Securing Unified Communications and Certificate Deep Dive. Ryan Ratliff, Technical Leader - Services

Size: px
Start display at page:

Download "Securing Unified Communications and Certificate Deep Dive. Ryan Ratliff, Technical Leader - Services"

Transcription

1

2 Securing Unified Communications and Certificate Deep Dive Ryan Ratliff, Technical Leader - Services

3 Abstract Cisco Unified Communications Manager has a robust set of security features that allow for an effective defense throughout the system. This session will highlight security updates in the latest UCM versions as well as security features like CTL, CAPF, UC Manager PKI, encrypted signalling and media from a foundational, configuration, and troubleshooting perspective.

4 Agenda Secure Network, Secure Endpoints, Secure Call Control Hardened appliance model & Toll Fraud Protection Certificates & PKI Certificate Trust List (CTL) & Initial Trust List (ITL) Cisco Product Security Q & A

5 Secure Network, Secure Endpoints, Secure Call Control

6 Infrastructure Security Measures Segregation Virtual LANs (VLANs) separates voice and data traffic VLAN Access Control Lists (VACLs) limits traffic between devices on the voice VLAN QoS Packet Marking ensures UC traffic receives appropriate priority over other traffic Layer 2 DHCP Snooping creates binding table Dynamic ARP Inspection examines ARP & GARP for violations Port Security limits the number of MAC addresses allowed per port 802.1x limits network access to authentic devices on assigned VLANs Layer 3 Multi-Domain Authentication (MDA) binds two devices to assigned VLANs MAC Authentication Bypass (MAB) provides a measure of control over devices which don t support 802.1x IP Source Guard examines physical port, VLAN, IP, & MAC for inconsistencies 6

7 IP Phone Security Features Cryptographically assured device identity Manufacture Installed Certificate(MIC) Locally Significant Certificates (LSC) Signed firmware images Signed & encrypted configuration files Mutually authenticated & encrypted signalling & media Embedded 802.1x Supplicant Positive disconnect for handset & speakerphone Positive off-hook indicator for speakerphone Disable or block access to voice VLAN for downstream port Disable web interface Disable settings button Disable SSH access FIPS mode (select models) Gratuitous ARP rejection 7

8 Unified Communications Manager Security Encrypted Signalling & Media SIP & SCCP Phones SIP Video Endpoints MGCP, H.323, & SIP Trunks TAPI & JTAPI Applications Meet-me, ad-hoc, & barge Conferences Extension Mobility Cross-Cluster Intercluster Lookup Service (ILS) Location Bandwidth Manager (LBM) Secure Interfaces & Protocols Web, CLI, CTI, & LDAP HTTPS, TLS, SRTP, SSH, SFTP, SLDAP, & IPSec 8

9 Unified Communications Manager Security User Credential Policies Disallow trivial passwords Require minimum length Prevent reuse with configurable depth Lockout on failed attempts with configurable depth, time span, & duration Lockout on inactivity with configurable time span Expire after configurable time span Expiry warning with configurable time span Control frequency of credential modifications with configurable time span Force credential modification on next attempt Prevent credential modification by user Lockout by administrator Configurable session timeouts SAML Single-Sign-On (SSO)

10 Balancing Risk Cost - Complexity - Resources - Performance - Manpower - Overhead Low Easy or Default Medium Moderate and Reasonable High Advanced or Not Integrated Hardened Platform IP VPN Phone UC-Aware Firewall (Inspection) SELinux Host Based Intrusion Protection Secure Directory Integration (SLDAP) Phone Proxy iptables - Integrated Host Firewall Encrypted Configuration Ipsec Signed Firmware & Configuration TLS & SRTP for Phones & Gateways Rate Limiting HTTPS Trusted Relay Points (TRP) Managed VPN (Remote Worker) Separate Voice & Data VLANs QoS Packet Marking Network Anomaly Detection STP, BPDU Guard, SmartPorts DHCP Snooping Scavenger Class QoS Basic Layer 3 ACL s (Stateless) Dynamic ARP Inspection 802.1x & NAC Phone Security Settings IP Source Guard, Port Security

11 Cluster Security Mode: Feature Tradeoffs Feature Non Secure Cluster Mixed Mode Cluster Auto-registration Signed & Encrypted Phone Configs Signed Phone Firmware Secure Phone Services (HTTPS) CAPF + LSC IP VPN Phone Secure Endpoints (TLS & SRTP) 11

12 Hardened Appliance Model Why is CUCM considered a hardened platform? SELinux enforcing mode provides host based intrusion protection iptables provides host based firewall Third party software installations NOT allowed Root account disabled, no other uid=0 accounts OS and applications are installed with a single package All software updates must be signed packages from Cisco Secure Management (HTTPS, SSH, SFTP) Audit logging Active & Inactive partition architecture easy to fallback if needed

13 Eliminate Toll Fraud How Do Our Customers Prevent Toll Fraud? Deny network access to unauthorised users Partitions and Calling search spaces provide dial plan segmentation and access control Device Pool Calling Search Space for Auto-registration to limit access to dial plan Employ Time of day routing to deactivate segments of the dial plan after hours Require Forced Authentication Codes on route patterns to restrict access on long distance or internal calls. Drop Ad hoc Conferences (CallManager Service Parameter) Block OffNet to OffNet transfer (CallManager Service Parameter) Monitor Call Detail Records Employ Multilevel Administration Voice Gateways: Call Source Authentication (IOS 15.1(2) feature)

14 Certificates and PKI

15 PKI Public Key Infrastructure Consists Of Public + Private keypair Private Key remains secret Public Key widely distributed Allows For Asymmetric key encryption one-way encryption and decryption Symmetric key encryption Public Key exchange used to establish shared-secret between two parties Message encryption and authentication protocols

16 Digital Certificates Digital passport Self-signed or CA-Signed Contains the owner s public key Proves the identity of a public key s owner

17 What is a Signed File? Encrypted or unencrypted file that contains a signature in addition to the file contents.

18 How a File is Signed

19 Validating a Signed File

20 Unified CM Certificates Unified CM includes seven certificate types: Tomcat (web services) CallManager RSA and EC (SIP/SCCP TLS, TFTP config signing, etc.) CAPF (CA cert used to sign LSC, only employed on the publisher) IPSEC (ipsec tunnels to gateways or other CUCM) TVS (Trust Verification Service, security by default) ITLRecovery (used as a trust anchor for bulk ITL recovery) Default to self-signed certificates, valid for 5 years* ITLRecovery is valid for 20 years beginning in 11.0 Option to have signed by 3 rd party CA Self-signed, 3 rd party CA signed certificates, and trusted certificates managed via OS Admin page 20

21 Multi-Server Certificate Support Simplify Certificate Management In Clustered Environments Of UCM 10.5 And Later Unified CM Cluster UCM nodes IM&P nodes One CA signed Multi-Server Tomcat certificate for the entire Unified CM cluster New option to share a single CA signed certificate across all nodes in a cluster Each cluster node s FQDN included as Subject Alternative Name (SAN) in a single certificate, custom SANs can also be included Available for Unified CM (UCM + IM&P) and Unity Connection clusters Specifically for Tomcat, CallManager, CUP-XMPP & CUP-XMPP-S2S certificate types, CallManager-ECDSA in 11.0

22 Multi-Server CSR Distribution drop-down provides Multi-server option Common Name can be edited, defaults to ms suffix Auto-populated domains, parent domain, and other admin supplied domain names all included in CSR as individual DNS SANs

