Cisco Unified Communications Manager. Common Criteria Configuration Guide

Size: px
Start display at page:

Download "Cisco Unified Communications Manager. Common Criteria Configuration Guide"

Transcription

1 Cisco Unified Communications Manager Common Criteria Configuration Guide Version 0.4 EDCS July , Cisco Systems, Inc. All rights reserved. This document can be reproduced in full without any modifications.

2 Table of Contents 1 Introduction... 8 Audience... 8 Purpose... 8 Document References... 8 Supported Hardware and Software... 9 Operational Environment Supported non-toe Hardware/ Software/ Firmware Excluded Functionality Secure Acceptance of the TOE Secure Installation and Configuration Physical Installation Initial Setup of CUCM Enabling FIPS Mode Certificates Administrator Configuration, Credentials and Session Termination Logging Configuration Endpoint Devices and User Association Network Protocols and Cryptographic Settings Remote Administration Protocols SIP Connections and Protocols Clusters and Route Patterns Secure Management User Roles Clock Management Identification and Authentication Login Banners Product Updates Security Relevant Events Reviewing, Downloading and Deleting Audit Records Network Services and Protocols Page 2 of 35

3 7 Modes of Operation Security Measures for the Operational Environment Related Documentation Documentation Feedback Obtaining Technical Assistance Page 3 of 35

4 List of Tables Table 1: Acronyms... 5 Table 2 Terminology... 6 Table 3 Cisco Documentation... 8 Table 4: Operational Environment Components Table 5 Excluded Functionality Table 6 TOE External Identification Table 7 Evaluated Software Images Table 8 Audit Entries Table 10: Protocols and Services Table 11 Operational Environment Security Measures Page 4 of 35

5 List of Acronyms The following acronyms and abbreviations may be used in this document: Table 1: Acronyms Acronyms / Definition Abbreviations AAA Administration, Authorization, and Accounting ACL Access Control Lists AES Advanced Encryption Standard BRI Basic Rate Interface CC Common Criteria for Information Technology Security Evaluation CEM Common Evaluation Methodology for Information Technology Security CM Configuration Management CTI Computer Telephony Integration ports CUCM Cisco Unified Communications Manager DHCP Dynamic Host Configuration Protocol EAL Evaluation Assurance Level EHWIC Ethernet High-Speed WIC ESP Encapsulating Security Payload GE Gigabit Ethernet port HTTP Hyper-Text Transport Protocol HTTPS Hyper-Text Transport Protocol Secure ICMP Internet Control Message Protocol IT Information Technology NDPP Network Device Protection Profile OS Operating System PoE Power over Ethernet PP Protection Profile SBC Session Border Controllers SHS Secure Hash Standard SIP Session Initiation Protocol ST Security Target TCP Transport Control Protocol TLS Transport Layer Security TOE Target of Evaluation TSC TSF Scope of Control TSF TOE Security Function TSP TOE Security Policy UCM Unified Communications Manager UDP User datagram protocol UCS Unified Computing System VoIP Voice over IP WAN Wide Area Network WIC WAN Interface Card Page 5 of 35

6 Terminology Term Authorized Administrator Peer CUCM Security Administrator SIP Server User Table 2 Terminology Definition Any user which has been assigned to a privilege level that is permitted to perform all TSF-related functions. Another CUCM on the network that the TOE interfaces with. Synonymous with Authorized Administrator for the purposes of this evaluation. The SIP Server (the TOE) interacts with a VoIP client (user smartphone) and provides registrar and proxy capabilities required for call-session management as well as establishing, processing, and terminating VoIP calls. Any entity (human user or external IT entity) outside the TOE that interacts with the TOE. Page 6 of 35

7 DOCUMENT INTRODUCTION Prepared By: Cisco Systems, Inc. 170 West Tasman Dr. San Jose, CA This document provides supporting evidence for an evaluation of a specific Target of Evaluation (TOE), the Cisco Unified Communications Manager (CUCM). This Operational User Guidance with Preparative Procedures addresses the administration of the TOE software and hardware and describes how to install, configure, and maintain the TOE in the Common Criteria evaluated configuration. REVISION HISTORY Rev Date Description.01 2 March 2015 Initial Draft April 2015 Updated based on Evaluator findings May 2015 Updated based on Evaluator findings July 2015 Updated based on Evaluator findings Page 7 of 35

8 1 Introduction This Operational User Guidance with Preparative Procedures documents the administration of the Cisco Unified Communications Manager (CUCM), the TOE, as it was certified under Common Criteria. The Cisco Unified Communications Manager (CUCM ) may be referenced below as the Cisco Unified Communications Manager, CUCM, or simply TOE. Audience This document is written for administrators configuring the TOE. This document assumes that you are familiar with Cisco or equivalent call processing and unified communications products. It is also assumed that you have a general understanding and knowledge with the basic concepts and terminologies used in enterprise telephony features and functions to packet telephony network devices such as IP phones, media processing devices, voice-over-ip (VoIP) gateways, and multimedia applications, that you are a trusted individual, and that you are trained to use the operating systems on which you are running your network. Purpose This document is the Operational User Guidance with Preparative Procedures for the Common Criteria evaluation. It was written to highlight the specific TOE configuration and administrator functions and interfaces that are necessary to configure and maintain the TOE in the evaluated configuration. The evaluated configuration is the configuration of the TOE that satisfies the requirements as defined in the Security Target (ST). This document covers all of the security functional requirements specified in the ST and as summarized in Section 3 of this document. This document does not mandate configuration settings for the features of the TOE that are outside the evaluation scope, which should be set according to your organizational security policies. This document is not meant to detail specific actions performed by the administrator but rather is a road map for identifying the appropriate locations within Cisco documentation to get the specific details for configuring and maintaining CUCM operations. It is recommended that you read all instructions in this document and any references before performing steps outlined and entering commands. Section 9 of this document provides information for obtaining assistance. Document References This section lists the Cisco Systems documentation that is also the Common Criteria Configuration Item (CI) List. The documents used are shown below in Table 3. Throughout this document, the guides will be referred to by the #, such as [1]. Table 3 Cisco Documentation # Title Link [1] Cisco Unified Communications Manager (CallManager) Maintain and Operate Guides Page 8 of 35

9 # Title Link [2] Cisco UCS C220 Server Installation and Service Guide /C220/install/C220.html Cisco UCS C210 Installation and Service Guide [3] Administration Guide for Cisco Unified Communications Manager, Release 11.0(1) /C210M1/install/C210M1.html n/11_0_1/administration/cucm_bk_a0a10476_00_administrati on-guide-for-cisco-unified.html [4] Cisco Unified Real-Time Monitoring Tool Administration Guide, Release 11.0(1) [5] System Configuration Guide for Cisco Unified Communications Manager, Release 11.0(1) ce/11_0_1/rtmt/cucm_bk_cc660a6b_00_cisco-unifiedrtmt-administration-1101.html n/11_0_1/sysconfig/cucm_bk_c733e983_00_cucm-systemconfiguration-guide.html [6] Security Guide for Cisco Unified Communications Manager, Release 11.0(1) [7] Cisco Unified Communications Manager FIPS Certificate [8] Cisco Unified Communications Manager Common Criteria Guidance, version 0.1 [9] Cisco Unified Communications Manager Security Target, version.01 [10] Installation Guide for Cisco Unified Communications Manager, Release 11.0(1) [11] Release Notes for Cisco Unified Communications Manager and IM and Presence Service, Release 11.0(1) [12] Cisco Collaboration on Virtual Servers ity/11_0_1/secugd/cucm_bk_c1a78c1d_00_cucm-securityguide-1101.html Refer to FIPS certificate 2100; Cisco FIPS Object Module (Software Version: 4.1) This will be updated with a link to the Cisco certification webpage This will be updated with the link to the NIAP webpage l/11_0_1/cucm_bk_idf93684_00_installing-cucm_1101.html otes/11_0_1/cucm_bk_r30921a8_00_cucm_releasenotes_1101.html l/cucm_bk_cf3d71b4_00_cucm_virtual_servers.html Supported Hardware and Software Only the hardware and software listed in section 1.5 of the Security Target (ST) is compliant with the Common Criteria evaluation. Using hardware not specified in the ST invalidates the secure configuration. Likewise, using any software version other than the evaluated software Page 9 of 35

10 listed in the ST will invalidate the secure configuration. The TOE is a hardware and software solution that makes up the CUCM system as follows: The hardware is comprised of the Cisco Unified Computing System (Cisco UCS) C220 M3 Rack Server or the Cisco Unified Computing System (Cisco UCS) C210 M2 Rack Server The software is comprised of the CUCM software image Release 11.0 The software comes pre-installed on the UCS C220 M3 Server or the UCS C210 M2 Server and is comprised of the Cisco CUCM 11.0 software. Cisco Unified CM Administration is a web-based application that is the main administration and configuration interface for Cisco Unified Communications Manager. The CUCM Administration is used to manage the system, features, server settings, call routing rules, phones and end users. CUCM Administration supports the following operating system browsers: Microsoft Internet Explorer (IE) 7 when running on Microsoft Windows XP SP3 Microsoft Internet Explorer (IE) 8 when running on Microsoft Windows XP SP3 or Microsoft Vista SP2 Firefox 3.x when running on Microsoft Windows XP SP3, Microsoft Vista SP2 or Apple MAC OS X Safari 4.x when running on Apple MAC OS X HTTPS is used to secure the connection between CUCM and the browser. Refer to [6] Hypertext Transfer Protocol Over Secure Sockets Layer (HTTPS) Cisco Unified Communications Manager works as an Appliance on a non-windows-based Operating System. The Cisco Unified Communications Manager appliance refers to the following functions: Works on a specific hardware platform(s) that Cisco specifies and supplies and, in some cases, the customer supplies Works in a carefully controlled software environment that Cisco specifies and installs Includes all software that is required to operate, maintain, secure, and manage servers Cisco Unified Communications Manager servers get preinstalled with software to ease customer and partner deployment and automatically search for updates and notify administrators when key security fixes and software upgrades are available for their system. This process comprises Electronic Software Delivery. Because Cisco Unified Communications Manager is a software application, enhancing its capabilities in production environments requires only upgrading software on the server platform. Page 10 of 35

