Configuring a Secure Survivable Remote Site Telephony (SRST) Reference
|
|
- Iris Collins
- 6 years ago
- Views:
Transcription
1 CHAPTER 6 Configuring a Secure Survivable Remote Site Telephony (SRST) Reference This chapter contains information on the following topics: Overview for Securing the SRST, page 6-1 Secure SRST Configuration Checklist, page 6-3 Configuring Secure SRST References, page 6-4 Security Configuration Settings for SRST References, page 6-6 Overview for Securing the SRST A SRST-enabled gateway provides limited call-processing tasks if the Cisco CallManager cannot complete the call. Secure SRST-enabled gateways contain a self-signed or certificate-authority issued certificate. After you perform SRST configuration tasks in Cisco CallManager Administration, Cisco CallManager uses a TLS connection to authenticate with the Certificate Provider service in the SRST-enabled gateway. Cisco CallManager then retrieves the certificate from the SRST-enabled gateway and adds the certificate to the Cisco CallManager database. 6-1
2 Overview for Securing the SRST Chapter 6 After you reset the dependent devices in Cisco CallManager Administration, the TFTP server adds the SRST certificate to the phone cnf.xml file and sends the file to the phone. A secure phone then uses a TLS connection to interact with the SRST-enabled gateway. Cisco CallManager only supports depth-1 chaining for the SRST certificates; that is, the phone configuration file only contains a certificate from a single issuer. HSRP is not supported. Ensure that the following criteria are met, so the TLS handshake occurs between the secure phone and the SRST-enabled gateway: The SRST reference contains a self-signed or certificate-authority issued certificate. You configured the cluster for mixed mode through the Cisco CTL client. You configured the phone for authentication or encryption. You configured the SRST reference in Cisco CallManager Administration. You reset the SRST-enabled gateway and the dependent phones after the SRST configuration. Related Topics Secure SRST Configuration Checklist, page 6-3 Configuring Secure SRST References, page 6-4 Security Configuration Settings for SRST References, page 6-6 Troubleshooting, page
3 Chapter 6 Secure SRST Configuration Checklist Secure SRST Configuration Checklist Use Table 6-1 to guide you through the SRST configuration process for security. Table 6-1 Configuration Checklist for Securing the SRST Configuration Steps Step 1 Step 2 Verify that you performed all necessary tasks on the SRST-enabled gateway, so the device supports Cisco CallManager and security. Verify that you performed all necessary tasks to install and configure the Cisco CTL client. Related Procedures and Topics System administration guide for the Cisco SRST-enabled gateway that supports this version of Cisco CallManager Configuring the Cisco CTL Client, page 3-1 Step 3 Verify that a certificate exists in the phone. Verifying That a Locally Significant Certificate Exists on the Phone, page 7-39 Step 4 Step 5 Step 6 Verify that you configured the phones for authentication or encryption. In Cisco CallManager Administration, configure the SRST reference for security, including enabling the SRST reference in the Device Pool Configuration window. Reset the SRST-enabled gateway and phones. Verifying That a Manufactured-Installed Certificate (MIC) Exists in the Phone, page 7-40 Configuring the Device Security Mode, page 5-3 Configuring Secure SRST References, page 6-4 Configuring Secure SRST References, page
4 Chapter 6 Configuring Secure SRST References Configuring Secure SRST References Consider the following information before you add, update, or delete the SRST reference in Cisco CallManager Administration: Adding a Secure SRST Reference The first time that you configure the SRST reference for security, you must configure all settings that are described in Table 6-2. Updating a Secure SRST Reference Performing SRST updates in Cisco CallManager Administration does not automatically update the SRST certificate. To update the certificate, you must click the Update SRST Certificate button; after you click the button, the contents of the certificate display, and you must accept or reject the certificate. If you accept the certificate, Cisco CallManager replaces the SRST certificate in the trust folder on each server in the cluster. Deleting a Secure SRST Reference Deleting a secure SRST reference removes the SRST certificate from the Cisco CallManager database and the cnf.xml file in the phone. To configure a secure SRST reference, perform the following procedure: Procedure Step 1 Step 2 Step 3 Step 4 In Cisco CallManager Administration, choose System > SRST. Perform one of the following tasks: Add a SRST reference for the first time. For information on how to perform this task, refer to the Cisco CallManager Administration Guide. Find the SRST reference that you want to configure for security. For information on finding SRST references, refer to the Cisco CallManager Administration Guide. Use Table 6-2 to update an existing SRST reference for security. Click Insert or Update, depending on whether you added or updated the SRST reference. To update the SRST certificate in the database, click the Update SRST Certificate button. 6-4
