- Cisco Unity Express Features
- Overview of Cisco Unity Express Voice Mail and Auto Attendant
- Entering and Exiting the Command Environment
- Configuration Tasks
- Configuring System Components
- Configuring Users and Groups
- Configuring Voice Mail
- Configure Smart Licensing
- Configuring Authentication, Authorization, and Accounting
- Configuring the Administration via Telephone Application
- Configuring Auto Attendants
- Configuring Message Notification
- Configuring VoiceView Express
- Networking Cisco Unity Express
- Configuring Distribution Lists
- Configuring Security
- Backing Up and Restoring Data
- Language Support
- Configuring Advanced Voice Mail
- Advanced Configuration
- Monitoring the System
- Configuring SNMP Monitoring
- Registering Cisco Unity Express Endpoints to Cisco Unified Messaging Gateway
- Configuring Your Cisco IOS Gateway for T.37 On-Ramp and Off-Ramp Fax Support
- Troubleshooting
Configuring Authentication, Authorization, and Accounting
Overview
Release 7.0 provides a set of new features for Authentication, Authorization, and Accounting (AAA). These features expand on the authentication and authorization functionality available in previous releases, such as determining which user could access restricted services by assigning predefined privileges to groups.
In release 7.0, you can create new privileges and customize existing privileges and then assign these privileges to groups as you did in previous releases.
In addition, release 7.0 also includes these new AAA features:
- The ability to log AAA accounting information that enables you to easily audit configuration changes, maintain security, accurately allocate resources, and determine who should be billed for the use of resources.
- The ability to use a remote RADIUS server for authentication.
- The ability to configure failover capabilities to for the accounting and authentication servers.
To configure the AAA features, use the following procedures:
Configuring the Accounting Server
You can configure up to two AAA accounting servers. Automatic failover functionality is provided if you have two accounting servers configured. In this case, if the first server is unreachable, the accounting information is sent the second server. If both accounting servers are unreachable, accounting records are cached until a server becomes available. If a server cannot be reached before the cache is full, the oldest accounting packets are dropped to make room for the new packets.
Because the configuration of the AAA accounting server is completely independent of the AAA authentication server, you can configure the AAA accounting server to be on the same or different machine from the AAA authentication server.
If you use a syslog server, it is not affected by the AAA configuration and continues to use the existing user interfaces. When the RADIUS server sends AAA accounting information to a syslog server, it is normalized into a single string before being recorded. If no syslog server is defined, the AAA accounting logs are recorded by the syslog server running locally on Cisco Unity Express.
For an accounting server, you can configure the following information used to log into the server:
- Server IP address or DNS name
- Port number used
- Cryptographic shared secret and security credentials
- Number of login retries
- Length of login timeout

Note Only RADIUS servers are supported.
Specifying AAA Accounting Settings
SUMMARY STEPS
2. aaa accounting server remote
3. address address [ port port] secret secret
DETAILED STEPS
Examples
The following is sample output from the show aaa accounting service command:
Configuring the Authentication Server
The two procedures for configuring AAA authentication consist of:
- Configuring connection parameters for the AAA authentication server
- Configuring whether the authentication servers or local authentication database will be queried first
This section covers only the first procedure. The second procedure is covered in the “Configuring the AAA Policy” section.
For an AAA authentication server, you can configure the following information used to log into the server:
- Server IP address or DNS name
- Port number used
- Cryptographic shared secret and security credentials
- Number of login retries
- Length of login timeout

Note To help protect the cryptographic information of the RADIUS server, you must view the running configuration to see this information.
Specifying AAA Authentication Settings
SUMMARY STEPS
2. aaa authentication server remote
3. address address [ port port] secret secret
DETAILED STEPS
Configuring the AAA Policy
The AAA policy specifies the failover functionality that you can optionally configure for the authentication server. You can choose from two types of failover functionality:
You can also use a combination of both failover methods.
Authentication Failover
The authentication failover feature enables you to optionally use a remote RADIUS server for user login authentication in addition to the local database. The procedure in this section configures the order in which authentication is resolved. You can configure authentication to use:
- Only the local database
- Only the remote server
- The local database first, then the remote server
- The remote server first, then the local database
When using both local and remote authentication, you can also configure whether you want the user attributes that are retrieved from a remote RADIUS AAA server to be merged with the attributes found in the local user database for the same username.