23 Multi-Server CSR Workflow Using the Tomcat certificate as an example 1. All nodes in the cluster need to be installed and powered on 2. Navigate to Publisher s OS Admin > Cert Mgmt page and generate CSR with distribution set to Multi-Server, supply other SANs if required 3. Admin will be prompted for other cluster nodes OS admin credentials to securely replicate CSR throughout the cluster (no prompt when using common credentials) 4. Download CSR and take to CA to procure a signed certificate a. Depending on the CA, you may need to re-enter each SAN in the CA s web form b. Verify the CA signed certificate includes all SANs you requested 5. Upload CA certificate chain to tomcat-trust via Publisher s Cert Mgmt page (tomcat-trust certs are always replicated throughout the cluster) 6. Upload signed Tomcat multi-server certificate via Publisher s Cert Mgmt GUI 7. Restart services on all nodes (utils service restart Cisco Tomcat)

24 XMPP Multi-Server CSR Workflow XMPP CSR Differences From The Previous Tomcat Workflow cup-xmpp & cup-xmpp-s2s multi-server CSRs need to be generated from IM&P nodes Auto-populated domains will include IM&P node FQDNs Presence domains Group Chat Server Alias (cup-xmpp-s2s only) domains, if configured (cup-xmpp-s2s only) Restart Cisco XCP Router service after uploading signed cup-xmpp certificate Restart Cisco XCP XMPP Federation Connection Manager service after uploading signed cup-xmpp-s2s certificate

25 Certificate Key Length & Hash Algorithm Options Available Across All Server Certificate Types In Unified CM 10.X

26 Certificate Key Length & Hash Algorithm Options New ECDSA certificate with EC encryption added in Unified CM 11.0 Host portion of certificate CN will end in EC Multi-Server certs will end in EC-ms CallManager-ECDSA cert is included in ITL with role of TFTP Key size will limit hash algorithm selection Key Pair Length Hash algorithm supported 256 bits SHA256, SHA384, SHA bits SHA384, SHA bits SHA512

27 set web-security CLI command CLI command used for updating certificate details including Organisational Unit (OU), Organisational Name (O), Location (L), State (S), and Country (C) One DNS SAN can also be added via the cli command (optional) SANs for Multi-Server CSRs can also be set from OS Admin CSR GUI

28 Best Practice: Tomcat Certificate Signed by CA Avoid Untrusted Certificate Warnings In Browsers And Jabber Tomcat: HTTPS certificate used for serving CUCM admin, end user self-care page, and UDS By default Tomcat is self signed Self signed certificates generate ugly security warnings and reinforce bad habits Use a CA signed certificate to avoid certificate errors in browser for both end users and admins Save time and money with multiserver Tomcat certificate

29 Endpoint Certificates Cryptographically assured device identity Manufacturing Installed Certificate (MIC) Cisco IP Phones ship from the factory with a unique MIC pre-installed MIC is valid for 10 years No certificate revocation support Locally Significant Certificates (LSC) preferred certificate for endpoint identity Endpoint support includes IP Phones, TelePresence, Jabber clients, CIPC LSC signed by CAPF Service running on CUCM Publisher LSC supports the same RSA and EC key sizes as Unified CM LSC can be installed, re-issued, deleted in bulk with CUCM Bulk Admin Tool LSC signed by CAPF is valid for 5 years Paper process required to track certificate expiration*

30 Endpoint Certificates CAPF Support for EC Key Sizes New to UCM 11.0 Default Key Order is RSA Only with 2048 bit Key Size Key Size updated for RSA and EC separately No current client support for EC only Auto-generated Device Security Profile will have a suffix indicating Key Order and Key Size

31 Best Practice: IP Phone MIC Endpoints can use MICs to authenticate with CAPF for LSC installation Use MIC for initial endpoint provisioning of IP Phones before LSC installation is done Not recommended to use MIC for TLS, VPN, or 802.1x MIC is installed at time of manufacturing and cannot be revoked When both LSC and MIC are installed on a device, LSC takes preference MIC CA certificates included in both the CallManager and CAPF trust stores: CAP-RTP-001 CAP-RTP-002 Cisco_Manufacturing_CA Cisco_Root_CA_2048

32 Cisco Manufacturing CA SHA2 Cisco s newest IP Phones include MIC certificates signed by this new Manufacturing SHA2 CA CUCM 10.5(1)+ includes and trusts the new SHA2 certificate Customers on older versions of UCM may need to download the new Manufacturing CA certificate and 1. upload to the CAPF-trust to allow phones to authenticate with CAPF to obtain an LSC 2. upload to the CallManager-trust if customer want to allow phones to authenticate with MIC for SIP , 8841, 8851, 8861

33 Troubleshooting Certificates

34 Unable to Upload CA-signed Certificate

35 Unable to Upload CA-signed Certificate

36 Unsupported CA-Signed Certificates Common problems associated with CA certs 4096-bit cert anywhere in the trust chain Unsupported until UCM 11.0, 10.5(2)SU2 Will upload but TFTP cannot use it to create an ITL admin:show itl The checksum value of the ITL file: d41d8cd98f00b204e ecf8427e(md5) da39a3ee5e6b4b0d3255bfef afd80709(sha1) Length of ITL file: 0 The ITL File was last modified on Fri Jan 22 11:08:23 EST 2016 Parse ITL File Invalid ITL file. Error skipping past version. Error parsing the ITL File.

37 TLS connections in Wireshark Client: Entity initiating the connection Server: Entity receiving the connection Wireshark filters: ssl Only packets with SSL data tcp.port == nnn All TCP packets for the connection including SYN, ACK with no data

38 TLS connections in Wireshark TCP vs SSL SSL TCP.port == 8443

39 Certificates in Wireshark Server Certs can easily be examined from a pcap! Intermediate Cert

40 Certificates in Wireshark

41 Certificate Trust List (CTL) & Initial Trust List (ITL)

42 Certificate Trust List (CTL) CTL provides a trust mechanism for Cisco endpoints Enabling Mixed Mode to support encrypted signalling and media requires CTL Minimum of 2 USB secure tokens required, KEY- CCM-ADMIN-K9= or new KEY-CCM-ADMIN2-K9= CTL client produces Certificate Trust List (CTL) file and uploads to CUCM TFTP Download the CTL Client from CUCM Admin, install on Windows workstation CTL file is downloaded by endpoints and is the basis for endpoint certificate trust

43 Certificate Trust List (CTL) New token-less CTL option Unified CM 10.0 supports two different methods of building the CTL Classic CTL client, minimum 2 USB tokens required New token-less CTL Token-less CTL is activated with admin cli command (publisher only), utils ctl set-cluster mixed-mode CallManager certificate private key is used to sign the CTL, rather than the USB token DRS backup!!! Other CTL cli commands include utils ctl update CTLFile utils ctl set-cluster non-secure-mode

44 Initial Trust List (ITL) Security by Default component Unlike the CTL file, the ITL file is built automatically when the cluster is installed or upgraded to 8.0+ Downloaded by phones at boot or reset, after CTL file Has the same format as the CTL File Does not require etokens; uses a soft etoken (the CallManager cert private key) Static and Dynamic ITL Files are built ITLFile.tlv ITLSEPMAC.tlv 45

