Cisco Jabber for Windows. Common Criteria Configuration Guide. Version 1.0 EDCS November 2015

Size: px
Start display at page:

Download "Cisco Jabber for Windows. Common Criteria Configuration Guide. Version 1.0 EDCS - 1502604. 11 November 2015"

Transcription

1 Cisco Jabber for Windows Common Criteria Configuration Guide Version 1.0 EDCS November , Cisco Systems, Inc. All rights reserved. This document can be reproduced in full without any modifications.

2 Table of Contents 1 Introduction Audience Purpose Document References Supported Hardware and Software Operational Environment Supported non-toe Hardware/ Software/ Firmware Excluded Functionality Secure Acceptance of the TOE Secure Installation and Configuration Installation and Initial Setup of Jabber Enabling FIPS Mode Configuration and Certificates Network Protocols and Cryptographic Settings SIP Connections and Protocols Secure Management SIP Servers Client Credentials and SIP Authentication Product Updates Jabber Features and Calls Contacts Calls Modes of Operation Security Measures for the Operational Environment Related Documentation Documentation Feedback Obtaining Technical Assistance Page 2 of 26

3 List of Tables Table 1: Acronyms... 4 Table 2 Terminology... 6 Table 3 Cisco Documentation... 9 Table 4 Jabber for Windows Requirements Table 5: Operational Environment Components Table 6 Excluded Functionality Table 7 Evaluated Software Images Table 8 Operational Environment Security Measures Page 3 of 26

4 List of Acronyms The following acronyms and abbreviations may be used in this document: Table 1: Acronyms Acronyms / Definition Abbreviations AAA Administration, Authorization, and Accounting ACL Access Control Lists AES Advanced Encryption Standard BRI Basic Rate Interface CC Common Criteria for Information Technology Security Evaluation CEM Common Evaluation Methodology for Information Technology Security CM Configuration Management CSU Channel Service Unit CUCM Cisco Unified Communications Manager DHCP Dynamic Host Configuration Protocol DSU Data Service Unit EAL Evaluation Assurance Level EHWIC Ethernet High-Speed WIC ESP Encapsulating Security Payload GE Gigabit Ethernet port HTTP Hyper-Text Transport Protocol HTTPS Hyper-Text Transport Protocol Secure ICMP Internet Control Message Protocol ISDN Integrated Services Digital Network IT Information Technology NDPP Network Device Protection Profile OS Operating System PBKDF2 Password-Based Key Derivation Function version 2 PoE Power over Ethernet POP3 Post Office Protocol PP Protection Profile SA Security Association SBC Session Border Controllers SDES Security Descriptions for Media Streams SDP Session Description Protocol SFP Small form-factor pluggable port SHS Secure Hash Standard SIP Session Initiation Protocol SSHv2 Secure Shell (version 2) SRTP Security Real-Time Transport Protocol ST Security Target TCP Transport Control Protocol TLS Transport Layer Security TOE Target of Evaluation TSC TSF Scope of Control TSF TOE Security Function TSP TOE Security Policy UCM Unified Communications Manager UDP User datagram protocol VoIP Voice over IP WAN Wide Area Network Page 4 of 26

5 Acronyms / Abbreviations WIC WAN Interface Card Definition Page 5 of 26

6 Terminology Term Authorized Administrator CUCM Security Administrator SIP Server User Table 2 Terminology Definition Any user which has been assigned to a privilege level that is permitted to perform all TSF-related functions. Cisco Unified Communications Manager (CUCM) serves as the software-based callprocessing component of the Cisco Unified Communications family of products. The CUCM extends enterprise telephony features and functions to packet telephony network devices such as IP phones, media processing devices, voice-over-ip (VoIP) gateways, and multimedia applications. Synonymous with Authorized Administrator for the purposes of this evaluation. The SIP Server (the CUCM) interacts with a VoIP client (TOE) and provides registrar and proxy capabilities required for call-session management as well as establishing, processing, and terminating VoIP calls. Any entity (human user or external IT entity) outside the TOE that interacts with the TOE. Page 6 of 26

7 DOCUMENT INTRODUCTION Prepared By: Cisco Systems, Inc. 170 West Tasman Dr. San Jose, CA This document provides supporting evidence for an evaluation of a specific Target of Evaluation (TOE), the Cisco Jabber for Windows. This Operational User Guidance with Preparative Procedures addresses the administration of the TOE software and hardware and describes how to install, configure, and maintain the TOE in the Common Criteria evaluated configuration. Page 7 of 26

8 1 Introduction This Operational User Guidance with Preparative Procedures documents the administration of the Cisco Jabber for Windows, the TOE, as it was certified under Common Criteria. The Cisco Jabber for Windows may be referenced below as the Cisco Jabber for Windows, Jabber, or simply TOE. 1.1 Audience This document is written for administrators configuring the TOE, Cisco Jabber for Windows. This document assumes that you are familiar with Cisco or equivalent call processing and unified communications products. It is also assumed that you have a general understanding and knowledge with the basic concepts and terminologies used in enterprise telephony features and functions to packet telephony network devices such as IP phones, media processing devices, voice-over-ip (VoIP) gateways, and multimedia applications, that you are a trusted individual, and that you are trained to use the operating systems on which you are running in your network. 1.2 Purpose This document is the Operational User Guidance with Preparative Procedures for the Common Criteria evaluation. It was written to highlight the specific TOE configuration and administrator functions and interfaces that are necessary to configure and maintain the TOE in the evaluated configuration. It is recommended that you review the Common Criteria certified Microsoft Windows 8 Security Target 1 for its evaluated configuration requirements and settings as the operating system hosting the TOE. It is also recommended that you review the Common Criteria certified Cisco Unified Communications Manager (CUCM) Security Target 2 for its evaluated configuration requirements and settings as the SIP Sever that performs secure call-control. The evaluated configuration is the configuration of the TOE that satisfies the requirements as defined in the Security Target (ST). This document covers all of the security functional requirements specified in the ST and as summarized in Section 3 of this document. This document does not mandate configuration settings for the features of the TOE that are outside the evaluation scope, which should be set according to your organizational security policies. This document is not meant to detail specific actions performed by the administrator but rather is a road map for identifying the appropriate locations within Cisco documentation to get the specific details for configuring and maintaining Jabber for Windows operations. It is recommended that you read all instructions in this document and any references before performing steps outlined and entering commands. Section 7 Related Documentation of this document that provides information for obtaining assistance Page 8 of 26

9 1.3 Document References This section lists the Cisco Systems documentation that is also the Common Criteria Configuration Item (CI) List. The documents used are shown below in Table 3. Throughout this document, the guides will be referred to by the #, such as [1]. Table 3 Cisco Documentation # Title Link [1] Cisco Jabber 11.0 Planning Guide /CJAB_BK_C04C09E7_00_cisco-jabber-110-planning-guide.html [2] Cisco Jabber 11.0 Deployment and Installation Guide /CJAB_BK_D657A25F_00_deployment-installation-guide-jabber- 110.html [3] Cisco Jabber for Windows 11.0 Release Notes [4] Cisco Jabber for Windows 11.0 User Guide [5] Cisco Jabber FIPS Certificate [6] Cisco Jabber for Windows Common Criteria Guidance, version 0.1 [6] Cisco Jabber for Windows Security Target, version.01 dows/11_0/rn/jabw_bk_c5e7828c_00_cisco-jabberwindows-11-release-notes.html dows/11_0/ug/jabw_bk_cd4ea7a2_00_cisco-jabber-forwindows-110-userguide.html Refer to FIPS certificate 2100; Cisco FIPS Object Module (Software Version: 4.1) Not Applicable Not Applicable 1.4 Supported Hardware and Software Only the hardware and software listed in section 1.5 of the Security Target (ST) is compliant with the Common Criteria evaluation. Using hardware not specified in the ST invalidates the secure configuration. Likewise, using any software version other than the evaluated software listed in the ST will invalidate the secure configuration. The TOE is a software-only solution comprised of the Jabber OS software image Release The TOE is a software solution that is installed on the following Microsoft Window operating systems: Microsoft Windows 8 32 bit and 64 bit (supported in desktop mode only) Page 9 of 26