Note The authentication failover feature has the following limitations:
- Authentication with a RADIUS server is available only when accessing the GUI or CLI interface and requires only a user ID and password. Authentication for the TUI, VVE, AvT, and IMAP interfaces can use only the local database. Therefore, users of the TUI, VVE, AvT, and IMAP interfaces must be configured locally in order to gain access. The auto-attendant interface does not require authentication because it is user independent.
- Login information is not synchronized between the local system and the remote server. Any security features such, as password expiration, must be configured separately for Cisco Unity Express and the RADIUS server. Also, Cisco Unity Express users are not prompted when security events, such as password expiration or account lockout, occur on the RADIUS server, and vis versa.
Unreachable Failover
The unreachable failover is used only with RADIUS servers. This feature enables you to configure up to two addresses that can be used to access RADIUS servers.
As Cisco Unity Express attempts to authenticate a user with the RADIUS servers, messages are sent to users to notify them when a RADIUS server:
Example
In this example, authentication is performed by the remote server first, then by the local database. Also, two addresses are configured for the remote RADIUS server.
This is a sequence of events that could occur during authentication for this example:
1. Cisco Unity Express tries to contact the first remote RADIUS server.
2. If the first RADIUS server does not respond or does not accept the authentication credentials of the user, Cisco Unity Express tries to contact the second remote RADIUS server.
3. If the second RADIUS server does not respond or does not accept the authentication credentials of the user, the user receives the appropriate error message and Cisco Unity Express tries to contact the local database.
4. If the local database does not accept the authentication credentials of the user, the user receives an error message.
Specifying the Policy that Controls the Behavior of Authentication and Authorization
SUMMARY STEPS
3. authentication-order {remote [local] | local [remote]}
DETAILED STEPS
Examples
The following is sample output from the show aaa policy command:
Configuring Privileges
Cisco Unity Express software provides several predefined privileges that you can assign to groups. Starting with 7.0, you can also create your own privileges and modify the predefined privileges.
When you assign a privilege to a group, any member of the group is granted the privilege rights. An administrator group is created automatically by the software initialization process from the imported subscribers designated as administrators.
When you create or modify privileges, you add or delete the operations allowed by that privilege. Operations define the CLI commands and GUI functions that are allowed. In addition to adding operations to a privilege, you can also configure a privilege to have another privilege nested inside of it. A privilege configured with a nested privilege includes all operations configured for the nested privilege.
As part of the planning process, you should decide:
- How many categories of user privileges you want to create for your company.
- Which functions each privilege will allow your users to perform.
After you decide which privileges you want your users to have:
1. Review the predefined privileges to determine whether any of them are similar to the permissions that you want to give to each of your categories of users.
2. Configure a separate privilege for each category by specifying which operations each category of users will be allowed to preform, optionally including predefined privileges (see Creating and Customizing Privileges).
3. Create a group for each category of user privilege and assign the appropriate privilege to each group of users (see Adding and Modifying a Group).
4. Add your users to the appropriate group.

Tip For an example of the commands used for these steps, see the “Configuration Example” section.

Note You cannot modify the superuser privilege.
Table 9-1 describes the predefined privileges provided with the Cisco Unity Express software and the operations associated with them. Table 9-2 describes all available operations that you can add to privileges.

Note Two new permissions were added in 7.0: manage-users and manage-passwords.
To display a list of privileges, use the show privileges command in Cisco Unity Express EXEC mode. To display detailed information about a specific privilege, use the show privilege detail command.

