Cisco Unified Communications Operating System Administration Guide for Cisco Unity Connection Release 2.x
Security

Table Of Contents

Security

Set Internet Explorer Security Options

Manage Certificates and Certificate Trust Lists

Display Certificates

Download a Certificate or CTL

Delete and Regenerate a Certificate

Deleting a Certificate

Regenerating a Certificate

Upload a Certificate or Certificate Trust List

Upload a Certificate

Upload a Certificate Trust List

Upload a Directory Trust Certificate

Using Third-Party CA Certificates

Generating a Certificate Signing Request

Download a Certificate Signing Request

Obtaining Third-Party CA Certificates

Monitor Certificate Expiration Dates

IPSEC Management

Set Up a New IPSec Policy

Managing Existing IPSec Policies


Security


This chapter describes Certificate Management and IPSec Management and provides procedures for performing the following tasks:

Set Internet Explorer Security Options

Manage Certificates and Certificate Trust Lists

IPSEC Management

Set Internet Explorer Security Options

To download certificates from the server, ensure your Internet Explorer security settings are configured as follows:

Procedure


Step 1 Start Internet Explorer.

Step 2 Navigate to Tools>Internet Options.

Step 3 Click the Advanced tab.

Step 4 Scroll down to the Security section on the Advanced tab.

Step 5 If necessary, clear the Do not save encrypted pages to disk check box.

Step 6 Click OK.


Manage Certificates and Certificate Trust Lists

The functions that you can perform from the Certificate Management menu are described in the following topics:

Display Certificates

Download a Certificate or CTL

Delete and Regenerate a Certificate

Upload a Certificate or Certificate Trust List

Using Third-Party CA Certificates

Monitor Certificate Expiration Dates


Note To access the Security menu items, you must re-log in to Cisco Unified Communications Operating System Administration using your administrator password.


Display Certificates

To display existing certificates, follow this procedure:

Procedure


Step 1 Navigate to Security>Certificate Management.

The Certificate List window displays.

Step 2 You can use the Find controls to filter the certificate list.

Step 3 To view details of a certificate or trust store, click its file name.

The Certificate Configuration window displays information about the certificate.

Step 4 To return to the Certificate List window, select Back To Find/List in the Related Links list; then, click Go.


Download a Certificate or CTL

To download a certificate or CTL from the Cisco Unified Communications Operating System to your PC, follow this procedure:

Procedure


Step 1 Navigate to Security>Certificate Management.

The Certificate List window displays.

Step 2 You can use the Find controls to filter the certificate list.

Step 3 Click the file name of the certificate or CTL.

The Certificate Configuration window displays.

Step 4 Click Download.

Step 5 In the File Download dialog box, click Save.


Delete and Regenerate a Certificate

These sections describe deleting and regenerating a certificate:

Deleting a Certificate

Regenerating a Certificate

Deleting a Certificate

To delete a trusted certificate, follow this procedure:


Caution Deleting a certificate can affect your system operations.

Procedure


Step 1 Navigate to Security>Certificate Management.

The Certificate List window displays.

Step 2 You can use the Find controls to filter the certificate list.

Step 3 Click the file name of the certificate or CTL.

The Certificate Configuration window displays.

Step 4 Click Delete.


Regenerating a Certificate

To regenerate a certificate, follow this procedure:


Caution Regenerating a certificate can affect your system operations.

Procedure


Step 1 Navigate to Security>Certificate Management.

The Certificate List window displays.

Step 2 Click Generate New.

The Generate Certificate dialog box opens.

Step 3 Choose a certificate name from the Certificate Name list.

Step 4 Click Generate New.


Upload a Certificate or Certificate Trust List


Caution Uploading a new certificate or certificate trust list (CTL) file can affect your system operations.

These sections describe how upload a CA root certificate, application certificate, or CTL file to the server:

Upload a Certificate

Upload a Certificate Trust List

Upload a Directory Trust Certificate

Upload a Certificate

Procedure


Step 1 Navigate to Security>Certificate Management.

The Certificate List window displays.

Step 2 Click Upload Certificate.

The Upload Certificate dialog box opens.

Step 3 Select the certificate name from the Certificate Name list.

Step 4 If you are uploading an application certificate that was issued by a third-party CA, enter the name of the CA root certificate in the Root Certificate text box. If you are uploading a CA root certificate, leave this text box empty.

Step 5 Select the file to upload by doing one of the following steps:

In the Upload File text box, enter the path to the file.

Click the Browse button and navigate to the file; then, click Open.

Step 6 To upload the file to the server, click the Upload File button.