11 Operational Environment Supported non-toe Hardware/ Software/ Firmware The TOE supports (in some cases optionally) the following hardware, software, and firmware in its environment: Table 4: Operational Environment Components Component Required Usage/Purpose Description for TOE performance Local No This includes any IT Environment Console that is directly Console connected to the TOE via the Serial Console Port and is used by Management Workstation using web browser for HTTPS Yes the TOE administrator to support TOE administration. This includes any IT Environment Management workstation with a web browser installed that is used by the TOE administrator to support TOE administration through HTTPS protected channels. Any web browser that supports TLSv1.0 with the supported ciphersuites may be used. NTP Server Yes The TOE supports communications with an NTP server in order to synchronize the date and time on the TOE with the NTP server s date and time. RADIUS or TACACS+ AAA Server Syslog Server Remote Endpoint No Yes Yes This includes any IT environment RADIUS or TACACS+ AAA server that provides single-use authentication mechanisms. This can be any RADIUS or TACACS+ AAA server that provides single-use authentication. This includes any syslog server to which the TOE would transmit syslog messages. This includes any peer (other SIP servers) or VoIP client with which the TOE communicates with the end points over a protected TLS channel. Excluded Functionality Excluded Functionality Non-FIPS mode of operation on the router. Table 5 Excluded Functionality Exclusion Rationale This mode of operation includes non-fips allowed operations. The exclusion of this functionality does not affect compliance to the U.S. Government Protection Profile for Security Requirements for Network Devices PP or the SIP Server EP. Page 11 of 35

12 2 Secure Acceptance of the TOE In order to ensure the correct TOE is received, the TOE should be examined to ensure that that is has not been tampered with during delivery. Verify that the TOE software and hardware were not tampered with during delivery by performing the following actions: Step 1 Before unpacking the TOE, inspect the physical packaging the equipment was delivered in. Verify that the external cardboard packing is printed with the Cisco Systems logo and motifs. If it is not, contact the supplier of the equipment (Cisco Systems or an authorized Cisco distributor/partner). Step 2 Verify that the packaging has not obviously been opened and resealed by examining the tape that seals the package. If the package appears to have been resealed, contact the supplier of the equipment (Cisco Systems or an authorized Cisco distributor/partner). Step 3 Verify that the box has a white tamper-resistant, tamper-evident Cisco Systems bar coded label applied to the external cardboard box. If it does not, contact the supplier of the equipment (Cisco Systems or an authorized Cisco distributor/partner). This label will include the Cisco product number, serial number, and other information regarding the contents of the box. Step 4 Note the serial number of the TOE on the shipping documentation. The serial number displayed on the white label affixed to the outer box will be that of the device. Verify the serial number on the shipping documentation matches the serial number on the separately mailed invoice for the equipment. If it does not, contact the supplier of the equipment (Cisco Systems or an authorized Cisco distributor/partner). Step 5 Verify that the box was indeed shipped from the expected supplier of the equipment (Cisco Systems or an authorized Cisco distributor/partner). This can be done by verifying with the supplier that they shipped the box with the courier company that delivered the box and that the consignment note number for the shipment matches that used on the delivery. Also verify that the serial numbers of the items shipped match the serial numbers of the items delivered. This verification should be performed by some mechanism that was not involved in the actual equipment delivery, for example, phone/fax or other online tracking service. Step 6 Inspect the TOE according to the instructions in [2] Unpack and Inspect the Cisco Unified Computing System (Cisco UCS) C220 M3 or the Cisco UCS C210 M2. Rack Server installed with CUCM software image Release Verify that the serial number displayed on the unit itself matches the serial number on the shipping documentation and the invoice. If it does not, contact the supplier of the equipment (Cisco Systems or an authorized Cisco distributor/partner). Also verify that the unit has the following external identification as described in Table 6 below. Table 6 TOE External Identification Product Name Model Number External Identification Cisco Unified Computing System (Cisco UCS) C220 M3S UCS C220 M3S Cisco Unified Computing System (Cisco UCS) C210 M2 UCS C210 M2 Page 12 of 35

13 Step 7 As noted above, Cisco Unified Communications Manager servers get preinstalled with software. To verify the software version and to register the license, from a PC in your network that has been installed with one of the supported browsers, browse into a server that is running Cisco Unified Communications Manager Administration and log in with administrative privileges. Follow the instructions in [3] Administration Overview -> Getting Started -> Sign In Step 8 To verify the software version CUCM 11.0 Follow the instructions in [3] Manage the System -> Monitor System Status -> View Installed Software. See Table 7 below for the details that must be checked to ensure the software has not been modified in anyway. Table 7 Evaluated Software Images Software Version Image Name Hash Unified Communications Manager Version 11.0 UCSInstall_UCOS_ sgn.iso File size MB ( bytes) MD5 Checksum: 0fea04be800597d7e414984afed5ae26 SHA512 Checksum: 27f41b24ee75a91a59a18ea857feca48... Page 13 of 35

14 3 Secure Installation and Configuration Physical Installation Follow the instructions in [2] Preparing for Server Installation following with Installing the Server In a Rack and Initial Setup. There are network requirements that must be met before deploying CUCM. Initial Setup of CUCM Follow the instructions in Configure Initial Parameters for the System in [5] for the initial setup configurations. There are network requirements that must be met before deploying CUCM such as IP addressing, DNS requirements, software and supported browsers and their associated certificates. During the initial startup of the Cisco Unified Communications Manager you will be required to reset the Administrator default setting. Refer to the password requirements listed below in Section Administrator Configuration, Credentials and Session Termination. The Initial configuration setup the licensing requirements, the server name and ports, systemwide parameters that are required when you setup a node for the first time and the core settings for server groups, time zone information and regions.. The Post-Installation Tasks for Cisco Unified Communications Manager in [10] will guide you through activating services and installing the license. After the initial setup and activating licenses and services are completed, the remainder of this guide will guide you through setting up enterprise parameters for end users, endpoint devices and call administration control [5]. The default method to administer is CUCM is securely connecting to the CUCM GUI interface using TLS. If local administration is required via directly connected to the UCS appliance, refer to Administration in [12] using vsphere client. Enabling FIPS Mode The TOE must be run in the FIPS mode of operation. Refer to [6] Security for SRST References, Trunks, and Gateways -> FIPS Mode Setup for the configuration settings. The self-tests for the cryptographic functions in the TOE are run automatically during power-on as part of the POST. The same POST self-tests for the cryptographic operations are also run periodically during operational state. If any of the self-tests fail, the TOE transitions into an error state. In the error state, all secure management and data transmission that is affected by the failure is halted and the TOE outputs status information indicating the failure. In an error state the Administrator may be able to log in to troubleshoot the issue. During the POST, all ports are blocked from moving to forwarding state. If all components of all modules pass the POST, the system is placed in FIPS PASS state and ports are allowed to forward management and data traffic. If the POST fails the TOE will continuously reboot in attempts to correct the failure. During this state no one can login, no traffic is passed, the TOE is not operational. If the problem is not corrected by the reboot, Cisco Technical Support provides 24-hour-a-day award-winning technical assistance. The Cisco Technical Support & Page 14 of 35

15 Documentation website on Cisco.com features extensive online support resources. In addition, if you have a valid Cisco service contract, Cisco Technical Assistance Center (TAC) engineers provide telephone support. Contact Cisco TAC as described in 9.2 Obtaining Technical Assistance. In this 11.0 release of CUCM, the TOE provides support to monitor the Entropy Monitoring Daemon. This feature does not require any configuration, though it can be turned off by using the CLI. In the evaluated configuration, this service should not be turned off [6] Default Security Setup -> ECDSA Support for Common Criteria for Certified Solutions -> Entropy. Certificates The CUCM supports self-signed and third party signed certificates. The certificates are used to securely authenticate devices, encrypt data and to hash data to ensure its integrity. The most important part of certificates is that you know and define how your data is encrypted and shared with entities such as the intended website, phone, or FTP server. When your system trusts a certificate, this means that there is a preinstalled certificate on your system which states it is fully confident that it shares information with the correct destination. Otherwise, it terminates the communication between these points. In order to trust a certificate, trust must already be established with a third-party certificate authority (CA). Your devices must know that they can trust both the CA and intermediate certificates first, before they can trust the server certificate presented by the exchange of messages called the secure sockets layer (SSL) handshake. Refer to Manage Certificates in [3] and Security Overview -> Certificates and Security Overview -> Certificate Setup in [6]. The CUCM also supports EDCSA certificates and in the evaluated configuration, it is required to use these certificates [10]. When you install Cisco Unified Communications Manager, the selfsigned certificate is generated. Cisco Unified Communications Manager Release 11.0 always has an ECDSA certificate and uses that certificate in its SIP interface. All SIP connections support the ECDSA ciphers and use ECDSA certificates. For third-party signed certificates or certificate chain, you will need to upload the certificate authority root certificate of the certificate authority that signed an application certificate. If a subordinate certificate authority signs an application certificate, you must upload the certificate authority root certificate of the subordinate certificate authority. You can also upload the PKCS#7 format certificate chain of all certificate authority certificates. You can upload certificate authority root certificates and application certificates by using the Upload Certificate dialog box. When you upload a certificate authority root certificate or certificate chain that contains only certificate authority certificates, choose the certificate name with the format certificate type-trust. When you upload an application certificate or certificate chain that contains an application certificate and certificate authority certificates, choose the certificate name that includes only the certificate type. To download certificates, on the Cisco Unified OS Administration page, choose Security > Certificate Management. Next, specify the search criteria and then click Find, then choose the file name of the certificate or certificate trust list (CTL) and click Download. To upload any new certificates or certificate chains that you want your system to trust, from the Cisco Unified OS Administration, choose Security > Certificate Management, click Upload Certificate/Certificate Chain, choose the certificate name from the Certificate Purpose dropdown list, then choose the file to upload by performing one of the following steps: Page 15 of 35