5 Chapter 6 Configuring Secure SRST References This button displays only when you update an existing SRST reference. Step 5 Step 6 Click Reset Devices. Verify that you enabled the SRST reference in the Device Pool Configuration window. Related Topics Overview for Securing the SRST, page 6-1 Secure SRST Configuration Checklist, page 6-3 Security Configuration Settings for SRST References, page 6-6 Troubleshooting, page
6 Chapter 6 Security Configuration Settings for SRST References Security Configuration Settings for SRST References Use Table 6-2 to configure secure SRST references. Table 6-2 Configuration Settings for Secure SRST References Setting Is SRST Secure? SRST Certificate Provider Port Description After you verify that the SRST-enabled gateway contains a self-signed or certificate-authority issued certificate, check this check box. After you configure the SRST and reset the gateway and dependent phones, the Cisco CTL Provider service authenticates to the Certificate Provider service on the SRST-enabled gateway. The Cisco CTL client retrieves the certificate from the SRST-enabled gateway and stores the certificate in the Cisco CallManager database. To remove the SRST certificate from the database and phone, uncheck this check box, click Update, and reset the dependent phones. This port monitors requests for the Certificate Provider service on the SRST-enabled gateway. Cisco CallManager uses this port to retrieve the certificate from the SRST-enabled gateway. The Cisco SRST Certificate Provider default port equals After you configure this port on the SRST-enabled gateway, enter the port number in this field. You may need to configure a different port number if the port is currently used or if you use a firewall and you cannot use the port within the firewall. 6-6
7 Chapter 6 Security Configuration Settings for SRST References Table 6-2 Configuration Settings for Secure SRST References (continued) Setting Update SRST Certificate Description This button displays only for existing secure SRST references. After you click this button, the Cisco CTL client replaces the existing SRST certificate that is stored in the Cisco CallManager database. After you reset the dependent phones, the TFTP server sends the cnf.xml file (with the new SRST certificate) to the phones. Related Topics Overview for Securing the SRST, page 6-1 Secure SRST Configuration Checklist, page 6-3 Troubleshooting, page
8 Chapter 6 Security Configuration Settings for SRST References 6-8
Configuring a Secure Survivable Remote Site Telephony (SRST) Reference
CHAPTER 12 Configuring a Secure Survivable Remote Site Telephony (SRST) Reference This chapter contains information on the following topics: Overview for Securing the SRST, page 12-1 Secure SRST Configuration
More informationConfiguring a Secure Survivable Remote Site Telephony (SRST) Reference
CHAPTER 13 Configuring a Secure Survivable Remote Site Telephony (SRST) Reference This chapter contains information on the following topics: Overview for Securing the SRST, page 13-1 Configuration Tips
More informationSecure Survivable Remote Site Telephony (SRST) Reference
Secure Survivable Remote Site Telephony (SRST) Reference This chapter provides information about SRST references. Securing SRST, page 1 Securing SRST Tips, page 2 Set Up Secure SRST, page 3 Set Up Secure
More informationSurvivable Remote Site Telephony Configuration
13 CHAPTER Survivable Remote Site Telephony Configuration A survivable remote site telephony (SRST) reference comprises the gateway that can provide limited Cisco Unified CallManager functionality when
More informationVoice-Messaging Ports Security Setup
This chapter provides information about voice-messaging ports security setup. Voice-Messaging Security, page 1 Voice-Messaging Security Setup Tips, page 1 Set Up Secure Voice-Messaging Port, page 2 Apply
More informationVoice-messaging ports security setup
Voice-messaging ports security setup This chapter provides information about voice-messaging ports security setup. Voice-messaging security, page 1 Voice-messaging security setup tips, page 2 Set up secure
More informationPhone Security. Phone Security. This chapter provides information about phone security.