10 Refer to the Microsoft Windows 8 Security Target 3 for information regarding the evaluated configuration requirements of Microsoft Windows 8 as the hosting operating system for the TOE. The TOE also requires support of Cisco Unified Communications Manager (CUCM), release 11.0 or later as the SIP Server. Cisco CUCM serves as the call-processing component for voice that includes IP telephony, mobility features and calls controls. As such there are configuration settings that are pushed to Jabber for Windows that are required in the evaluated configuration. These settings cannot be changed. Refer to the Common Criteria certified Cisco Unified Communications Manager (CUCM) Security Target 4 for information regarding the evaluated configuration requirements of CUCM. The following table identifies the minimum hardware requirements for Jabber to run on Microsoft Windows 8: Table 4 Jabber for Windows Requirements Requirement Installed RAM Free Physical Memory Free Disk Space CPU Speed and Type 2 GB RAM 128 MB 256 MB Cisco Jabber for Windows Mobile AMD Sempron Processor GHz Intel Core2 CPU T7400 at GHz Intel Atom Jabber can be installed on any support hardware that is also supported by Microsoft Windows 8. The following hardware platforms and components are included in the evaluated configuration of Microsoft Windows 8 Pro and Enterprise Edition, 32 bit and 64 bit. Microsoft Surface Dell Optiplex GX620 Dell XPS 8500 ASUS VivoTab (Windows RT NVidia tablet) Dell XPS10 (Windows RT Qualcomm tablet) Dell Precision M6300 Trusted Platform Module Refer to the Microsoft Windows 8 Security Target 5 for additional information regarding the evaluated configuration and hardware requirements Page 10 of 26

11 The network, on which the TOE resides, is considered part of the environment. 1.5 Operational Environment Supported non-toe Hardware/ Software/ Firmware The TOE supports the following hardware, software, and firmware components in its operational environment. Each component is identified as being required or not based on the claims made in this Security Target. All of the following environment components are supported by the TOE evaluated configurations. Table 5: Operational Environment Components Component Required Usage/Purpose Description for TOE performance Certification Authority No This includes any IT Environment Certification Authority on the TOE network. This can be used to validate certificates. Management Workstation installed with Microsoft Windows 8 Remote SIP Endpoint/Peer in this evaluation it is the Cisco Unified Communications Manager (CUCM)) Yes Yes This includes any IT Environment Management workstation that supports the requirements defined in Section 1.4 Supported Hardware and Software This includes any peer with which the TOE participates in SDES-SRTP communications. SIP peers may be any device or remote VoIP application that supports SDES- SRTP communications. 1.6 Excluded Functionality Excluded Functionality Non-FIPS mode of operation on the router. Table 6 Excluded Functionality Exclusion Rationale This mode of operation includes non-fips allowed operations. These services will be disabled by configuration. The exclusion of this functionality does not affect compliance to the Protection Profile for Voice Over IP (VoIP) Applications, version 1.3. Page 11 of 26

12 2 Secure Acceptance of the TOE In order to ensure the correct TOE is received, the TOE should be examined to ensure that that is has not been tampered with during delivery. Verify that the TOE software was not tampered with during delivery by performing the following actions: Step 1 Before acquiring the TOE, review Cisco Jabber Planning Checklist [1]. The checklist provides deployment scenarios, the supported operating systems, hardware and network requirements. Step 2 To verify the software version [2] Install Client -> Install Cisco Jabber for Windows. The Jabber for Windows version is stamped or indicated on the MSI 6 file. When the binary is downloaded it is verified by the Client Platform as being signed by a trusted source. Step 3 To verify the software version installed, see Table 7 below provides the detail information for the evaluated configuration that must be checked to ensure the software has not been modified in anyway. Table 7 Evaluated Software Images Software Version Image Name Hash Jabber for Windows 11.0 (Install) Jabber for Windows 11.0 (Admin) CiscoJabber-Installffr.11-0.zip CiscoJabber-Adminffr.11-0.zip MD5 Checksum: e2d169d946d830749efd77b88af829df SHA512 Checksum: 49e8a98d53d68d800d4d3110d643dd7a... MD5 Checksum: adfa46b606ec88d161c928c7 SHA512 Checksum: bdd5b3d26ffc9f763f160c4bb255ce13... For any updates delivered through the trusted update mechanism, to verify the software has not been modified, on the download page hoover the cursor over the file information for the details. 6 MSI is an installer package file format used by Windows. Its name comes from the program's original title, Microsoft Installer, which has since changed to Windows Installer. MSI files are used for installation, storage, and removal of programs. Page 12 of 26

13 Page 13 of 26

14 3 Secure Installation and Configuration 3.1 Installation and Initial Setup of Jabber Prior to installing Jabber, refer to the Planning Guide [1]. The planning guide provides an overview of the features available in Jabber for Windows, deployment scenarios such as on premise or the cloud and the requirements for hardware, software, network, and certificates. Cisco Jabber for Windows is installed on the Common Criteria certified Microsoft Windows 8 32 bit and 64 bit (supported in desktop mode only) 7. Refer to the Microsoft Windows 8 Security Target for information regarding the evaluated configuration requirements of Microsoft Windows. Cisco Jabber for Windows also requires support of Cisco Unified Communications Manager (CUCM), release 11.0 or later as the SIP Server. Cisco CUCM serves as the call-processing component for voice that includes IP telephony, mobility features and calls controls. As such there are configuration settings that are pushed to Jabber for Windows that are required in the evaluated configuration. These settings cannot be changed. Refer to the Cisco Unified Communications Manager (CUCM) for information regarding the evaluated configuration requirements of CUCM. In the evaluated configuration, the TOE will be installed in on-premises deployment scenario that is one in which the Administrator set ups, manages, and maintains all services on the corporate network. In addition, the TOE will be deployed in Phone Mode. In Phone mode, the end-user's primary authentication is to the SIP Server, Cisco Unified Communications Manager (CUCM). In this deployment, the Administrator provision users with devices for audio and video capabilities. The Administrator can also provision users with additional services such as voic . Note in the evaluated configuration, video capabilities are not evaluated or tested. Refer to Configuration and Installation Workflows in [2] to proceed with the installation of Jabber on Windows Enabling FIPS Mode Cisco Jabber for Windows is compliant with FIPS In order to run the client in FIPS mode, you must enable FIPS on your Windows operating system. The client detects that the operating system is in FIPS mode and runs in FIPS mode. FIPS mode results in the client managing certificates more strictly. Users in FIPS mode may see certificate errors in the client if a certificate for a service expires and users do not reenter their credentials before they expire. Users also see a FIPS icon in their hub window to indicate the client is running in FIPS mode. Refer to Microsoft Windows 8 Security Target 8 for more information Page 14 of 26