Upload a Certificate Trust List

Procedure


Step 1 Navigate to Security>Certificate Management.

The Certificate List window displays.

Step 2 Click Upload CTL.

The Upload Certificate Trust List dialog box opens.

Step 3 Select the certificate name from the Certificate Name list.

Step 4 If you are uploading an application certificate that was issued by a third-party CA, enter the name of the CA root certificate in the Root Certificate text box. If you are uploading a CA root certificate, leave this text box empty.

Step 5 Select the file to upload by doing one of the following steps:

In the Upload File text box, enter the path to the file.

Click the Browse button and navigate to the file; then, click Open.

Step 6 To upload the file to the server, click the Upload File button.


Upload a Directory Trust Certificate

Procedure


Step 1 Navigate to Security>Certificate Management.

The Certificate List window displays.

Step 2 Click Upload CTL.

The Upload Certificate Trust List dialog box opens.

Step 3 Select directory-trust from the Certificate Name list.

Step 4 Enter the file to upload in the Upload File field.

Step 5 To upload the file, click the Upload File button.

Step 6 Log into Cisco Unified Serviceability.

Step 7 Navigate to Tools > Control Center - Feature Services.

Step 8 Restart the service Cisco Dirsync.

Step 9 Log in to the Cisco Unified Communications Operating System CLI as an administrator.

Step 10 To restart the Tomcat service, enter the command utils service restart Cisco Tomcat.

Step 11 After the services have been restarted, you can add the directory agreement for SSL.


Using Third-Party CA Certificates

Cisco Unified Communications Operating System supports certificates that a third-party Certificate Authority (CA) issues with PKCS # 10 Certificate Signing Request (CSR). The following table provides an overview of this process, with references to additional documentation:

 
Task
For More Information

Step 1 

Generate a CSR on the server.

See the "Generating a Certificate Signing Request" section.

Step 2 

Download the CSR to your PC.

See the "Download a Certificate Signing Request" section.

Step 3 

Use the CSR to obtain an application certificate from a CA.

Get information about obtaining application certificates from your CA. See the "Obtaining Third-Party CA Certificates" section for additional notes.

Step 4 

Obtain the CA root certificate.

Get information about obtaining a root certificate from your CA. See the "Obtaining Third-Party CA Certificates" section for additional notes.

Step 5 

Upload the CA root certificate to the server.

See the "Upload a Certificate" section.

Step 6 

Upload the application certificate to the server.

See the "Upload a Certificate" section.

Step 7 

If you updated the certificate for CAPF or Cisco Unified Communications Manager, generate a new CTL file.

See the Cisco Unified Communications Manager Security Guide.

Step 8 

Restart the services that are affected by the new certificate.

For all certificate types, restart the corresponding service (for example, restart the Tomcat service if you updated the Tomcat certificate). In addition, if you updated the certificate for CAPF or Cisco Unified Communications Manager, restart the TFTP service.

See the Cisco Unified Communications Manager Serviceability Administration Guide for information about restarting services.

Generating a Certificate Signing Request

To generate a Certificate Signing Request (CSR), follow these steps:

Procedure


Step 1 Navigate to Security>Certificate Management.

The Certificate List window displays.

Step 2 Click Generate CSR.

The Generate Certificate Signing Request dialog box opens.

Step 3 Select the certificate name from the Certificate Name list.

Step 4 Click Generate CSR.


Download a Certificate Signing Request

To download a Certificate Signing Request, follow this procedure:

Procedure


Step 1 Navigate to Security>Certificate Management.

The Certificate List window displays.

Step 2 Click Download CSR.

The Download Certificate Signing Request dialog box opens.

Step 3 Select the certificate name from the Certificate Name list.

Step 4 Click Download CSR.

Step 5 In the File Download dialog box, click Save.


Obtaining Third-Party CA Certificates

To use an application certificate that a third-party CA issues, you must obtain both the signed application certificate and the CA root certificate from the CA. Get information about obtaining these certificates from your CA. The process varies among CAs.

CAPF and Cisco Unified Communications Manager CSRs include extensions that you must include in your request for an application certificate from the CA. If your CA does not support the ExtensionRequest mechanism, you must enable the X.509 extensions that are listed on the final page of the CSR generation process.

Cisco Unified Communications Operating System generates certificates in DER and PEM encoding formats and generates CSRs in PEM encoding format. It accepts certificates in DER and DER encoding formats.

Cisco verified third-party certificates that were obtained from Microsoft, Keon, and Verisign CAs. Certificates from other CAs might work but have not been verified.