This chapter provides information about phone security., page 1 Trusted Devices, page 2 Phone Model Support, page 3 Preferred Vendor SIP Set Up, page 4 View Settings, page 5 Set Up, page 5 Interactions
More informationCertificate authority proxy function
Certificate authority proxy function This chapter provides information about the certificate authority proxy function. About certificate authority proxy function, page 1 Cisco Unified IP Phone and CAPF
More informationUsing the Certificate Authority Proxy Function
CHAPTER 10 This chapter provides information on the following topics: Certificate Authority Proxy Function Overview, page 10-1 Cisco Unified IP Phone and CAPF Interaction, page 10-2 CAPF Interaction with
More informationTLS Setup. TLS Overview. TLS Prerequisites
Setup Overview, page 1 Prerequisites, page 1 Configuration Task Flow, page 2 Interactions and Restrictions, page 8 Overview Transport Layer Security () provides secure and reliable signaling and data transfer
More informationCisco CTL Client Setup
This chapter provides information about Cisco CTL client setup. About, page 2 Addition of Second SAST Role in the CTL File for Recovery, page 2 Cluster Encryption Configuration Through CLI, page 3 Remove
More informationConfiguring Encryption for Gateways and Trunks
CHAPTER 24 This chapter contains information on the following topics: Overview for Cisco IOS MGCP Gateway Encryption, page 24-1 Overview for H.323 Gateway and H.323/H.225/H.245 Trunk Encryption, page 24-2
More informationCisco CTL Client setup
Cisco CTL Client setup This chapter provides information about Cisco CTL client setup. About Cisco CTL Client setup, page 2 Remove etoken Run Time Environment 3.00 for CTL Client 5.0 plug-in, page 2 Cisco
More informationPreparing to Deploy Cisco IP Communicator
CHAPTER 2 Revised: 1/19/11 This chapter describes the required and recommended tasks for deploying Cisco IP Communicator. It also provides instructions for adding Cisco IP Communicator devices to the Cisco
More informationCisco IP Communicator Deployment Preparation
This chapter describes the required and recommended tasks for deploying Cisco IP Communicator. It also provides instructions for adding Cisco IP Communicator devices to the Cisco Unified Communications
More informationAuto Register Cisco IP Communicator 8.6 with CUCM 8.x
Auto Register Cisco IP Communicator 8.6 with CUCM 8.x Document ID: 113589 Contents Introduction Prerequisites Requirements Components Used Conventions CIPC Features and Benefits Secure VLAN Traversal High
More informationConfiguring Authentication and Encryption for CTI, JTAPI, and TAPI
CHAPTER 22 Configuring Authentication and Encryption for CTI, JTAPI, and TAPI This chapter provides a brief overview of how to secure the CTI, JTAPI, and TAPI applications. It also describes the tasks
More informationEncryption setup for gateways and trunks
Encryption setup for gateways and trunks This chapter provides information about encryption setup for gateways and trunks. Cisco IOS MGCP gateway encryption, page 1 H.323 gateway and H.323/H.225/H.245
More informationAutoregistration Configuration
CHAPTER 24 This section covers the following topics on autoregistration configuration: Settings, page 24-1 Enabling Autoregistration, page 24-3 Disabling Autoregistration, page 24-5 Reusing Autoregistration
More informationUnderstanding Cisco CallManager Trunk Types
42 CHAPTER In a distributed call-processing environment, Cisco CallManager communicates with other Cisco CallManager clusters, the public switched telephone network (PSTN), and other non-ip telecommunications
More informationEncrypted Phone Configuration File Setup
This chapter provides information about encrypted phone configuration files setup. After you configure security-related settings, the phone configuration file contains sensitive information, such as digest
More informationConfigure Cisco IP Phones
Cisco IP Phones Overview, page 1 Cisco IP Phones Configuration Task Flow, page 1 Cisco IP Phones Overview Cisco Unified IP Phones are full-featured telephones that provide voice communication over an IP
More informationRefer to Cisco Unified Communications Manager Security Guide for more details.
