Security Guide for Cisco Unity Release 8.x (With Microsoft Exchange)
Index
Downloads: This chapterpdf (PDF - 152.0KB) The complete bookPDF (PDF - 2.3MB) | Feedback

Index

Table Of Contents

A - C - D - E - F - I - L - M - N - O - P - R - S - T - U - V - W -

Index

A

account policy

account lockout settings for phone access 9-10

phone password settings 9-8

accounts, defining policy for logons, passwords, and lockouts 9-7

ACE/Server return codes 8-11

administration account

limiting use of 7-2

using to log on to the Cisco Unity Administrator 7-2

Anonymous authentication, how it works with the Cisco Unity Administrator 8-4

authentication

Anonymous 8-4

best practice 6-4

Integrated Windows 8-2

overview 8-2

PCA passwords 8-8

settings in CiscoUnity 6-3

C

call signaling, modification threat 6-1

CA root certificate

adding to Domain Group Policy 10-11

exporting 10-11

changing

Cisco PCA passwords 9-6

Cisco Unity Administrator passwords 9-6

permissions on files in the CommServer directory 1-2

phone passwords 9-6

Cisco Certificate Trust List (CTL) file

used for device authentication 6-2

used for signaling authentication 6-2

Cisco PCA

authentication, how it works 8-8

passwords 8-8

passwords, changing 9-6

preventing unauthorized access 8-9

Cisco Security Agent

description 4-1

policies 4-1

Cisco Unified CM

call signaling modification 6-1

device authentication as a security feature 6-2

identity theft 6-2

man-in-the-middle attacks on connection to CiscoUnity 6-1

media (RTP) stream modification 6-1

media encryption as a security feature 6-3

network traffic sniffing (eavesdropping) 6-1

security connection with CiscoUnity 6-1

security issues 6-1

signaling authentication as a security feature 6-2

signaling encryption as a security feature 6-2

Cisco Unity Administrator

accounts used to access 7-2

limiting use of administration account 7-2

passwords, changing 9-6

preventing unauthorized access 8-7

security concerns 7-2

using appropriate accounts 7-3

using class of service to restrict access 7-3

Cisco Unity conversation, preventing unauthorized access 9-5

Cisco Unity Inbox

disabling Copy to File option 11-17

handling private messages 11-1

Cisco Unity server, securing 1-1

configuring

IIS for Integrated Windows authentication 8-5

IIS so Cisco Unity Administrator and Status Monitor use Anonymous authentication 8-6

IIS so Cisco Unity Administrator and Status Monitor use Integrated Windows authentication 8-5

D

defining policies for logon, password, and lockout 9-7

distributing root certificate 10-10

E

eavesdropping CiscoUnified CM connections 6-1

encryption

best practice 6-4

settings in CiscoUnity 6-3

used for media protection 6-3

used for signaling protection 6-2

enhanced phone security

ACE/Server return codes 8-11

Cisco Unity Greetings Administrator, incompatibility 8-11

class of service settings 8-11

setting up 8-11

Exchange, securing 2-3

exporting CA root certificate 10-11

F

file permissions, changing on files in the CommServer directory 1-2

firewall, configuring 3-1

I

identity theft

CiscoUnified CM server 6-2

CiscoUnity voice messaging port 6-1

IIS

configuring for Integrated Windows authentication 8-5

configuring so Cisco Unity Administrator and Status Monitor use Anonymous authentication 8-6

configuring so Cisco Unity Administrator and Status Monitor use Integrated Windows authentication 8-5

Integrated Windows authentication, how it works with the Cisco Unity Administrator 8-2

Internet Explorer, securing 2-2

IP phones

network traffic sniffing (eavesdropping) 6-1

securing connection with CiscoUnity 6-1

security issues 6-1

L

lockouts

policy for accessing Cisco Unity by phone 9-10

policy for Cisco Unity Administrator access 9-7

logon policy 9-7

M

man-in-the-middle attacks for CiscoUnified CM connections 6-1

Media Master, disabling Copy to File 11-17

media stream, modification threat 6-1

Microsoft Certificate Services component, installing 10-3

Microsoft software, securing 2-1

MSDE 2000, securing 2-2

MSMQ, securing 2-3

N

network traffic sniffing CiscoUnified CM connections 6-1

NTLM authentication 8-2

O

operating system, securing 1-1

P

passwords

policy for accessing Cisco Unity by phone 9-8

policy for Cisco Unity Administrator access 9-7

TUI 9-2

web applications 9-2

permissions, changing on files in the CommServer directory 1-2

phone access, account lockout policy 9-10

phone passwords

changing 9-6

default 9-5

securing 9-1

toll fraud 9-1

policies

Cisco Security Agent 4-1

logon, password, and lockout 9-7

ports, voice messaging

best practice 6-4

CiscoUnified CM security features 6-2

identity theft 6-1

security mode settings 6-3

private messages, how Cisco Unity handles them 11-1

R

restriction tables, best practices for use 5-1

root certificate, distributing to trusted root store 10-10

RSA SecurID overview 8-10

RTP stream, modification threat 6-1

S

secure messaging

installing 11-6

limitations 11-4

overview 11-2

sending and receiving 11-2

setting user expectations 11-4

Secure Real Time Protocol (SRTP) 6-3

securing

passwords 9-1

Windows 1-1

security mode settings

best practice 6-4

voice messaging ports 6-3

security policy, Windows, applying 1-2

security template, Windows, applying 1-2

security updates, installing Microsoft 2-3

server

identity theft 6-2

securing 1-1

service packs, installing Microsoft 2-3

services, changing the startup type 1-2

SQL Server 2000, securing 2-2

SSL

determining whether to use 10-2

installing Microsoft Certificate Services component 10-3

startup type for services, changing 1-2

T

TCP ports, securing 1-5

toll fraud 9-1

preventing by using restriction tables 5-1

preventing with account policy 9-10

Transport Layer Security (TLS) protocol 6-2

trusted root store 10-10

TUI

preventing unauthorized access 9-5

private message handling 11-1

U

UDP ports, securing 1-5

V

ViewMail, private message handling 11-1

voice messaging ports

best practice 6-4

CiscoUnified CM security features 6-2

identity theft 6-1

security mode settings 6-3

W

Windows

applying a security policy 1-2

applying a security template 1-2

securing 1-1

Windows NT Challenge/Response authentication 8-2