Cisco Unified Communications Manager Security Guide, Release 9.0(1)
Index
Downloads: The complete bookPDF (PDF - 3.67MB) | Feedback

Contents

A - B - C - D - E - F - H - I - J - L - M - N - P - S - T - V -

Index

A

authentication
device 1
digest 1
interactions 1 2
overview 1
restrictions 1 2
with CTI/JTAPI/TAPI applications 1
authentication string
entering on phone 1
finding phones using 1
with CAPF 1
with CTI/JTAPI/TAPI applications 1
authorization
configuration settings (table)
for SIP trunk 1
configuring for SIP trunk 1
interactions 1
overview 1

B

barge
encryption restrictions with 1
security 1
security icons 1

C

Certificate Authority Proxy Function (CAPF)
activating service 1
authentication string
entering on phone 1
CAPF service 1
configuration checklist (table) 1
configuration settings (table)
for CTI/JTAPI/TAPI applications 1
for phones 1
configuring an application user or end user CAPF profile 1
configuring in Cisco Unified Serviceability 1
deleting an application user or end user CAPF profile 1
finding an application user or end user CAPF profile 1
finding phones using LSC or authentication string 1
generating CAPF report 1
installing 1
interaction with Cisco Unified IP Phone 1
interaction with IPv6 addressing 1
interactions and requirements 1
overview 1
updating service parameters 1
using for phone certificate operations 1
viewing certificate operation status for application user or end user 1
with CTI/JTAPI/TAPI applications
interactions and requirements 1
overview 1
updating service parameters 1
Certificate Signing Requests (CSRs) 1
certificates
external CAs 1
Firefox certificate 1
Safari certificate 1
types 1
Cisco Unified IP Phone
authentication string
entering on phone 1
configuration checklist (table) for security 1
configuration settings (table)
for CAPF 1
configuration tips for phone security profiles 1
deleting CTL file 1
disabling the PC Port setting 1
disabling the PC Voice VLAN Access setting 1
disabling the Setting Access setting 1
encrypted configuration file 1
interaction with CAPF 1
secure conference support 1
security icons 1
understanding security 1
viewing security settings 1
computer telephony integration (CTI)
configuration checklist (table) for securing 1
secure user groups
adding application users and end users 1
conference bridge
conference list 1
configuration checklist (table) for security 1
configuration tips for security 1
configuring minimum Meet-Me security 1
configuring packet capture on a secure conference bridge 1
configuring security 1
minimum Meet-Me security level 1
security 1
security icons 1
security interactions 1
security requirements 1
security restrictions 1
configuration file
encryption 1
CTL client
CAPF service 1
cluster security mode
updating 1
configuration checklist (table) 1
configuration settings (table) 1
configuration tips 1
configuring
CTL client 1
TLS port 1
CTL Provider service 1
deleting CTL file on phone 1
installing 1 2
migrating 1
overview 1
security mode
verifying 1
security token
changing password 1
configuring CTL client 1
setting the Smart Card service 1
size limit 1
uninstalling 1
upgrading 1
verifying 1
version
determining 1
CTL file
deleting entry 1
deleting on phone 1
updating 1
CTL Provider
activating service 1

D

device authentication
configuration settings (table)
for phone that is running SCCP 1
for phone that is running SIP 1
for SIP trunk 1
configuring for phones 1
configuring for SIP trunk 1
overview 1
digest authentication
associating digest user with a phone 1
cluster ID 1
configuration checklist (table)
for phones 1
for SIP trunk 1
configuration settings (table)
for application user digest credentials 1
for end user 1
for phone that is running SIP 1
for SIP realm 1
for SIP trunk 1
configuring a SIP realm 1
configuring digest credentials
for application user 1
for end user 1
configuring for phones 1
configuring for SIP trunk 1
configuring service parameters 1
deleting a SIP realm 1
finding a SIP realm 1
overview 1

E

encrypted configuration file
configuration checklist (table) 1
configuration settings (table)
for manual key 1
configuration tips 1
configuring manual key distribution 1
disabling 1
enabling 1
entering symmetric key 1
manual key configuration checklist (table) 1
manual key distribution 1
phone support 1
symmetric key encryption with public key 1
understanding 1
using symmetric key encryption w/public key 1
verifying 1
encryption
configuration checklist (table) for gateways and trunks 1
configuration settings (table)
for phone that is running SCCP 1
for phone that is running SIP 1
for SIP trunk 1
configuring for phones 1
configuring SRTP allowed check box 1
configuring with barge 1
for H.323 gateway 1
for H.323/H.225/H.245 trunk 1
for MGCP gateway 1
for SIP trunk 1
installing 1
interactions 1 2 3
overview 1
restrictions 1 2 3
signaling
configuring for phones 1
configuring for SIP trunk 1
with CTI/JTAPI/TAPI applications 1
etoken
changing password 1
configuring CTL client 1