Contents Introduction Prerequisites Requirements Components Used Diagram Configure - Secure SIP Trunk Configure CUC 1. Add SIP certificate 2. Create New Phone System or Modify Default One 3. Add a New
More informationManage Certificates. Certificates Overview
Certificates Overview, page 1 Show Certificates, page 3 Download Certificates, page 4 Install Intermediate Certificates, page 4 Delete a Trust Certificate, page 5 Regenerate a Certificate, page 6 Upload
More informationAn Overview of the Cisco Unified IP Phone
CHAPTER 1 The Cisco Unified IP Phone 7975G is a full-featured telephones that provides voice communication over an Internet Protocol (IP) network. These phones function much like digital business phones,
More informationCommand or Action Step 1. Create and Configure Cisco Jabber Devices, on page 1. Configure a SIP Trunk, on page 6
s Workflow, page 1 s Workflow Command or Action Purpose Create and Configure Cisco Jabber Devices, on page 1 Create at least one device for every user that will access Cisco Jabber. Configure a SIP Trunk,
More informationConfigure Mobile and Remote Access
Mobile and Remote Access Overview, on page 1 Mobile and Remote Access Prerequisites, on page 3 Mobile and Remote Access Configuration Task Flow, on page 4 Mobile and Remote Access Overview Cisco Unified
More informationAn Overview of the Cisco Unified IP Phone
CHAPTER 1 The Cisco Unified IP Phone 7962G and 7942G are full-feature telephones that provide voice communication over an Internet Protocol (IP) network. The Cisco Unified IP Phone functions much like
More informationProvision Cisco UC Integration for MicrosoftOffice Communicator client
Provision Cisco UC Integration for MicrosoftOffice Communicator client Add and register Cisco UC Integration for Microsoft Office Communicator client, page 1 Install Cisco UC Integration for Microsoft
More informationCisco Desktop Collaboration Experience DX650 Security Overview
White Paper Cisco Desktop Collaboration Experience DX650 Security Overview Cisco Desktop Collaboration Experience DX650 Security Overview The Cisco Desktop Collaboration Experience DX650 (Cisco DX650)
More informationCisco IP Phone Security
Overview, page 1 Security Enhancements for Your Phone Network, page 2 View the Current Security Features on the Phone, page 2 View Security Profiles, page 3 Supported Security Features, page 3 Overview
More informationVPN Client. VPN Client Overview. VPN Client Prerequisites. VPN Client Configuration Task Flow. Before You Begin
Overview, page 1 Prerequisites, page 1 Configuration Task Flow, page 1 Overview The Cisco for Cisco Unified IP Phones creates a secure VPN connection for employees who telecommute. All settings of the
More informationEncrypted Phone Configuration File Setup
This chapter provides information about encrypted phone configuration files setup. After you configure security-related settings, the phone configuration file contains sensitive information, such as digest
More informationConfigure Voice and Video Communication
s for On-Premises Deployments, page 1 for Cloud-Based Deployments, page 23 s for On-Premises Deployments Command or Action Purpose Install Cisco Options Package File for Devices, on page 2. Complete this
More informationCisco recommends that you have knowledge of these commonly used CUCM features:
Contents Introduction Prerequisites Requirements Components Used Supported Phones Background Information Configure Configure Mixed Mode on a CUCM 11.5 Cluster with Auto-registration Currently Enabled Configure
More informationCisco Unified Communications Manager configuration for integration with IM and Presence Service
Cisco Unified Communications Manager configuration for integration with IM and Presence Service User and Device Configuration on Cisco Unified Communications Manager before Integration Task List, page
More informationConfiguring the Cisco Phone Proxy
