Security Basics
|
Security Overview
|
Provides an overview of security terminology, system requirements, interactions and restrictions, installation requirements,
and a configuration checklist; describes the different types of authentication and encryption.
|
Hypertext Transfer Protocol Over Secure Sockets Layer (HTTPS)
|
Provides an overview of HTTPS and describes how to install the server authentication certificate in the trusted folder.
|
Default Security Setup
|
Provides information about the Security by Default feature, which provides automatic security features for Cisco Unified IP Phones.
|
Cisco CTL Client Setup
|
Describes how to configure authentication by installing and configuring the CiscoCTL Client.
|
TLS Setup
|
|
Certificates
|
Certificate Overview |
|
|
|
|
|
Security for Phones and Voice Mail Ports
|
Phone Security
|
Describes how Unified Communications Manager and the phone use security; provides a list of tasks that you perform to configure security for the phone.
|
Phone Security Profile Setup
|
Describes how to configure the security profile and apply it to the phones in Unified Communications Manager.
|
Secure and Nonsecure indication Tone Setup
|
Describes how to configure a phone to play a secure-indication tone.
|
Encryption to Analog Endpoint Setup
|
Describes how to configure a secure SCCP connection to analog endpoints.
|
Encrypted Phone Configuration File Setup
|
Describes how to configure encrypted phone configuration files in Unified Communications Manager.
|
Digest Authentication for SIP phones Setup
|
Describes how to configure digest authentication on the phone that is running SIP in Unified Communications Manager Administration.
|
Phone Hardening
|
Describes how to tighten the security on the phone by using Unified Communications Manager Administration.
|
Secure Conference Resources Setup
|
Describes how to configure media encryption for secure conferences.
|
Voice-Messaging Ports Security Setup
|
Describes how to configure security for voice mail ports in Unified Communications Manager Administration.
|
Secure Call Monitoring and Recording Setup
|
Describes how to configure secure call monitoring and recording.
|
Virtual Private Networks for CiscoIPPhones
|
Security for CTI, JTAPI, and TAPI
|
Authentication and Encryption Setup for CTI, JTAPI and TAPI
|
Describes how to configure the Application User CAPF Profile and End User CAPF Profiles in Unified Communications Manager.
|
Security for SRST References, Gateways, Trunks, and Cisco Unified Mobility Advantage Servers
|
Secure Survivable Remote Site Telephony (SRST) Reference
|
Describes how to configure the SRST reference for security in Unified Communications Manager Administration.
|
Encryption Setup for Gateways and Trunks
|
Describes how Unified Communications Manager communicates with a secure gateway or trunk; describes IPSec recommendations and considerations.
|
SIP Trunk Security Profile Setup
|
Describes how to configure and apply the SIP trunk security profile in Unified Communications Manager Administration.
|
Digest Authentication setup for SIP Trunks
|
Describes how to configure digest authentication for the SIP trunk in Unified Communications Manager Administration.
|
Cisco Unified Mobility Advantage Server security Profile Setup
|
Describes how to configure a Cisco Unified Mobility Advantage server security profile in Unified Communications Manager Administration.
|
FIPS 140-2 Mode Setup
|
Describes how to configure FIPS (Federal Information Processing Standard) 140-2 mode in Unified Communications Manager Administration.
|
Cisco V.150 Minimum Essential Requirements (MER)
|
Describes how to configure the V.150 feature, which allows you to make secure calls in a modem over IP network.
|