Book Image

Cisco Unified Communications Manager 8: Expert Administration Cookbook

By : Tanner Ezell
Book Image

Cisco Unified Communications Manager 8: Expert Administration Cookbook

By: Tanner Ezell

Overview of this book

Cisco Unified Communications Manager (CUCM) is a software-based call-processing system developed by Cisco Systems. CUCM tracks all active VoIP network components; these include phones, gateways, conference bridges, transcoding resources, and voicemail boxes among others. This scalable, distributable, highly-available enterprise-class system delivers voice, video, mobility, and presence services. It connects up to 30,000 users of IP phones, media processing devices, VoIP gateways, mobile devices, and multimedia applications. With this cookbook you will learn all the important aspects of administering Cisco Unified Communications Manager. Cisco Unified Communications Manager 8: Expert Administration Cookbook is filled with many advanced recipes to effectively and efficiently configure and manage Cisco Unified Communications Manager. This book covers everything an administrator needs during and after Cisco Unified Communications Manager implementation. This practical cookbook contains detailed step-by-step instructions with clear and informative screenshots that cover all the important and advanced aspects of administering Cisco Unified Communications Manager. The book starts with introducing Call Routing and E.164. It then covers configuration and design information for the various call admission control technologies and Media Resources. The book also dives deep into troubleshooting, upgrades, disaster recovery, user management and much more.
Table of Contents (18 chapters)
Cisco Unified Communications Manager 8: Expert Administration Cookbook
Credits
About the Author
About the Reviewers
www.PacktPub.com
Preface
Index

Implementing endpoint hardening


Endpoint hardening is a supplementary step that can provide greater protection from various forms of attacks. It may also make it difficult for users to gain information about the system by preventing the phone from relaying certain information.

Getting ready

Determine from business requirements the fields and options required, and those that will not be required. Those that are not required can be disabled as part of endpoint hardening.

How to do it...

To harden an endpoint from various forms of attacks and vulnerabilities, perform the following:

  1. Navigate to the endpoint to be hardened (Device | Phone).

  2. Under the Product Specific Configuration Layout section, enable or disable the following fields as required:

    • PC Port

    • Settings Access

    • Gratuitous ARP

    • PC Voice VLAN Access

    • Web Access

  3. Click on Save.

  4. Click on Reset.

  5. Repeat these steps for each endpoint that requires hardening.

How it works...

By disabling certain services, we can increase the security of our setup and...