Index

A

administrative accounts

summary of purposes 5-1

Application Administration account 5-1

authentication rules 7-5

C

call signaling, modification threat 3-1

Cisco PCA, securing access to Cisco Unity Connection 10-1

Cisco Unified CM

call signaling modification 3-1

identity theft 3-2, 4-1

man-in-the-middle attacks on connection to Cisco Unity Connection 3-1, 4-1

media (RTP) stream modification 3-2, 4-1

network traffic sniffing (eavesdropping) 3-1, 4-1

Connection service ports 1-1

E

eavesdropping Cisco Unified CM connections 3-1, 4-1

I

identity theft

Cisco Unified CM server 3-2, 4-1

Cisco Unity Connection voice messaging port 3-2

IMAP clients

securing access to Cisco Unity Connection 10-1

security options 11-5

IP phones, network traffic sniffing (eavesdropping) 3-1, 4-1

M

mailbox-size quotas, customizing for users or templates 11-4

man-in-the-middle attacks for Cisco Unified CM connections 3-1, 4-1

media stream, modification threat 3-2, 4-1

messages

shredding files for secure deletes 11-4

message security

overview of options 11-1

security options for IMAP client access 11-5

sensitivity options for users and unidentified callers 11-1

N

network traffic sniffing Cisco Unified CM connections 3-1, 4-1

O

Operating System Administration account 5-1

P

passwords

changing for Connection web application access 6-3, 7-3, 8-3

unique and secure, assigning 7-2

used to access Connection applications 6-1, 7-2, 8-1

PINs

changing Connection phone PINs 6-4, 7-4, 8-3

unique and secure, assigning 7-2

used to access Connection applications 6-1, 7-2, 8-1

ports, voice messaging, and identity theft 3-2

Q

quotas for mailboxes, customizing for users or templates 11-4

R

restriction tables, using to prevent toll fraud 2-1

RTP stream, modification threat 3-2, 4-1

S

sec-01-1 1-1

secure deletes, shredding message files for 11-4

securing Cisco PCA and IMAP client access to Cisco Unity Connection 10-1

security

controlling access, distribution, and storage of voice messages 11-1

IMAP client 11-5

user and unidentified caller messages 11-1

server, identity theft 3-2, 4-1

shredding message files for secure deletes 11-4

SSL certificate, using to secure Cisco PCA and IMAP client access to Cisco Unity Connection 10-1

T

TCP ports

used for inbound connections 1-1

used for outbound connections 1-6

toll fraud 2-1

U

UDP ports

used for inbound connections 1-1

used for outbound connections 1-6

V

voice messaging ports and identity theft 3-2

Index

A

administrative accounts

summary of purposes 5-1

Application Administration account 5-1

authentication rules 7-5

C

call signaling, modification threat 3-1

Cisco PCA, securing access to Cisco Unity Connection 10-1

Cisco Unified CM

call signaling modification 3-1

identity theft 3-2, 4-1

man-in-the-middle attacks on connection to Cisco Unity Connection 3-1, 4-1

media (RTP) stream modification 3-2, 4-1

network traffic sniffing (eavesdropping) 3-1, 4-1

Connection service ports 1-1

E

eavesdropping Cisco Unified CM connections 3-1, 4-1

I

identity theft

Cisco Unified CM server 3-2, 4-1

Cisco Unity Connection voice messaging port 3-2

IMAP clients

securing access to Cisco Unity Connection 10-1

security options 11-5

IP phones, network traffic sniffing (eavesdropping) 3-1, 4-1

M

mailbox-size quotas, customizing for users or templates 11-4

man-in-the-middle attacks for Cisco Unified CM connections 3-1, 4-1

media stream, modification threat 3-2, 4-1

messages

shredding files for secure deletes 11-4

message security

overview of options 11-1

security options for IMAP client access 11-5

sensitivity options for users and unidentified callers 11-1

N

network traffic sniffing Cisco Unified CM connections 3-1, 4-1

O

Operating System Administration account 5-1

P

passwords

changing for Connection web application access 6-3, 7-3, 8-3

unique and secure, assigning 7-2

used to access Connection applications 6-1, 7-2, 8-1

PINs

changing Connection phone PINs 6-4, 7-4, 8-3

unique and secure, assigning 7-2

used to access Connection applications 6-1, 7-2, 8-1

ports, voice messaging, and identity theft 3-2

Q

quotas for mailboxes, customizing for users or templates 11-4

R

restriction tables, using to prevent toll fraud 2-1

RTP stream, modification threat 3-2, 4-1

S

sec-01-1 1-1

secure deletes, shredding message files for 11-4

securing Cisco PCA and IMAP client access to Cisco Unity Connection 10-1

security

controlling access, distribution, and storage of voice messages 11-1

IMAP client 11-5

user and unidentified caller messages 11-1

server, identity theft 3-2, 4-1

shredding message files for secure deletes 11-4

SSL certificate, using to secure Cisco PCA and IMAP client access to Cisco Unity Connection 10-1

T

TCP ports

used for inbound connections 1-1

used for outbound connections 1-6

toll fraud 2-1

U

UDP ports

used for inbound connections 1-1

used for outbound connections 1-6

V

voice messaging ports and identity theft 3-2