45 Initial Trust List (ITL) Contents Certificate Roles: TFTP, CCM+TFTP, SAST, TVS TFTP, CCM+TFTP (mixed mode cluster) CallManager RSA certificate from the local node CallManager ECDSA certificate from the local node (11.0) SAST (allowed to sign the ITL file): CallManager RSA certificate from local node (8.x, 9.x, 10.x) CallManager RSA certificate from every node (11.0) ITLRecovery certificate (10.5+) TVS: All nodes in the cluster ITL Contents viewable with CLI show itl

46 Extended ITL New to UCM 11.0 Includes CallManager-ECDSA and CallManager certificates for the entire cluster Only served to endpoints when the request for ITL comes in over HTTPS No endpoint support today Listed after regular ITL in CLI show itl

47 Trust Verification Service Security by Default Component Trust Verification Service (TVS) runs on each CUCM server and authenticates certificates on behalf of the phone Provides endpoint trusted certificates scale Instead of downloading all the trusted certificates, phones need only to trust TVS Up to 3 TVS per phone (primary, secondary and tertiary from CallManager Group) No support when failover to SRST by phone TVS function relies on SBD enabled and correct TVS certificate in the endpoint s ITL file

48 Managing Security by Default (SBD) ITL File Awareness ITL file is built by the TFTP service in UCM 8.6+ TVS service built the ITL file in UCM 8.0 & 8.5 Each node running TFTP creates a unique ITL ITL file is rebuilt when: TFTP Service Restarts Any certificate inside the ITL changes CallManager Group Changes IP Phones automatically reset on certificate change (8.6+) ITL Signature should always match on endpoint and TFTP server

49 Managing Security by Default (SBD) Disabling Security By Default Prepare Cluster for Rollback to pre 8.0 Enterprise parameter empties the ITL file, disabling Security by Default feature Disable SBD if customer upgraded but needs to roll cluster back to 6.X, 7.X Endpoints cannot use HTTPS Services with SBD Disabled Default internal services will fail with SBD disabled prior to 10.5(2)

50 How Do Phones Trust the ITL File? Case 1: Non-Existing CTL File First ITL File is trusted in a leap of faith (similar to initial CTL) Subsequent ITL Files must be either signed by the same TFTP private key or TVS is able to provide the certificate corresponding to the signer or ITL is signed with the ITL Recovery Key Case 2: Existing CTL File Phone uses the certificates in the CTL File to authenticate the ITL File signature 51

51 Migrating Phones Between Clusters Option 1: Disable SBD Pros: No cross-cluster certificate exchange old cluster can be offline Cons: Reduced security due to leap of faith as phone moves to new cluster Must reset phone every time the parameter is changed. Option 2: Use TVS Pros: Seamless user experience Phone maintains a trust list at all times. Cons: Requires identity certificate exchange from all TFTP nodes. Requires connectivity from phone to both clusters

52 DRS Backup/Restore Certificates & Keys The trust anchor for the ITL File is the TFTP private key (CallManager certificate) Certificates and private keys are both included in DRS backups The backup package is encrypted to protect the private key DRS can be used to restore certificates and keys Take a fresh backup after regenerating server certificates to insure the ITL trust anchor can be restored in a disaster scenario 53

53 ITL Recovery Key New Key Added To The ITL In 10.0 The ITL Recovery key is a new addition to the ITL file in 10.0 It provides a fallback mechanism to restore trust between endpoints in rare conditions were phones no longer trust the ITL file or new signed configuration files server by TFTP > show itl

54 Backing Up The ITL Recovery Key ITLrecovery Backup Alternative > file get tftp ITLRecovery.p12

55 Troubleshooting CTL and ITL Issues

56 Invalid ITL/CTL Files admin:show itl The checksum value of the ITL file: d41d8cd98f00b204e ecf8427e(md5) da39a3ee5e6b4b0d3255bfef afd80709(sha1) Length of ITL file: 0 The ITL File was last modified on Fri Jan 22 11:08:23 EST 2016 Parse ITL File Invalid ITL file. Error skipping past version. Error parsing the ITL File.

57 Detecting CTL/ITL Mismatches 1. DeviceTLInfo Alarm sent at registration from endpoint to UCM %UC_-3-DeviceTLInfo: %[DeviceName=SEPD0C ][IPv4Address= ][IPv6Address=::][ CTL_Signature=22 CB 70 5F 3E 0C 9A A EF 2A 3B FC E8 60 7E 3D ][CTL_TFTP_Server=videolab-ucm11a-pub.videolab.local][ITL_Signature=65 B0 1A 7C E9 45 AD F4 CA 9E E C2 C2 3F 36 8D ED D0 ][ITL_TFTP_Server=videolab-ucm11apub.videolab.local][UNKNOWN_PARAMTYPE:StatusCode=1][AppID=Cisco CallManager][ClusterID=videolab11a][NodeID=videolab-ucm11a-pub]: Trust List Files are updated or installed 2. Endpoint web page

58 ITL & CTL in Endpoint Web Server

59 Remote TL Info Support by Endpoint Family Model DeviceTLInfo Alarm CTL/ITL in Web Server XX 99XX 69XX 78XX 88XX 8831 DX ** Verified version Firmware Version** SIP 9.4(2) 9.4(2) SIP 9.4(1) (1) 10.2(5)

60 Fixing CTL/ITL Mismatches 1. Manually erase ITL/CTL at every phone Requires Settings Access enabled Does not scale 2. Use SIP signalling or endpoint XSI interface to erase the ITL/CTL at every phone Requires Settings Access enabled 3 rd party applications are available but may be expensive 3. Revert to the old ITL file on the TFTP server Requires the fix for CSCts01319 Must be able to identify the current ITL on the phone Only available via remotesupport account through TAC

61 Reset ITL Trust Recover phones not accepting config changes or new ITL files >utils itl reset localkey Restart phones after running this command on the publisher Similar procedure available for tokenless CTL (watch out for CSCux73531)

62 Cisco Product Security Awareness

63 Cisco Secure Development Lifecycle

64 Cisco PSIRT Has Your Back Product Security Incident Response Team (PSIRT) - Dedicated, global team managing security vulnerability information related to Cisco products and networks Responsible for Cisco Security Advisories, Responses and Notices Interface with security researchers and hackers Assist Cisco product teams in securing products Subscribe (RSS or ) to Cisco notification service

65 Product Security Awareness Subscribe/Monitor PSIRT security advisories, responses and notices Consult advisory details to understand impact, workarounds, and other details Reference linked Cisco Applied Mitigation Bulletins (AMB) when available Make preparations to patch systems via upgrade or COP files Verify DRS backups available before patching critical systems

66 Q & A

67 Complete Your Online Session Evaluation Give us your feedback and receive a Cisco 2016 T-Shirt by completing the Overall Event Survey and 5 Session Evaluations. Directly from your mobile device on the Cisco Live Mobile App By visiting the Cisco Live Mobile Site Visit any Cisco Live Internet Station located throughout the venue T-Shirts can be collected Friday 11 March at Registration Learn online with Cisco Live! Visit us online after the conference for full access to session videos and presentations.