15 3.1.2 Configuration and Certificates Jabber for Windows requires the Authorized Administer has created and configured at least one Cisco Jabber Device for every user that access Cisco Jabber for Windows. This entails the proper files have been installed, mobility has been enabled for each user, SIP profiles have been configured, create Phone Security Profiles for secure phone capabilities and that the Cisco Certificate Authority Proxy Function (CAPF) service parameters value for Certificate Issuer to Endpoint is Cisco Certificate Authority Proxy Function, as this is the only option supported by Cisco Jabber for Windows. Refer to Security Guide for Cisco Unified Communications Manager, Release 11.0(1) 9 This CUCM SIP Server configuration setup generates the authentication string (password) that will be provided to the end user. The end users must specify the authentication string in the client interface to access their devices and securely register with Cisco Unified Communications Manager. When users enter the authentication string in the client interface, the CAPF enrollment process begins. User associations must also be configured where the end user is associated with a device and the device is provisioned to the end user. Refer to [2] Configure Voice and Video Communication - >Configure User Associations. Jabber for Windows as configured by CUCM SIP Server requires authentication using passwords for SIP Register functions. Therefore, Jabber for Windows must be configured to use a username and SIP authentication password for access to SIP (voice) calls. The user password must be at least eight (8) characters. The supported character set includes upper and lower case letters, numeric 0-9 and the following special #, $, %, ^, &, *, (, and ). Once the CUCM has been setup and configured, the user can access their account and set their password. Refer to [2] Configure Voice and Video Communications ->Configure Voice and Video Communications for On-Premises Deployments ->Create and Configure Cisco Jabber Devices ->Provide Users with Authentication Strings. For certificate validation, Cisco Jabber for Windows uses certificate validation to establish secure connections with CUCM SIP Servers. When attempting to establish secure connections, CUCM SIP Servers present Cisco Jabber for Windows with certificates. Certificates are required for each service to which the Jabber clients connect. The following certificates are required for the on premises server configurations to establish secure connection with the TOE: Server CUCM Certificate HTTP (Tomcat) and CallManager certificate (secure SIP call signaling for secure phone) 9 cucm-security-guide-1101.html Page 15 of 26

16 Cisco Jabber for Windows uses Microsoft Windows 8 to verify the certificate information and validation. Both OCSP and CRL s are supported for validation depending on the information supplied in the certificate. Refer to Microsoft Windows 8 Security Target 10 and CUCM SIP Server Security Target 11 for more information. To ensure that certificate validation occurs without users receiving a prompt to accept or decline certificates, deploy certificates to the local certificate store of the endpoint clients; in this case the certificate store is managed by the hosted operating system, Microsoft Windows 8. If a wellknown public CA is used, then the CA certificate may already exist in Microsoft Windows 8 certificate store or keychain. If so, then no need to deploy CA certificates. If the CA certificate is not already on the Microsoft Windows 8 certificate store or keychain, then the CA certificate will need to be deployed. To manually deploy the certificates perform the following steps, Step 1 Make the CA certificate available to the Cisco Jabber for Windows client machine. Step 2 From the Windows machine, open the certificate file. Step 3 Install the certificate and then select Next. Step 4 Select Place all certificates in the following store, then select Browse. Step 5 Select the Trusted Root Certification Authorities store. When you finish the wizard, a message is displayed to verify successful certificate import. After the certificates have been added to the Microsoft Windows 8 certificate store or keychain verify that the certificate is installed in the correct certificate store by opening the Windows Certificate Manager tool, browse to Trusted Root Certification Authorities > Certificates. The CA root certificate is listed in the certificate store. Refer to [2] Set Up Certificate Validation -> Configure Certificates for an On-Premises Deployment. 3.2 Network Protocols and Cryptographic Settings Jabber for Windows provides cryptography in support of SIP connections via Security Real- Time Transport Protocol (SRTP) that has been established using the Session Description Protocol (SDP) and the Security Descriptions for Media Streams (SDES) for SDP. The TOE also protects communications between itself and the CUCM SIP Server by using a Transport Layer Security (TLS)-protected signaling channel. A phone security profile must be setup and configured on the CUCM SIP Server. Once the profile has been configured, then user mobility must be enabled to provision the remote device. This assigns the end user as the owner of the device. Refer to [2] Configure Voice and Video Communications for On-Premises, then Create SIP Profiles, Enable User Mobility, then Create and Configure Cisco Jabber Devices. Note: In the evaluated configuration, it is not recommended to configure a CTI Service since this allows users to control the devices Page 16 of 26

17 3.2.1 SIP Connections and Protocols There is no direct admin or user interaction on the TOE to configure or set the SRTP channel. The CUCM SIP Server administrator configures the required settings appropriately and then each time a call is made the TOE automatically starts SRTP streams are negotiated. There is no user or admin interaction per-srtp-channel. The CUCM SIP Server administrator can also configure the port ranges for the voice and video streams. If network loss on the SRTP sessions occurs, the TOE automatically attempts to recover. If the user remains dissatisfied with the result, they can end the call and redial. The communication is initiated on the TOE by the user dialing a number. The SIP connections between the TOE and the CUCM SIP Server are over TLS. If the CUCM SIP Server has been configured to Authenticated as the value for the Device Security Mode field on the phone security profile, the SIP connection is over TLS using NULL-SHA encryption. If Encrypted is set as the value for the Device Security Mode field on the phone security profile, the SIP connection is over TLS using AES 128/SHA encryption. The mutual TLS ensures that only Client Services Framework (CSF) devices (i.e. the TOE) with the correct certificates can register to CUCM SIP Server. Likewise, CSF devices can register only to CUCM SIP Server instances that provide the correct certificate. In the evaluated configuration, secure phone capabilities are required. This is to ensure that connections to the CUCM SIP Server are secure. The CUCM SIP Server pushes secure configuration settings to the TOE that cannot be changed or modified in the evaluated configuration. Refer to Security Guide for Cisco Unified Communications Manager, Release 11.0(1) 12 In the evaluated configuration when the TOE is configured for secure connections with CUCM SIP Server, the SIP connections are secured with TLS 1.0 (RFC 2246) or TLS 1.2 (RFC 5246) with the following ciphersuites: TLS_RSA_WITH_AES_128_CBC_SHA TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 TLS_ECDHE_RSA_WITH _AES_256_GCM_SHA384 Refer to [2] Set Up Certification Validation. Refer to [2] Configure Voice and Video Communications Also refer to the Security Guide for Cisco Unified Communications Manager, Release 11.0(1) cucm-security-guide-1101.html 13 cucm-security-guide-1101.html Page 17 of 26

18 4 Secure Management 4.1 SIP Servers To connect to CUCM SIP Server services, the TOE requires the following information: Source of authentication that enables users to sign in to the client. Location of services. In addition, during the initial setup of Jabber for Windows, the CUCM SIP Servers that are used for connections need to be identified and configured. Providing this information depends on the deployment type and product mode. In the evaluated configuration, the TOE will be installed in on-premises deployment scenario that is one in which the Administrator set ups, manages, and maintains all services on the corporate network. In addition, the TOE will be deployed in Phone Mode. In Phone mode, the end-user's primary authentication is to the SIP Server, Cisco Unified Communications Manager (CUCM). As described above in Section 3 Secure Installation and Configuration during the initial setup and configuration, the CUCM SIP Server pushes the required configuration settings for establishing secure connections to the prescribed CUCM SIP Server.. When the setup is completed, secure TLS connections between the TOE and the CUCM SIP Server are established. For the secure SIP connections required for calls, the connection is established when the user initiates a call. 4.2 Client Credentials and SIP Authentication Jabber for Windows must be configured for secure phone (SIP calls) capabilities for all devices. Secure phone capabilities provide secure SIP signaling, secure media streams, and encrypted device configuration files. The Jabber client credentials that are used for connections as well as the password requirements for the SIP connections (voice calls) are described in Section Configuration and Certificates in this document. 4.3 Product Updates To check the current version, on the TOE click on the menu button and select Help and then select About Cisco Jabber. Page 18 of 26

