Book Image

Cisco Unified Communications Manager 8: Expert Administration Cookbook

By : Tanner Ezell
Book Image

Cisco Unified Communications Manager 8: Expert Administration Cookbook

By: Tanner Ezell

Overview of this book

Cisco Unified Communications Manager (CUCM) is a software-based call-processing system developed by Cisco Systems. CUCM tracks all active VoIP network components; these include phones, gateways, conference bridges, transcoding resources, and voicemail boxes among others. This scalable, distributable, highly-available enterprise-class system delivers voice, video, mobility, and presence services. It connects up to 30,000 users of IP phones, media processing devices, VoIP gateways, mobile devices, and multimedia applications. With this cookbook you will learn all the important aspects of administering Cisco Unified Communications Manager. Cisco Unified Communications Manager 8: Expert Administration Cookbook is filled with many advanced recipes to effectively and efficiently configure and manage Cisco Unified Communications Manager. This book covers everything an administrator needs during and after Cisco Unified Communications Manager implementation. This practical cookbook contains detailed step-by-step instructions with clear and informative screenshots that cover all the important and advanced aspects of administering Cisco Unified Communications Manager. The book starts with introducing Call Routing and E.164. It then covers configuration and design information for the various call admission control technologies and Media Resources. The book also dives deep into troubleshooting, upgrades, disaster recovery, user management and much more.
Table of Contents (18 chapters)
Cisco Unified Communications Manager 8: Expert Administration Cookbook
Credits
About the Author
About the Reviewers
www.PacktPub.com
Preface
Index

Configuring phone security profiles


Phone security profiles allow us to group security-related settings for a phone type and protocol that we can then assign to a device. The device will then be required to enforce those settings.

How to do it...

To configure a phone security profile, perform the following:

  1. First navigate to the phone security profile page (System | Security | Phone Security Profile).

  2. Click on Add New.

  3. From the Product Type drop-down, select the appropriate device type.

  4. Click on Next.

  5. Select the appropriate protocol from the drop-down.

  6. Click on Next.

  7. Specify a Name.

  8. From the Device Security Mode drop-down, select the desired mode.

  9. If desired, check TFTP Encrypted Config.

  10. Specify the Authentication Mode.

  11. If desired, change the Key Size:

For SIP devices:

  1. Specify the Transport Type.

  2. If desired, check Enable Digest Authentication.

  3. If using digest authentication and if desired, check Exclude Digest Credentials in Configuration File.

  4. If necessary, change the SIP Phone Port.

  5. Click on Save.

How it...