68 Thank you

69

70 Backup Slides

71 Certificate Example: Self-signed tomcat.pem

72 Known Caveats Multi-Server CallManager certs Specific to CallManager.pem certificate Not recommended to use Multi-Server CSR for CallManager certificate on older 10.X releases. known caveats exist pre 10.5(2)SU2 CSCur79530, CSCuq02712, CSCur97909 CallManager certificates should not be signed by a CA with 4096 bit key - CSCur67631 (this is unrelated to Multi-Server certificate usage) All of these defects addressed in 10.5(2)SU2 No known defects related to Tomcat, CUP-XMPP or CUP-XMPP-S2S Multi- Server certificate usage

73 Lock Icon Non Secure Video Considerations Allows administrator to determine what encryption criteria must be met to display the lock icon Old Service Parameter: Override BFCP Application Encryption Status When Designating Call Security Status Renamed 10.0 service parameter: Secure Call Icon Display Policy

74 TLS Ciphers SIP Line/Trunk Establishing a Connection TLS Ciphers Option Cipher Order Client Certificate AES-256 SAH384 ciphers only RSA preferred AES-128 SHA256 ciphers only RSA preferred AES-256, AES-128 ciphers ECDSA preferred AES-256, AES-128 ciphers ECDSA only AES-256, AES-128 ciphers RSA preferred TLS_ECDHE_RSA_AES_256_GCM_SHA384 TLS_ECDHE_ECDSA_AES_256_GCM_SHA384 TLS_ECDHE_RSA_AES_128_GCM_SHA256 TLS_ECDHE_ECDSA_AES_128_GCM_SHA256 TLS_ECDHE_ECDSA_AES_256_GCM_SHA384 TLS_ECDHE_ECDSA_AES_128_GCM_SHA256 TLS_ECDHE_RSA_AES_256_GCM_SHA384 TLS_ECDHE_RSA_AES_128_GCM_SHA256 TLS_RSA_WITH_AES_128_CBC_SHA1 TLS_ECDHE_ECDSA_AES_256_GCM_SHA384 TLS_ECDHE_ECDSA_AES_128_GCM_SHA256 TLS_ECDHE_RSA_AES_256_GCM_SHA384 TLS_ECDHE_RSA_AES_128_GCM_SHA256 TLS_ECDHE_ECDSA_AES_256_GCM_SHA384 TLS_ECDHE_ECDSA_AES_128_GCM_SHA256 TLS_RSA_WITH_AES_128_CBC_SHA1 CallManager CallManager CallManager CallManager-ECDSA CallManager AES-128 SHA1 cipher only TLS_RSA_WITH_AES_128_CBC_SHA1 CallManager

75 TLS Ciphers SIP Line/Trunk Receiving a Connection TLS Ciphers Option AES-256 SAH384 ciphers only RSA preferred AES-128 SHA256 ciphers only RSA preferred AES-256, AES-128 ciphers ECDSA preferred AES-256, AES-128 ciphers ECDSA only AES-256, AES-128 ciphers RSA preferred AES-128 SHA1 cipher only Cipher Order TLS_ECDHE_RSA_AES_256_GCM_SHA384 TLS_ECDHE_ECDSA_AES_256_GCM_SHA384 TLS_ECDHE_RSA_AES_128_GCM_SHA256 TLS_ECDHE_ECDSA_AES_128_GCM_SHA256 TLS_ECDHE_ECDSA_AES_256_GCM_SHA384 TLS_ECDHE_ECDSA_AES_128_GCM_SHA256 TLS_ECDHE_RSA_AES_256_GCM_SHA384 TLS_ECDHE_RSA_AES_128_GCM_SHA256 TLS_RSA_WITH_AES_128_CBC_SHA1 TLS_ECDHE_ECDSA_AES_256_GCM_SHA384 TLS_ECDHE_ECDSA_AES_128_GCM_SHA256 TLS_ECDHE_RSA_AES_256_GCM_SHA384 TLS_ECDHE_RSA_AES_128_GCM_SHA256 TLS_ECDHE_ECDSA_AES_256_GCM_SHA384 TLS_ECDHE_ECDSA_AES_128_GCM_SHA256 TLS_RSA_WITH_AES_128_CBC_SHA1 TLS_RSA_WITH_AES_128_CBC_SHA1

76 TLS Ciphers Secure CTI Manager Receiving a Connection TLS Ciphers Option AES-256 SAH384 ciphers only RSA preferred AES-128 SHA256 ciphers only RSA preferred AES-256, AES-128 ciphers ECDSA preferred AES-256, AES-128 ciphers ECDSA only AES-256, AES-128 ciphers RSA preferred AES-128 SHA1 cipher only Cipher Order TLS_ECDHE_RSA_AES_256_GCM_SHA384 TLS_ECDHE_ECDSA_AES_256_GCM_SHA384 TLS_ECDHE_RSA_AES_128_GCM_SHA256 TLS_ECDHE_ECDSA_AES_128_GCM_SHA256 TLS_ECDHE_ECDSA_AES_256_GCM_SHA384 TLS_ECDHE_ECDSA_AES_128_GCM_SHA256 TLS_ECDHE_RSA_AES_256_GCM_SHA384 TLS_ECDHE_RSA_AES_128_GCM_SHA256 TLS_RSA_WITH_AES_128_CBC_SHA1 TLS_ECDHE_ECDSA_AES_256_GCM_SHA384 TLS_ECDHE_ECDSA_AES_128_GCM_SHA256 TLS_ECDHE_RSA_AES_256_GCM_SHA384 TLS_ECDHE_RSA_AES_128_GCM_SHA256 TLS_ECDHE_ECDSA_AES_256_GCM_SHA384 TLS_ECDHE_ECDSA_AES_128_GCM_SHA256 TLS_RSA_WITH_AES_128_CBC_SHA1 TLS_RSA_WITH_AES_128_CBC_SHA1

77

Default Security Setup

Default Security Setup This section provides information about the default security setup. Default Security Features, page 1 Trust Verification Service, page 2 Initial Trust List, page 2 Update ITL File for IP Phones, page 4

More information

Configuration Example for Secure SIP Integration Between CUCM and CUC based on Next Generation Encryption (NGE)

Configuration Example for Secure SIP Integration Between CUCM and CUC based on Next Generation Encryption (NGE) Configuration Example for Secure SIP Integration Between CUCM and CUC based on Next Generation Encryption (NGE) Contents Introduction Prerequisites Requirements Network Diagram Certificate requirements

More information

Cisco IP Phone Security

Cisco IP Phone Security Overview, page 1 Security Enhancements for Your Phone Network, page 2 View the Current Security Features on the Phone, page 2 View Security Profiles, page 3 Supported Security Features, page 3 Overview

More information

Security by Default. Overview CHAPTER

Security by Default. Overview CHAPTER CHAPTER 3 This section contains the following topics: Overview, page 3-1 Trust Verification Service, page 3-2 Initial Trust List, page 3-2 Autoregistration, page 3-3 Supported Cisco Unified IP Phones,

More information

Cisco CTL Client Setup

Cisco CTL Client Setup This chapter provides information about Cisco CTL client setup. About, page 2 Addition of Second SAST Role in the CTL File for Recovery, page 2 Cluster Encryption Configuration Through CLI, page 3 Remove

More information

Default security setup

Default security setup Default security setup This section provides information about the default security setup. Default security features, page 1 Trust Verification Service, page 2 Initial trust list, page 2 Update ITL file

More information

Manage Certificates. Certificates Overview

Manage Certificates. Certificates Overview Certificates Overview, page 1 Show Certificates, page 3 Download Certificates, page 4 Install Intermediate Certificates, page 4 Delete a Trust Certificate, page 5 Regenerate a Certificate, page 6 Upload

More information

Encrypted Phone Configuration File Setup

Encrypted Phone Configuration File Setup This chapter provides information about encrypted phone configuration files setup. After you configure security-related settings, the phone configuration file contains sensitive information, such as digest

More information

TLS Setup. TLS Overview. TLS Prerequisites

TLS Setup. TLS Overview. TLS Prerequisites Setup Overview, page 1 Prerequisites, page 1 Configuration Task Flow, page 2 Interactions and Restrictions, page 8 Overview Transport Layer Security () provides secure and reliable signaling and data transfer

More information

Phone Security. Phone Security. This chapter provides information about phone security.

