- Preface
-
- Phone Security
- Phone Security Profile Setup
- Secure and Nonsecure Indication Tone Setup
- Encryption to Analog Endpoint Setup
- Encrypted Phone Configuration File Setup
- Digest Authentication for SIP Phones Setup
- Phone Hardening
- Secure Conference Resources Setup
- Voice-Messaging Ports Security Setup
- Call Secure Status Policy
- Secure Call Monitoring and Recording Setup
-
- Secure Survivable Remote Site Telephony (SRST) Reference
- Encryption Setup for Gateways and Trunks
- SIP Trunk Security Profile Setup
- Digest Authentication Setup for SIP Trunks
- Cisco Unified Mobility Advantage Server Security Profile Setup
- FIPS 140-2 Mode Setup
- Cisco V.150 Minimum Essential Requirements (MER)
- Index
Contents
A - B - C - D - E - F - H - I - J - L - M - N - P - S - T - V
Index
A
authenticationdevice 1digest 1overview 1with CTI/JTAPI/TAPI applications 1authentication stringwith CTI/JTAPI/TAPI applications 1authorizationconfiguration settings (table)for SIP trunk 1configuring for SIP trunk 1interactions 1overview 1B
bargeencryption restrictions with 1security 1security icons 1C
Certificate Authority Proxy Function (CAPF)CAPF service 1configuration settings (table)for CTI/JTAPI/TAPI applications 1configuring an application user or end user CAPF profile 1deleting an application user or end user CAPF profile 1installing 1interaction with IPv6 addressing 1viewing certificate operation status for application user or end user 1with CTI/JTAPI/TAPI applicationsinteractions and requirements 1overview 1updating service parameters 1Certificate Signing Requests (CSRs) 1certificatesexternal CAs 1Firefox certificate 1Safari certificate 1types 1Cisco Unified IP Phoneconfiguration checklist (table) for security 1configuration tips for phone security profiles 1disabling the PC Port setting 1disabling the PC Voice VLAN Access setting 1disabling the Setting Access setting 1encrypted configuration file 1secure conference support 1security icons 1understanding security 1viewing security settings 1computer telephony integration (CTI)configuration checklist (table) for securing 1secure user groupsadding application users and end users 1conference bridgeconference list 1configuration checklist (table) for security 1configuration tips for security 1configuring minimum Meet-Me security 1configuring packet capture on a secure conference bridge 1configuring security 1minimum Meet-Me security level 1security 1security icons 1security interactions 1security requirements 1security restrictions 1configuration fileencryption 1Configuration Task Flow 1CTL clientCAPF service 1cluster security modeupdating 1configuration settings (table) 1configuringCTL client 1TLS port 1CTL Provider service 1installing 1overview 1security modeverifying 1security tokenconfiguring CTL client 1setting the Smart Card service 1uninstalling 1verifying 1CTL fileupdating 1CTL Provideractivating service 1D
device authenticationconfiguration settings (table)for phone that is running SCCP 1for phone that is running SIP 1for SIP trunk 1configuring for phones 1configuring for SIP trunk 1overview 1digest authenticationassociating digest user with a phone 1cluster ID 1configuration checklist (table)for phones 1for SIP trunk 1configuration settings (table)for application user digest credentials 1for end user 1for phone that is running SIP 1for SIP realm 1for SIP trunk 1configuring a SIP realm 1configuring digest credentialsfor application user 1for end user 1configuring for phones 1configuring for SIP trunk 1configuring service parameters 1deleting a SIP realm 1finding a SIP realm 1overview 1E
Enable 1encrypted configuration fileconfiguration settings (table)for manual key 1configuration tips 1configuring manual key distribution 1disabling 1entering symmetric key 1manual key configuration checklist (table) 1manual key distribution 1phone support 1symmetric key encryption with public key 1understanding 1using symmetric key encryption w/public key 1encryptionconfiguration checklist (table) for gateways and trunks 1configuration settings (table)for phone that is running SCCP 1for phone that is running SIP 1for SIP trunk 1configuring for phones 1configuring SRTP allowed check box 1configuring with barge 1for H.323 gateway 1for H.323/H.225/H.245 trunk 1for MGCP gateway 1for SIP trunk 1installing 1overview 1signalingconfiguring for phones 1configuring for SIP trunk 1with CTI/JTAPI/TAPI applications 1etokenconfiguring CTL client 1F