19 To check for updates, on the TOE click on the menu button and select Help and then select Check for Updates. When software updates are made available by Cisco, an administrator can obtain, verify the integrity of, and install those updates. The updates can be downloaded from Cisco.com. A digital signature is used to verify software/firmware update files (to ensure they have not been modified from the originals distributed by Cisco) before they are used to actually update the TOE. When there is an update for Jabber for Windows, the process to update is the same as a new installation. See Section 2 Secure Acceptance of the TOE in this document for the method to download and verify an image prior to running it on the TOE. Cisco Jabber for Windows provides an MSI installation package that you can use in the following ways: A Group Policy, may be configured the Authorized Administrator of the Client Platform may to be used as a deployment mechanism to install the TOE on multiple computers in the same domain. This method allows the Authorized Administrator of the Client Page 19 of 26

20 Platform to push updates to the TOE by downloading the binary to specific configuration location. The Authorized Administrator of the Client Platform may also run the MSI file manually on the file system of the TOE and then specify connection properties when the Client Platform is started. This method is normally used for installing a single instance for testing or evaluation purposes. The Authorized Administrator of the Client Platform may also create a Custom Installer. This method is used when the same installation properties are being distributed across the domain. The Jabber for Windows version is stamped or indicated on the MSI file. When the binary is downloaded it is verified by the Client Platform as being signed by a trusted source. Section 3 in this document provides the instructions and methods used for installing and updating the TOE. 4.4 Jabber Features and Calls The following diagram is an example for the Jabber for Windows hub window. 1. Status message 6. Recent calls 2. Menu 7. Voice Messages 3. Search or call bar 8. Meetings 4. Contacts 9. Custom Groups 5. Chat Rooms 10. Phone Controls You can access your options and preferences for to customize how the TOE behaves. Page 20 of 26

21 Procedure: 1. From the hub window, select Menu > File > Options. 2. Select any tab in the Options menu to make your choices. For more details and information related to the TOE features refer to [4]. Note, some options may not be available depending on the deployment options that were configured or covered by this certification Contacts Directory groups are maintained by Authorized Administrator of the Client Platform for your enterprise. When a directory group to your Contacts list is added, then the list of people assigned to that directory group are automatically added to the group in your contacts. You do not have to maintain the list because it synchronizes automatically with the directory for your enterprise, meaning that people are added and removed from the group in your Contacts whenever the administrator adds or removes them from the enterprise directory. You can remove a directory group from your contacts list at any time. You can also add contacts that are external to the organization if the Authorized Administrator of the Client Platform has enabled this feature. Procedure: Step 1 - Select File > New and select the type of contact that you want to add. Step 2 - Enter the address of your contact. For custom contacts without an IM address, enter the contact details that you want to use. Step 3 Select a contact group. Step 4 Select Add Calls Step 1 Access the phone number options for your contact. For example, right-click on a contact in your contact list and choose Call, or from a chat window, click on the phone numbers/address list drop-down list. Step 2 Choose Jabber Call. There are several features that suspend or stop voice media on a call; such as setting the call on hold, transfer, or end call. In addition, entering/leaving a conference can also interrupt voice data briefly. Page 21 of 26

22 When a call is placed on voice mute (silence), the connections is not ended or stopped, simply voice data from the microphone is no longer being sent. Using the Jabber call screen, selecting the Mute icon will mute the voice audio. Selecting the Mute icon again will unmute. You can also place a call on Hold. Using the Jabber call screen, selecting the More icon and then selecting Hold will place the call on hold or resume the call. You can also Transfer a call to another paerson. Using the the Jabber call screen, selecting More icon, then selecting Transfer, then enter the number you wish to transfer the call too, will transfer the call. End the call by selecting the telephone icon. For all these functions, the implementation is via SIP and SDP messaging, and the SDP messaging includes the necessary crypto options for secure connections. Any change of participant results in re-keying (unless they are connected to a conference bridge and each endpoint has a unique set of keys applied only to the call leg between it and the bridge). Page 22 of 26

23 5 Modes of Operation The Jabber has several modes of operation, these modes are as follows: Deployment Mode: Setup and available configuration options Full UC and Cisco Jabber for Everyone (IM Only) The default product mode is one in which the user's primary authentication is to a presence server. At a minimum, users have instant messaging and presence capabilities. Both full UC and Cisco Jabber for Everyone deployments use the default product mode. To deploy full UC, Authorized Administrators enable instant messaging and presence capabilities. Then provision users with devices for audio and video in addition to voic and conferencing capabilities. To deploy Cisco Jabber for everyone, Authorized Administrators enable instant messaging and presence capabilities. Authorized Administrators can optionally provision users with desk phone devices that they can control with the client. Phone Mode (this is the required mode for the evaluated configuration) In phone mode, the user's primary authentication is to Cisco Unified Communications Manager (CUCM) SIP Server. To deploy phone mode, Authorized Administrators provision users with devices for audio and video capabilities. Authorized Administrators can also provision users with additional services such as voic . In phone mode deployments Cisco Unified Communications Manager (CUCM) SIP Server is the authenticator. When the client (the TOE) gets the authenticator, it determines the product mode is phone mode. However, because the client always starts in the default product mode on the initial launch, users must restart the client to enter phone mode after sign in. Operational This is the normal operation of Jabber for Windows. The TOE image and configuration is loaded and the TOE is operating as configured. However, the configuration of the TOE can have a detrimental effect on security; therefore, adherence to the guidelines in this document should be followed. Misconfiguration of the TOE could result in the unprotected access to CUCM SIP Server and non-secure SIP calls. Trouble-shooting - Unable to Access Features When there is an issue with a feature, for example, you cannot access your voice messages, you may have an issue with your connection status. 2015, Cisco Systems, Inc. All rights reserved. This document can be reproduced in full without any modifications.

24 6 Security Measures for the Operational Environment Proper operation of the TOE requires functionality from the environment. It is the responsibility of the authorized administrator of the TOE to ensure that the Operational Environment provides the necessary functions, and adheres to the environment security objectives listed below. The environment security objective identifiers map to the environment security objectives as defined in the Security Target. Environment Security Objective OE.AUTHORIZED_USER Table 8 Operational Environment Security Measures IT Environment Security Objective Definition The user of the TOE is non-hostile and follows all user guidance. OE.OPER_ENV OE.TRUSTED_ADMIN The operational environment will provide a SIP infrastructure to establish a VoIP connection; a PKI to provide certificates; and an execution domain to support correct operation of the TOE. TOE Administrators are trusted to follow and apply all administrator guidance in a trusted manner. Page 24 of 26

25 7 Related Documentation For information on obtaining documentation, submitting a service request, and gathering additional information, see the monthly What's New in Cisco Product Documentation, which also lists all new and revised Cisco technical documentation at: With CCO login: Without CCO login: Subscribe to the What's New in Cisco Product Documentation as a Really Simple Syndication (RSS) feed and set content to be delivered directly to your desktop using a reader application. The RSS feeds are a free service and Cisco currently supports RSS version 2.0. You can access the most current Cisco documentation on the World Wide Web at the following sites: Documentation Feedback If you are reading Cisco product documentation on the World Wide Web, you can submit technical comments electronically. Click Feedback in the toolbar and select Documentation. After you complete the form, click Submit to send it to Cisco. You can your comments to [email protected]. To submit your comments by mail, for your convenience many documents contain a response card behind the front cover. Otherwise, you can mail your comments to the following address: Cisco Systems, Inc., Document Resource Connection 170 West Tasman Drive San Jose, CA We appreciate your comments. 7.2 Obtaining Technical Assistance Cisco provides Cisco.com as a starting point for all technical assistance. Customers and partners can obtain documentation, troubleshooting tips, and sample configurations from online tools. For Cisco.com registered users, additional troubleshooting tools are available from the TAC website. Page 25 of 26