Phone Security. Phone Security. This chapter provides information about phone security. This chapter provides information about phone security., page 1 Trusted Devices, page 2 Phone Model Support, page 3 Preferred Vendor SIP Set Up, page 4 View Settings, page 5 Set Up, page 5 Interactions

More information

Unified Communications Mobile and Remote Access via Cisco VCS

Unified Communications Mobile and Remote Access via Cisco VCS Unified Communications Mobile and Remote Access via Cisco VCS Deployment Guide Cisco VCS X8.5.2 Cisco Unified CM 9.1(2)SU1 or later April 2015 Contents Mobile and remote access overview 5 Jabber client

More information

Mobile and Remote Access Through Cisco Expressway

Mobile and Remote Access Through Cisco Expressway Mobile and Remote Access Through Cisco Expressway Deployment Guide First Published: April 2014 Last Updated: April 2016 Cisco Expressway X8.7 Cisco Unified CM 9.1(2)SU1 or later Cisco Systems, Inc. www.cisco.com

More information

Unified Communications Mobile and Remote Access via Cisco Expressway

Unified Communications Mobile and Remote Access via Cisco Expressway Unified Communications Mobile and Remote Access via Cisco Expressway Deployment Guide Cisco Expressway X8.5.3 Cisco Unified CM 9.1(2)SU1 or later June 2015 Contents Mobile and remote access overview 5

More information

Security and Certificates

Security and Certificates Encryption, page 1 Voice and Video Encryption, page 6 Federal Information Processing Standards, page 6 Certificate Validation, page 6 Required Certificates for On-Premises Servers, page 7 Certificate Requirements

More information

IP Phone Security and CTL (Certificate Trust List)

IP Phone Security and CTL (Certificate Trust List) IP Phone Security and CTL (Certificate Trust List) Purpose on page 1 Phone Security and CTL Overview on page 1 Configuration on page 3 1. Obtain USB etokens on page 3 2. Activate CTL Provider and CAPF

More information

Post-Change Tasks and Verification

Post-Change Tasks and Verification Post-Change Task List for Cisco Unified Communications Manager Nodes, page 1 Post-Change Task List for IM and Presence Service Nodes, page 3 Perform Post-Change Tasks for Cisco Unified Communications Manager

More information

Mobile and Remote Access Through Cisco Expressway

Mobile and Remote Access Through Cisco Expressway Mobile and Remote Access Through Cisco Expressway Deployment Guide First Published: April 2014 Last Updated: November 2017 Cisco Expressway X8.8.n Cisco Unified Communications Manager 9.1(2)SU4 or later

More information

Understanding Cisco Unified Communications Security

Understanding Cisco Unified Communications Security Cisco Support Community Presents Tech-Talk Series Understanding Cisco Unified Communications Security Akhil Behl Solutions Architect, akbehl@cisco.com Author of Securing Cisco IP Telephony Networks 2010

More information

Cisco IP Communicator Deployment Preparation

Cisco IP Communicator Deployment Preparation This chapter describes the required and recommended tasks for deploying Cisco IP Communicator. It also provides instructions for adding Cisco IP Communicator devices to the Cisco Unified Communications

More information

Cisco Desktop Collaboration Experience DX650 Security Overview

Cisco Desktop Collaboration Experience DX650 Security Overview White Paper Cisco Desktop Collaboration Experience DX650 Security Overview Cisco Desktop Collaboration Experience DX650 Security Overview The Cisco Desktop Collaboration Experience DX650 (Cisco DX650)

More information

Mobile and Remote Access Through Cisco Video Communication Server

Mobile and Remote Access Through Cisco Video Communication Server Mobile and Remote Access Through Cisco Video Communication Server Deployment Guide First Published: April 2014 Last Updated: June 2017 Cisco VCS X8.8.n Cisco Unified Communications Manager 9.1(2)SU4 or

More information

Configure Voice and Video Communication

Configure Voice and Video Communication s for On-Premises Deployments, page 1 for Cloud-Based Deployments, page 23 s for On-Premises Deployments Command or Action Purpose Install Cisco Options Package File for Devices, on page 2. Complete this

More information

Managing Certificates

Managing Certificates CHAPTER 12 The Cisco Identity Services Engine (Cisco ISE) relies on public key infrastructure (PKI) to provide secure communication for the following: Client and server authentication for Transport Layer

More information

Setting Up a Cisco Unified Communications Manager SIP Trunk Integration, page 1

Setting Up a Cisco Unified Communications Manager SIP Trunk Integration, page 1 Up a Cisco Unified Communications Manager SIP Trunk Integration This chapter provides instructions for setting up a Cisco Unified Communications Manager SIP trunk integration with Cisco Unity Connection.

More information

Preparing to Deploy Cisco IP Communicator

Preparing to Deploy Cisco IP Communicator CHAPTER 2 Revised: 1/19/11 This chapter describes the required and recommended tasks for deploying Cisco IP Communicator. It also provides instructions for adding Cisco IP Communicator devices to the Cisco

More information

Endpoint Security & Health Check Report Background

Endpoint Security & Health Check Report Background Background The information contained within this report was generated by PhoneView from UnifiedFX ( http://www.unifiedfx.com) by data gathering, testing and analysing Cisco Unified IP Phones. The purpose

More information

Cisco CTL Client setup

Cisco CTL Client setup Cisco CTL Client setup This chapter provides information about Cisco CTL client setup. About Cisco CTL Client setup, page 2 Remove etoken Run Time Environment 3.00 for CTL Client 5.0 plug-in, page 2 Cisco

More information

CUCM Security By Default and ITL Operation and Troubleshooting

CUCM Security By Default and ITL Operation and Troubleshooting CUCM Security By Default and ITL Operation and Troubleshooting Contents Introduction Background Information SBD Overview TFTP Download Authentication TFTP Configuration File Encryption Trust Verification

More information

Encrypted Phone Configuration File Setup

Encrypted Phone Configuration File Setup This chapter provides information about encrypted phone configuration files setup. After you configure security-related settings, the phone configuration file contains sensitive information, such as digest

More information

Unified Communications Mobile and Remote Access via Cisco Expressway

Unified Communications Mobile and Remote Access via Cisco Expressway Unified Communications Mobile and Remote Access via Cisco Expressway Deployment Guide Cisco Expressway X8.1.1 or later Cisco Unified CM 9.1(2)SU1 or later D15068.01 April 2014 Contents Mobile and remote

More information

Unified Communications Manager FAQ

Unified Communications Manager FAQ Unified Communications Manager FAQ Document ID: 111900 Contents Introduction Is it possible to control the quota for outside calls with Cisco Unified Communications Manager? How many calls can be handled

More information

Changing the IP Address and Hostname for Cisco Unified Communications Manager Release 8.6(1)

Changing the IP Address and Hostname for Cisco Unified Communications Manager Release 8.6(1) Changing the IP Address and Hostname for Cisco Unified Communications Manager Release 8.6(1) Published: May 24, 2011 Revised: June 28, 2012 This document provides the steps to change the IP address or

More information

Changing the IP Address and Hostname for Cisco Unified Communications Manager Release 8.5(1)