16 o In the Upload File text box, enter the path to the file. o Click Browse, navigate to the file, and then click Open. To upload the file to the server, click Upload File Note, certificates will also be required for each device that communicates with CUCM. Refer to [3] Manage Certificates. Administrator Configuration, Credentials and Session Termination The CUCM must be configured to use a username and password for each administrator. Once the CUCM has been setup and configured, the Administrator can create additional administrative user accounts, refer to [3] Manage Users -> Manage User Access. Also refer to Manage User Access -> Standard Roles and Access Control Groups. The security policies for administrative users include the settings for: idle timeouts (session termination) is set by default to 30 minutes password criteria o by default, is set to a minimum of six (6) characters. In the evaluated configuration the password must be set to a minimum of at least 15 characters o password complexity include the following settings: password must be a combination of upper and lower case letters (a-z and A-Z), numbers (0-9) and the following special #, $, %, ^, &, *, (, ) pins (personal identification number) needs to be set to at least eight (8) characters The credential policies control the authentication process for resources (users) of the TOE. The defines password requirements and account lockout details such as failed login attempts, expiration periods and lockout durations for end user passwords, end user PINs, and application user passwords. Credential policies can be assigned broadly to all accounts of a specific credential type, such as all end user PINs, or they can be customized for a specific application user, or end user. Refer to [5] Configure Credential Policy. Inactivity settings must trigger termination of the administrator session. The default value for the CUCM Web Interface is 30 minutes. If the TOE detects there is no activity for 30 minutes, the CUCM Web Interface times out and the Administrator will be logged off. These settings are only configurable by using the Command Line Interface. It is recommended to accept the default time in the evaluated configuration as the CLI was not included. Logging Configuration Once the TOE becomes operational, auditing is on by default, though can be configured via the access the Audit Log Configuration window in the serviceability GUI to configure the settings for the audit logs [3] Tools and Reports -> Audit Logs -> Set up audit log. Cisco Unified Serviceability logs the following events: Activation, deactivation, start, or stop of a service. Changes in trace configurations and alarm configurations. Changes in SNMP configurations. Page 16 of 35

17 Changes in CDR management. (Cisco Unified Communications Manager only) Review of any report in the Serviceability Reports Archive. This log gets viewed on the reporter node. (Cisco Unified Communications Manager only) The Cisco Unified Real-Time Monitoring Tool can also be used to monitor system performance, operations and events on the TOE. Refer to [4]. Cisco Unified Real-Time Monitoring Tool logs the following events with an audit event alarm: Alert configuration Alert suspension configuration Set node alert status Alert addition Add alert action Clear alert Enable alert Remove alert action Remove alert By default, the logs are configured to rotate. If the AuditLogAlarmMonitor cannot write an audit event, the AuditLogAlarmMonitor logs this failure as a critical error in the syslog file. The Alert Manager reports this error as part of a SeverityMatchFound alert. The actual operation continues even if the event logging fails. All audit logs get collected, viewed, and deleted from Trace and Log Central in the Cisco Unified Real-Time Monitoring Tool. Audit logging contains the following parts: Audit logging framework - The framework comprises an API that uses an alarm library to write audit events into audit logs. An alarm catalog that is defined as GenericAlarmCatalog.xml applies for these alarms. Different system components provide their own logging. The following example displays an API that a Cisco Unified Communications Manager component can use to send an alarm: User ID: CCMAdministratorClient IP Address: Severity: 3 EventType: ServiceStatusUpdated ResourceAccessed: CCMService EventStatus: Successful Description: CallManager Service status is stopped Audit event logging - An audit event represents any event that is required to be logged. The following example displays a sample audit event: Page 17 of 35

18 CCM_TOMCAT-GENERIC-3-AuditEventGenerated: Audit Event Generated UserID:CCMAdministrator Client IP Address: Severity:3 EventType:ServiceStatusUpdated ResourceAccessed: CCMService EventStatus:Successful Description: Call Manager Service status is stopped App ID:Cisco Tomcat Cluster ID:StandAloneCluster Node ID:sa-cm1-3 For additional information refer to [3] Tools and Reports ->Audit Logs and [4] Traces and Logs Audit Trail Log Entries The following table identifies the elements of the audit record. Heading User ID Client IP Address Severity EventType Table 8 Audit Entries Definition The user that triggered the event IP address of the client device used Level of the event The type of event that was performed ResourceAccessed The resource that was accessed EventStatus Description The status of the event; successful, failed The description of the event; CallManager service status is stopped Audit trail records capture the following activities: Auditable Event Sample Audit Record Rationale All use of the user identification mechanism. 05/04/ :54:01.881, acumenadmin, , Info, UserLogging, Cisco CallManager Administration, Success, No, AdministrativeEvent, Cisco CCM Application, Successfully Logged into Cisco CCM Webpages, Cisco Tomcat,, CUCM1, 0 05/04/ :39:00.331, acumenadmin, , Info, UserLogging, CUCMAdmin, Success, No, CriticalEvent, Cisco CUCM Events will be generated for attempted identification/ authentication, and the username attempting to authenticate and source address or interface will be included in the log record. Page 18 of 35

19 Auditable Event Sample Audit Record Rationale Any use of the authentication mechanism. Administration, Successfully Logged out Cisco CCM Web Pages, Cisco Tomcat,, CUCM1, 15 05/04/ :09:56.498, acumensec, , Warning, UserLogging, Cisco CallManager Administration, Failure, No, AdministrativeEvent, Cisco CCM Application, Failed to Log into Cisco CCM Webpages, Cisco Tomcat,, CUCM1, 16 Events will be generated for attempted identification/ authentication, and the username attempting to authenticate will be included in the log record, along with the origin or source of the attempt. Management functions 05/04/ :08:59.564, acumenadmin, , Notice, UserRoleMembershipUpdate, CUCMAdmin, Success, No, AdministrativeEvent, Cisco CUCM Administration, End user acumensec added to usergroup Standard CCM End Users, Cisco Tomcat,, CUCM1, 12 The use of the security management functions is logged; modifications of the behavior of the functions in the TSF and modifications of default settings. 05/04/ :18:41.070, acumenadmin, , Notice, DeviceUpdate, CUCMAdmin, Success, No, AdministrativeEvent, Cisco CUCM Administration, New Phone added with MAC address=upcdivice, CAL mode=< None > and CAL value=< None >, Cisco Tomcat,, CUCM1, 21 05/04/ :55:44.631, acumenadmin, , Info, GeneralConfigurationUpdate, CUCMServiceability, Success, No, AdministrativeEvent, Cisco CCM Servicability, Cisco Location Bandwidth Manager Was Activated on node CUCM1, Cisco Tomcat,, CUCM1, 35 Changes to the time. Dec 17 16:22:23 ryhooper-cucm-dev Info ntpd : synchronized to , stratum 11 Changes to the time are logged. Failure to establish and/or establishment/termination of a TLS session Dec 18 02:19:53 ryhooper-cucm-dev Notice ntpd : time reset s Dec 18 02:19:53 ryhooper-cucm-dev Notice ntpd : kernel time sync status change 2001 Dec 18 02:20:56 ryhooper-cucm-dev Info ntpd : synchronized to , stratum 11 : 6: dchokshi-cucm1.cisco.com Dec :12:10 UTC : %UC_CALLMANAGER-6- EndPointRegistered: %[DeviceName=SEP001B545235C9][IPAddress= ][Protocol=SIP][DeviceType=119][Per fmonobjtype=2][description=sep001b545235c9 Attempts to establish a TLS session or the failure to establish a TLS session is logged as well as successfully established and Page 19 of 35

