Cisco Systems OL-14619-01 Cisco Unified Communications Manager Security Features, Description

Models: OL-14619-01

1 106
Download 106 pages 43.76 Kb
Page 69
Image 69
•Cisco Unified Communications Manager Security Features, page 6-13

Chapter 6 Integrating Cisco Unity with the Phone System

Integrating with Cisco Unified Communications Manager (by Using SCCP or SIP)

Identity theft of the Cisco Unity voice messaging port, in which a non-Cisco Unity device presents itself to Cisco Unified CM as a Cisco Unity voice messaging port.

Identity theft of the Cisco Unified CM server, in which a non-Cisco Unified CM server presents itself to Cisco Unity voice messaging ports as a Cisco Unified CM server.

Note SIP integrations do not support Cisco Unified CM authentication or encryption.

See the following sections for additional details:

Cisco Unified Communications Manager Security Features, page 6-13

When Data Is Encrypted, page 6-15

Cisco Unified Communications Manager Cluster Security Mode Settings in Cisco Unity, page 6-15

Disabling and Re-Enabling Security, page 6-16

Multiple Integrations Can Have Different Security Mode Settings, page 6-16

Settings for Individual Voice Messaging Ports, page 6-16

Cisco Unified Communications Manager Security Features

 

Cisco Unified CM 4.1(3) or later can secure the connection with Cisco Unity against these threats. The

 

Cisco Unified CM security features that Cisco Unity can take advantage of are described in Table 6-3.

Table 6-3

Cisco Unified Communications Manager Security Features That Are Used by Cisco Unity

 

 

Security Feature

Description

 

 

Signaling

Uses the Transport Layer Security (TLS) protocol to validate that no tampering has occurred to

authentication

signaling packets during transmission. Signaling authentication relies on the creation of the Cisco

 

Certificate Trust List (CTL) file.

 

This feature protects against:

Man-in-the-middle attacks that modify the information flow between Cisco Unified CM and the Cisco Unity voice messaging ports.

Modification of the call signaling.

Identity theft of the Cisco Unity voice messaging port.

Identity theft of the Cisco Unified CM server.

Device

Validates the identity of the device. This process occurs between Cisco Unified CM and Cisco Unity

authentication

voice messaging ports when each device accepts the certificate of the other device. When the

 

certificates are accepted, a secure connection between the devices is established. Device authentication

 

relies on the creation of the Cisco Certificate Trust List (CTL) file.

 

This feature protects against:

Man-in-the-middle attacks that modify the information flow between Cisco Unified CM and the Cisco Unity voice messaging ports.

Modification of the media stream.

Identity theft of the Cisco Unity voice messaging port.

Identity theft of the Cisco Unified CM server.

 

 

Design Guide for Cisco Unity Release 5.x

 

 

 

 

 

 

OL-14619-01

 

 

6-13

 

 

 

 

 

Page 69
Image 69
Cisco Systems OL-14619-01 manual Cisco Unified Communications Manager Security Features, When Data Is Encrypted, page, 6-13