Changing the IP Address and Hostname for Cisco Unified Communications Manager Release 8.5(1) Changing the IP Address and Hostname for Cisco Unified Communications Manager Release 8.5(1) Published: December 02, 2010 Revised: July 3, 2012 This document provides the steps to change the IP address

More information

Security Guide for Cisco Unified Communications Manager, Release 11.5(1)

Security Guide for Cisco Unified Communications Manager, Release 11.5(1) Security Guide for Cisco Unified Communications Manager, Release 11.5(1) First Published: -- Last Modified: 2018-01-29 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706

More information

SAML-Based SSO Configuration

SAML-Based SSO Configuration Prerequisites, page 1 SAML SSO Configuration Task Flow, page 5 Reconfigure OpenAM SSO to SAML SSO Following an Upgrade, page 9 SAML SSO Deployment Interactions and Restrictions, page 9 Prerequisites NTP

More information

FIPS Mode Setup

FIPS Mode Setup This chapter provides information about FIPS 140-2 mode setup. FIPS 140-2 Setup, page 1 FIPS Mode Restrictions, page 9 FIPS 140-2 Setup Caution FIPS mode is only supported on releases that have been through

More information

Cisco Unified Communications Manager TCP and UDP Port

Cisco Unified Communications Manager TCP and UDP Port Cisco TCP and UDP Port Usage This chapter provides a list of the TCP and UDP ports that Cisco uses for intracluster connections and for communication with external applications or devices. You will also

More information

Configuring the Cisco Phone Proxy

Configuring the Cisco Phone Proxy CHAPTER 44 This chapter describes how to configure the adaptive security appliance for Cisco Phone Proxy feature. This chapter includes the following sections: Information About the Cisco Phone Proxy,

More information

Command or Action Step 1. Create and Configure Cisco Jabber Devices, on page 1. Configure a SIP Trunk, on page 6

Command or Action Step 1. Create and Configure Cisco Jabber Devices, on page 1. Configure a SIP Trunk, on page 6 s Workflow, page 1 s Workflow Command or Action Purpose Create and Configure Cisco Jabber Devices, on page 1 Create at least one device for every user that will access Cisco Jabber. Configure a SIP Trunk,

More information

LDAP Directory Integration

LDAP Directory Integration LDAP Server Name, Address, and Profile Configuration, on page 1 with Cisco Unified Communications Manager Task List, on page 1 for Contact Searches on XMPP Clients, on page 6 LDAP Server Name, Address,

More information

Install an LSC on a Phone with CUCM Cluster Security Mode set to Non-Secure

Install an LSC on a Phone with CUCM Cluster Security Mode set to Non-Secure Install an LSC on a Phone with CUCM Cluster Security Mode set to Non-Secure Contents Introduction Background Information Manufacturing Installed Certificates (MICs) versus Locally Significant Certificates

More information

Certificate authority proxy function

Certificate authority proxy function Certificate authority proxy function This chapter provides information about the certificate authority proxy function. About certificate authority proxy function, page 1 Cisco Unified IP Phone and CAPF

More information

Mobile and Remote Access Through Cisco Video Communication Server

Mobile and Remote Access Through Cisco Video Communication Server Mobile and Remote Access Through Cisco Video Communication Server Deployment Guide First Published: April 2014 Last Updated: July 2017 Cisco VCS X8.9.n Cisco Unified Communications Manager 10 or later

More information

Mobile and Remote Access Through Cisco Expressway

Mobile and Remote Access Through Cisco Expressway Mobile and Remote Access Through Cisco Expressway Deployment Guide First Published: April 2014 Last Updated: December 2016 Cisco Expressway X8.9.n Cisco Unified Communications Manager 10 or later Cisco

More information

Configuration and Administration of IM and Presence Service on Cisco Unified Communications Manager, Release 11.5(1)

Configuration and Administration of IM and Presence Service on Cisco Unified Communications Manager, Release 11.5(1) Configuration and Administration of IM and Presence Service on Cisco Unified Communications Manager, Release 11.5(1) First Published: 2016-06-08 Last Modified: 2018-02-21 Americas Headquarters Cisco Systems,

More information

Cisco Unified Communications Manager TCP and UDP Port

Cisco Unified Communications Manager TCP and UDP Port Cisco TCP and UDP Port Usage This chapter provides a list of the TCP and UDP ports that Cisco uses for intracluster connections and for communication with external applications or devices. You will also

More information

Client services framework setup

Client services framework setup In Cisco Unified Communications Manager Administration, use the Device > Phone menu path to configure the Cisco Unified Client Services Framework device. This section describes how to configure a Cisco

More information

SonicOS Release Notes

SonicOS Release Notes SonicOS Contents Platform Compatibility... 1 Known Issues... 2 Resolved Issues... 4 Upgrading SonicOS Enhanced Image Procedures... 5 Related Technical Documentation... 10 Platform Compatibility The SonicOS

More information

Direct Upgrade Procedure for Cisco Unified Communications Manager Releases 6.1(2) 9.0(1) to 9.1(x)

Direct Upgrade Procedure for Cisco Unified Communications Manager Releases 6.1(2) 9.0(1) to 9.1(x) Direct Upgrade Procedure for Cisco Unified Communications Manager Releases 6.1(2) 9.0(1) to 9.1(x) First Published: May 17, 2013 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose,

More information

CCNA Voice. Unified Communications Overview.

CCNA Voice. Unified Communications Overview. CCNA Voice Unified Communications Overview www.ine.com Cisco UC Components Unified Call Control Cisco Unified Communications Manager Cisco Unified Communications Manager Express Unified Messaging Cisco

More information

LDAP Directory Integration

LDAP Directory Integration LDAP Server Name, Address, and Profile Configuration, page 1 with Cisco Unified Communications Manager Task List, page 1 for Contact Searches on XMPP Clients, page 6 LDAP Server Name, Address, and Profile

More information

Mobile and Remote Access Through Cisco Video Communication Server

Mobile and Remote Access Through Cisco Video Communication Server Mobile and Remote Access Through Cisco Video Communication Server Deployment Guide First Published: April 2014 Last Updated: September 2017 Cisco VCS X8.10 Cisco Systems, Inc. www.cisco.com 2 Contents

More information

Mobile and Remote Access Through Cisco Expressway

Mobile and Remote Access Through Cisco Expressway Mobile and Remote Access Through Cisco Expressway Deployment Guide First Published: April 2014 Last Updated: November 2017 Cisco Expressway X8.10 Cisco Systems, Inc. www.cisco.com 2 Contents Preface 5

More information

IM and Presence Service Network Setup

IM and Presence Service Network Setup Configuration changes and service restart notifications, page 1 DNS Domain Configuration, page 2 IM and Presence Service Default Domain Configuration, page 6 IM Address Configuration, page 7 Domain Management

More information

Configure Mobile and Remote Access

Configure Mobile and Remote Access Mobile and Remote Access Overview, on page 1 Mobile and Remote Access Prerequisites, on page 3 Mobile and Remote Access Configuration Task Flow, on page 4 Mobile and Remote Access Overview Cisco Unified

More information

SAML-Based SSO Configuration

SAML-Based SSO Configuration Prerequisites, page 1 SAML SSO Configuration Workflow, page 5 Reconfigure OpenAM SSO to SAML SSO After an Upgrade, page 9 Prerequisites NTP Setup In SAML SSO, Network Time Protocol (NTP) enables clock

More information

Platform Compatibility... 1 Enhancements... 2 Known Issues... 3 Upgrading SonicOS Enhanced Image Procedures... 3 Related Technical Documentation...

