Cisco Systems EGW 2200 manual Cisco Product Security Overview

Page 22

Appendix: Documentation and Technical Assistance

Cisco Product Security Overview

Cisco Product Security Overview

Cisco provides a free online Security Vulnerability Policy portal at this URL:

http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

From this site, you can perform these tasks:

Report security vulnerabilities in Cisco products.

Obtain assistance with security incidents that involve Cisco products.

Register to receive security information from Cisco.

A current list of security advisories and notices for Cisco products is available at this URL:

http://www.cisco.com/go/psirt

If you prefer to see advisories and notices as they are updated in real time, you can access a Product Security Incident Response Team Really Simple Syndication (PSIRT RSS) feed from this URL:

http://www.cisco.com/en/US/products/products_psirt_rss_feed.html

Reporting Security Problems in Cisco Products

Cisco is committed to delivering secure products. We test our products internally before we release them, and we strive to correct all vulnerabilities quickly. If you think that you might have identified a vulnerability in a Cisco product, contact PSIRT:

Emergencies — security-alert@cisco.com

An emergency is either a condition in which a system is under active attack or a condition for which a severe and urgent security vulnerability should be reported. All other conditions are considered nonemergencies.

Nonemergencies — psirt@cisco.com

In an emergency, you can also reach PSIRT by telephone:

1 877 228-7302

1 408 525-6532

Tip We encourage you to use Pretty Good Privacy (PGP) or a compatible product to encrypt any sensitive information that you send to Cisco. PSIRT can work from encrypted information that is compatible with PGP versions 2.x through 8.x.

Never use a revoked or an expired encryption key. The correct public key to use in your correspondence with PSIRT is the one linked in the Contact Summary section of the Security Vulnerability Policy page at this URL:

http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

The link on this page has the current PGP key ID in use.

QSIG/DPNSS Phone System with Cisco EGW 2200 Integration Guide for Cisco Unity Connection 1.1

22

OL-8187-01

 

 

Image 22
Contents Integration Tasks Task List to Create the IntegrationTask List to Make Changes to an Integration RequirementsIntegration Description Task List to Delete an Existing IntegrationIntegration Features Call InformationIntegrations with Multiple Phone Systems Number of Voice Messaging Ports to InstallField Considerations Number of Voice Messaging Ports That Will Answer Calls Programming the QSIG/DPNSS Phone SystemNumber of Voice Messaging Ports That Will Dial Out Field Setting Setting Up the Cisco EGWTo Create an Integration Settings for the Cisco EGW 2220 or SIP Proxy Server Settings for the Phone System Trunk Testing the Integration To Set Up the Test ConfigurationOn the Edit menu, click Message Waiting Indicators Uncheck the Set for Self-enrollment at Next Login check boxTest User To Test an External Call with Release Transfer To Test Listening to MessagesTo Delete the Test User To Set Up Supervised Transfer on Cisco Unity ConnectionTo Test Supervised Transfer Click Delete SelectedTo Change the Settings for an Integration Changing the Settings for an Existing IntegrationPhone System Port Group Deleting an Existing Phone System Integration To Delete an Existing Phone System IntegrationReasons to Use Alternate Extensions Alternate ExtensionsHow Alternate Extensions Work Setting Up Alternate Extensions To Add Administrator-Defined Alternate ExtensionsTo Modify Alternate Extensions Setting Up Alternate MWIsAlternate MWIs To Delete Alternate ExtensionsTo Modify Alternate MWIs Convention Description ConventionsTo Delete Alternate MWIs Ctrl-Alt-DeletePanel Phone and Modem Options Obtaining DocumentationCisco.com AdvancedProduct Documentation DVD Documentation FeedbackOrdering Documentation Reporting Security Problems in Cisco Products Cisco Product Security OverviewObtaining Technical Assistance Submitting a Service RequestCisco Technical Support & Documentation Website Definitions of Service Request Severity Obtaining Additional Publications and InformationPage OL-8187-01