CHAPTER 44 This chapter describes how to configure the adaptive security appliance for Cisco Phone Proxy feature. This chapter includes the following sections: Information About the Cisco Phone Proxy,
More informationManaging Security Certificates in Cisco Unified Operating System
CHAPTER 5 Managing Security Certificates in Cisco Unified Operating System June 11, 2009 The operating system security options enable you to manage security certificates in these two ways: Certificate
More informationAn Overview of the Cisco Unified IP Phone
CHAPTER 1 The Cisco Unified IP Phone 7965G and 7945G are full-featured telephones that provide voice communication over an Internet Protocol (IP) network. These phones function much like digital business
More informationReal4Test. Real IT Certification Exam Study materials/braindumps
Real4Test http://www.real4test.com Real IT Certification Exam Study materials/braindumps Exam : 300-075 Title : Implementing Cisco IP Telephony & Video, Part 2 v1.0 Vendor : Cisco Version : DEMO Get Latest
More informationViewing Security, Device, Model, Status, and Call Statistics Information on the Phone
CHAPTER 8 Viewing Security, Device, Model, Status, and Call Statistics Information on the Phone This chapter describes how to use the Settings menus on the Cisco Unified Wireless IP Phone 7921G to view
More informationCommand or Action Step 1. Create and Configure Cisco Jabber Devices, on page 1
Create Softphones Workflow, page 1 Create Softphones Workflow Command or Action Purpose Create and Configure Cisco Jabber Devices, on page 1 Create at least one device for every user that will access Cisco
More informationSystem-Level Configuration Settings
CHAPTER 5 Configure system-level settings before you add devices and configure other Cisco Unified CallManager features. This section covers the following topics: Server Configuration, page 5-1 Cisco Unified
More informationPre-Change Tasks and System Health Checks
Pre-Change Task List for Cisco Unified Communications Manager Nodes, page 1 Pre-Change Task List for IM and Presence Service Nodes, page 2 System Health Checks, page 4 Pre-Change Setup, page 6 Pre-Change
More informationCisco Unified Communications Manager Configuration
CHAPTER 3 Cisco Unified Communications Manager Configuration Use the following topics to find and update a Cisco Unified Communications Manager configuration or to view system component version information:
More informationCisco Unified IP Phones
Phone Overview, page 1 Cisco Unified IP Phone 7906G and 7911G, page 2 Network Protocols, page 3 Cisco Unified IP Phone 7906 and 7911 Supported Features, page 8 Cisco Unified IP Phone Security Features,
More informationUsing the Cisco Unified Wireless IP Phone 7921G Web Pages
4 CHAPTER Using the Cisco Unified Wireless IP Phone 7921G Web Pages This chapter describes how to set up your PC to configure a Cisco Unified Wireless IP Phone 7921G by using a USB connector and how to
More informationSetting Up a Cisco Unified Communications Manager SIP Trunk Integration, page 1
Up a Cisco Unified Communications Manager SIP Trunk Integration This chapter provides instructions for setting up a Cisco Unified Communications Manager SIP trunk integration with Cisco Unity Connection.
More informationCisco CallManager Security Guide
Release 4.1(2) Corporate Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 526-4100 Text Part Number:
More informationUnderstanding Trace. Understanding Trace CHAPTER
CHAPTER 6 This chapter, which provides information on Cisco Unified Serviceability trace, contains the following topics:, page 6-1 Trace Configuration, page 6-2 Troubleshooting Trace Settings, page 6-2
More informationCisco Unified Wireless IP Phone
Phone Overview, page 1 7925G, 7925G-EX, and 7926G, page 1 Bluetooth Technology, page 10 Feature Support, page 12 Security Features, page 14 7925G, 7925G-EX, and 7926G Deployment, page 19 Phone Overview
More informationCisco Unified Communications Manager Security Guide Copyright 2010 Cisco Systems, Inc. All rights reserved.
