Table Of Contents
A - B - C - D - E - F - H - I - J - L - M - P - S - T - V -
Index
A
authentication
device 1-17
digest 1-17
interactions 1-6, 1-7
overview 1-17
restrictions 1-6, 1-7
with CTI/JTAPI/TAPI applications 13-2
authentication string
entering on phone 7-9
finding phones using 7-8
with CAPF 7-1
with CTI/JTAPI/TAPI applications 13-4
authorization
configuration settings (table)
for SIP trunk 16-4
configuring for SIP trunk 16-3
interactions 1-7
overview 1-17
B
barge
encryption restrictions with 1-13
security 11-1
security icons 11-3
C
Certificate Authority Proxy Function (CAPF)
activating service 7-5, 13-8
authentication string
entering on phone 7-9
CAPF service 3-5
configuration checklist (table) 7-4
configuration settings (table)
for CTI/JTAPI/TAPI applications 13-11
for phones 7-7
configuring an application user or end user CAPF profile 13-10
configuring in Cisco Unified Serviceability 7-4
deleting an application user or end user CAPF profile 13-12
finding an application user or end user CAPF profile 13-9
finding phones using LSC or authentication string 7-8
generating CAPF report 7-8
installing 1-13
interactions and requirements 7-3
interaction with Cisco Unified IP Phone 7-2
overview 7-1
updating service parameters 7-5
using for phone certificate operations 7-6
viewing certificate operation status for application user or end user 13-14
with CTI/JTAPI/TAPI applications
interactions and requirements 13-5
overview 13-4
updating service parameters 13-8
certificates
external CAs 1-14
Internet Explorer certificate 2-2
Netscape certificate 2-6
types 1-14
Certificate Signing Requests (CSRs) 1-14
Cisco Unified IP Phone
authentication string
entering on phone 7-9
configuration checklist (table) for security 4-2
configuration settings (table)
for CAPF 7-7
configuration tips for phone security profiles 5-1
deleting CTL file 3-18
disabling the GARP setting 10-1
disabling the PC Port setting 10-2
disabling the PC Voice VLAN Access setting 10-2
disabling the Setting Access setting 10-2
disabling the Web Access setting 10-1
encrypted configuration file 8-1
interaction with CAPF 7-2
secure conference support 11-5
security icons 1-6
understanding security 4-1
viewing security settings 4-2
computer telephony integration (CTI)
configuration checklist (table) for securing 13-5
secure user groups
adding application users and end users 13-7
conference bridge
conference list 11-3
configuration checklist (table) for security 11-9
configuration tips for security 11-8
configuring minimum Meet-Me security 11-11
configuring packet capture on a secure conference bridge 11-12
configuring security 11-10
minimum Meet-Me security level 11-3
security 11-1
security icons 11-3
security interactions 11-6
security requirements 11-2
security restrictions 11-6
configuration file
encryption 1-21
CTL client
CAPF service 3-5
cluster security mode
updating 3-14
configuration checklist (table) 3-4
configuration settings (table) 3-14
configuration tips 3-3
configuring
CTL client 3-9
TLS port 3-6
CTL Provider service 3-5
deleting CTL file on phone 3-18
installing 1-13, 3-7
migrating 3-8
overview 3-2
security mode
verifying 3-16
security token
changing password 3-18
configuring CTL client 3-9
setting the Smart Card service 3-17
uninstalling 3-19
upgrading 3-8
verifying 3-19
version
determining 3-19
CTL file
deleting entry 3-13
deleting on phone 3-18
updating 3-12
CTL Provider
activating service 3-5
D
device authentication
configuration settings (table)
for SCCP phone 5-4
for SIP phones 5-6
for SIP trunk 16-4
configuring for phones 5-3
configuring for SIP trunk 16-3
overview 1-17
digest authentication
associating digest user with a phone 9-4
cluster ID 17-2
configuration checklist (table)
for phones 9-1
for SIP trunk 17-1
configuration settings (table)
for application user digest credentials 17-3
for end user 9-3
for SIP phones 5-6
for SIP realm 17-5
for SIP trunk 16-4
configuring a SIP realm 17-4
configuring digest credentials
for application user 17-2
for end user 9-3
configuring for phones 5-3
configuring for SIP trunk 16-3
configuring service parameters 9-2
deleting a SIP realm 17-5
finding a SIP realm 17-3
overview 1-17
E
encrypted configuration file
configuration checklist (table) 8-5
configuration settings (table)
for manual key 8-7
configuration tips 8-4
configuring manual key distribution 8-6
disabling 8-9
enabling 8-6
entering symmetric key 8-7
manual key configuration checklist (table) 8-7
manual key distribution 8-2
phone support 8-4
symmetric key encryption with public key 8-3
understanding 8-1
using symmetric key encryption w/public key 8-8
verifying 8-9
encryption
configuration checklist (table) for gateways and trunks 15-3