26 Cisco.com is the foundation of a suite of interactive, networked services that provides immediate, open access to Cisco information and resources at anytime, from anywhere in the world. This highly integrated Internet application is a powerful, easy-to-use tool for doing business with Cisco. Cisco.com provides a broad range of features and services to help customers and partners streamline business processes and improve productivity. Through Cisco.com, you can find information about Cisco and our networking solutions, services, and programs. In addition, you can resolve technical issues with online technical support, download and test software packages, and order Cisco learning materials and merchandise. Valuable online skill assessment, training, and certification programs are also available. Customers and partners can self-register on Cisco.com to obtain additional personalized information and services. Registered users can order products, check on the status of an order, access technical support, and view benefits specific to their relationships with Cisco. To access Cisco.com, go to the following website: Page 26 of 26

NATIONAL SECURITY AGENCY Ft. George G. Meade, MD

NATIONAL SECURITY AGENCY Ft. George G. Meade, MD NATIONAL SECURITY AGENCY Ft. George G. Meade, MD Serial: I732-010R-2008 30 April 2008 Network Infrastructure Division Systems and Network Analysis Center Activating Authentication and Encryption for Cisco

More information

UC-One. Epik. UC-One Quick Guide. Quick Guide For Apps. Why we love UC-One

UC-One. Epik. UC-One Quick Guide. Quick Guide For Apps. Why we love UC-One Quick Guide For Apps Epik UC-One UC-One is part of our Epik suite enabling you to access all your communication services, telephony, video, IM and presence from any supported device. Contact Integration

More information

Application Note: Cisco Integration with Onsight Connect

Application Note: Cisco Integration with Onsight Connect Application Note: Cisco Integration with Onsight Connect Table of Contents Application Note:... 1 Cisco Integration with Onsight Connect... 3 Direct Onsight Device to Cisco Endpoint Calls... 3 Cisco Unified

More information

MANUFACTURER RamSoft Incorporated 243 College St, Suite 100 Toronto, ON M5T 1R5 CANADA

MANUFACTURER RamSoft Incorporated 243 College St, Suite 100 Toronto, ON M5T 1R5 CANADA All Information provided in this document and in the accompanying software is subject to change without notice and does not represent a commitment on the part of RamSoft. RamSoft assumes no responsibility

More information

Configuring a Softphone for Windows for Virtual Contact Center

Configuring a Softphone for Windows for Virtual Contact Center Configuring Bria 3 for Virtual Contact Center Configuring a Softphone for Windows for Virtual Contact Center 8x8 issues softphone licenses to Virtual Contact Center customers allowing them to manage all

More information

VMware Horizon FLEX User Guide

VMware Horizon FLEX User Guide Horizon FLEX 1.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this

More information

Frequently Asked Questions: Cisco Jabber 9.x for Android

Frequently Asked Questions: Cisco Jabber 9.x for Android Frequently Asked Questions Frequently Asked Questions: Cisco Jabber 9.x for Android Frequently Asked Questions (FAQs) 2 Setup 2 Basics 4 Connectivity 8 Calls 9 Contacts and Directory Search 14 Voicemail

More information

Freshservice Discovery Probe User Guide

Freshservice Discovery Probe User Guide Freshservice Discovery Probe User Guide 1. What is Freshservice Discovery Probe? 1.1 What details does Probe fetch? 1.2 How does Probe fetch the information? 2. What are the minimum system requirements

More information

Copyright 2012 Trend Micro Incorporated. All rights reserved.

Copyright 2012 Trend Micro Incorporated. All rights reserved. Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

Using Avaya Flare Experience for Windows

Using Avaya Flare Experience for Windows Using Avaya Flare Experience for Windows Release 9.0 Issue 02.01 September 2013 Contents Chapter 1: About Flare Experience... 5 About Flare Experience... 5 Main window... 6 Button descriptions... 10 Chapter

More information

Set Up Certificate Validation

Set Up Certificate Validation About Certificate Validation, page 1 About Certificate Validation Cisco Jabber uses certificate validation to establish secure connections with servers. When attempting to establish secure connections,

More information

USER GUIDE. Ethernet Configuration Guide (Lantronix) P/N: 2900-300321 Rev 6

USER GUIDE. Ethernet Configuration Guide (Lantronix) P/N: 2900-300321 Rev 6 KRAMER ELECTRONICS LTD. USER GUIDE Ethernet Configuration Guide (Lantronix) P/N: 2900-300321 Rev 6 Contents 1 Connecting to the Kramer Device via the Ethernet Port 1 1.1 Connecting the Ethernet Port Directly

More information

Spontania User Setup Guide

Spontania User Setup Guide Spontania User Setup Guide ClearOne 5225 Wiley Post Way Suite 500 Salt Lake City, UT 84116 Telephone 1.800.945.7730 1.801.975.7200 Spontania Support 1.801.974.3612 TechSales 1.800.705.2103 FAX 1.801.977.0087

More information

Configuring the Sonus SBC 2000 with Cisco Unified Call Manager 10.5 for Verizon Deployment

Configuring the Sonus SBC 2000 with Cisco Unified Call Manager 10.5 for Verizon Deployment Configuring the Sonus SBC 2000 with Cisco Unified Call Manager 10.5 for Verizon Deployment Application Notes Rev 1.0 P/N 550-06690 Last Updated: October 26, 2015 Revision History Revision Date Revised

More information

Cisco Jabber for Windows

Cisco Jabber for Windows Get started with Jabber Cisco Jabber for Windows Cisco Jabber is a communication tool that allows you access to presence, instant messaging (IM), voice, video, voice messaging, desktop sharing, and conferencing.

More information

Virtual Appliance Setup Guide

Virtual Appliance Setup Guide The Barracuda SSL VPN Vx Virtual Appliance includes the same powerful technology and simple Web based user interface found on the Barracuda SSL VPN hardware appliance. It is designed for easy deployment

More information

NEFSIS DEDICATED SERVER

NEFSIS DEDICATED SERVER NEFSIS TRAINING SERIES Nefsis Dedicated Server version 5.2.0.XXX (DRAFT Document) Requirements and Implementation Guide (Rev5-113009) REQUIREMENTS AND INSTALLATION OF THE NEFSIS DEDICATED SERVER Nefsis

More information

DESLock+ Basic Setup Guide Version 1.20, rev: June 9th 2014

DESLock+ Basic Setup Guide Version 1.20, rev: June 9th 2014 DESLock+ Basic Setup Guide Version 1.20, rev: June 9th 2014 Contents Overview... 2 System requirements:... 2 Before installing... 3 Download and installation... 3 Configure DESLock+ Enterprise Server...

More information

Cisco Jabber IM v11 Mac Reference Guide

Cisco Jabber IM v11 Mac Reference Guide Cisco Jabber IM v11 Mac Reference Guide ICIT Technology Training Department [email protected] Updated on June 29, 2015 1 TABLE OF CONTENTS 1 Table of Contents... 2 2 About Cisco Jabber... 4 3 Installing

More information

Installing and Configuring vcenter Multi-Hypervisor Manager

Installing and Configuring vcenter Multi-Hypervisor Manager Installing and Configuring vcenter Multi-Hypervisor Manager vcenter Server 5.1 vcenter Multi-Hypervisor Manager 1.1 This document supports the version of each product listed and supports all subsequent

More information

VidyoConferencing Network Administrators Guide

VidyoConferencing Network Administrators Guide VidyoConferencing Network Administrators Guide Windows 8, 7, XP, Vista and Apple Mac OS - updated 30/11/2012 Introduction The Attend Anywhere management platform is a cloud based management, facilitation

More information

TLS and SRTP for Skype Connect. Technical Datasheet

TLS and SRTP for Skype Connect. Technical Datasheet TLS and SRTP for Skype Connect Technical Datasheet Copyright Skype Limited 2011 Introducing TLS and SRTP Protocols help protect enterprise communications Skype Connect now provides Transport Layer Security

