The documentation set for this product strives to use bias-free language. For the purposes of this documentation set, bias-free is defined as language that does not imply discrimination based on age, disability, gender, racial identity, ethnic identity, sexual orientation, socioeconomic status, and intersectionality. Exceptions may be present in the documentation due to language that is hardcoded in the user interfaces of the product software, language used based on RFP documentation, or language that is used by a referenced third-party product. Learn more about how Cisco is using Inclusive Language.
Contents
A - B - C - D - E - F - I - J - L - M - N - P - R - S - T - V
Index
A
allowing remote accesshow to 1authenticationdevice 1digest 1overview 1with CTI/JTAPI/TAPI applications 1authentication stringwith CTI/JTAPI/TAPI applications 1authorizationconfiguration settings (table)for SIP trunk 1configuring for SIP trunk 1overview 1B
bargeencryption restrictions with 1security 1security icons 1C
Certificate Authority Proxy Function (CAPF)configuration settings (table)for CTI/JTAPI/TAPI applications 1configuring an application user or end user CAPF profile 1deleting an application user or end user CAPF profile 1viewing certificate operation status for application user or end user 1with CTI/JTAPI/TAPI applicationsinteractions and requirements 1overview 1updating service parameters 1Cisco Secure Telnetdesign 1server access 1structure 1system 1Cisco Unified Communications Manager JTAPIusing credential policy 1using user directory 1Cisco Unified Communications Manager TAPIusing credential policy 1Cisco Unified IP Phoneconfiguration checklist (table) for security 1encrypted configuration file 1secure conference support 1viewing security settings 1computer telephony integration (CTI)configuration checklist (table) for securing 1secure user groupsadding application users and end users 1conference bridgeconference list 1configuration checklist (table) for security 1configuration tips for security 1configuring minimum Meet-Me security 1configuring packet capture on a secure conference bridge 1configuring security 1minimum Meet-Me security level 1security 1security icons 1security interactions 1security requirements 1security restrictions 1configuration fileencryption 1Configuration Task Flow 1credential policyJTAPI/TAPI support 1D
device authenticationconfiguration settings (table)for phone that is running SCCP 1for phone that is running SIP 1for SIP trunk 1configuring for phones 1configuring for SIP trunk 1overview 1digest authenticationassociating digest user with a phone 1configuration checklist (table)for phones 1configuration settings (table)for end user 1for phone that is running SIP 1for SIP trunk 1configuring digest credentialsfor end user 1configuring for phones 1configuring for SIP trunk 1configuring service parameters 1overview 1E
Enable 1encrypted configuration fileconfiguration tips 1configuring manual key distribution 1disabling 1entering symmetric key 1understanding 1using symmetric key encryption w/public key 1encryptionconfiguration checklist (table) for gateways and trunks 1configuration settings (table)for phone that is running SCCP 1for phone that is running SIP 1for SIP trunk 1configuring for phones 1configuring SRTP allowed check box 1configuring with barge 1for H.323 gateway 1for H.323/H.225/H.245 trunk 1for MGCP gateway 1for SIP trunk 1interactions 1overview 1restrictions 1signalingconfiguring for phones 1configuring for SIP trunk 1with CTI/JTAPI/TAPI applications 1F
file authenticationconfiguring for phones 1overview 1firewall protection 1I
image authenticationoverview 1integrityoverview 1IPSecconfiguration checklist (table) for IPSec 1J
JTAPICisco Unified Communications Manager JTAPI 1configuration checklist (table) for securing 1configuring security service parameters 1L
locally significant certificate (LSC)with CTI/JTAPI/TAPI applications 1M
media encryption 1See encryption 1MGCP gatewayconfiguration checklist (table) for security 1N
NMAP scansrunning 1P
phone hardeningconfiguring 1phone security profilesynchronizing configuration to applicable phones 1Phone Support 1R
remote access 1S
secure conferenceCisco Unified IP Phone support 1conference bridge requirements 1conference list 1configuration checklist (table) 1configuration tips 1configuring minimum Meet-Me security 1configuring packet capture 1configuring secure conference bridge 1CTI support 1interactions 1minimum Meet-Me security level 1restrictions 1security icons 1security overview 1trunks and gateways 1Secure Directory Server URL 1securityauthentication overview 1authorization overview 1best practices 1configuration checklist for authentication and encryption (table) 1encryption overview 1firewall integrity 1interactions 1rebooting the cluster 1rebooting the server 1resetting devices 1restarting Cisco Unified Communications Manager service 1restrictions 1using barge with encryption 1security profileapplying for SIP trunk 1applying to phones 1configuration settings (table)for phone that is running SCCP 1for phones that is running SIP 1for SIP trunk 1configuring for phones 1configuring for SIP trunk 1deleting for phones 1finding for phones 1finding phones that use 1overview for SIP trunk 1signaling authenticationoverview 1signaling encryptionoverview 1SIP Trunk security profilesynchronizing configuration to applicable SIP trunks 1SRSToverview for securing 1SRST referenceT
TACallowing remote access 1TAPIconfiguration checklist (table) for securing 1configuring security service parameters 1Telnetdesign 1structure 1transport securityconfiguration settings (table)for phone that is running SCCP 1for phone that is running SIP 1for SIP trunk 1configuring for phones that are running SIP 1configuring for SIP trunk 1troubleshootingremote access for TAC 1V
voice messagingconfiguration checklist (table) for security 1security overview 1security requirements 1voice messaging portapplying a security profile 1applying a security profile using the Wizard 1configuration checklist (table) for security 1security overview 1