Cisco Unity Security Guide (With IBM Lotus Domino), Release 4.x
Securing the Connection Between Cisco Unity, Cisco CallManager, and IP Phones

Table Of Contents

Securing the Connection Between Cisco Unity, Cisco CallManager, and IP Phones

Security Issues for Connections Between Cisco Unity, Cisco CallManager, and IP Phones

Cisco CallManager Security Features for Cisco Unity Voice Messaging Ports

Security Mode Settings for Cisco CallManager and Cisco Unity

Best Practices


Securing the Connection Between Cisco Unity, Cisco CallManager, and IP Phones


In this chapter, you will find descriptions of potential security issues related to connections between Cisco Unity, Cisco CallManager, and IP phones; information on any actions you need to take; recommendations that will help you make decisions; discussion of the ramifications of the decisions you make; and best practices.

See the following sections:

Security Issues for Connections Between Cisco Unity, Cisco CallManager, and IP Phones

Cisco CallManager Security Features for Cisco Unity Voice Messaging Ports

Security Mode Settings for Cisco CallManager and Cisco Unity

Best Practices

Security Issues for Connections Between Cisco Unity, Cisco CallManager, and IP Phones

A potential point of vulnerability for a Cisco Unity system is the connection between Cisco Unity, Cisco CallManager, and the IP phones. Possible threats include:

Man-in-the-middle attacks (when the information flow between Cisco CallManager and the Cisco Unity voice messaging ports is observed and modified)

Network traffic sniffing (when software is used to capture phone conversations and signaling information that flow between Cisco CallManager, the Cisco Unity voice messaging ports, and IP phones that are managed by Cisco CallManager)

Modification of call signaling between the Cisco Unity voice messaging ports and Cisco CallManager

Modification of the media stream between the Cisco Unity voice messaging ports and the endpoint (for example, an IP phone or a gateway)

Identity theft of the Cisco Unity voice messaging port (when a non-Cisco Unity device presents itself to Cisco CallManager as a Cisco Unity voice messaging port)

Identity theft of the Cisco CallManager server (when a non-Cisco CallManager server presents itself to Cisco Unity voice messaging ports as a Cisco CallManager server)

Cisco CallManager Security Features for Cisco Unity Voice Messaging Ports

Cisco CallManager 4.1(3) or later can secure the connection with Cisco Unity 4.0(5) or later against the threats listed in the "Security Issues for Connections Between Cisco Unity, Cisco CallManager, and IP Phones" section. The Cisco CallManager security features that Cisco Unity can take advantage of are described in Table 5-1.

Table 5-1 Cisco CallManager Security Features That Are Used by Cisco Unity 

Security Feature
Description

Signaling authentication

The process that uses the Transport Layer Security (TLS) protocol to validate that no tampering has occurred to signaling packets during transmission. Signaling authentication relies on the creation of the Cisco Certificate Trust List (CTL) file.

This feature protects against:

Man-in-the-middle attacks that modify the information flow between Cisco CallManager and the Cisco Unity voice messaging ports.

Modification of the call signalling.

Identity theft of the Cisco Unity voice messaging port.

Identity theft of the Cisco CallManager server.

Device authentication

The process that validates the identity of the device and ensures that the entity is what it claims to be. This process occurs between Cisco CallManager and Cisco Unity voice messaging ports when each device accepts the certificate of the other device. When the certificates are accepted, a secure connection between the devices is established. Device authentication relies on the creation of the Cisco Certificate Trust List (CTL) file.

This feature protects against:

Man-in-the-middle attacks that modify the information flow between Cisco CallManager and the Cisco Unity voice messaging ports.

Modification of the media stream.

Identity theft of the Cisco Unity voice messaging port.

Identity theft of the Cisco CallManager server.

Signaling encryption

The process that uses cryptographic methods to protect (through encryption) the confidentiality of all SCCP signaling messages that are sent between the Cisco Unity voice messaging ports and Cisco CallManager. Signaling encryption ensures that the information that pertains to the parties, DTMF digits that are entered by the parties, call status, media encryption keys, and so on are protected against unintended or unauthorized access.

This feature protects against:

Man-in-the-middle attacks that observe the information flow between Cisco CallManager and the Cisco Unity voice messaging ports.

Network traffic sniffing that observes the signaling information flow between Cisco CallManager and the Cisco Unity voice messaging ports.

Media encryption

The process whereby the confidentiality of the media occurs through the use of cryptographic procedures. This process uses Secure Real Time Protocol (SRTP) as defined in IETF RFC 3711, and ensures that only the intended recipient can interpret the media streams between Cisco Unity voice messaging ports and the endpoint (for example, a phone or gateway). Support includes audio streams only. Media encryption includes creating a media master key pair for the devices, delivering the keys to Cisco Unity and the endpoint, and securing the delivery of the keys while the keys are in transport. Cisco Unity and the endpoint use the keys to encrypt and decrypt the media stream.

This feature protects against:

Man-in-the-middle attacks that listen to the media stream between Cisco CallManager and the Cisco Unity voice messaging ports.

Network traffic sniffing that eavesdrops on phone conversations that flow between Cisco CallManager, the Cisco Unity voice messaging ports, and IP phones that are managed by Cisco CallManager.


Authentication and signaling encryption serve as the minimum requirements for media encryption; that is, if the devices do not support signaling encryption and authentication, media encryption cannot occur.

Security Mode Settings for Cisco CallManager and Cisco Unity

Cisco CallManager and Cisco Unity have the security mode options shown in Table 5-2 for voice messaging ports.


Caution The Cluster Security Mode setting for Cisco Unity voice messaging ports must match the security mode setting for the Cisco CallManager ports. Otherwise, Cisco CallManager authentication and encryption will fail.

Table 5-2 Security Mode Options for Voice Messaging Ports 

Setting
Effect

Non-secure

The integrity and privacy of call-signaling messages will not be ensured because call-signaling messages will be sent as clear (unencrypted) text and will be connected to Cisco CallManager through a non-authenticated port rather than an authenticated TLS port.

In addition, the media stream cannot be encrypted.

Authenticated

The integrity of call-signaling messages will be ensured because they will be connected to Cisco CallManager through an authenticated TLS port. However, the privacy of call-signaling messages will not be ensured because they will be sent as clear (unencrypted) text.

In addition, the media stream will not be encrypted.

Encrypted

The integrity and privacy of call-signaling messages will be ensured because they will be connected to Cisco CallManager through an authenticated TLS port, and the call-signaling messages will be encrypted.

In addition, the media stream can be encrypted.


Caution Both end points must be registered in encrypted mode for the media stream to be encrypted. However, when one end point is set for non-secure or authenticated mode and the other end point is set for encrypted mode, the media stream will not be encrypted. Also, if an intervening device (such as a transcoder or gateway) is not enabled for encryption, the media stream will not be encrypted.

Best Practices

If you have Cisco Unity 4.0(5) or later integrated with Cisco CallManager 4.1(3) or later, we recommend that you enable authentication and encryption for the voice messaging ports on both Cisco Unity and Cisco CallManager.

For information on enabling authentication and encryption, see the applicable Cisco CallManager integration guide, available at http://www.cisco.com/en/US/products/sw/voicesw/ps2237/products_installation_and_configuration_guides_list.html.