More information

Cisco 837 Router and Cisco SOHO 97 Router Cabling and Setup

Cisco 837 Router and Cisco SOHO 97 Router Cabling and Setup English CHAPTER 1 Cisco 837 Router and Cisco SOHO 97 Router Cabling and Setup Cisco One-Year Limited Hardware Warranty Terms Easy Installation: Try These Steps First! (CRWS Users) Overview Parts List Verify

More information

Forcepoint Sidewinder, Virtual Appliance Evaluation for Desktop. Installation Guide 8.x. Revision A

Forcepoint Sidewinder, Virtual Appliance Evaluation for Desktop. Installation Guide 8.x. Revision A Forcepoint Sidewinder, Virtual Appliance Evaluation for Desktop Installation Guide 8.x Revision A Table of contents 1 Overview...3 2 Verify system requirements...4 Virtualization requirements...4 Admin

More information

Cisco Collaboration with Microsoft Interoperability

Cisco Collaboration with Microsoft Interoperability Cisco Collaboration with Microsoft Interoperability Infrastructure Cheatsheet First Published: June 2016 Cisco Expressway X8.8 Cisco Unified Communications Manager 10.x or later Microsoft Lync Server 2010

More information

NF5 VOIP Setup Guide (for Generic)

NF5 VOIP Setup Guide (for Generic) NF5 VOIP Setup Guide (for Generic) Configuring your NF5 for VOIP Service The following steps will take you through the process of setting up your VOIP connection. Step 1: Checking Computer Network Settings:

More information

640-461: Introducing Cisco Voice and Unified Communications Administration (ICOMM) v8.0 Course Introduction

640-461: Introducing Cisco Voice and Unified Communications Administration (ICOMM) v8.0 Course Introduction 640-461: Introducing Cisco Voice and Unified Communications Administration (ICOMM) v8.0 Course Introduction Course Introduction Module 01 - Overview of Cisco Unified Communications Solutions Understanding

More information

Configuring Security Features of Session Recording

Configuring Security Features of Session Recording Configuring Security Features of Session Recording Summary This article provides information about the security features of Citrix Session Recording and outlines the process of configuring Session Recording

More information

Kerio Operator. Getting Started Guide

Kerio Operator. Getting Started Guide Kerio Operator Getting Started Guide 2011 Kerio Technologies. All rights reserved. 1 About Kerio Operator Kerio Operator is a PBX software for small and medium business customers. Kerio Operator is based

More information

Application Notes for Microsoft Office Communicator Clients with Avaya Communication Manager Phones - Issue 1.1

Application Notes for Microsoft Office Communicator Clients with Avaya Communication Manager Phones - Issue 1.1 Avaya Solution & Interoperability Test Lab Application Notes for Microsoft Office Communicator Clients with Avaya Communication Manager Phones - Issue 1.1 Abstract These Application Notes describe the

More information

Introducing Cisco Voice and Unified Communications Administration Volume 1

Introducing Cisco Voice and Unified Communications Administration Volume 1 Introducing Cisco Voice and Unified Communications Administration Volume 1 Course Introduction Overview Learner Skills and Knowledge Course Goal and Course Flow Additional Cisco Glossary of Terms Your

More information

INSTANT CONNECT SERVICE USER GUIDE

INSTANT CONNECT SERVICE USER GUIDE INSTANT CONNECT SERVICE USER GUIDE Contents Introduction... 3 Office Communicator 2007 R2 PC Desktop Client... 4 Manual configuration of Office Communicator... 4 Troubleshooting... 5 Microsoft Office Communicator

More information

How To Set Up Safetica Insight 9 (Safetica) For A Safetrica Management Service (Sms) For An Ipad Or Ipad (Smb) (Sbc) (For A Safetaica) (

How To Set Up Safetica Insight 9 (Safetica) For A Safetrica Management Service (Sms) For An Ipad Or Ipad (Smb) (Sbc) (For A Safetaica) ( SAFETICA INSIGHT INSTALLATION MANUAL SAFETICA INSIGHT INSTALLATION MANUAL for Safetica Insight version 6.1.2 Author: Safetica Technologies s.r.o. Safetica Insight was developed by Safetica Technologies

More information

BigConnect v1.x. Software Guide 009-1525-00

BigConnect v1.x. Software Guide 009-1525-00 BigConnect v1.x Software Guide 009-1525-00 Contents Overview...3 Installation...3 Launch BigConnect...7 Minimize BigConnect...7 Exit BigConnect...7 BigConnect Home Page...8 Call Management...11 Make a

More information

BabyWare Imperial PC Software

BabyWare Imperial PC Software Overview (see page 1) Things You Should Know (see page 1) Getting Started (see page 2) Licenses and Registration (see page 6) Usernames Passwords and Login (see page 7) BabyWare Imperial PC Software Overview

More information

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise

More information

TMS Phone Books Troubleshoot Guide

TMS Phone Books Troubleshoot Guide TMS Phone Books Troubleshoot Guide Document ID: 118705 Contributed by Adam Wamsley and Magnus Ohm, Cisco TAC Engineers. Jan 05, 2015 Contents Introduction Prerequisites Requirements Components Used Related

More information

Configuring Bria 3 Mac for Virtual Contact Center

Configuring Bria 3 Mac for Virtual Contact Center Configuring Bria 3 Mac for Virtual Contact Center Counterpath s Bria 3 is a softphone application that enables you to manage your Virtual Contact Center VOIP calls easily from your desktop replacing or

More information

http://docs.trendmicro.com

http://docs.trendmicro.com Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,

More information

Pearl Echo Installation Checklist

Pearl Echo Installation Checklist Pearl Echo Installation Checklist Use this checklist to enter critical installation and setup information that will be required to install Pearl Echo in your network. For detailed deployment instructions

More information

Server Software Installation Guide

Server Software Installation Guide Server Software Installation Guide This guide provides information on...... The architecture model for GO!Enterprise MDM system setup... Hardware and supporting software requirements for GO!Enterprise

More information

http://docs.trendmicro.com

http://docs.trendmicro.com Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,

More information

An Overview of Cisco IP Communicator

An Overview of Cisco IP Communicator CHAPTER 1 An Overview of Cisco IP Communicator Cisco IP Communicator is a software-based application that allows users to place and receive phone calls using their personal computers. Cisco IP Communicator

More information

User s Guide for Polycom CX7000 Systems

User s Guide for Polycom CX7000 Systems User s Guide for Polycom CX7000 Systems 1.1 August 2012 3725-63878-001/C Trademark Information Polycom, the Polycom Triangles logo, and the names and marks associated with Polycom s products are trademarks

More information

Installing and Configuring vcloud Connector

Installing and Configuring vcloud Connector Installing and Configuring vcloud Connector vcloud Connector 2.0.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new

More information

NSi Mobile Installation Guide. Version 6.2

NSi Mobile Installation Guide. Version 6.2 NSi Mobile Installation Guide Version 6.2 Revision History Version Date 1.0 October 2, 2012 2.0 September 18, 2013 2 CONTENTS TABLE OF CONTENTS PREFACE... 5 Purpose of this Document... 5 Version Compatibility...

More information

How To Install Sedar On A Workstation

How To Install Sedar On A Workstation SEDAR Client Installation Guide Version 1.2 January 27, 2014 10 Contents About This Guide... 2 Assumptions... 3 Date Format Synchronization... 3 Before You Begin the Installation Test of the SEDAR Client...