20 Auditable Event Sample Audit Record Rationale ][LoadID=SIP S][AssociatedDNs=2002][MACAddress=001B C9][IPAddrAttributes=0][ActiveLoadId=SIP S][ClusterID=StandAloneCluster][NodeID=dchok shi-cucm1]: Endpoint registered terminated sessions. TLS : 7: dchokshi-cucm1.cisco.com Dec :12:10 UTC : %UC_CALLMANAGER-6- DeviceDnInformation: %[DeviceName=SEP001B545235C9][DeviceType =119][StationDesc=SEP001B545235C9][StationDn =2002][ClusterID=StandAloneCluster][NodeID=dc hokshi-cucm1]: List of directory numbers (DN) associated with this device Dec 16 10:34:42 dchokshi-cucm1 local7 3 : 18: dchokshi-cucm1.cisco.com: Dec :34: UTC : %UC_CALLMANAGER-3- ServicePortOnline: %[Protocol=Secure SCCP][PortNumber=2443][ AppID=Cisco CallManager][ClusterID=StandAloneCluster][Node ID=dchokshi-cucm1]: A Cisco CallManager service port is online Failure to establish and/or establishment/termination of a HTTPS session 11:51: LogMessage UserID : appadmin ClientAddress : Severity : 3 EventType : UserLogging ResourceAccessed: Cisco CallManager Serviceability RTMT Servlet EventStatus : Success CompulsoryEvent : No AuditCategory : AdministrativeEvent ComponentID : Cisco CCM Application AuditDetails : Login Authentication Successful App ID: Cisco Tomcat Cluster ID: Node ID: dchokshi-cucm1 Attempts to establish a HTTPS session or the failure to establish a HTTPS session is logged as well as successfully established and terminated HTTPS sessions. 12:11: LogMessage UserID : fakeuser ClientAddress : Severity : 3 EventType : UserLogging ResourceAccessed: Cisco CallManager Serviceability RTMT Servlet EventStatus : Failure CompulsoryEvent : No AuditCategory : AdministrativeEvent ComponentID : Cisco CCM Application AuditDetails : Login Authentication Failed App ID: Cisco Tomcat Cluster ID: Node ID: dchokshicucm1 Session Establishment with 11:51: LogMessage UserID : appadmin ClientAddress : Severity : 3 The establishment of a Page 20 of 35

21 Auditable Event Sample Audit Record Rationale peer (TLS) EventType : UserLogging ResourceAccessed: Cisco CallManager Serviceability RTMT Servlet EventStatus : Success CompulsoryEvent : No AuditCategory : AdministrativeEvent ComponentID : Cisco CCM Application AuditDetails : Login Authentication Successful App ID: Cisco Tomcat Cluster ID: Node ID: dchokshi-cucm1 TLS session is logged Session Establishment with peer (SIP) Establishing session with CA 12:11: LogMessage UserID : fakeuser ClientAddress : Severity : 3 EventType : UserLogging ResourceAccessed: Cisco CallManager Serviceability RTMT Servlet EventStatus : Failure CompulsoryEvent : No AuditCategory : AdministrativeEvent ComponentID : Cisco CCM Application AuditDetails : Login Authentication Failed App ID: Cisco Tomcat Cluster ID: Node ID: dchokshicucm :23: AppInfo SIPTcp - wait_sdlspisignal: Outgoing SIP TCP message to on port index :23: AppInfo SIPTcp - wait_sdlreadrsp: Incoming SIP TCP message from on port index 5 with 1478 bytes: :23: AppInfo //SIP/SIPHandler/ccbId=1677/scbId=0/insertConta ctintocontainer: Outgoing Contact=[<sip:2002@ :5061;transport=tl s>] 05/04/ :55:44.644, acumenadmin, , Info, GeneralConfigurationUpdate, CUCMServiceability, Success, No, AdministrativeEvent, Cisco CCM Servicability, Self Provisioning IVR Was Activated on node CUCM1, Cisco Tomcat,, CUCM1, 43 The establishment of a SIP session is logged The connection to CA s for the purpose of certificate verification is logged. Indication that TSF selftest was completed. 05/04/ :55:44.649, acumenadmin, , Info, GeneralConfigurationUpdate, CUCMServiceability, Success, No, AdministrativeEvent, Cisco CCM Servicability, Cisco Certificate Authority Proxy Function Was Activated on node CUCM1, Cisco Tomcat,, CUCM1, 52 The status of startup operation is currently being audited as syslog entries. Examples are pasted below: During bootup, if the self-test fails, the failure is logged. Page 21 of 35

22 Auditable Event Sample Audit Record Rationale Sep 4 17:56:30 Infy-S64-cucm6 local7 2 : 7: Infy- S64-cucm6.cisco.com: Sep :26: UTC : %UC_SERVICEMANAGER-2- ServiceFailed: %[ServiceName=Cisco CallManager Admin][Reason=Service stopped abruptly][appid=cisco Service Manager][ClusterID=][NodeID=Infy-S64-cucm6]: Service terminated. Sep 4 17:56:30 Infy-S64-cucm6 local7 6 : 8: Infy- S64-cucm6.cisco.com: Sep :26: UTC : %UC_GENERIC-6-ServiceStarted: %[ServiceName=Cisco Trust Verification Service][ProcessID=25112][AppID=Cisco Service Manager][ClusterID=][NodeID=Infy-S64-cucm6]: Service started ,0,CiscoSystemInDemo, Reason : CiscoSystemInDemo AppID : Cisco License Manager ClusterID : NodeID : Infy-S64-cucm6 TimeStamp : Sat Sep 27 01:09:37 IST The alarm is generated on Sat Sep 27 01:09:37 IST 2014.,,4,1,,Infy-S64-cucm6.cisco.com,UCM ,1,AuthenticationFailed, Number of AuthenticationFailed events exceeds configured threshold during configured interval of time 1 within 3 minutes on cluster StandAloneCluster. There are 2 AuthenticationFailed events (up to 30) received during the monitoring interval From Tue Sep 30 00:31:24 IST 2014 to Tue Sep 30 00:34:24 IST 2014: TimeStamp : 9/30/14 12:31 AM LoginFrom : Interface : Cisco RTMT Reporter Servlet UserID : CUCService AppID : Cisco Tomcat ClusterID : NodeID : Infy- S64-cucm6 TimeStamp : Tue Sep 30 00:31:59 IST 2014 TimeStamp : 9/30/14 12:31 AM LoginFrom : Interface : Cisco RTMT Reporter Servlet UserID : CUCService AppID : Cisco Tomcat ClusterID : NodeID : Infy-S64-cucm6 TimeStamp : Tue Sep 30 00:31:28 IST 2014,,2,0,,,System Initiation of update 16:43: LogMessage UserID : admin ClientAddress : Severity : 6 EventType : CLICommand ResourceAccessed: GenericCLI EventStatus : Success CompulsoryEvent : No AuditCategory : AdministrativeEvent ComponentID : CLI Audit event is generated for the initiation of a software update. Page 22 of 35

23 Auditable Event Sample Audit Record Rationale AuditDetails : utils system upgrade status Command status= App ID: Command Line Cluster ID: Node ID: infyvoscm30-lnx Any attempts at unlocking of an interactive session. This requirement is satisfied based on CUCM does not provide the ability to 'lock' the admin s session. The sessions are terminated when the admin logsout or session is terminated due to inactivity. The admin must re-establish the session and log-on to gain access. We will reference the FIA audit logs. Audit event is generated after a user s session is locked and the admin user is required to reauthenticate. Once a remote interactive session is terminated after a Security Administratorconfigurable time interval of session inactivity. The termination of an interactive session. Initiation of the trusted channel/ path. Termination of the trusted channel/ path. Failure of the trusted channel/ path functions. 16:50: LogMessage UserID : admin ClientAddress : Severity : 6 EventType : UserLogging ResourceAccessed: CUCMAdmin EventStatus : Success CompulsoryEvent : No AuditCategory : CriticalEvent ComponentID : Cisco CUCM Administration AuditDetails : Successfully Logged out Cisco CCM Web Pages App ID: Cisco Tomcat Cluster ID: Node ID: infyvoscm28-lnx 15:46: LogMessage UserID : admin ClientAddress : Severity : 6 EventType : UserLogging ResourceAccessed: CUCMAdmin EventStatus : Success CompulsoryEvent : No AuditCategory : CriticalEvent ComponentID : Cisco CUCM Administration AuditDetails : Successfully Logged out Cisco CCM Web Pages App ID: Cisco Tomcat Cluster ID: Node ID: infyvoscm28-lnx 11:51: LogMessage UserID : appadmin ClientAddress : Severity : 3 EventType : UserLogging ResourceAccessed: Cisco CallManager Serviceability RTMT Servlet EventStatus : Success CompulsoryEvent : No AuditCategory : AdministrativeEvent ComponentID : Cisco CCM Application AuditDetails : Login Authentication Successful App ID: Cisco Tomcat Cluster ID: Node ID: dchokshi-cucm1 An audit event is generated by when sessions are terminated after exceeding the inactivity settings. An audit event is generated by an authorized administrator when the exit command is used. Also see the rows for TLS above. 12:11: LogMessage UserID : fakeuser ClientAddress : Severity : 3 EventType : UserLogging ResourceAccessed: Cisco CallManager Serviceability RTMT Servlet EventStatus : Failure CompulsoryEvent : No AuditCategory : AdministrativeEvent ComponentID : Cisco CCM Application AuditDetails : Login Authentication Failed App ID: Page 23 of 35