Monitor Certificate Expiration Dates

The system can automatically send you an e-mail when a certificate is close to its expiration date. To view and configure the Certificate Expiration Monitor, follow this procedure:

Procedure


Step 1 To view the current Certificate Expiration Monitor configuration, navigate to Security>Certificate Monitor.

The Certificate Monitor window displays.

Step 2 Enter the required configuration information. See Table 6-1 for a description of the Certificate Monitor Expiration fields.

Step 3 To save your changes, click Save.


Table 6-1 Certificate Monitor Field Descriptions 

Field
Description

Notification Start Time

Enter the number of days before the certificate expires that you want to be notified.

Notification Frequency

Enter the frequency for notification, either in hours or days.

Enable E-mail Notification

Select the check box to enable e-mail notification.

Email IDs

Enter the e-mail address to which you want notifications sent.

Note For the system to send notifications, you must configure an SMTP host.


IPSEC Management

The functions that you can perform with the IPSec menu are described in the following topics:

Set Up a New IPSec Policy

Managing Existing IPSec Policies

Set Up a New IPSec Policy

To set up a new IPSec policy and association, follow this procedure:


Note Because any changes that you make to an IPSec policy during a system upgrade will get lost, do not modify or create IPSec policies during an upgrade.



Caution IPSec, especially with encryption, will affect the performance of your system.

Procedure


Step 1 Navigate to Security > IPSEC Configuration.

The IPSEC Policy List window displays.

Step 2 Click Add New.

The IPSEC Policy Configuration window displays.

Step 3 Enter the appropriate information on the IPSEC Policy Configuration window. For a description of the fields on this window, see Table 6-2.

Step 4 To set up the new IPSec policy, click Save.


Table 6-2 IPSEC Policy and Association Field Descriptions 

Field
Description

Policy Name

Specifies the name of the IPSec policy. The name can contain only letters, digits, and hyphens.

Association Name

Specifies the association name that is given to each IPSec association. The name can contain only letters, digits, and hyphens.

Authentication Method

Specifies the authentication method.

Preshared Key

Specifies the preshared key if you selected Pre-shared Key in the Authentication Name field.

Peer Type

Specifies whether the peer is the same type or different.

Destination Address

Specifies the IP address or FQDN of the destination.

Destination Port

Specifies the port number at the destination.

Source Address

Specifies the IP address or FQDN of the source.

Source Port

Specifies the port number at the source.

Mode

Specifies Tunnel or Transport mode.

Remote Port

Specifies the port number to use at the destination.

Protocol

Specifies the specific protocol, or Any:

TCP

UDP

Any

Encryption Algorithm

From the drop-down list, choose the encryption algorithm. Choices include

DES

3DES

Hash Algorithm

Specifies the hash algorithm

SHA1—Hash algorithm that is used in phase 1 IKE negotiation

MD5—Hash algorithm that is used in phase 1 IKE negotiation

ESP Algorithm

From the drop-down list, choose the ESP algorithm. Choices include

NULL_ENC

DES

3DES

BLOWFISH

RIJNDAEL

Phase One Life Time

Specifies the lifetime for phase One, IKE negotiation, in seconds.

Phase One DH

From the drop-down list, choose the phase One DH value. Choices include: 2, 1, 5, 14, 16, 17, and 18.

Phase Two Life Time

Specifies the lifetime for phase Two, IKE negotiation, in seconds.

Phase Two DH

From the drop-down list, choose the phase Two DH value. Choices include: 2, 1, 5, 14, 16, 17, and 18.

Enable Policy

Check the check box to enable the policy.


Managing Existing IPSec Policies

To display, enable or disable, or delete an existing IPSec policy, follow this procedure:


Note Because any changes that you make to an IPSec policy during a system upgrade will get lost, do not modify or create IPSec policies during an upgrade.



Caution IPSec, especially with encryption, will affect the performance of your system.


Caution Any changes that you make to the existing IPSec policies can impact your normal system operations.

Procedure


Step 1 Navigate to Security > IPSEC Configuration.


Note To access the Security menu items, you must re-log in to Cisco Unified Communications Operating System Administration using your Administrator password.


The IPSEC Policy List window displays.

Step 2 To display, enable, or disable a policy, follow these steps:

a. Click the policy name.

The IPSEC Policy Configuration window displays.

b. To enable or disable the policy, use the Enable Policy check box.

c. Click Save.

Step 3 To delete one or more policies, follow these steps:

a. Select the check box next to the policies that you want to delete.

You can click Select All to select all policies or Clear All to clear all the check boxes.

b. Click Delete Selected.