Home Page Icon
Home Page
Table of Contents for
Cover Page
Close
Cover Page
by
Practical Cisco Unified Communications Security
Cover Page
About This eBook
Title Page
Copyright Page
Credits
About the Authors
About the Technical Reviewers
Dedications
Acknowledgments
Contents at a Glance
Contents
Icons Used in This Book
Command Syntax Conventions
Introduction
Goals and Methods
Who Should Read This Book?
How This Book Is Organized
Chapter 1 The Importance of Practical UC Security
Identifying the Threat Landscape
The Danger of Shadow IT
Balancing Operations and Security
Minimizing Complexity
Visibility and Management
Introduction to ACME: Case Study
Summary
Additional Resources
Chapter 2 Physical Security and Life Safety
Introduction to Physical Security and Life Safety
Life and Safety Considerations
Summary
Additional Resources
Chapter 3 Security Through Network Fundamentals
Introduction to Network Security
Segmentation
Micro Segmentation
Secure Network Access
Security Features
Continuous Monitoring
Summary
Additional Resources
Chapter 4 Maintaining Security Across UC Deployment Types
Common Enterprise Collaboration Deployment Models and Security Considerations
An Overview of How to Secure Cluster Communications
NTP Authentication Enablement and Verification
Securing Intra-Cluster Signaling and Traffic
Securing the Signaling Traffic to IOS Voice and Analog Gateways
Securing the Integration with Cisco Emergency Responder
Summary
Additional Resources
Chapter 5 Hardening the Core Cisco UC Appliance Operating Systems
Defining the Core UC Applications
Hardening the Voice Operating System
Performing OS Lockdown via CLI
Summary
Additional Resources
Chapter 6 Core Cisco UC Application Lockdown
Types of Users in Cisco Unified Communications Manager and Cisco Unity Connection
Strengthening Local User Account Controls
Importing End Users from a LDAP Directory
Using Single Sign-On to Simplify the Login Experience
Synching End Users Between Unity Connection and Unified CM Using Universal PIN
Locking Down the GUI
Enabling System Monitoring Using SNMP and Syslog
Disaster Recovery Planning and Best Practices
Summary
Additional Resources
Chapter 7 Encrypting Media and Signaling
Licensing (Encryption License) and Allowing Export Restrictions Requirements
FIPS Considerations When Enabling Secure Signaling and Media Encryption
Public Key Infrastructure Overview
TFTP File Encryption
Overview of the Endpoint Registration Process
Applying the Secure Phone Profiles and LSC to the Phones
Summary
Additional Resources
Chapter 8 Securing Cisco Unified Communications Manager (Cisco)
Endpoint Hardening
Secure Conferencing
Conference Now
Smart Licensing
Summary
Additional Resources
Chapter 9 Securing Cisco Unity Connection
Baseline Security Considerations Overview
Securing User Access to the Unity Connection
Securely Integrating Unity Connection with Unified CM
Preventing Toll Fraud in Unity Connection
Summary
Additional Resources
Chapter 10 Securing Cisco Meeting Server
CMS Overview and Deployment Modes
Operating System Hardening
Infrastructure Considerations
Securing CMS Connections
Certificate Verification
Certificate Assignment
Application Programming Interfaces (APIs)
Inbound and Outbound Calling
Summary
Additional Resources
Chapter 11 Securing the Edge
Business Requirements for the Collaboration Edge
Cisco’s Collaboration Edge Architecture
Deploying CUBE
Security Features Within Expressway
Deploying Mobile and Remote Access
Defending Against Attacks at the Edge
B2B Connectivity
Summary
Additional Resources
Chapter 12 Securing Cloud and Hybrid Cloud Services
Business Drivers for Cloud and Hybrid UC Services
Coordinating for Governance and Compliance
Considerations for Secure Calling
Securing Messaging Services
Meeting Management and Security Controls
Security Across Emerging Features
IoT Security
Summary
Additional Resources
Afterword
Index
Code Snippets
Search in book...
Toggle Font Controls
Playlists
Add To
Create new playlist
Name your new playlist
Playlist description (optional)
Cancel
Create playlist
Sign In
Email address
Password
Forgot Password?
Create account
Login
or
Continue with Facebook
Continue with Google
Sign Up
Full Name
Email address
Confirm Email Address
Password
Login
Create account
or
Continue with Facebook
Continue with Google
Next
Next Chapter
About This eBook
Add Highlight
No Comment
..................Content has been hidden....................
You can't read the all page of ebook, please click
here
login for view all page.
Day Mode
Cloud Mode
Night Mode
Reset