Practical Cisco Unified Communications Security - Bookswagon
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Home > Computing and Information Technology > Computer networking and communications > Network security > Practical Cisco Unified Communications Security
Practical Cisco Unified Communications Security

Practical Cisco Unified Communications Security


     0     
5
4
3
2
1



Out of Stock


Notify me when this book is in stock
X
About the Book

Master the foundations of modern Cisco Unified Communications (UC) system security

This guide helps you build foundational knowledge for securing modern Cisco Unified Communications environments that support voice, video, messaging, and meetings, and support different types of real-time collaboration capabilities based on mobile/remote access and mobile devices based on bring-your-own-device (BYOD) initiatives.

Writing for administrators and managers, two Cisco collaboration experts bring together methods and insights to illuminate both the why and the how of effective collaboration security. Using the proven Explain, Demonstrate, and Verify methodology, they explain each threat, demonstrate remediation, and show how to confirm correct implementation. Youll walk through securing each attack surface in a logical progression, across each Cisco UC application domain.

The authors address key updates to Cisco collaboration architecture, including Expressway, Cisco Meeting Server, encryption enhancements, and advanced business-to-business collaboration. Youll find quick-reference checklists in each chapter, and links to more detail wherever needed.

  • Begin by protecting your workforce through basic physical security and life/safety techniques
  • Understand how attackers seek to compromise your UC systems network environmentand your best countermeasures
  • Maintain security across all UC deployment types n Protect core UC applications by locking down and hardening the core operating system
  • Use encryption to protect media and signaling, and enforce secure authentication
  • Secure Cisco Unified Communications Manager, Cisco Unity Connection, and Cisco Meeting Server
  • Deploy Session Border Controllers to provide security controls for VoIP and video traffic
  • Provide additional protection at the edge of the network
  • Safeguard cloud-based and hybrid-cloud services
  • Enable organisations to seamlessly and securely connect to cloud UC services
  • Allow remote teleworker users to connect safely to local UC resources

The full text downloaded to your computer

With eBooks you can:

  • search for key concepts, words and phrases
  • make highlights and notes as you study
  • share your notes with friends

eBooks are downloaded to your computer and accessible either offline through the Bookshelf (available as a free download), available online and also via the iPad and Android apps.

Upon purchase, you'll gain instant access to this eBook.

Time limit

The eBooks products do not have an expiry date. You will continue to access your digital ebook products whilst you have your Bookshelf installed.