Platform Compatibility... 1 Enhancements... 2 Known Issues... 3 Upgrading SonicOS Enhanced Image Procedures... 3 Related Technical Documentation... SonicOS Contents Platform Compatibility... 1 Enhancements... 2 Known Issues... 3 Upgrading SonicOS Enhanced Image Procedures... 3 Related Technical Documentation...7 Platform Compatibility The SonicOS

More information

Configure Cisco IP Phones

Configure Cisco IP Phones Cisco IP Phones Overview, page 1 Cisco IP Phones Configuration Task Flow, page 1 Cisco IP Phones Overview Cisco Unified IP Phones are full-featured telephones that provide voice communication over an IP

More information

Cisco Unified Communications Manager Security Guide Copyright 2010 Cisco Systems, Inc. All rights reserved.

Cisco Unified Communications Manager Security Guide Copyright 2010 Cisco Systems, Inc. All rights reserved. Cisco Unified Communications Manager Security Guide Release 8.5(1) Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800

More information

Cisco Unified Communications XMPP Federation

Cisco Unified Communications XMPP Federation Cisco Unified Communications XMPP Federation Deployment Guide First Published: December 2014 Last Updated: March 2018 Cisco Expressway X8.10 IM and Presence Service 9.1.1 or later Cisco Systems, Inc. www.cisco.com

More information

Mobile and Remote Access Through Cisco Expressway

Mobile and Remote Access Through Cisco Expressway Mobile and Remote Access Through Cisco Expressway Deployment Guide First Published: April 2014 Last Updated: September 2018 Cisco Expressway X8.11.1 Cisco Systems, Inc. www.cisco.com 2 Contents Preface

More information

Cisco Unified Communications Manager Security Guide, Release 10.0(1)

Cisco Unified Communications Manager Security Guide, Release 10.0(1) Cisco Unified Communications Manager Security Guide, Release 10.0(1) First Published: 2013-12-03 Last Modified: 2018-01-16 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706

More information

Push Notifications (On-Premises Deployments)

Push Notifications (On-Premises Deployments) Push Notifications Overview, page 1 Push Notifications Prerequisites, page 5 Push Notifications Configuration Task Flow, page 6 Push Notifications Troubleshooting, page 15 Push Notifications Interactions

More information

Mobile and Remote Access Through Cisco Expressway

Mobile and Remote Access Through Cisco Expressway Mobile and Remote Access Through Cisco Expressway Deployment Guide First Published: April 2014 Last Updated: December 2018 Cisco Expressway X8.11.4 Cisco Systems, Inc. www.cisco.com 2 Contents Preface

More information

Refer to Cisco Unified Communications Manager Security Guide for more details.

Refer to Cisco Unified Communications Manager Security Guide for more details. Contents Introduction Prerequisites Requirements Components Used Diagram Configure - Secure SIP Trunk Configure CUC 1. Add SIP certificate 2. Create New Phone System or Modify Default One 3. Add a New

More information

Configure Centralized Deployment

Configure Centralized Deployment Centralized Deployment Overview, on page 1 Centralized Deployment Prerequisites, on page 4 Centralized Deployment Configuration Task Flow, on page 6 Centralized Deployment Field Descriptions, on page 16

More information

Cisco Unified Communications Operating System Administration Guide for Cisco Unity Connection Release 12.x

Cisco Unified Communications Operating System Administration Guide for Cisco Unity Connection Release 12.x Cisco Unified Communications Operating System Administration Guide for Cisco Unity Connection Release 12.x First Published: -- Last Modified: -- Americas Headquarters Cisco Systems, Inc. 170 West Tasman

More information

Managing Security Certificates in Cisco Unified Operating System

Managing Security Certificates in Cisco Unified Operating System CHAPTER 5 Managing Security Certificates in Cisco Unified Operating System June 11, 2009 The operating system security options enable you to manage security certificates in these two ways: Certificate

More information

Cisco TelePresence Conductor with Cisco Unified Communications Manager

Cisco TelePresence Conductor with Cisco Unified Communications Manager Cisco TelePresence Conductor with Cisco Unified Communications Manager Deployment Guide XC2.2 Unified CM 8.6.2 and 9.x D14998.09 Revised March 2014 Contents Introduction 4 About this document 4 Further

More information

Unified Communication Cluster Setup with CA Signed Multi Server Subject Alternate Name Configuration Example

Unified Communication Cluster Setup with CA Signed Multi Server Subject Alternate Name Configuration Example Unified Communication Cluster Setup with CA Signed Multi Server Subject Alternate Name Configuration Example Document ID: 118731 Contributed by Vasanth Kumar K, Cisco TAC Engineer. Mar 09, 2015 Contents

More information

Cisco Unified IP Phone Settings

Cisco Unified IP Phone Settings Phone Settings Overview, page 1 Cisco Unified IP Phones 7906G and 7911G Menus, page 1 Phone Setup s, page 4 Network Configuration Menu, page 5 Device Configuration Menu, page 17 Security Configuration

More information

Internet Protocol Version 6 (IPv6)

Internet Protocol Version 6 (IPv6) CHAPTER 29 Internet Protocol version 6 (IPv6), which is the latest version of the Internet Protocol (IP) that uses packets to exchange data, voice, and video traffic over digital networks, increases the

More information

Cisco TelePresence Conductor with Cisco Unified Communications Manager

Cisco TelePresence Conductor with Cisco Unified Communications Manager Cisco TelePresence Conductor with Cisco Unified Communications Manager Deployment Guide TelePresence Conductor XC4.0 Unified CM 10.5(2) January 2016 Contents Introduction 6 About this document 6 Related

More information

Deploying OAuth with Cisco Collaboration Solution Release 12.0

Deploying OAuth with Cisco Collaboration Solution Release 12.0 White Paper Deploying OAuth with Cisco Collaboration Solution Release 12.0 Authors: Bryan Morris, Kevin Roarty (Collaboration Technical Marketing) Last Updated: December 2017 This document describes the

More information

Internet Protocol Version 6 (IPv6)

Internet Protocol Version 6 (IPv6) This chapter provides information about Internet Protocol version 6 (IPv6), which is the latest version of the Internet Protocol (IP). Packets are used to exchange data, voice, and video traffic over dual-stack

More information

Manage Device Firmware

Manage Device Firmware Device Firmware Updates Overview, page 1 Install a Device Pack or Individual Device Firmware, page 2 Remove Unused Firmware from the System, page 3 Set up Default Firmware for a Phone Model, page 3 Set

More information

Security+ SY0-501 Study Guide Table of Contents

Security+ SY0-501 Study Guide Table of Contents Security+ SY0-501 Study Guide Table of Contents Course Introduction Table of Contents About This Course About CompTIA Certifications Module 1 / Threats, Attacks, and Vulnerabilities Module 1 / Unit 1 Indicators

More information

Setup for Cisco Unified Communications Manager

Setup for Cisco Unified Communications Manager Setup for Cisco Unified Communications Manager This chapter describes how you can set up Cisco Jabber for ipad using Cisco Unified Communications Manager. System and Network Requirements, page 1 Recommended

More information

SIMPLE (SIP for Instant Messaging and Presence Leveraging Extensions Used by CM-IMP. XMPP (extensible Messaging and Presence Protocol) Used by CM-IMP

SIMPLE (SIP for Instant Messaging and Presence Leveraging Extensions Used by CM-IMP. XMPP (extensible Messaging and Presence Protocol) Used by CM-IMP Rev. 20170312.203116 14. IM and Presence c cnac o okbook.com C M - I M P CM-IMP (cisco Communications Manager IM and Presence server) Tightly integrated with CUCM. Extends the presence capabilities native