F

file authentication
configuring for phones 1
overview 1

H

HTTPS
overview 1
virtual directories (table) 1
with Firefox 1
with Safari 1

I

image authentication
overview 1
integrity
overview 1
IPSec 1
configuration checklist (table) for IPSec 1
configuring 1
gateway or trunk considerations 1
infrastructure considerations 1
recommendations 1 2

J

JTAPI
configuration checklist (table) for securing 1
configuring security service parameters 1

L

locally significant certificate (LSC)
finding phones using 1
with CTI/JTAPI/TAPI applications 1

M

media encryption 1
See encryption 1
MGCP gateway
configuration checklist (table) for security 1
configuring 1 2

N

NMAP scans
running 1

P

phone hardening
configuring 1
disabling the PC Port setting 1
disabling the PC Voice VLAN Access setting 1
disabling the Setting Access setting 1
phone security profile
synchronizing configuration to applicable phones 1
port
CTL Provider 1
Ethernet phone 1
SIP secure 1
protected call 1

S

secure conference
Cisco Unified IP Phone support 1
conference bridge requirements 1
conference list 1
configuration checklist (table) 1
configuration tips 1
configuring minimum Meet-Me security 1
configuring packet capture 1
configuring secure conference bridge 1
CTI support 1
interactions 1
minimum Meet-Me security level 1
restrictions 1
security icons 1
security overview 1
trunks and gateways 1
secure indication tone 1
secure sockets layer (SSL)
installing 1
with HTTPS 1
security
authentication overview 1
authorization overview 1
best practices 1
certificate types 1
configuration checklist for authentication and encryption (table) 1
CTL client overview 1
encryption overview 1
external CAs 1
features list 1
HTTPS 1
installing 1
interactions 1 2 3
rebooting the cluster 1
rebooting the server 1
resetting devices 1
restarting Cisco Unified Communications Manager service 1
restrictions 1 2 3
SCCP calls (table) 1
SIP calls (table) 1
system requirements 1
terminology (table) 1
tokens 1 2 3 4 5
using barge with encryption 1
where to find more information 1
security mode
cluster
configuring 1
verifying 1
security profile
applying for SIP trunk 1
applying to Cisco Unified Mobility Advantage Server 1
applying to phones 1
configuration settings (table)
for phone that is running SCCP 1
for phones that is running SIP 1
for SIP trunk 1
configuration tips for phones 1
configuring for phones 1
configuring for SIP trunk 1
deleting for Cisco Unified Mobility Advantage server 1
deleting for phones 1
deleting for SIP trunk 1
finding for Cisco Unified Mobility Advantage servers 1
finding for phones 1
finding for SIP trunk 1
finding phones that use 1
overview for Cisco Unified Mobility Advantage 1
overview for phones 1
overview for SIP trunk 1
security token
configuring CTL client 1
signaling authentication
overview 1
signaling encryption
overview 1
SIP Trunk security profile
synchronizing configuration to applicable SIP trunks 1
Site Administrator Security Token (SAST) 1
SRST
configuration checklist (table) for securing 1
configuration tips for securing 1
overview for securing 1 2
troubleshooting
certificate deleted on gateway 1
SRST reference
configuration settings (table) for security 1
configuring 1 2 3
troubleshooting
deleting secured reference 1

T

TAPI
configuration checklist (table) for securing 1
configuring security service parameters 1
Tftp service 1
TLS Proxy server 1
transport layer security (TLS) 1
port 1
transport security
and real-time protocol (RTP) 1
and secure real-time protocol (SRTP) 1
configuration settings (table)
for phone that is running SCCP 1
for phone that is running SIP 1
for SIP trunk 1
configuring for phones that are running SIP 1
configuring for SIP trunk 1
IPSec 1
TLS 1
troubleshooting
deleting CTL file on phone 1
SRST certificate deleted on gateway 1

V

voice messaging
configuration checklist (table) for security 1
security overview 1
security requirements 1
voice messaging port
applying a security profile 1
applying a security profile using the Wizard 1
configuration checklist (table) for security 1
security overview 1