Cisco Unified Communications Manager Security Guide Release 8.5(1) Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800
More informationSurvivable Remote Site Telephony Overview, page 1 Survivable Remote Site Telephony Configuration Task Flow, page 1 SRST Restrictions, page 6
Survivable Remote Site Telephony Overview, page 1 Survivable Remote Site Telephony Configuration Task Flow, page 1 SRST Restrictions, page 6 Survivable Remote Site Telephony Overview Survivable Remote
More informationUnified Communication Cluster Setup with CA Signed Multi Server Subject Alternate Name Configuration Example
Unified Communication Cluster Setup with CA Signed Multi Server Subject Alternate Name Configuration Example Document ID: 118731 Contributed by Vasanth Kumar K, Cisco TAC Engineer. Mar 09, 2015 Contents
More informationexamcollection.premium.exam.161q
300-075.examcollection.premium.exam.161q Number: 300-075 Passing Score: 800 Time Limit: 120 min File Version: 6.0 300-075 Implementing Cisco IP Telephony & Video, Part 2 v1.0 Version 6.0 Exam A QUESTION
More informationClient services framework setup
In Cisco Unified Communications Manager Administration, use the Device > Phone menu path to configure the Cisco Unified Client Services Framework device. This section describes how to configure a Cisco
More informationConfigure and Troubleshoot Device Mobility
Configure and Troubleshoot Device Mobility Contents Introduction Prerequisites Requirements Components Used Background Information Configure Configurations Service Parameter Configuration Phone Configuration
More informationSecure Call Recording
Secure Call Recording Effective Summer 2017, Imagicle Call Recording can record Encrypted calls, i.e. calls which are placed with Secure SIP (SIP/TLS) for the signalling and SRTP for the audio stream.
More informationManaging Certificates
CHAPTER 12 The Cisco Identity Services Engine (Cisco ISE) relies on public key infrastructure (PKI) to provide secure communication for the following: Client and server authentication for Transport Layer
More informationDefault Security Setup
This section provides information about the default security setup. Default Security Features, page 1 Trust Verification Service, page 2 Initial Trust List, page 2 Update ITL File for IP Phones, page 4
More informationAbout Cisco Unified Communications Manager Group Setup
Cisco Unified Communications Manager Group Setup This chapter provides information to configure a Cisco Unified Communications Manager group. About, on page 1 Cisco Unified Communications Manager Group
More informationSSH Algorithms for Common Criteria Certification
The feature provides the list and order of the algorithms that are allowed for Common Criteria Certification. This module describes how to configure the encryption, Message Authentication Code (MAC), and
More informationConfiguration Example for Secure SIP Integration Between CUCM and CUC based on Next Generation Encryption (NGE)
Configuration Example for Secure SIP Integration Between CUCM and CUC based on Next Generation Encryption (NGE) Contents Introduction Prerequisites Requirements Network Diagram Certificate requirements
More informationFixing Issues with Corporate Directory Lookup from the Cisco IP Phone
Fixing Issues with Corporate Directory Lookup from the Cisco IP Phone Document ID: 13936 Contents Introduction Prerequisites Requirements Components Used Conventions Fix Corporate Directory Issues in Cisco
More informationSAML-Based SSO Configuration
Prerequisites, page 1 SAML SSO Configuration Task Flow, page 5 Reconfigure OpenAM SSO to SAML SSO Following an Upgrade, page 9 SAML SSO Deployment Interactions and Restrictions, page 9 Prerequisites NTP
More informationUsing the Cisco Unified Wireless IP Phone 7921G Web Pages
CHAPTER 4 Using the Cisco Unified Wireless IP Phone 7921G Web Pages You can use the Cisco Unified Wireless IP Phone 7921G web pages to set up and configure settings for the phone. This chapter describes
More informationTroubleshooting and Maintenance
CHAPTER 6 This chapter provides information that can assist you in troubleshooting problems with your ATA 187 or with your IP telephony network. It also explains how to clean and maintain your phone. This