More information

Quick Start Guide for VMware and Windows 7

Quick Start Guide for VMware and Windows 7 PROPALMS VDI Version 2.1 Quick Start Guide for VMware and Windows 7 Rev. 1.1 Published: JULY-2011 1999-2011 Propalms Ltd. All rights reserved. The information contained in this document represents the

More information

Cloud Services ADM. Agent Deployment Guide

Cloud Services ADM. Agent Deployment Guide Cloud Services ADM Agent Deployment Guide 10/15/2014 CONTENTS System Requirements... 1 Hardware Requirements... 1 Installation... 2 SQL Connection... 4 AD Mgmt Agent... 5 MMC... 7 Service... 8 License

More information

Cisco Jabber for Windows 9.7 Installation and Configuration Guide

Cisco Jabber for Windows 9.7 Installation and Configuration Guide First Published: March 26, 2014 Last Modified: June 23, 2014 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS

More information

Phone security. Phone security. This chapter provides information about phone security.

Phone security. Phone security. This chapter provides information about phone security. This chapter provides information about phone security., page 1 Trusted devices, page 2 Phone model support, page 3 Preferred vendor SIP phone security set up, page 4 View phone security settings, page

More information

PortGo 6.0 for Wndows User Guide

PortGo 6.0 for Wndows User Guide PortGo 6.0 for Wndows User Guide PortSIP Solutions, Inc. [email protected] http:// @May 20, 2010 PortSIP Solutions, Inc. All rights reserved. This User guide for PortGo Softphone 6.0. 1 Table of Contents

More information

To ensure you successfully install Timico VoIP for Business you must follow the steps in sequence:

To ensure you successfully install Timico VoIP for Business you must follow the steps in sequence: To ensure you successfully install Timico VoIP for Business you must follow the steps in sequence: Firewall Settings - you may need to check with your technical department Step 1 Install Hardware Step

More information

Requirements. System Requirements. System Requirements, page 1 Port Requirements, page 4 Supported Codecs, page 5

Requirements. System Requirements. System Requirements, page 1 Port Requirements, page 4 Supported Codecs, page 5 System, page 1 Port, page 4 Supported Codecs, page 5 System Each of the components listed in the following table must meet the requirements. Use of unsupported components can result in a nonfunctional

More information

VMware Horizon FLEX User Guide

VMware Horizon FLEX User Guide Horizon FLEX 1.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this

More information

Installation & Configuration Guide Version 1.0. TekSIP Route Server Version 1.0 - Installation & Configuration Guide

Installation & Configuration Guide Version 1.0. TekSIP Route Server Version 1.0 - Installation & Configuration Guide TekSIP Route Server Installation & Configuration Guide Version 1.0 2011 Yasin KAPLAN - http://www.teksip.com/ 1 Document Revision 1.1 http://www.teksip.com/ TekSIP Route Server is built by Yasin KAPLAN

More information

Cisco CallManager configuration for BLU-103

Cisco CallManager configuration for BLU-103 Cisco CallManager configuration for BLU-103 This document details the steps required to configure a Cisco CallManager VoIP system to work with a BLU-103 VoIP interface. 10653 South River Front Pkwy, Suite

More information

Troubleshooting Jabber Desktop Clients

Troubleshooting Jabber Desktop Clients Troubleshooting Jabber Desktop Clients 2 Index Jabber Overview Jabber Configuration and Deployment Troubleshooting Common Issues 3 Jabber Overview 4 Cisco Desktop Client Evolution Cisco Unified Personal

More information

Cisco Unified Communications Manager. Common Criteria Configuration Guide

Cisco Unified Communications Manager. Common Criteria Configuration Guide Cisco Unified Communications Manager Common Criteria Configuration Guide Version 0.4 EDCS 1502594 20 July 2015 2015, Cisco Systems, Inc. All rights reserved. This document can be reproduced in full without

More information

QUANTIFY INSTALLATION GUIDE

QUANTIFY INSTALLATION GUIDE QUANTIFY INSTALLATION GUIDE Thank you for putting your trust in Avontus! This guide reviews the process of installing Quantify software. For Quantify system requirement information, please refer to the

More information

Table of Contents. Introduction...9. Installation...17. Program Tour...31. The Program Components...10 Main Program Features...11

Table of Contents. Introduction...9. Installation...17. Program Tour...31. The Program Components...10 Main Program Features...11 2011 AdRem Software, Inc. This document is written by AdRem Software and represents the views and opinions of AdRem Software regarding its content, as of the date the document was issued. The information

More information

User guide. Business Email

User guide. Business Email User guide Business Email June 2013 Contents Introduction 3 Logging on to the UC Management Centre User Interface 3 Exchange User Summary 4 Downloading Outlook 5 Outlook Configuration 6 Configuring Outlook

More information

Lync for Mac 2011 Deployment Guide

Lync for Mac 2011 Deployment Guide 2011 Deployment Guide Getting Started Information in this document, including URL and other Internet Web site references, is subject to change without notice. Content in this document represents the current

More information

Cisco 831 Router and Cisco SOHO 91 Router Cabling and Setup Quick Start Guide

Cisco 831 Router and Cisco SOHO 91 Router Cabling and Setup Quick Start Guide English CHAPTER 1 Cisco 831 Router and Cisco SOHO 91 Router Cabling and Setup Quick Start Guide Cisco One-Year Limited Hardware Warranty Terms Easy Installation: Try These Steps First! (CRWS Users) Overview

More information

NF1Adv VOIP Setup Guide (for Pennytel)

NF1Adv VOIP Setup Guide (for Pennytel) NF1Adv VOIP Setup Guide (for Pennytel) Configuring your NF1Adv for VOIP Service The following steps will take you through the process of setting up your VOIP connection. Step 1: Checking Computer Network

More information

Avaya Video Conferencing Manager Deployment Guide

Avaya Video Conferencing Manager Deployment Guide Avaya Video Conferencing Manager Deployment Guide August 2011 Avaya Video Conferencing Manager Deployment Guide 2 Avaya Video Conferencing Manager This guide is for network administrators who use Avaya

More information

NETWRIX EVENT LOG MANAGER

NETWRIX EVENT LOG MANAGER NETWRIX EVENT LOG MANAGER QUICK-START GUIDE FOR THE ENTERPRISE EDITION Product Version: 4.0 July/2012. Legal Notice The information in this publication is furnished for information use only, and does not

More information

LifeSize Control Installation Guide

LifeSize Control Installation Guide LifeSize Control Installation Guide April 2005 Part Number 132-00001-001, Version 1.0 Copyright Notice Copyright 2005 LifeSize Communications. All rights reserved. LifeSize Communications has made every

More information

Application Notes for Avaya Aura Conferencing 7.2 and Radvision SCOPIA Elite MCU Issue 1.0

Application Notes for Avaya Aura Conferencing 7.2 and Radvision SCOPIA Elite MCU Issue 1.0 Avaya Solution & Interoperability Test Lab Application Notes for Avaya Aura Conferencing 7.2 and Radvision SCOPIA Elite MCU Issue 1.0 Abstract These Application Notes describe the configuration of Avaya

More information

How To Configure A Cisco Unified Ip Phone On A Cnet Box On A Microsoft Powerbook 2.5 (Powerbook) On A Mini Ip Phone (Mini Ip) On An Ip Phone With A Mini Cell Phone (Microsoft Power

How To Configure A Cisco Unified Ip Phone On A Cnet Box On A Microsoft Powerbook 2.5 (Powerbook) On A Mini Ip Phone (Mini Ip) On An Ip Phone With A Mini Cell Phone (Microsoft Power CHAPTER 2 Configuring the Cisco Unified IP Phone for MIDlets Revised: January 2012, Contents This chapter describes how to configure and manage the Cisco Unified IP Phone and the Enhanced Phone User Interface