file authenticationconfiguring for phones 1overview 1H
HTTPSoverview 1virtual directories (table) 1with Firefox 1with Safari 1I
image authenticationoverview 1integrityoverview 1IPSec 1configuration checklist (table) for IPSec 1configuring 1gateway or trunk considerations 1infrastructure considerations 1J
JTAPIconfiguration checklist (table) for securing 1configuring security service parameters 1L
locally significant certificate (LSC)with CTI/JTAPI/TAPI applications 1M
media encryption 1See encryption 1MGCP gatewayconfiguration checklist (table) for security 1N
NMAP scansrunning 1P
phone hardeningconfiguring 1disabling the PC Port setting 1disabling the PC Voice VLAN Access setting 1disabling the Setting Access setting 1phone security profilesynchronizing configuration to applicable phones 1Phone Support 1portCTL Provider 1Ethernet phone 1SIP secure 1protected call 1S
secure conferenceCisco Unified IP Phone support 1conference bridge requirements 1conference list 1configuration checklist (table) 1configuration tips 1configuring minimum Meet-Me security 1configuring packet capture 1configuring secure conference bridge 1CTI support 1interactions 1minimum Meet-Me security level 1restrictions 1security icons 1security overview 1trunks and gateways 1Secure Directory Server URL 1secure indication tone 1secure sockets layer (SSL)installing 1with HTTPS 1securityauthentication overview 1authorization overview 1best practices 1certificate types 1configuration checklist for authentication and encryption (table) 1CTL client overview 1encryption overview 1external CAs 1features list 1HTTPS 1installing 1rebooting the cluster 1rebooting the server 1resetting devices 1restarting Cisco Unified Communications Manager service 1SCCP calls (table) 1SIP calls (table) 1system requirements 1terminology (table) 1using barge with encryption 1where to find more information 1security modeclusterconfiguring 1verifying 1security profileapplying for SIP trunk 1applying to Cisco Unified Mobility Advantage Server 1applying to phones 1configuration settings (table)for phone that is running SCCP 1for phones that is running SIP 1for SIP trunk 1configuration tips for phones 1configuring for phones 1configuring for SIP trunk 1deleting for Cisco Unified Mobility Advantage server 1deleting for phones 1deleting for SIP trunk 1finding for Cisco Unified Mobility Advantage servers 1finding for phones 1finding for SIP trunk 1finding phones that use 1overview for Cisco Unified Mobility Advantage 1overview for phones 1overview for SIP trunk 1security tokenconfiguring CTL client 1signaling authenticationoverview 1signaling encryptionoverview 1SIP Trunk security profilesynchronizing configuration to applicable SIP trunks 1Site Administrator Security Token (SAST) 1SRSTconfiguration checklist (table) for securing 1configuration tips for securing 1troubleshootingcertificate deleted on gateway 1SRST referenceconfiguration settings (table) for security 1troubleshootingdeleting secured reference 1T
TAPIconfiguration checklist (table) for securing 1configuring security service parameters 1Tftp service 1TLS Proxy server 1transport layer security (TLS) 1port 1transport securityand real-time protocol (RTP) 1and secure real-time protocol (SRTP) 1configuration settings (table)for phone that is running SCCP 1for phone that is running SIP 1for SIP trunk 1configuring for phones that are running SIP 1configuring for SIP trunk 1IPSec 1TLS 1troubleshootingSRST certificate deleted on gateway 1V
voice messagingconfiguration checklist (table) for security 1security overview 1security requirements 1voice messaging portapplying a security profile 1applying a security profile using the Wizard 1configuration checklist (table) for security 1security overview 1