24 Auditable Event Sample Audit Record Rationale Node ID: dchokshi- Cisco Tomcat Cluster ID: cucm1 Audit Trail Capacities Log Partition Monitoring (LPM), which is installed automatically with the CUCM, uses configurable thresholds to monitor the disk usage of the log partition on a server. The Cisco Log Partition Monitoring Tool service starts automatically after installation of the CUCM. Every 5 minutes, Log Partition Monitoring uses the following configured thresholds to monitor the disk usage of the log partition and the spare log partition on a server: LogPartitionLowWaterMarkExceeded (% disk space): When the disk usage is above the percentage that you specify, LPM sends out an alarm message to syslog and an alert to RTMT Alert central. To save the log files and regain disk space, you can use trace and log central option in RTMT. LogPartitionHighWaterMarkExceeded (% disk space): When the disk usage is above the percentage that you specify, LPM sends an alarm message to syslog and an alert to RTMT Alert central. SparePartitionLowWaterMarkExceeded (% disk space): When the disk usage is above the percentage that you specify, LPM sends out an alarm message to syslog and an alert to RTMT Alert central. To save the log files and regain disk space, you can use trace and log central option in RTMT. SparePartitionHighWaterMarkExceeded (% disk space): When the disk usage is above the percentage that you specify, LPM sends a n alarm message to syslog and an alert to RTMT Alert central. To utilize log partition monitor, verify that the Cisco Log Partitioning Monitoring Tool service, a network service, is running on Cisco Unified Serviceability on the server or on each server in the cluster (if applicable). Warning, stopping the service causes a loss of feature functionality. When the log partition monitoring services starts at system startup, the service checks the current disk space utilization. If the percentage of disk usage is above the low water mark, but less than the high water mark, the service sends an alarm message to syslog and generates a corresponding alert in RTMT Alert central. To configure Log Partitioning Monitoring, set the alert properties for the LogPartitionLowWaterMarkExceeded and LogPartitionHighWaterMarkExceeded alerts in Alert Central. If the percentage of disk usage is above the high water mark that you configured, the system sends an alarm message to syslog, generates a corresponding alert in RTMT Alert Central, and automatically purges log files until the value reaches the low water mark. Refer to [4] Chapter 2, Log Partition Monitoring Tool. Page 24 of 35

25 You can download the audit and trace logs using the Cisco Unified Real-Time Monitoring Tool (RTMT). Before downloading the logs, there are a few configuration options that need to be setup. Also you will need to import the proper security certificates. Refer to [4] Chapter 8 Traces and Logs -> Preparation through View Trace and Log Central Options. To download the trace logs, using the Cisco Unified Real-Time Monitoring Tool (RTMT) refer to [4] Chapter 8, Traces and Logs -> Collect files through Collect Installation Logs. To download the audit logs, using the Cisco Unified Real-Time Monitoring Tool (RTMT) refer to [4] Chapter 8, Traces and Logs -> Collect audit logs through Download Audit Logs. Logging Protection If an authorized administrator wants to backup the logs to a syslog server using the Cisco Unified Real-Time Monitoring Tool (RTMT), then protection must be provided for the syslog server communications. The secure HTTPS/TLS communications protects the audit records while being archived to the storage area/syslog server. Refer to [4] Getting Started for the setup and installation instructions. In the evaluated configuration, the HTTPS connection is using the configured TLSv1.2 that is using TLS_RSA_WITH_AES_128_CBC_SHA ciphersuites. Endpoint Devices and User Association The TOE supports analog telephone adapter that acts as an interface between analog telephones and IP-based telephony networks, Cisco IP Phones and third party SIP endpoints. To configure the profiles and templates that define the services, features, and directory numbers that associate with a particular device refer to [5] Endpoint Devices Overview. o Device Profiles o A device profile defines the services, features, and directory numbers that associate with a particular device. You can configure a device profile and then you can assign the user device profile to a user, so that when the user logs in to a device, those features and services are available on that device. o SIP Profiles for End Points o A SIP profile comprises the set of SIP attributes that are associated with SIP endpoints. SIP profiles include information such as name, description, timing, retry, call pickup URI, and so on. The profiles contain some standard entries that cannot be deleted or changed. o Device Profiles and Templates o Cisco Unified Communications Manager also supports a default device profile. Cisco Unified Communications Manager uses the default device profile whenever a user logs on to a phone model for which no user device profile exists. To associate users to endpoints, first you must configure end users and application users. The end user can control devices that they are associated with, whereas applications that are identified as users can control devices, such as phones and CTI ports. Refer to [5] Associate Users with Endpoints. Page 25 of 35

26 Network Protocols and Cryptographic Settings Remote Administration Protocols The Authorized Administrates manages the TOE by connecting via a web browser. The remote administration sessions are protected by HTTPS/TLS. The evaluated configuration requires that when connecting to the TOE over HTTPS/TLS for administrative management, TLS1.2 is used with the following ciphersuites, TLS_RSA_WITH_AES_128_CBC_SHA and optionally any of the following ciphersuites: TLS_RSA_WITH_AES_256_CBC_SHA TLS_DHE_RSA_WITH_AES_128_CBC_SHA After the initial configuration, use the following procedures to into the server and log in to Cisco Unified Communications Manager Administration. Step 1 Start your preferred operating system browser. Step 2 In the address bar of the web browser, enter the following case-sensitive URL: CM-server-name>:{8443}/ccmadmin/showHome.do where: <Unified CM-server-name> equals the name or IP address of the server Note: You can optionally specify a port number. Step 3 A Security Alert dialog box displays. Click the appropriate button. Step 4 At the main Cisco Unified Communications Manager Administration window, enter the username and password that you specified during Cisco Unified Communications Manager installation and click Login. Note: For security purposes, Cisco Unified Communications Manager Administration logs you out after 30 minutes of inactivity, and you must log back in. If the HTTPS/TLS connection fails for an unknown reason, you can attempt to re-establish the connection and/or you will want to check the alert and trace logs for a possible cause. You may also need to use the Cisco Unified Serviceability application to start or restart services on the Cisco Unified Communications Manager nodes. Cisco Unified Serviceability is a web-based troubleshooting tool. Refer to [5] Getting Started. SIP Connections and Protocols The Assured Services SIP (AS-SIP) endpoints are SIP endpoints compliant with MLPP, DSCP, TLS/SRTP, and IPv6 requirements. AS-SIP provides for multiple endpoint interfaces on the TOE. The Third-Party AS-SIP Endpoint device type allows a third-party AS-SIP-compliant generic endpoint to be configured and used with CUCM [2]. In the evaluated configuration, the SIP connections are secured with TLS. For the SIP connections, TLS v1.2 is supported with the following ciphersuites: TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH _AES_256_GCM_SHA384, Page 26 of 35

Troubleshooting. System History Log. System History Log Overview CHAPTER

Troubleshooting. System History Log. System History Log Overview CHAPTER CHAPTER 10 This section provides you will tools to help you to troubleshoot the Cisco Intercompany Media Engine server. For more information on troubleshooting the Cisco Intercompany Media Engine feature,

More information

Administering Cisco ISE

Administering Cisco ISE CHAPTER 8 This chapter describes the administrative activities for the Cisco Identity Services Engine (ISE) and how to perform them. The following topics are covered: Logging In, page 8-1 System Time and

More information

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise

More information

Introducing Cisco Voice and Unified Communications Administration Volume 1

Introducing Cisco Voice and Unified Communications Administration Volume 1 Introducing Cisco Voice and Unified Communications Administration Volume 1 Course Introduction Overview Learner Skills and Knowledge Course Goal and Course Flow Additional Cisco Glossary of Terms Your

More information

Tool for Automated Provisioning System (TAPS) Version 1.2 (1027)

Tool for Automated Provisioning System (TAPS) Version 1.2 (1027) Tool for Automated Provisioning System (TAPS) Version 1.2 (1027) 2015 VoIP Integration Rev. July 24, 2015 Table of Contents Product Overview... 3 Application Requirements... 3 Cisco Unified Communications

More information

Cisco Jabber for Windows. Common Criteria Configuration Guide. Version 1.0 EDCS - 1502604. 11 November 2015

Cisco Jabber for Windows. Common Criteria Configuration Guide. Version 1.0 EDCS - 1502604. 11 November 2015 Cisco Jabber for Windows Common Criteria Configuration Guide Version 1.0 EDCS - 1502604 11 November 2015 2015, Cisco Systems, Inc. All rights reserved. This document can be reproduced in full without any

More information

Cisco Email Security Appliance (ESA), with Software Version AsyncOS 9.1

Cisco Email Security Appliance (ESA), with Software Version AsyncOS 9.1 Cisco Email Security Appliance (ESA), with Software Version AsyncOS 9.1 CC Configuration Guide Version 1.4 September 1, 2015 Table of Contents 1 Introduction... 7 1.1 Audience... 7 1.2 Purpose... 7 1.3

More information

Deployment Guide for Maximum Security Environments Polycom HDX Systems, Version 3.0.5

Deployment Guide for Maximum Security Environments Polycom HDX Systems, Version 3.0.5 Polycom HDX Systems, Version 3.0.5 A warning about operating in a maximum security environment The maximum security profile is designed to lock down communications to the most stringent requirements of

More information

Application Note: Cisco Integration with Onsight Connect

Application Note: Cisco Integration with Onsight Connect Application Note: Cisco Integration with Onsight Connect Table of Contents Application Note:... 1 Cisco Integration with Onsight Connect... 3 Direct Onsight Device to Cisco Endpoint Calls... 3 Cisco Unified

More information

NATIONAL SECURITY AGENCY Ft. George G. Meade, MD

NATIONAL SECURITY AGENCY Ft. George G. Meade, MD NATIONAL SECURITY AGENCY Ft. George G. Meade, MD Serial: I732-010R-2008 30 April 2008 Network Infrastructure Division Systems and Network Analysis Center Activating Authentication and Encryption for Cisco

More information

Installing and Configuring vcloud Connector

Installing and Configuring vcloud Connector Installing and Configuring vcloud Connector vcloud Connector 2.7.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new

More information

640-461: Introducing Cisco Voice and Unified Communications Administration (ICOMM) v8.0 Course Introduction

640-461: Introducing Cisco Voice and Unified Communications Administration (ICOMM) v8.0 Course Introduction 640-461: Introducing Cisco Voice and Unified Communications Administration (ICOMM) v8.0 Course Introduction Course Introduction Module 01 - Overview of Cisco Unified Communications Solutions Understanding

More information

Installation / Configuration Manual. TLS and srtp

Installation / Configuration Manual. TLS and srtp Installation / Configuration Manual TLS and srtp Version 3.4.1 of December 16 th 2010 Subject to change without notice NovaTec Kommunikationstechnik GmbH Titel des Dokumentes 1/55 Table of contents Changes...

