User Workstation Setup Guide for Cisco Unity Connection Release 2.x

Table Of Contents



Audience and Use

The User Workstation Setup Guide for Cisco Unity Connection contains information and instructions that system administrators can use for setting up user workstation access to Cisco Unity Connection web tools, for configuring e-mail accounts to access Connection voice messages, and for conducting orientation sessions for users.

Documentation Conventions

Table 1 Conventions in the User Workstation Setup Guide for Cisco Unity Connection 

boldfaced text

Boldfaced text is used for:

Key and button names. (Example: Click OK.)

Information that you enter. (Example: Enter Administrator in the User Name box.)

< >

(angle brackets)

Angle brackets are used around parameters for which you supply a value. (Example: In your browser, go to https://<Cisco Unity Connection server IP address>/cuadmin.)



Hyphens separate keys that must be pressed simultaneously. (Example: Press Ctrl-Alt-Delete.)


(right angle bracket)

A right angle bracket is used to separate selections that you make in the navigation bar of Cisco Unity Connection Administration. (Example: In Cisco Unity Connection Administration, go to Contacts > System Contacts.)

The User Workstation Setup Guide for Cisco Unity Connection also uses the following conventions:

Note Means reader take note. Notes contain helpful suggestions or references to material not covered in the document.

Caution Means reader be careful. In this situation, you might do something that could result in equipment damage or loss of data.

Cisco Unity Connection Documentation

For descriptions and URLs of Cisco Unity Connection documentation on, see the Documentation Guide for Cisco Unity Connection. The document is shipped with Cisco Unity Connection and is available at

Obtaining Documentation, Obtaining Support, and Security Guidelines

For information on obtaining documentation, obtaining support, providing documentation feedback, security guidelines, and also recommended aliases and general Cisco documents, see the monthly What's New in Cisco Product Documentation, which also lists all new and revised Cisco technical documentation, at:

Cisco Product Security Overview

This product contains cryptographic features and is subject to United States and local country laws governing import, export, transfer and use. Delivery of Cisco cryptographic products does not imply third-party authority to import, export, distribute or use encryption. Importers, exporters, distributors and users are responsible for compliance with U.S. and local country laws. By using this product you agree to comply with applicable laws and regulations. If you are unable to comply with U.S. and local laws, return this product immediately.

A summary of U.S. laws governing Cisco cryptographic products can be found at If you require further assistance, contact us by sending e-mail to