- Contents (DO NOT PUBLISH)
- Preface
- IP Communications Required by Cisco Unity Connection 10.x
- Preventing Toll Fraud in Cisco Unity Connection 10.x
- Securing the Connection Between Cisco Unity Connection 10.x, Cisco Unified Communications Manager, and IP Phones
- Securing Administration and Services Accounts in Cisco Unity Connection 10.x
- FIPS Compliance in Cisco Unity Connection 10.x
- Passwords, PINs, and Authentication Rule Management in Cisco Unity Connection 10.x
- Single Sign-on in Cisco Unity Connection
- The Cisco Unity Connection 10.x Security Password
- Using SSL to Secure Client/Server Connections in Cisco Unity Connection 10.x
- Securing User Messages in Cisco Unity Connection 10.x
- Cisco Unity Connection - Restricted and Unrestricted Version (Applicable for 10.5(2) SU6 and later)
- Index
Index
summary of purposes 5-1
Application Administration account 5-1
authentication rules 7-5
call signaling, modification threat 3-1
Cisco PCA, securing access to Cisco Unity Connection 10-1
call signaling modification 3-1
identity theft 3-2, 4-1
man-in-the-middle attacks on connection to Cisco Unity Connection 3-1, 4-1
media (RTP) stream modification 3-2, 4-1
network traffic sniffing (eavesdropping) 3-1, 4-1
Connection service ports 1-1
eavesdropping Cisco Unified CM connections 3-1, 4-1
Cisco Unified CM server 3-2, 4-1
Cisco Unity Connection voice messaging port 3-2
securing access to Cisco Unity Connection 10-1
security options 11-5
IP phones, network traffic sniffing (eavesdropping) 3-1, 4-1
mailbox-size quotas, customizing for users or templates 11-4
man-in-the-middle attacks for Cisco Unified CM connections 3-1, 4-1
media stream, modification threat 3-2, 4-1
shredding files for secure deletes 11-4
overview of options 11-1
security options for IMAP client access 11-5
sensitivity options for users and unidentified callers 11-1
network traffic sniffing Cisco Unified CM connections 3-1, 4-1
Operating System Administration account 5-1
changing for Connection web application access 6-3, 7-3, 8-3
unique and secure, assigning 7-2
used to access Connection applications 6-1, 7-2, 8-1
changing Connection phone PINs 6-4, 7-4, 8-3
unique and secure, assigning 7-2
used to access Connection applications 6-1, 7-2, 8-1
ports, voice messaging, and identity theft 3-2
quotas for mailboxes, customizing for users or templates 11-4
restriction tables, using to prevent toll fraud 2-1
RTP stream, modification threat 3-2, 4-1
sec-01-1 1-1
secure deletes, shredding message files for 11-4
securing Cisco PCA and IMAP client access to Cisco Unity Connection 10-1
controlling access, distribution, and storage of voice messages 11-1
IMAP client 11-5
user and unidentified caller messages 11-1
server, identity theft 3-2, 4-1
shredding message files for secure deletes 11-4
SSL certificate, using to secure Cisco PCA and IMAP client access to Cisco Unity Connection 10-1
used for inbound connections 1-1
used for outbound connections 1-6
toll fraud 2-1
used for inbound connections 1-1
used for outbound connections 1-6
voice messaging ports and identity theft 3-2
Index
summary of purposes 5-1
Application Administration account 5-1
authentication rules 7-5
call signaling, modification threat 3-1
Cisco PCA, securing access to Cisco Unity Connection 10-1
call signaling modification 3-1
identity theft 3-2, 4-1
man-in-the-middle attacks on connection to Cisco Unity Connection 3-1, 4-1
media (RTP) stream modification 3-2, 4-1
network traffic sniffing (eavesdropping) 3-1, 4-1
Connection service ports 1-1
eavesdropping Cisco Unified CM connections 3-1, 4-1
Cisco Unified CM server 3-2, 4-1
Cisco Unity Connection voice messaging port 3-2
securing access to Cisco Unity Connection 10-1
security options 11-5
IP phones, network traffic sniffing (eavesdropping) 3-1, 4-1
mailbox-size quotas, customizing for users or templates 11-4
man-in-the-middle attacks for Cisco Unified CM connections 3-1, 4-1
media stream, modification threat 3-2, 4-1
shredding files for secure deletes 11-4
overview of options 11-1
security options for IMAP client access 11-5
sensitivity options for users and unidentified callers 11-1
network traffic sniffing Cisco Unified CM connections 3-1, 4-1
Operating System Administration account 5-1
changing for Connection web application access 6-3, 7-3, 8-3
unique and secure, assigning 7-2
used to access Connection applications 6-1, 7-2, 8-1
changing Connection phone PINs 6-4, 7-4, 8-3
unique and secure, assigning 7-2
used to access Connection applications 6-1, 7-2, 8-1
ports, voice messaging, and identity theft 3-2
quotas for mailboxes, customizing for users or templates 11-4
restriction tables, using to prevent toll fraud 2-1
RTP stream, modification threat 3-2, 4-1
sec-01-1 1-1
secure deletes, shredding message files for 11-4
securing Cisco PCA and IMAP client access to Cisco Unity Connection 10-1
controlling access, distribution, and storage of voice messages 11-1
IMAP client 11-5
user and unidentified caller messages 11-1
server, identity theft 3-2, 4-1
shredding message files for secure deletes 11-4
SSL certificate, using to secure Cisco PCA and IMAP client access to Cisco Unity Connection 10-1
used for inbound connections 1-1
used for outbound connections 1-6
toll fraud 2-1
used for inbound connections 1-1
used for outbound connections 1-6
voice messaging ports and identity theft 3-2