuration tips for phones 5-1

configuring for phones 5-3

configuring for SIP trunk 16-3

deleting for CUMA server 18-4

deleting for phones 5-10

deleting for SIP trunk 16-8

finding for CUMA servers 18-1

finding for phones 5-2

finding for SIP trunk 16-2

finding phones that use 5-11

overview for CUMA 18-1

overview for phones 5-1

overview for SIP trunk 16-1

security token

configuring CTL client 3-9

signaling authentication

overview 1-17

signaling encryption

overview 1-21

Site Administrator Security Token (SAST) 3-2

SRST

configuration checklist (table) for securing 14-3

configuration tips for securing 14-2

overview for securing 14-1

troubleshooting

certificate deleted on gateway 14-5

SRST reference

configuration settings (table) for security 14-5

configuring 14-3

troubleshooting

deleting secured reference 14-5

T

TAPI

configuration checklist (table) for securing 13-5

configuring security service parameters 13-13

Tftp service 3-2

TLS Proxy server 3-2

transport layer security (TLS) 1-13

port 3-6

transport security

and real-time protocol (RTP) 1-13

and secure real-time protocol (SRTP) 1-13

configuration settings (table)

for SCCP phone 5-4

for SIP phone 5-6

for SIP trunk 16-4

configuring for SIP phones 5-3

configuring for SIP trunk 16-3

IPSec 1-13

TLS 1-13

troubleshooting

deleting CTL file on phone 3-18

SRST certificate deleted on gateway 14-5

V

voice messaging

configuration checklist (table) for security 12-3

security overview 12-1

security requirements 12-1

voice messaging port

applying a security profile 12-3

applying a security profile using the Wizard 12-4

configuration checklist (table) for security 12-3

security overview 12-1