Note Users do not need privileges to access their own data. The user’s data is primarily associated with the voice mail application and includes the user’s:
- Language (configured for the user’s voice mailbox)
- Password
- PIN
- Membership to groups owned by the user
- Ownership of groups owned by the user
- Notification profile
- Cascade settings
- Personal voice mail zero out number
- Voice mail greeting type
- Voice mail play tutorial flag
- Public distribution lists owned by the user
- Private distribution lists
Configuration Example
In this example, a company wants a security structure with two levels of security administration. The two levels allow the following actions to be taken by the administrator:
- The first level enables the security administrator to reset the passwords and PINs for users that have locked themselves out of the system, whether they forgot their password or their account is locked because of too many failed login attempts. This level will be called PASSWORD RESET.
- The second level enables the security administrator to act as a system guardian by:
– Ensuring that the proper security policies are implemented for issues such as password aging, account lockout, encryption, authentication, authorization, and accounting
– Ensuring that voicemail messages and other data remain safe from attackers without over burdening end users with security related details and tasks
– Monitoring the system to ensure that only legitimate users have access
– Troubleshooting any problems that legitimate users have with accessing the system
– Resetting passwords and PINs for users that have locked themselves out of the system, whether they forgot their password or their account is locked because of too many failed login attempts
This level will be called SYSTEM GUARDIAN
When you use the general planning and configuration steps as described in the “Configuring Privileges” section, to set up the security administration levels for this example, these are the results:
– How many levels or categories of user privileges you want to create for your company
– Which functions each privilege will allow your users to perform
There will be two levels, called PASSWORD RESET and SYSTEM GUARDIAN, as described above.
- After reviewing the predefined privileges to determine whether any of them are similar to the permissions that you want to give each of your security levels, you find that:
– The predefined privilege called manage-passwords can be used for the security level named PASSWORD RESET because it has all of the permissions needed to help users that have locked themselves out of the system.
– The manage-passwords privilege also has a subset of the permissions needed the security level named SYSTEM GUARDIAN and is the predefined privilege closest to your requirements. However, to act as system guardian, the following additional operations will have to included: security.access, security.aaa, security.password, security.pin, system.debu g, and system.view. See Table 9-2 for more information.
- Use the following commands to configure a privilege for the SYSTEM GUARDIAN security level by including the predefined privilege manage-password and adding the operations listed in the previous bullet:

Note You do not have to configure a privilege for the PASSWORD RESET security level because you can use the predefined privilege manage-passwords.
- Use the following commands to create a new group called password-reset and assign the privilege called manage-password s to it:
- Use the following commands to create a new group called system-guardian and assign the privilege called guardian-privilege :
- Assign the appropriate users to the new groups, associating them with their roles. For example, if you want Bob and Ned to have the privileges of the PASSWORD RESET security administration level and Ann to have the privileges of the SYSTEM GUARDIAN security administration level, use the following commands:
- The configuration of this example is now complete. You can verify your configuration using the following commands.
The following is sample output from the show group detail groupname password-reset expanded command:
The following is sample output from the show group detail groupname system-guardian expanded command:
The following is sample output from the show privilege detail manage-passwords expanded command:
The following is sample output from the show privilege detail guardian-privilege expanded command:
Creating and Customizing Privileges
SUMMARY STEP
2. privilege privilege-name create
3. privilege privilege-name description string
4. privilege privilege-name operation operation-name
5. privilege privilege-name member privilege-name2
DETAILED STEPS
Examples
The following is sample output from the show operations command:
The following is sample output from the show operation detail command:
The following is sample output from the show privileges command:
The following is sample output from the show privilege detail command:
Configuring Accounting Event Logging
AAA accounting logs contain information that enables you to easily:
- Audit configuration changes
- Maintain security
- Accurately allocate resources
- Determine who should be billed for the use of resources
You can configure AAA accounting to log the following types of events:
- Logins—All forms of system access except IMAP, including access to the CLI, GUI, TUI, and VVE, when a login is required.
- Logouts—All forms of system access except IMAP, including access to the CLI, GUI, TUI, and VVE, when a login is required before logout.
- Failed logins—Failed login attempts for all forms of system access except IMAP, including access to the CLI, GUI, TUI, and VVE, when a login is required.
- Configuration mode commands—Any changes made to the Cisco Unity Express configuration using any interface except IMAP (CLI, GUI, TUI, and VVE).
- EXEC mode commands—Any commands entered in Cisco Unity Express EXEC mode using any interface except IMAP (CLI, GUI, TUI, and VVE).
- System startups—System startups, which include information about the system’s software version, installed licenses, installed packages, installed languages, and so on.
- System Shutdowns—System shutdowns, which include information about the system’s software version, installed licenses, installed packages, installed languages, and so on.
- IMAP—Access to the IMAP system.
In addition to information specific to the type of action performed, the accounting logs also indicate:
- User that authored the action
- Time when the action was executed
- Time when the accounting record was sent to the server
The detailed content of the log entries is explained in the “Examples” section.

Note Account logging is not performed during the system power-up playback of the startup configuration. When the system boots up, the startup-config commands are not recorded.
Configuring Accounting Event Logging
SUMMARY STEPS
DETAILED STEPS
Examples
The following is sample output from the show aaa accounting event command:
Configuring Console Authentication
By default, console authentication is disabled, allowing any user logging into the system through the console to have superuser privileges and to log in without providing a username or password.
Therefore, to protect your console from unauthorized access, you must enter the login command in config-line mode, as described below.

Note To see whether authentication is enabled for the console, you must view the running configuration.