More information

Installation and configuration of Real-Time Monitoring Tool (RTMT)

Installation and configuration of Real-Time Monitoring Tool (RTMT) Installation and configuration of Real-Time Monitoring Tool (RTMT) How to install and upgrade RTMT, page 1 Services, servlets, and service parameters on server, page 5 Navigation of RTMT, page 6 Nonconfigurable

More information

Installing, Uninstalling, and Upgrading Service Monitor

Installing, Uninstalling, and Upgrading Service Monitor CHAPTER 2 Installing, Uninstalling, and Upgrading Service Monitor This section contains the following topics: Preparing to Install Service Monitor, page 2-1 Installing Cisco Unified Service Monitor, page

More information

Configuring SSL VPN on the Cisco ISA500 Security Appliance

Configuring SSL VPN on the Cisco ISA500 Security Appliance Application Note Configuring SSL VPN on the Cisco ISA500 Security Appliance This application note describes how to configure SSL VPN on the Cisco ISA500 security appliance. This document includes these

More information

Only LDAP-synchronized users can access SAML SSO-enabled web applications. Local end users and applications users cannot access them.

Only LDAP-synchronized users can access SAML SSO-enabled web applications. Local end users and applications users cannot access them. This chapter provides information about the Security Assertion Markup Language (SAML) Single Sign-On feature, which allows administrative users to access certain Cisco Unified Communications Manager and

More information

Configuration Guide. BlackBerry Enterprise Service 12. Version 12.0

Configuration Guide. BlackBerry Enterprise Service 12. Version 12.0 Configuration Guide BlackBerry Enterprise Service 12 Version 12.0 Published: 2014-12-19 SWD-20141219132902639 Contents Introduction... 7 About this guide...7 What is BES12?...7 Key features of BES12...

More information

RealPresence Platform Director

RealPresence Platform Director RealPresence CloudAXIS Suite Administrators Guide Software 1.3.1 GETTING STARTED GUIDE Software 2.0 June 2015 3725-66012-001B RealPresence Platform Director Polycom, Inc. 1 RealPresence Platform Director

More information

Australasian Information Security Evaluation Program

Australasian Information Security Evaluation Program Australasian Information Security Evaluation Program Juniper Networks, Inc. JUNOS 12.1 X46 D20.6 for SRX-Series Platforms Certification Report 2015/90 3 July 2015 Version 1.0 Commonwealth of Australia

More information

Security certificate management

Security certificate management The operating system security options enable you to manage security certificates in these two ways: Certificate Management Manages certificates, Certificate Trust Lists (CTL), and Certificate Signing Requests

More information

Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0

Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0 Security Guide BlackBerry Enterprise Service 12 for ios, Android, and Windows Phone Version 12.0 Published: 2015-02-06 SWD-20150206130210406 Contents About this guide... 6 What is BES12?... 7 Key features

More information

Configuration Guide BES12. Version 12.3

Configuration Guide BES12. Version 12.3 Configuration Guide BES12 Version 12.3 Published: 2016-01-19 SWD-20160119132230232 Contents About this guide... 7 Getting started... 8 Configuring BES12 for the first time...8 Configuration tasks for managing

More information

The SSL device also supports the 64-bit Internet Explorer with new ActiveX loaders for Assessment, Abolishment, and the Access Client.

The SSL device also supports the 64-bit Internet Explorer with new ActiveX loaders for Assessment, Abolishment, and the Access Client. WatchGuard SSL v3.2 Release Notes Supported Devices SSL 100 and 560 WatchGuard SSL OS Build 355419 Revision Date January 28, 2013 Introduction WatchGuard is pleased to announce the release of WatchGuard

More information

Kerio Operator. Getting Started Guide

Kerio Operator. Getting Started Guide Kerio Operator Getting Started Guide 2011 Kerio Technologies. All rights reserved. 1 About Kerio Operator Kerio Operator is a PBX software for small and medium business customers. Kerio Operator is based

More information

BlackBerry Enterprise Service 10. Version: 10.2. Configuration Guide

BlackBerry Enterprise Service 10. Version: 10.2. Configuration Guide BlackBerry Enterprise Service 10 Version: 10.2 Configuration Guide Published: 2015-02-27 SWD-20150227164548686 Contents 1 Introduction...7 About this guide...8 What is BlackBerry Enterprise Service 10?...9

More information

End User Configuration

End User Configuration CHAPTER114 The window in Cisco Unified Communications Manager Administration allows the administrator to add, search, display, and maintain information about Cisco Unified Communications Manager end users.

More information

Administrator s Guide for the Polycom Video Control Application (VCA)

Administrator s Guide for the Polycom Video Control Application (VCA) Administrator s Guide for the Polycom Video Control Application (VCA) Version 1.1 November 2007 Edition 3725-26448-004/A Trademark Information Polycom and the Polycom logo design are registered trademarks

More information

Installing and Configuring vcenter Support Assistant

Installing and Configuring vcenter Support Assistant Installing and Configuring vcenter Support Assistant vcenter Support Assistant 5.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced

More information

How to Configure the Cisco UC500 for use with Integra Telecom SIP Solutions

How to Configure the Cisco UC500 for use with Integra Telecom SIP Solutions How to Configure the Cisco UC500 for use with Integra Telecom SIP Solutions Overview: This document provides a reference for configuration of the Cisco UC500 IP PBX to connect to Integra Telecom SIP Trunks.

More information

F-Secure Messaging Security Gateway. Deployment Guide

F-Secure Messaging Security Gateway. Deployment Guide F-Secure Messaging Security Gateway Deployment Guide TOC F-Secure Messaging Security Gateway Contents Chapter 1: Deploying F-Secure Messaging Security Gateway...3 1.1 The typical product deployment model...4

More information

IM and Presence Service Network Setup

IM and Presence Service Network Setup Configuration changes and service restart notifications, page 1 DNS Domain Configuration, page 2 IM and Presence Service Default Domain Configuration, page 6 IM Address Configuration, page 7 Domain Management

More information

Configuration Guide BES12. Version 12.1

Configuration Guide BES12. Version 12.1 Configuration Guide BES12 Version 12.1 Published: 2015-04-22 SWD-20150422113638568 Contents Introduction... 7 About this guide...7 What is BES12?...7 Key features of BES12... 8 Product documentation...

More information

SonicWALL PCI 1.1 Implementation Guide

SonicWALL PCI 1.1 Implementation Guide Compliance SonicWALL PCI 1.1 Implementation Guide A PCI Implementation Guide for SonicWALL SonicOS Standard In conjunction with ControlCase, LLC (PCI Council Approved Auditor) SonicWall SonicOS Standard

More information

VMware vcenter Log Insight Security Guide

VMware vcenter Log Insight Security Guide VMware vcenter Log Insight Security Guide vcenter Log Insight 2.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new

More information

How To Set Up A Cisco Expressway Trunk On A Cnet Cnet Trunk On An Unidenm (Cisco Vcnet) Vcntl On A Uniden Mt.Net (Cnet Trunk) On A Multi

How To Set Up A Cisco Expressway Trunk On A Cnet Cnet Trunk On An Unidenm (Cisco Vcnet) Vcntl On A Uniden Mt.Net (Cnet Trunk) On A Multi Cisco Unified Communications Manager with Cisco Expressway (SIP Trunk) Deployment Guide Cisco Expressway X8.2 Unified CM 8.6.x, 9.x January 2015 Contents Introduction 4 Deployment scenario 4 Configuring

More information

Gigabyte Content Management System Console User s Guide. Version: 0.1

Gigabyte Content Management System Console User s Guide. Version: 0.1 Gigabyte Content Management System Console User s Guide Version: 0.1 Table of Contents Using Your Gigabyte Content Management System Console... 2 Gigabyte Content Management System Key Features and Functions...

More information

NMS300 Network Management System

NMS300 Network Management System NMS300 Network Management System User Manual June 2013 202-11289-01 350 East Plumeria Drive San Jose, CA 95134 USA Support Thank you for purchasing this NETGEAR product. After installing your device, locate

More information

NETASQ MIGRATING FROM V8 TO V9

NETASQ MIGRATING FROM V8 TO V9 UTM Firewall version 9 NETASQ MIGRATING FROM V8 TO V9 Document version: 1.1 Reference: naentno_migration-v8-to-v9 INTRODUCTION 3 Upgrading on a production site... 3 Compatibility... 3 Requirements... 4

More information

VMware vcenter Log Insight Getting Started Guide

VMware vcenter Log Insight Getting Started Guide VMware vcenter Log Insight Getting Started Guide vcenter Log Insight 1.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by

More information

Installation and Configuration Manual

Installation and Configuration Manual Beacon Office Installation and Configuration Manual Version - 2.5(1) Radianta Inc. September 2008 Radianta, Inc. Beacon Office Page 2 Table of Contents Introduction... 4 What is Beacon Office... 4 How

More information

SyncThru TM Web Admin Service Administrator Manual

SyncThru TM Web Admin Service Administrator Manual SyncThru TM Web Admin Service Administrator Manual 2007 Samsung Electronics Co., Ltd. All rights reserved. This administrator's guide is provided for information purposes only. All information included

More information

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream User Manual Onsight Management Suite Version 5.1 Another Innovation by Librestream Doc #: 400075-06 May 2012 Information in this document is subject to change without notice. Reproduction in any manner

More information

GlobalSCAPE DMZ Gateway, v1. User Guide

GlobalSCAPE DMZ Gateway, v1. User Guide GlobalSCAPE DMZ Gateway, v1 User Guide GlobalSCAPE, Inc. (GSB) Address: 4500 Lockhill-Selma Road, Suite 150 San Antonio, TX (USA) 78249 Sales: (210) 308-8267 Sales (Toll Free): (800) 290-5054 Technical

More information

Gigabyte Management Console User s Guide (For ASPEED AST 2400 Chipset)

Gigabyte Management Console User s Guide (For ASPEED AST 2400 Chipset) Gigabyte Management Console User s Guide (For ASPEED AST 2400 Chipset) Version: 1.4 Table of Contents Using Your Gigabyte Management Console... 3 Gigabyte Management Console Key Features and Functions...