configuration settings (table)
for SCCP phone 5-4
for SIP phone 5-6
for SIP trunk 16-4
configuring for phones 5-3
configuring SRTP allowed check box 15-5
configuring with barge 1-13
for H.323/H.225/H.245 trunk 15-2
for H.323 gateway 15-2
for MGCP gateway 15-1
for SIP trunk 15-3
installing 1-13
interactions 1-6, 1-7, 11-6
overview 1-21
restrictions 1-6, 1-7, 11-6
signaling
configuring for phones 5-3
configuring for SIP trunk 16-3
with CTI/JTAPI/TAPI applications 13-3
etoken
changing password 3-18
configuring CTL client 3-9
F
file authentication
configuring for phones 5-3
overview 1-17
H
HTTPS
overview 2-1
virtual directories (table) 2-2
with Internet Explorer 2-2
with Netscape 2-6
I
image authentication
overview 1-17
integrity
overview 1-17
IPSec 1-13
configuration checklist (table) for IPSec 15-3
configuring 15-4
gateway or trunk considerations 15-5
infrastructure considerations 15-4
recommendations 15-4, 15-5
J
JTAPI
configuration checklist (table) for securing 13-5
configuring security service parameters 13-13
L
locally significant certificate (LSC)
finding phones using 7-8
with CTI/JTAPI/TAPI applications 13-4
M
media encryption (See also encryption)
overview 1-21
MGCP gateway
configuration checklist (table) for security 15-3
configuring 15-4, 15-5
P
phone hardening
configuring 10-2
disabling the GARP setting 10-1
disabling the PC Port setting 10-2
disabling the PC Voice VLAN Access setting 10-2
disabling the Setting Access setting 10-2
disabling the Web Access setting 10-1
port
CTL Provider 3-6
Ethernet phone 3-6
SIP secure 3-6
S
secure conference
Cisco Unified IP Phone support 11-5
conference bridge requirements 11-2
conference list 11-3
configuration checklist (table) 11-9
configuration tips 11-8
configuring minimum Meet-Me security 11-11
configuring packet capture 11-12
configuring secure conference bridge 11-10
CTI support 11-6
interactions 11-6
minimum Meet-Me security level 11-3
restrictions 11-6
security icons 11-3
security overview 11-1
trunks and gateways 11-6
secure sockets layer (SSL)
installing 1-13
with HTTPS 2-1
security
authentication overview 1-17
authorization overview 1-17
best practices 1-11
certificate types 1-14
configuration checklist for authentication and encryption (table) 1-24
CTL client overview 3-2
encryption overview 1-21
external CAs 1-14
features list 1-5
HTTPS 2-1
installing 1-13
interactions 1-6, 1-7, 11-6
rebooting the cluster 1-12
rebooting the server 1-12
resetting devices 1-12
restarting Cisco Unified Communications Manager service 1-12
restrictions 1-6, 1-7, 11-6
SCCP calls (table) 1-5
SIP calls (table) 1-6
system requirements 1-5
terminology (table) 1-2
tokens 3-2, 3-7, 3-9, 3-12, 3-18
using barge with encryption 1-13
where to find more information 1-28
security mode
cluster
configuring 3-14
verifying 3-16
security profile
applying for SIP trunk 16-7
applying to CUMA Server 18-4
applying to phones 5-9
configuration settings (table)
for SCCP phone 5-4
for SIP phones 5-6
for SIP trunk 16-4
configuration tips for phones 5-1
configuring for phones 5-3
configuring for SIP trunk 16-3
deleting for CUMA server 18-4
deleting for phones 5-10
deleting for SIP trunk 16-8
finding for CUMA servers 18-1
finding for phones 5-2
finding for SIP trunk 16-2
finding phones that use 5-11
overview for CUMA 18-1
overview for phones 5-1
overview for SIP trunk 16-1
security token
configuring CTL client 3-9
signaling authentication
overview 1-17
signaling encryption
overview 1-21
Site Administrator Security Token (SAST) 3-2
SRST
configuration checklist (table) for securing 14-3
configuration tips for securing 14-2
overview for securing 14-1
troubleshooting
certificate deleted on gateway 14-5
SRST reference
configuration settings (table) for security 14-5
configuring 14-3
troubleshooting
deleting secured reference 14-5
T
TAPI
configuration checklist (table) for securing 13-5
configuring security service parameters 13-13
Tftp service 3-2
TLS Proxy server 3-2
transport layer security (TLS) 1-13
port 3-6
transport security
and real-time protocol (RTP) 1-13
and secure real-time protocol (SRTP) 1-13
configuration settings (table)
for SCCP phone 5-4
for SIP phone 5-6
for SIP trunk 16-4
configuring for SIP phones 5-3
configuring for SIP trunk 16-3
IPSec 1-13
TLS 1-13
troubleshooting
deleting CTL file on phone 3-18
SRST certificate deleted on gateway 14-5
V
voice messaging
configuration checklist (table) for security 12-3
security overview 12-1
security requirements 12-1
voice messaging port
applying a security profile 12-3
applying a security profile using the Wizard 12-4
configuration checklist (table) for security 12-3
security overview 12-1