Index

Contents

A - B - C - D - E - F - I - J - L - M - N - P - R - S - T - V

Index

A

allowing remote access
how to 1
authentication
device 1
digest 1
overview 1
with CTI/JTAPI/TAPI applications 1
authentication string
with CTI/JTAPI/TAPI applications 1
authorization
configuration settings (table)
for SIP trunk 1
configuring for SIP trunk 1
overview 1

B

barge
encryption restrictions with 1
security 1
security icons 1

C

Certificate Authority Proxy Function (CAPF)
configuration settings (table)
for CTI/JTAPI/TAPI applications 1
configuring an application user or end user CAPF profile 1
deleting an application user or end user CAPF profile 1
viewing certificate operation status for application user or end user 1
with CTI/JTAPI/TAPI applications
interactions and requirements 1
overview 1
updating service parameters 1
Cisco Secure Telnet
design 1
server access 1
structure 1
system 1
Cisco Unified Communications Manager JTAPI
using credential policy 1
using user directory 1
Cisco Unified Communications Manager TAPI
using credential policy 1
Cisco Unified IP Phone
configuration checklist (table) for security 1
encrypted configuration file 1
secure conference support 1
viewing security settings 1
computer telephony integration (CTI)
configuration checklist (table) for securing 1
secure user groups
adding application users and end users 1
conference bridge
conference list 1
configuration checklist (table) for security 1
configuration tips for security 1
configuring minimum Meet-Me security 1
configuring packet capture on a secure conference bridge 1
configuring security 1
minimum Meet-Me security level 1
security 1
security icons 1
security interactions 1
security requirements 1
security restrictions 1
configuration file
encryption 1
Configuration Task Flow 1
Contact Search Authentication 1 2 3 4
credential policy
JTAPI/TAPI support 1

D

device authentication
configuration settings (table)
for phone that is running SCCP 1
for phone that is running SIP 1
for SIP trunk 1
configuring for phones 1
configuring for SIP trunk 1
overview 1
digest authentication
associating digest user with a phone 1
configuration checklist (table)
for phones 1
configuration settings (table)
for end user 1
for phone that is running SIP 1
for SIP trunk 1
configuring digest credentials
for end user 1
configuring for phones 1
configuring for SIP trunk 1
configuring service parameters 1
overview 1

E

Enable 1
encrypted configuration file
configuration tips 1
configuring manual key distribution 1
disabling 1
entering symmetric key 1
understanding 1
using symmetric key encryption w/public key 1
encryption
configuration checklist (table) for gateways and trunks 1
configuration settings (table)
for phone that is running SCCP 1
for phone that is running SIP 1
for SIP trunk 1
configuring for phones 1
configuring SRTP allowed check box 1
configuring with barge 1
for H.323 gateway 1
for H.323/H.225/H.245 trunk 1
for MGCP gateway 1
for SIP trunk 1
interactions 1
overview 1
restrictions 1
signaling
configuring for phones 1
configuring for SIP trunk 1
with CTI/JTAPI/TAPI applications 1

F

file authentication
configuring for phones 1
overview 1
firewall protection 1

I

image authentication
overview 1
integrity
overview 1
IPSec
configuration checklist (table) for IPSec 1

J

JTAPI
Cisco Unified Communications Manager JTAPI 1
configuration checklist (table) for securing 1
configuring security service parameters 1

L

locally significant certificate (LSC)
with CTI/JTAPI/TAPI applications 1

M

media encryption 1
See encryption 1
MGCP gateway
configuration checklist (table) for security 1

N

NMAP scans
running 1

P

phone hardening
configuring 1
phone security profile
synchronizing configuration to applicable phones 1
Phone Support 1

R

remote access 1

S

secure conference
Cisco Unified IP Phone support 1
conference bridge requirements 1
conference list 1
configuration checklist (table) 1
configuration tips 1
configuring minimum Meet-Me security 1
configuring packet capture 1
configuring secure conference bridge 1
CTI support 1
interactions 1
minimum Meet-Me security level 1
restrictions 1
security icons 1
security overview 1
trunks and gateways 1
Secure Directory Server URL 1
security
authentication overview 1
authorization overview 1
best practices 1
configuration checklist for authentication and encryption (table) 1
encryption overview 1
firewall integrity 1
interactions 1
rebooting the cluster 1
rebooting the server 1
resetting devices 1
restarting Cisco Unified Communications Manager service 1
restrictions 1
using barge with encryption 1
security profile
applying for SIP trunk 1
applying to phones 1
configuration settings (table)
for phone that is running SCCP 1
for phones that is running SIP 1
for SIP trunk 1
configuring for phones 1
configuring for SIP trunk 1
deleting for phones 1
finding for phones 1
finding phones that use 1
overview for SIP trunk 1
signaling authentication
overview 1
signaling encryption
overview 1
SIP Trunk security profile
synchronizing configuration to applicable SIP trunks 1
SRST
overview for securing 1
SRST reference
configuring 1 2

T

TAC
allowing remote access 1
TAPI
configuration checklist (table) for securing 1
configuring security service parameters 1
Telnet
Cisco Secure 1 2
design 1
structure 1
transport security
configuration settings (table)
for phone that is running SCCP 1
for phone that is running SIP 1
for SIP trunk 1
configuring for phones that are running SIP 1
configuring for SIP trunk 1
troubleshooting
remote access for TAC 1

V

voice messaging
configuration checklist (table) for security 1
security overview 1
security requirements 1
voice messaging port
applying a security profile 1
applying a security profile using the Wizard 1
configuration checklist (table) for security 1
security overview 1