More information

Q&As. Implementing Cisco Collaboration Devices v1.0. Pass Cisco Exam with 100% Guarantee

Q&As. Implementing Cisco Collaboration Devices v1.0. Pass Cisco Exam with 100% Guarantee 210-060 Q&As Implementing Cisco Collaboration Devices v1.0 Pass Cisco 210-060 Exam with 100% Guarantee Free Download Real Questions & Answers PDF and VCE file from: 100% Passing Guarantee 100% Money Back

More information

An Overview of the Cisco Unified IP Phone

An Overview of the Cisco Unified IP Phone CHAPTER 1 The Cisco Unified IP Phone 7965G and 7945G are full-featured telephones that provide voice communication over an Internet Protocol (IP) network. These phones function much like digital business

More information

Cisco Unified IP Phone Settings

Cisco Unified IP Phone Settings Phone Settings Overview, page 1 Cisco Unified IP Phone Configuration Menus, page 1 Network Setup Menu, page 3 IPv4 Setup Menu s, page 8 IPv6 Setup Menu s, page 13 Security Setup Menu, page 14 Phone Settings

More information

Mobile and Remote Access Through Cisco Expressway

Mobile and Remote Access Through Cisco Expressway Mobile and Remote Access Through Cisco Expressway Deployment Guide First Published: April 2014 Last Updated: February 2019 Cisco Expressway X12.5 Cisco Systems, Inc. www.cisco.com 2 Contents Preface 5

More information

An Overview of the Cisco Unified IP Phone

An Overview of the Cisco Unified IP Phone CHAPTER 1 The Cisco Unified IP Phone 7962G and 7942G are full-feature telephones that provide voice communication over an Internet Protocol (IP) network. The Cisco Unified IP Phone functions much like

More information

An Overview of the Cisco Unified IP Phone

An Overview of the Cisco Unified IP Phone CHAPTER 1 The Cisco Unified IP Phone 7975G is a full-featured telephones that provides voice communication over an Internet Protocol (IP) network. These phones function much like digital business phones,

More information

Compatibility Matrix for Cisco Unified Communications Manager and the IM and Presence Service, Release 11.5(1)SU5

Compatibility Matrix for Cisco Unified Communications Manager and the IM and Presence Service, Release 11.5(1)SU5 Compatibility Matrix for Cisco Unified Communications Manager and the IM and Presence Service, Release 11.5(1)SU5 Compatibility Matrix for Cisco Unified Communications Manager and the IM and Presence Service

More information

New and Changed Features

New and Changed Features This chapter summarizes features the new and updated features for this release. The following features are new or updated specifically for Release 11.5(1)SU1: APIC-EM Controller Checksums for Download

More information

Setting Up the Server

Setting Up the Server Managing Licenses, page 1 Cross-launch from Prime Collaboration Provisioning, page 5 Integrating Prime Collaboration Servers, page 6 Single Sign-On for Prime Collaboration, page 7 Changing the SSL Port,

More information

Configuration and Administration for the IM and Presence Service, Release 11.5(1)SU5

Configuration and Administration for the IM and Presence Service, Release 11.5(1)SU5 Configuration and Administration for the IM and Presence Service, Release 11.5(1)SU5 First Published: 2018-06-29 Last Modified: 2018-09-24 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive

More information

Expressway for Mobile and Remote Access Deployments, page 1 Cisco AnyConnect Deployments, page 9 Survivable Remote Site Telephony, page 17

Expressway for Mobile and Remote Access Deployments, page 1 Cisco AnyConnect Deployments, page 9 Survivable Remote Site Telephony, page 17 Expressway for Mobile and Deployments, page 1 Cisco AnyConnect Deployments, page 9 Survivable Remote Site Telephony, page 17 Expressway for Mobile and Deployments Expressway for Mobile and for Cisco Unified

More information

SAML SSO Deployment Guide for Cisco Unified Communications Applications, Release 12.0(1)

SAML SSO Deployment Guide for Cisco Unified Communications Applications, Release 12.0(1) SAML SSO Deployment Guide for Cisco Unified Communications Applications, Release 12.0(1) First Published: 2017-08-31 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706

More information

Migrate Phones Between Secure Clusters

Migrate Phones Between Secure Clusters Migrate Phones Between Secure Clusters Contents Introduction Prerequisites Requirements Components Used Background Configure Verify Troubleshoot Introduction This document describes how to migrate phones

More information

Android Mobile Single Sign-On to VMware Workspace ONE. SEP 2018 VMware Workspace ONE VMware Identity Manager VMware Identity Manager 3.

Android Mobile Single Sign-On to VMware Workspace ONE. SEP 2018 VMware Workspace ONE VMware Identity Manager VMware Identity Manager 3. Android Mobile Single Sign-On to VMware Workspace ONE SEP 2018 VMware Workspace ONE VMware Identity Manager VMware Identity Manager 3.3 You can find the most up-to-date technical documentation on the VMware

More information

Troubleshooting. General Troubleshooting Information

Troubleshooting. General Troubleshooting Information General Information, page 1 Startup s, page 3 Phone Reset s, page 7 Phone Cannot Connect to LAN, page 9 Cisco IP Phone Security s, page 9 Video Call s, page 11 General Telephone Call s, page 12 Procedures,

More information

Interdomain Federation Guide for IM and Presence Service on Cisco Unified Communications Manager, Release 11.5(1)SU2

Interdomain Federation Guide for IM and Presence Service on Cisco Unified Communications Manager, Release 11.5(1)SU2 Interdomain Federation Guide for IM and Presence Service on Cisco Unified Communications Manager, Release 11.5(1)SU2 First Published: 2017-11-29 Last Modified: 2017-12-01 Americas Headquarters Cisco Systems,

More information

Cisco TelePresence Conductor with Unified CM

Cisco TelePresence Conductor with Unified CM Cisco TelePresence Conductor with Unified CM Deployment Guide TelePresence Conductor XC3.0 Unified CM 10.x Revised February 2015 Contents Introduction 5 About this document 5 Related documentation 5 About

More information

Partitioned Intradomain Federation for IM and Presence Service on Cisco Unified Communications Manager, Release 11.5(1)SU2

Partitioned Intradomain Federation for IM and Presence Service on Cisco Unified Communications Manager, Release 11.5(1)SU2 Partitioned Intradomain Federation for IM and Presence Service on Cisco Unified Communications Manager, First Published: 2017-01-10 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose,

More information

Configure Push Notifications for Cisco Jabber on iphone and ipad

Configure Push Notifications for Cisco Jabber on iphone and ipad Configure Push Notifications for Cisco Jabber on iphone and ipad Push Notifications Overview, page 1 Push Notifications Prerequisites, page 5 Push Notifications Configuration Task Flow, page 6 Push Notifications

More information

Configure Service Parameters

Configure Service Parameters Service Parameters Overview, page 1 Service Parameters Configuration Task Flow, page 1 Service Parameters Overview Each Cisco Unified Communications Manager node has a list of services that are available

More information

SonicOS Enhanced Release Notes

SonicOS Enhanced Release Notes SonicOS Contents Platform Compatibility... 1 Known Issues... 2 Resolved Known Issues... 3 Upgrading SonicOS Enhanced Image Procedures... 5 Related Technical Documentation...8 Platform Compatibility The

More information