More information

USER GUIDE WEB-BASED SYSTEM CONTROL APPLICATION. www.pesa.com August 2014 Phone: 256.726.9200. Publication: 81-9059-0703-0, Rev. C

USER GUIDE WEB-BASED SYSTEM CONTROL APPLICATION. www.pesa.com August 2014 Phone: 256.726.9200. Publication: 81-9059-0703-0, Rev. C USER GUIDE WEB-BASED SYSTEM CONTROL APPLICATION Publication: 81-9059-0703-0, Rev. C www.pesa.com Phone: 256.726.9200 Thank You for Choosing PESA!! We appreciate your confidence in our products. PESA produces

More information

Single Sign On. Configuration Checklist for Single Sign On CHAPTER

Single Sign On. Configuration Checklist for Single Sign On CHAPTER CHAPTER 39 The single sign on feature allows end users to log into a Windows client machine on a Windows domain, then use certain Cisco Unified Communications Manager applications without signing on again.

More information

Architecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference

Architecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference Architecture and Data Flow Overview BlackBerry Enterprise Service 10 721-08877-123 Version: Quick Reference Published: 2013-11-28 SWD-20131128130321045 Contents Key components of BlackBerry Enterprise

More information

LifeSize Control Installation Guide

LifeSize Control Installation Guide LifeSize Control Installation Guide April 2005 Part Number 132-00001-001, Version 1.0 Copyright Notice Copyright 2005 LifeSize Communications. All rights reserved. LifeSize Communications has made every

More information

Copyright 2012 Trend Micro Incorporated. All rights reserved.

Copyright 2012 Trend Micro Incorporated. All rights reserved. Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

Polycom RealPresence Group Series Deployment Guide for Maximum Security Environments

Polycom RealPresence Group Series Deployment Guide for Maximum Security Environments Military Unique Deployment Guide 4.1.0_J January 2014 3725-03137-002/A Polycom RealPresence Group Series Deployment Guide for Maximum Security Environments Trademark Information POLYCOM and the names and

More information

BlackBerry Enterprise Service 10. Universal Device Service Version: 10.2. Administration Guide

BlackBerry Enterprise Service 10. Universal Device Service Version: 10.2. Administration Guide BlackBerry Enterprise Service 10 Universal Service Version: 10.2 Administration Guide Published: 2015-02-24 SWD-20150223125016631 Contents 1 Introduction...9 About this guide...10 What is BlackBerry

More information

Clientless SSL VPN Users

Clientless SSL VPN Users Manage Passwords, page 1 Username and Password Requirements, page 3 Communicate Security Tips, page 3 Configure Remote Systems to Use Clientless SSL VPN Features, page 3 Manage Passwords Optionally, you

More information

Management, Logging and Troubleshooting

Management, Logging and Troubleshooting CHAPTER 15 This chapter describes the following: SNMP Configuration System Logging SNMP Configuration Cisco NAC Guest Server supports management applications monitoring the system over SNMP (Simple Network

More information

Certificate Management. PAN-OS Administrator s Guide. Version 7.0

Certificate Management. PAN-OS Administrator s Guide. Version 7.0 Certificate Management PAN-OS Administrator s Guide Version 7.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com/company/contact-us

More information

Application Note Configuring the Synapse SB67070 SIP Gateway for Broadvox GO! SIP Trunking

Application Note Configuring the Synapse SB67070 SIP Gateway for Broadvox GO! SIP Trunking Configuring the Synapse SB67070 SIP Gateway for Broadvox GO! SIP Trunking 2012 Advanced American Telephones. All Rights Reserved. AT&T and the AT&T logo are trademarks of AT&T Intellectual Property licensed

More information

Chapter 8 Router and Network Management

Chapter 8 Router and Network Management Chapter 8 Router and Network Management This chapter describes how to use the network management features of your ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN. These features can be found by

More information

Ensure that your environment meets the requirements. Provision the OpenAM server in Active Directory, then generate keytab files.

Ensure that your environment meets the requirements. Provision the OpenAM server in Active Directory, then generate keytab files. This chapter provides information about the feature which allows end users to log into a Windows client machine on a Windows domain, then use certain Cisco Unified Communications Manager applications without

More information

Symantec Database Security and Audit 3100 Series Appliance. Getting Started Guide

Symantec Database Security and Audit 3100 Series Appliance. Getting Started Guide Symantec Database Security and Audit 3100 Series Appliance Getting Started Guide Symantec Database Security and Audit 3100 Series Getting Started Guide The software described in this book is furnished

More information

Configuration Guide BES12. Version 12.2

Configuration Guide BES12. Version 12.2 Configuration Guide BES12 Version 12.2 Published: 2015-07-07 SWD-20150630131852557 Contents About this guide... 8 Getting started... 9 Administrator permissions you need to configure BES12... 9 Obtaining

More information

Deploying F5 with Microsoft Active Directory Federation Services

Deploying F5 with Microsoft Active Directory Federation Services F5 Deployment Guide Deploying F5 with Microsoft Active Directory Federation Services This F5 deployment guide provides detailed information on how to deploy Microsoft Active Directory Federation Services

More information

WatchGuard SSL v3.2 Update 1 Release Notes. Introduction. Windows 8 and 64-bit Internet Explorer Support. Supported Devices SSL 100 and 560

WatchGuard SSL v3.2 Update 1 Release Notes. Introduction. Windows 8 and 64-bit Internet Explorer Support. Supported Devices SSL 100 and 560 WatchGuard SSL v3.2 Update 1 Release Notes Supported Devices SSL 100 and 560 WatchGuard SSL OS Build 445469 Revision Date 3 April 2014 Introduction WatchGuard is pleased to announce the release of WatchGuard

More information

Managing Software and Configurations

Managing Software and Configurations 55 CHAPTER This chapter describes how to manage the ASASM software and configurations and includes the following sections: Saving the Running Configuration to a TFTP Server, page 55-1 Managing Files, page

More information

Network-Enabled Devices, AOS v.5.x.x. Content and Purpose of This Guide...1 User Management...2 Types of user accounts2

Network-Enabled Devices, AOS v.5.x.x. Content and Purpose of This Guide...1 User Management...2 Types of user accounts2 Contents Introduction--1 Content and Purpose of This Guide...........................1 User Management.........................................2 Types of user accounts2 Security--3 Security Features.........................................3

More information

User's Guide. Product Version: 2.5.0 Publication Date: 7/25/2011

User's Guide. Product Version: 2.5.0 Publication Date: 7/25/2011 User's Guide Product Version: 2.5.0 Publication Date: 7/25/2011 Copyright 2009-2011, LINOMA SOFTWARE LINOMA SOFTWARE is a division of LINOMA GROUP, Inc. Contents GoAnywhere Services Welcome 6 Getting Started

More information

Using Spectralink IP-DECT Server 400 and 6500 with Cisco Unified Communication Manager, 3 rd party SIP

Using Spectralink IP-DECT Server 400 and 6500 with Cisco Unified Communication Manager, 3 rd party SIP Using Spectralink IP-DECT Server 400 and 6500 with Cisco Unified Communication Manager, 3 rd party SIP Technical Bulletin Page 1 Introduction This document provides introductory information on how to use

More information

RSA Authentication Manager 7.1 Basic Exercises

RSA Authentication Manager 7.1 Basic Exercises RSA Authentication Manager 7.1 Basic Exercises Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com Trademarks RSA and the RSA logo

More information

vcloud Director User's Guide

vcloud Director User's Guide vcloud Director 5.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of

More information

Installing and Using the vnios Trial

Installing and Using the vnios Trial Installing and Using the vnios Trial The vnios Trial is a software package designed for efficient evaluation of the Infoblox vnios appliance platform. Providing the complete suite of DNS, DHCP and IPAM

More information

6.40A AudioCodes Mediant 800 MSBG

6.40A AudioCodes Mediant 800 MSBG AudioCodes Mediant 800 MSBG Page 1 of 66 6.40A AudioCodes Mediant 800 MSBG 1. Important Notes Check the SIP 3 rd Party Validation Website for current validation status. The SIP 3 rd party Validation Website

More information

Simple Network Management Protocol

Simple Network Management Protocol CHAPTER 4 This chapter gives an overview of (SNMP). It contains the following sections: Overview, page 4-1 SNMP Versioning, page 4-2 SNMP and Cisco Unified CM Basics, page 4-3 SNMP Basic Commands, page

More information

Configuration Guide. BES12 Cloud

Configuration Guide. BES12 Cloud Configuration Guide BES12 Cloud Published: 2016-04-08 SWD-20160408113328879 Contents About this guide... 6 Getting started... 7 Configuring BES12 for the first time...7 Administrator permissions you need