More informationIntegrate Microsoft Office Communicator Client and Microsoft Lync Client for Cisco UC
Integrate Microsoft Office Communicator Client and Microsoft Lync Client for Cisco UC Overview, page 1 Limitations and considerations, page 2 Microsoft Office Communicator, page 3 Microsoft Lync, page
More informationConfiguration of Microsoft Live Communications Server for Partitioned Intradomain Federation
Configuration of Microsoft Live Communications Server for Partitioned Intradomain Federation Domain Verification for LCS Servers, page 1 Enable Port 5060 on LCS Server, page 1 Configure a LCS Static Route
More informationConfigure Service Parameters
Service Parameters Overview, page 1 Service Parameters Configuration Task Flow, page 1 Service Parameters Overview Each Cisco Unified Communications Manager node has a list of services that are available
More informationCisco Unified Communications Manager Security Guide
Cisco Unified Communications Manager Security Guide Release 7.0 (1) Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800
More informationImplementing Cisco IP Telephony & Video, Part 2 v1.0
Implementing Cisco IP Telephony & Video, Part 2 v1.0 Cisco 300-075 Dumps Available Here at: /cisco-exam/300-075-dumps.html Enrolling now you will get access to 380 questions in a unique set of 300-075
More informationCisco Unified IP Phone Configuration
CHAPTER 67 Cisco Unified IP Phones as full-featured telephones can plug directly into your IP network. You use the Cisco Unified Communications Manager Administration Phone Configuration window to configure
More informationPost-Installation Tasks for Cisco Unified Communications Manager
Post-Installation Tasks for Cisco Unified Communications Manager, on page 1 COP Files, Dial Plans, and Locales, on page 5 Post-Installation Tasks for Cisco Unified Communications Manager After you install
More informationConfiguring Settings on the Cisco Unified Wireless IP Phone 7921G
CHAPTER 5 Configuring Settings on the Cisco Unified Wireless IP Phone 7921G The Settings menu on the Cisco Unified Wireless IP Phone 7921G provides access to view and change network profile settings and
More informationConfiguring Services. Activating and Deactivating Feature Services CHAPTER
CHAPTER 11 This chapter contains information on the following topics: Activating and Deactivating Feature s, page 11-1 Cluster Activation Recommendations, page 11-2 Starting, Stopping, Restarting, and
More informationDefault security setup
Default security setup This section provides information about the default security setup. Default security features, page 1 Trust Verification Service, page 2 Initial trust list, page 2 Update ITL file
More informationSecurity by Default. Overview CHAPTER
CHAPTER 3 This section contains the following topics: Overview, page 3-1 Trust Verification Service, page 3-2 Initial Trust List, page 3-2 Autoregistration, page 3-3 Supported Cisco Unified IP Phones,
More informationIntegrate Microsoft Office Communicator and Microsoft Lync Clients for Cisco UC
Integrate Microsoft Office Communicator and Microsoft Lync Clients for Cisco UC Overview, page 1 Limitations and considerations, page 2 Cisco UC Integration for Microsoft Office Communicator client design
More informationCisco Unified IP Phone Settings
Phone Settings Overview, page 1 Cisco Unified IP Phone Configuration Menus, page 1 Network Setup Menu, page 3 IPv4 Setup Menu s, page 8 IPv6 Setup Menu s, page 13 Security Setup Menu, page 14 Phone Settings
More informationLDAP Directory Integration
LDAP Server Name, Address, and Profile Configuration, on page 1 with Cisco Unified Communications Manager Task List, on page 1 for Contact Searches on XMPP Clients, on page 6 LDAP Server Name, Address,
More informationCHAPTER. Introduction
CHAPTER 1 Cisco Unified Communications Manager (formerly Cisco Unified CallManager) serves as the software-based call-processing component of the Cisco Unified Communications family of products. A wide
More informationA. On the VCS, navigate to Configuration, Protocols, H.323, and set Auto Discover to off.