Samples Preview sample pages to Practical Cisco Unified Communications Security

Table of Contents:
    Introduction xix
Chapter 1 The Importance of Practical UC Security 1
    Identifying the Threat Landscape 2
    The Danger of Shadow IT 4
    Balancing Operations and Security 5
    Minimizing Complexity 7
    Visibility and Management 10
    Introduction to ACME: Case Study 11
    Summary 13
    Additional Resources 14
Chapter 2 Physical Security and Life Safety 15
    Introduction to Physical Security and Life Safety 15
    Life and Safety Considerations 28
    Summary 53
    Additional Resources 54
Chapter 3 Security Through Network Fundamentals 55
    Introduction to Network Security 57
    Segmentation 58
    Micro Segmentation 59
    Secure Network Access 64
    Security Features 75
    Firewalls and Access Controls 84
    Continuous Monitoring 86
    Summary 86
    Additional Resources 87
Chapter 4 Maintaining Security Across UC Deployment Types 89
    Common Enterprise Collaboration Deployment Models and Security Considerations 90
    An Overview of How to Secure Cluster Communications 96
    NTP Authentication Enablement and Verification 100
    Securing Intra-Cluster Signaling and Traffic 103
    Securing the Signaling Traffic to IOS Voice and Analog Gateways 110
    Securing the Integration with Cisco Emergency Responder 118
    Summary 123
    Additional Resources 124
Chapter 5 Hardening the Core Cisco UC Appliance Operating Systems 125
    Defining the Core UC Applications 126
    Hardening the Voice Operating System 138
    Performing OS Lockdown via CLI 147
    Summary 159
    Additional Resources 159
Chapter 6 Core Cisco UC Application Lockdown 161
    Types of Users in Cisco Unified Communications Manager and Cisco Unity Connection 162
    Strengthening Local User Account Controls 163
    Importing End Users from a LDAP Directory 175
    Using Single Sign-On to Simplify the Login Experience 186
    Synching End Users Between Unity Connection and Unified CM Using
    Locking Down the GUI 201
    Enabling System Monitoring Using SNMP and Syslog 204
    Disaster Recovery Planning and Best Practices 213
    Summary 214
    Additional Resources 214
Chapter 7 Encrypting Media and Signaling 217
    Licensing (Encryption License) and Allowing Export Restrictions Requirements 218
    FIPS Considerations When Enabling Secure Signaling and Media Encryption 222
    Public Key Infrastructure Overview 222
    TFTP File Encryption 237
    Overview of the Endpoint Registration Process 239
    Applying the Secure Phone Profiles and LSC to the Phones 264
    Summary 271
    Additional Resources 271
Chapter 8 Securing Cisco Unified Communications Manager (Cisco) 273
    Endpoint Hardening 274
    Secure Conferencing 276
    Conference Now 298
    Smart Licensing 298
    Summary 302
    Additional Resources 303
Chapter 9 Securing Cisco Unity Connection 305
    Baseline Security Considerations Overview 306
    Securing User Access to the Unity Connection 311
    Securely Integrating Unity Connection with Unified CM 316
    Preventing Toll Fraud in Unity Connection 325
    Summary 336
    Additional Resources 337
Chapter 10 Securing Cisco Meeting Server 339
    CMS Overview and Deployment Modes 340
    Operating System Hardening 342
    Infrastructure Considerations 347
    Securing CMS Connections 351
    Certificate Verification 356
    Certificate Assignment 360
    Application Programming Interfaces (APIs) 367
    Inbound and Outbound Calling 370
    Summary 381
    Additional Resources 382
Chapter 11 Securing the Edge 383
    Business Requirements for the Collaboration Edge 383
    Cisco's Collaboration Edge Architecture 384
    Deploying CUBE 388
    Security Features Within Expressway 403
    Deploying Mobile and Remote Access 406
    Defending Against Attacks at the Edge 420
    B2B Connectivity 422
    Summary 424
    Additional Resources 425
Chapter 12 Securing Cloud and Hybrid Cloud Services 427
    Business Drivers for Cloud and Hybrid UC Services 428
    Coordinating for Governance and Compliance 430
    Considerations for Secure Calling 433
    Securing Messaging Services 446
    Meeting Management and Security Controls 456
    Security Across Emerging Features 463
    IoT Security 467
    Summary 470
    Additional Resources 470
Afterword 471


TOC, 9780136654452, 11/5/2020



About the Author :
Brett Hall, CCIE R&S, Collaboration #20774, is a Customer Solutions Architect supporting Cisco's product and service offerings for enterprise customers across the U.S. Army and defense agencies. He has more than 20 years' IT experience and has worked with Cisco to support federal government initiatives for more than 13 years. He also works with Cisco business units to define product and service strategies and helps lead a global team of Cisco architects. To support customer requirements, Brett works with presales teams to engineer solutions that lead to customer adoption. Brett also drives solution development to help support future needs of his customers.
Nik Smith, Technical Leader for Collaboration at Cisco, supports Cisco Unified Collaboration (UC) products and service offerings for the public sector, enterprise, and defense agencies. His 24 years of networking experience cover technologies ranging from RF communications and telecommunications to UC. For 14 years, he has supported some of the world's largest Cisco UC deployments. During this time, he has led several large implementation teams involved in migrating from TDM to VoIP, along with network support and modernization. He now leads a team of UC engineers supporting the public sector, Department of Defense and providing guidance and mentoring to ensure that Cisco delivers best-in-class, highly secure UC capabilities.


Best Sellers


Product Details
  • ISBN-13: 9780136654445
  • Publisher: Pearson Education (US)
  • Publisher Imprint: Cisco Press
  • Language: English
  • ISBN-10: 0136654444
  • Publisher Date: 15 Mar 2021
  • Binding: Digital download
  • No of Pages: 528


Similar Products

Add Photo
Add Photo

Customer Reviews

REVIEWS      0     
Click Here To Be The First to Review this Product
Practical Cisco Unified Communications Security
Pearson Education (US) -
Practical Cisco Unified Communications Security
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Practical Cisco Unified Communications Security

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept


    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!
    Hello, User