More information

Installation Guide for Pulse on Windows Server 2008R2

Installation Guide for Pulse on Windows Server 2008R2 MadCap Software Installation Guide for Pulse on Windows Server 2008R2 Pulse Copyright 2014 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software

More information

VOIP-500 Series Phone CUCM 8.0.3a Integration Guide

VOIP-500 Series Phone CUCM 8.0.3a Integration Guide I. Introduction This provides general instructions for integration of the VOIP-500 Series Phone with a Cisco Call Manager installation. It is recommended to read this instruction set completely before

More information

Sophos Mobile Control Installation guide. Product version: 3.5

Sophos Mobile Control Installation guide. Product version: 3.5 Sophos Mobile Control Installation guide Product version: 3.5 Document date: July 2013 Contents 1 Introduction...3 2 The Sophos Mobile Control server...4 3 Set up Sophos Mobile Control...10 4 External

More information

Roles and User Groups

Roles and User Groups Roles and User Groups This chapter provides information about roles and user groups in which uses roles and user groups to provide varying levels of privilege (access). This technique permits granting

More information

QUICK START GUIDE. Cisco S170 Web Security Appliance. Web Security Appliance

QUICK START GUIDE. Cisco S170 Web Security Appliance. Web Security Appliance 1 0 0 0 1 1 QUICK START GUIDE Web Security Appliance Web Security Appliance Cisco S170 303417 Cisco S170 Web Security Appliance 1 Welcome 2 Before You Begin 3 Document Network Settings 4 Plan the Installation

More information

SAML 2.0 SSO Deployment with Okta

SAML 2.0 SSO Deployment with Okta SAML 2.0 SSO Deployment with Okta Simplify Network Authentication by Using Thunder ADC as an Authentication Proxy DEPLOYMENT GUIDE Table of Contents Overview...3 The A10 Networks SAML 2.0 SSO Deployment

More information

Increased operational efficiency by providing customers the ability to: Use staff resources more efficiently by reducing troubleshooting time.

Increased operational efficiency by providing customers the ability to: Use staff resources more efficiently by reducing troubleshooting time. , page 1 This chapter provides an overview of the Cisco Cisco Unified Communications Manager service and describes how to configure the Cisco Cisco Unified Communications Manager feature. The feature allows

More information

A Guide to New Features in Propalms OneGate 4.0

A Guide to New Features in Propalms OneGate 4.0 A Guide to New Features in Propalms OneGate 4.0 Propalms Ltd. Published April 2013 Overview This document covers the new features, enhancements and changes introduced in Propalms OneGate 4.0 Server (previously

More information

Testing and Restoring the Nasuni Filer in a Disaster Recovery Scenario

Testing and Restoring the Nasuni Filer in a Disaster Recovery Scenario Testing and Restoring the Nasuni Filer in a Disaster Recovery Scenario Version 7.2 November 2015 Last modified: November 3, 2015 2015 Nasuni Corporation All Rights Reserved Document Information Testing

More information

Cisco TelePresence Server 7010 and MSE 8710 in Remotely Managed Mode Printable Online Help (4.1

Cisco TelePresence Server 7010 and MSE 8710 in Remotely Managed Mode Printable Online Help (4.1 Cisco TelePresence Server 7010 and MSE 8710 in Remotely Managed Mode Printable Online Help 4.1(2.29) April 2015 Page 1 of 91 Contents Introduction 4 Logging into the web interface 4 Failing to log into

More information

HP A-IMC Firewall Manager

HP A-IMC Firewall Manager HP A-IMC Firewall Manager Configuration Guide Part number: 5998-2267 Document version: 6PW101-20110805 Legal and notice information Copyright 2011 Hewlett-Packard Development Company, L.P. No part of this

More information

Secure Web Appliance. SSL Intercept

Secure Web Appliance. SSL Intercept Secure Web Appliance SSL Intercept Table of Contents 1. Introduction... 1 1.1. About CYAN Secure Web Appliance... 1 1.2. About SSL Intercept... 1 1.3. About this Manual... 1 1.3.1. Document Conventions...

More information

OnCommand Performance Manager 1.1

OnCommand Performance Manager 1.1 OnCommand Performance Manager 1.1 Installation and Setup Guide For Red Hat Enterprise Linux NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S. Telephone: +1 (408) 822-6000 Fax: +1 (408) 822-4501

More information

Cisco Unified CM Disaster Recovery System

Cisco Unified CM Disaster Recovery System Disaster Recovery System, page 1 Quick-Reference Tables for Backup and Restore s, page 3 Supported Features and Components, page 4 System Requirements, page 5 Log In to Disaster Recovery System, page 7

More information

IBM Security QRadar Version 7.1.0 (MR1) WinCollect User Guide

IBM Security QRadar Version 7.1.0 (MR1) WinCollect User Guide IBM Security QRadar Version 7.1.0 (MR1) WinCollect User Guide Note: Before using this information and the product that it supports, read the information in Notices and Trademarks on page 59. Copyright

More information

Roles and User Groups

Roles and User Groups CHAPTER 4 uses roles and user groups to provide varying levels of privilege (access). This technique permits granting only the required privileges for a selected group of users and limits the configuration

More information

www.novell.com/documentation SSL VPN Server Guide Access Manager 3.1 SP5 January 2013

www.novell.com/documentation SSL VPN Server Guide Access Manager 3.1 SP5 January 2013 www.novell.com/documentation SSL VPN Server Guide Access Manager 3.1 SP5 January 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of this documentation,

More information

How To Configure A Cisco Unified Ip Phone On A Cnet Box On A Microsoft Powerbook 2.5 (Powerbook) On A Mini Ip Phone (Mini Ip) On An Ip Phone With A Mini Cell Phone (Microsoft Power

How To Configure A Cisco Unified Ip Phone On A Cnet Box On A Microsoft Powerbook 2.5 (Powerbook) On A Mini Ip Phone (Mini Ip) On An Ip Phone With A Mini Cell Phone (Microsoft Power CHAPTER 2 Configuring the Cisco Unified IP Phone for MIDlets Revised: January 2012, Contents This chapter describes how to configure and manage the Cisco Unified IP Phone and the Enhanced Phone User Interface

More information

Bluesocket virtual Wireless Local Area Network (vwlan) FAQ

Bluesocket virtual Wireless Local Area Network (vwlan) FAQ Bluesocket virtual Wireless Local Area Network (vwlan) FAQ Updated 11/07/2011 Can I disable https on the login page of the BSC or vwlan and use http instead so I do not get a certificate error? No, https

More information

ReadyNAS Remote. User Manual. June 2013 202-11078-03. 350 East Plumeria Drive San Jose, CA 95134 USA

ReadyNAS Remote. User Manual. June 2013 202-11078-03. 350 East Plumeria Drive San Jose, CA 95134 USA User Manual June 2013 202-11078-03 350 East Plumeria Drive San Jose, CA 95134 USA Support Thank you for selecting this NETGEAR product. After installing your device, locate the serial number on the label

More information

LifeSize ClearSea Administrator Guide

LifeSize ClearSea Administrator Guide LifeSize ClearSea Administrator Guide August 2012 LifeSize ClearSea Administrator Guide 2 LifeSize ClearSea Server LifeSize ClearSea is a client/server solution for desktop and mobile video collaboration.

More information

Configuring the Sonus SBC 2000 with Cisco Unified Call Manager 10.5 for Verizon Deployment

Configuring the Sonus SBC 2000 with Cisco Unified Call Manager 10.5 for Verizon Deployment Configuring the Sonus SBC 2000 with Cisco Unified Call Manager 10.5 for Verizon Deployment Application Notes Rev 1.0 P/N 550-06690 Last Updated: October 26, 2015 Revision History Revision Date Revised

More information

Software Development Kit (SDK)

Software Development Kit (SDK) QUICK START GUIDE UC Software 5.3.0 May 2015 3725-49126-001A Software Development Kit (SDK) Polycom, Inc. 1 Copyright 2015, Polycom, Inc. All rights reserved. No part of this document may be reproduced,

More information

LifeSize Transit Deployment Guide June 2011

LifeSize Transit Deployment Guide June 2011 LifeSize Transit Deployment Guide June 2011 LifeSize Tranist Server LifeSize Transit Client LifeSize Transit Deployment Guide 2 Firewall and NAT Traversal with LifeSize Transit Firewalls and Network Address

More information

Device Certificates on Polycom Phones

Device Certificates on Polycom Phones Feature Profile 37148 Device Certificates are an important element in deploying a solution that ensures the integrity and privacy of communications involving Polycom UC Software devices. Device Certificates

More information

Packet Capture. Document Scope. SonicOS Enhanced Packet Capture

Packet Capture. Document Scope. SonicOS Enhanced Packet Capture Packet Capture Document Scope This solutions document describes how to configure and use the packet capture feature in SonicOS Enhanced. This document contains the following sections: Feature Overview

More information

Setting Up Scan to SMB on TaskALFA series MFP s.

Setting Up Scan to SMB on TaskALFA series MFP s. Setting Up Scan to SMB on TaskALFA series MFP s. There are three steps necessary to set up a new Scan to SMB function button on the TaskALFA series color MFP. 1. A folder must be created on the PC and

More information

Cisco TelePresence Video Communication Server Basic Configuration (Control with Expressway)

Cisco TelePresence Video Communication Server Basic Configuration (Control with Expressway) Cisco TelePresence Video Communication Server Basic Configuration (Control with Expressway) Deployment Guide Cisco VCS X8.1 D14651.08 August 2014 Contents Introduction 4 Example network deployment 5 Network

More information