Volume: 383 Questions Question No: 1 Which parameter should be set to prevent H.323 endpoints from registering to Cisco TelePresence Video Communication Server automatically? A. On the VCS, navigate to
More informationConfiguring the Client Adapter through Windows CE.NET
APPENDIX E Configuring the Client Adapter through Windows CE.NET This appendix explains how to configure and use the client adapter with Windows CE.NET. The following topics are covered in this appendix:
More informationIT Exam Training online / Bootcamp
DumpCollection IT Exam Training online / Bootcamp http://www.dumpcollection.com PDF and Testing Engine, study and practice Exam : 642-445 Title : Cisco IP Telephony for Release 5.x Vendors : Cisco Version
More informationCisco TelePresence Cisco Unified Communications Manager with Cisco VCS (SIP Trunk)
Cisco TelePresence Cisco Unified Communications Manager with Cisco VCS (SIP Trunk) Deployment Guide Cisco VCS X8.1 CUCM 8.6.x, 9.x January 2015 Contents Introduction 5 Deployment scenario 5 Summary of
More informationSecurity Certificate Configuration for XMPP Federation
Security Certificate Configuration for XMPP Federation, page 1 Local Domain Validation for XMPP Federation, page 2 Enable Wildcards in XMPP Federation Security Certificates, page 2 Use a Self-Signed Certificate
More informationT-Server for Cisco UCM Deployment Guide. T-Servers 8.1.2
T-Server for Cisco UCM Deployment Guide T-Servers 8.1.2 3/8/2018 Table of Contents Supplement to T-Server for Cisco UCM Deployment Guide 3 Cross-cluster supervisor monitoring 4 Extend and connect 5 TLS
More informationCisco Unified IP Phone Settings
Phone Settings Overview, page 1 Cisco Unified IP Phones 7906G and 7911G Menus, page 1 Phone Setup s, page 4 Network Configuration Menu, page 5 Device Configuration Menu, page 17 Security Configuration
More informationThe VPN menu and its options are not available in the U.S. export unrestricted version of Cisco Unified Communications Manager.
Overview, page 1 Prerequisites, page 1 Configuration Task Flow, page 1 Overview The Cisco for Cisco Unified IP Phones creates a secure VPN connection for employees who telecommute. All settings of the
More informationIP Phone Security and CTL (Certificate Trust List)
IP Phone Security and CTL (Certificate Trust List) Purpose on page 1 Phone Security and CTL Overview on page 1 Configuration on page 3 1. Obtain USB etokens on page 3 2. Activate CTL Provider and CAPF
More informationConfiguring the Cisco TelePresence System
3 CHAPTER Revised: August 2011, Contents This chapter contains the following sections: First Time Setup Wizard for the CTS 500 32, page 3-1 First Time Setup for All Other CTS Models, page 3-2 IP Settings,
More informationUnified Communications Manager FAQ
Unified Communications Manager FAQ Document ID: 111900 Contents Introduction Is it possible to control the quota for outside calls with Cisco Unified Communications Manager? How many calls can be handled
More informationIntercluster Peer Configuration
Prerequisites for Intercluster Deployment, page 1, page 2 Prerequisites for Intercluster Deployment You configure an intercluster peer between the IM and Presence database publisher nodes in standalone
More informationPost-Change Tasks and Verification
Post-Change Task List for Cisco Unified Communications Manager Nodes, page 1 Post-Change Task List for IM and Presence Service Nodes, page 3 Perform Post-Change Tasks for Cisco Unified Communications Manager
More informationTroubleshooting Cisco Unified Communications for RTX
CHAPTER 5 Troubleshooting Cisco Unified Communications for RTX Revised: February 18, 2013 Setting Logging Levels Before Users Create a Problem Report, page 5-1 Moving a Device to Another Cluster, page
More informationReal-Time Monitoring Configuration
CHAPTER 7 This chapter contains the following information for configuring the Cisco Unified Presence Server Real-Time Monitoring Tool (RTMT). Some options that are available in the current version of the
More informationCisco Unified IP Phone 7962G and 7942G Administration Guide for Cisco Unified Communications Manager 6.1
Cisco Unified IP Phone 7962G and 7942G Administration Guide for Cisco Unified Communications Manager 6.1 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com
More informationRemote Monitoring. Remote Monitoring Overview
Overview, page 1 Access Web Page, page 2 Control Web Page Access, page 3 Device Information Area, page 3 Network Configuration Area, page 4 Ethernet Information Area, page 7 Device Logs Area, page 9 Streaming
More informationCisco Unified IP Phone setup
Cisco Unified IP Phone setup This chapter provides information about working with and configuring Cisco Unified IP Phones in Cisco Unified Communications Manager Administration. About Cisco Unified IP
More information