Cisco Unity Security Guide (With Microsoft Exchange), Release 4.x
Index

Table Of Contents

A - C - D - E - I - L - M - N - O - P - R - S - T - U - V - W -

Index

A

account policy

account lockout settings for phone access 8-10

phone password settings 8-9

accounts, defining policy for logons, passwords, and lockouts 8-8

ACE/Server return codes 7-12

administration account

limiting use of 6-2

using to log on to the Cisco Unity Administrator 6-2

Anonymous authentication, how it works with the Cisco Unity Administrator 7-4

audit policies, changing 1-2

authentication

Anonymous 7-4

Integrated Windows 7-2

overview 7-2

PCA passwords 7-10

authentication and encryption

best practice 5-4

settings in CiscoUnity 5-3

C

call signaling, modification threat 5-1

CA root certificate

adding to Domain Group Policy 9-8

exporting 9-8

changing

Cisco PCA passwords 8-6

Cisco Unity Administrator passwords 8-6

phone passwords 8-7

Cisco CallManager

call signaling modification 5-1

device authentication as a security feature 5-2

identity theft 5-1

man-in-the-middle attacks on connection to CiscoUnity 5-1

media (RTP) stream modification 5-1

media encryption as a security feature 5-3

network traffic sniffing (eavesdropping) 5-1

security connection with CiscoUnity 5-1

security issues 5-1

signaling authentication as a security feature 5-2

signaling encryption as a security feature 5-3

Cisco Certificate Trust List (CTL) file 5-2

Cisco PCA

authentication, how it works 7-10

passwords 7-10

passwords, changing 8-6

preventing unauthorized access 7-11

Cisco Security Agent

description 3-1

policies 3-1

Cisco Unity Administrator

accounts used to access 6-2

limiting use of administration account 6-2

passwords, changing 8-6

preventing unauthorized access 7-8

security concerns 6-2

using appropriate accounts 6-3

using class of service to restrict access 6-3

Cisco Unity conversation, preventing unauthorized access 8-5

Cisco Unity Inbox

disabling Copy to File option 10-13

handling private messages 10-1

Cisco Unity server, securing 1-1

configuring

IIS for Integrated Windows authentication 7-5

IIS so Cisco Unity Administrator and Status Monitor use Anonymous authentication 7-7

IIS so Cisco Unity Administrator and Status Monitor use Integrated Windows authentication 7-5

D

DCOM dynamic port allocation, restricting 1-9

defining policies for logon, password, and lockout 8-8

distributing root certificate 9-7

dynamic port allocation, restricting 1-9

E

eavesdropping CiscoCallManager connections 5-1

encryption

best practice 5-4

settings in CiscoUnity 5-3

used for media protection 5-3

used for signaling protection 5-3

enhanced phone security

ACE/Server return codes 7-12

Cisco Unity Greetings Administrator, incompatibility 7-13

class of service settings 7-13

setting up 7-13

event log settings, changing 1-3

Exchange, securing 2-5

exporting CA root certificate 9-8

I

identity theft of CiscoCallManager server 5-1

identity theft of CiscoUnity voice messaging port 5-1

IIS

configuring for Integrated Windows authentication 7-5

configuring so Cisco Unity Administrator and Status Monitor use Anonymous authentication 7-7

configuring so Cisco Unity Administrator and Status Monitor use Integrated Windows authentication 7-5

Lockdown wizard, hardening the Cisco Unity server with 2-4

securing 2-3

installing SSL certificate 9-5

Integrated Windows authentication, how it works with the Cisco Unity Administrator 7-2

Internet Explorer, securing 2-3

IP phones

network traffic sniffing (eavesdropping) 5-1

securing connection with CiscoUnity 5-1

security issues 5-1

issuing SSL certificate 9-5

L

local security policies, changing 1-2, 1-3

lockouts

policy for accessing Cisco Unity by phone 8-10

policy for Cisco Unity Administrator access 8-8

logon policy 8-8

M

man-in-the-middle attacks for CiscoCallManager connections 5-1

Media Master, disabling Copy to File 10-13

media stream, modification threat 5-1

Microsoft software, securing 2-1

MSDE 2000, securing 2-2

MSMQ, securing 2-5

N

network traffic sniffing CiscoCallManager connections 5-1

NTLM authentication 7-2

O

operating system, securing 1-1

P

passwords

policy for accessing Cisco Unity by phone 8-9

policy for Cisco Unity Administrator access 8-8

TUI 8-2

web applications 8-2

phone access, account lockout policy 8-10

phone passwords

changing 8-7

default 8-5

securing 8-1

toll fraud 8-1

policies

Cisco Security Agent 3-1

logon, password, and lockout 8-8

port allocation, restricting dynamic 1-9

ports, voice messaging

best practice 5-4

CiscoCallManager security features 5-2

identity theft 5-1

security mode settings 5-3

preventing subscribers from saving WAV files 10-13

private messages, how Cisco Unity handles them 10-1

private secure messaging

certificates 10-6

installing 10-4

limitations 10-3

overview 10-2

sending and receiving 10-2

setting user expectations 10-3

R

restriction tables, best practices for use 4-1

root certificate, distributing to trusted root store 9-7

RSA SecurID overview 7-12

RTP stream, modification threat 5-1

S

Secure Real Time Protocol (SRTP) 5-3

securing

passwords 8-1

Windows 1-1

security mode settings

best practice 5-4

voice messaging ports 5-3

security policy, Windows, applying 1-2

security template, Windows, applying 1-2

security updates, installing Microsoft 2-6

server, securing 1-1

service packs, installing Microsoft 2-6

services, changing the startup type 1-3

setting up enhanced phone security 7-13

SQL Server 2000, securing 2-2

SSL

certificate, installing 9-5

certificate, issuing 9-5

certificate request, submitting 9-4

redirection 9-10

startup type for services, changing 1-3

T

TCP/IP filtering, configuring 1-10

TCP ports, securing 1-6

threats for connection to CiscoCallManager or IP phones 5-1

toll fraud

preventing by using restriction tables 4-1

preventing with account policy 8-10

Transport Layer Security (TLS) protocol 5-2

trusted root store 9-7

TUI

preventing unauthorized access 8-5

private message handling 10-1

U

UDP ports, securing 1-6

updates, installing Microsoft 2-6

URLScan tool, hardening the Cisco Unity server with 2-4

user rights, changing 1-2

V

ViewMail, private message handling 10-1

voice messaging ports

best practice 5-4

CiscoCallManager security features 5-2

identity theft 5-1

security mode settings 5-3

vulnerabilities for connection to CiscoCallManager or IP phones 5-1

W

Windows

applying a security policy 1-2

applying a security template 1-2

securing 1-1

TCP/IP filtering, configuring 1-10

Windows NT Challenge/Response authentication 7-2