More information

Migrating WebEx Connect Users to Cisco Jabber

Migrating WebEx Connect Users to Cisco Jabber Planning Guide Migrating WebEx Connect Users to Cisco Jabber Information for System Administrators Introduction The Cisco WebEx Messenger service provides an instant messaging / chat based collaboration

More information

Netwrix Auditor for Exchange

Netwrix Auditor for Exchange Netwrix Auditor for Exchange Quick-Start Guide Version: 8.0 4/22/2016 Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment from Netwrix

More information

Central Management System

Central Management System Central Management System Software Installation Guide Ver. 1.5.0.101115.001 ... ii System Introduction... 3 Client/Server Architecture...3 System Requirements... 4 System Setup...4 Multiple Monitor Configuration...5

More information

VPNC Interoperability Profile

VPNC Interoperability Profile VPNC Interoperability Profile Valid for Barracuda NG Firewall 5.0 Revision 1.1 Barracuda Networks Inc. 3175 S. Winchester Blvd Campbell, CA 95008 http://www.barracuda.com Copyright Notice Copyright 2004-2010,

More information

How to set up Outlook Anywhere on your home system

How to set up Outlook Anywhere on your home system How to set up Outlook Anywhere on your home system The Outlook Anywhere feature for Microsoft Exchange Server 2007 allows Microsoft Office Outlook 2007 and Outlook 2003 users to connect to their Outlook

More information

How To Industrial Networking

How To Industrial Networking How To Industrial Networking Prepared by: Matt Crites Product: Date: April 2014 Any RAM or SN 6xxx series router Legacy firmware 3.14/4.14 or lower Subject: This document provides a step by step procedure

More information

Stellar Phoenix Exchange Server Backup

Stellar Phoenix Exchange Server Backup Stellar Phoenix Exchange Server Backup Version 1.0 Installation Guide Introduction This is the first release of Stellar Phoenix Exchange Server Backup tool documentation. The contents will be updated periodically

More information

Avaya one-x Communicator User Reference

Avaya one-x Communicator User Reference Avaya one-x Communicator User Reference Table Of Contents Introduction...1 Logging in to the server...3 Logging out of the server...5 Using your feature buttons...7 Using Avaya one-x Communicator with

More information

Application Note Startup Tool - Getting Started Guide

Application Note Startup Tool - Getting Started Guide Application Note Startup Tool - Getting Started Guide 1 April 2012 Startup Tool Table of Contents 1 INGATE STARTUP TOOL... 1 2 STARTUP TOOL INSTALLATION... 2 3 CONNECTING THE INGATE FIREWALL/SIPARATOR...

More information

AXIS Camera Station Quick Installation Guide

AXIS Camera Station Quick Installation Guide AXIS Camera Station Quick Installation Guide Copyright Axis Communications AB April 2005 Rev. 3.5 Part Number 23997 1 Table of Contents Regulatory Information.................................. 3 AXIS Camera

More information

Cox Managed CPE Services. RADIUS Authentication for AnyConnect VPN Version 1.3 [Draft]

Cox Managed CPE Services. RADIUS Authentication for AnyConnect VPN Version 1.3 [Draft] Cox Managed CPE Services RADIUS Authentication for AnyConnect VPN Version 1.3 [Draft] September, 2015 2015 by Cox Communications. All rights reserved. No part of this document may be reproduced or transmitted

More information

Pro Bundle Evaluator s Guide. 2015 Software Pursuits, Inc.

Pro Bundle Evaluator s Guide. 2015 Software Pursuits, Inc. Pro Bundle Evaluator s Guide 2015 Table of Contents Introduction... 2 System Requirements... 2 Contact Information... 3 About the Communications Agent Add-On... 3 Other SureSync Add-Ons... 4 File Locking

More information

Vidyo Network Configuration Guide Windows XP and Vista

Vidyo Network Configuration Guide Windows XP and Vista Vidyo Network Configuration Guide Windows XP and Vista Introduction Vidyo is a new video conferencing system used in the latest Attend Anywhere professional networking, video collaboration & service delivery

More information

BIGPOND ONLINE STORAGE USER GUIDE Issue 1.1.0-18 August 2005

BIGPOND ONLINE STORAGE USER GUIDE Issue 1.1.0-18 August 2005 BIGPOND ONLINE STORAGE USER GUIDE Issue 1.1.0-18 August 2005 PLEASE NOTE: The contents of this publication, and any associated documentation provided to you, must not be disclosed to any third party without

More information

Comodo LoginPro Software Version 1.5

Comodo LoginPro Software Version 1.5 Comodo LoginPro Software Version 1.5 User Guide Guide Version 1.5.030513 Comodo Security Solutions 1255 Broad Street STE 100 Clifton, NJ 07013 Table of Contents 1.Introduction to Comodo LoginPro... 3 1.1.System

More information

NovaBACKUP xsp Version 15.0 Upgrade Guide

NovaBACKUP xsp Version 15.0 Upgrade Guide NovaBACKUP xsp Version 15.0 Upgrade Guide NovaStor / November 2013 2013 NovaStor, all rights reserved. All trademarks are the property of their respective owners. Features and specifications are subject

More information

NetWrix Password Manager. Quick Start Guide

NetWrix Password Manager. Quick Start Guide NetWrix Password Manager Quick Start Guide Contents Overview... 3 Setup... 3 Deploying the Core Components... 3 System Requirements... 3 Installation... 4 Windows Server 2008 Notes... 4 Upgrade Path...

More information

An Overview of the Cisco Unified Wireless IP Phone 7921G

An Overview of the Cisco Unified Wireless IP Phone 7921G CHAPTER1 An Overview of the Cisco Unified Wireless IP Phone 7921G The Cisco Unified Wireless IP Phone 7921G provides wireless voice communication over an Internet Protocol (IP) network. Like traditional

More information

formerly Help Desk Authority 9.1.3 Upgrade Guide

formerly Help Desk Authority 9.1.3 Upgrade Guide formerly Help Desk Authority 9.1.3 Upgrade Guide 2 Contacting Quest Software Email: Mail: Web site: [email protected] Quest Software, Inc. World Headquarters 5 Polaris Way Aliso Viejo, CA 92656 USA www.quest.com

More information

Version 0.1 June 2010. Xerox WorkCentre 7120 Fax over Internet Protocol (FoIP)

Version 0.1 June 2010. Xerox WorkCentre 7120 Fax over Internet Protocol (FoIP) Version 0.1 June 2010 Xerox WorkCentre 7120 Fax over Internet Protocol (FoIP) Thank you for choosing the Xerox WorkCentre 7120. Table of Contents Introduction.........................................

More information

Application Notes for Configuring Yealink T-22 SIP Phones to interoperate with Avaya IP Office - Issue 1.0

Application Notes for Configuring Yealink T-22 SIP Phones to interoperate with Avaya IP Office - Issue 1.0 Avaya Solution & Interoperability Test Lab Application Notes for Configuring Yealink T-22 SIP Phones to interoperate with Avaya IP Office - Issue 1.0 Abstract These Application Notes describe the configuration

More information

All Rights Reserved. Copyright 2006

All Rights Reserved. Copyright 2006 All Rights Reserved Copyright 2006 The use, disclosure, modification, transfer, or transmittal of this work for any purpose, in any form, or by any means, without the written permission of the copyright

More information

Overview 1. Document Objectives 1. Document Organization 1. Preparation before VIP-280/VIP-320 administration 1

Overview 1. Document Objectives 1. Document Organization 1. Preparation before VIP-280/VIP-320 administration 1 Table of Contents Overview 1 Document Objectives 1 Document Organization 1 Preparation before VIP-280/VIP-320 administration 1 Physical Installation 1 Keypad and button definition on DCT-100 3 Installing

More information

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream User Manual Onsight Management Suite Version 5.1 Another Innovation by Librestream Doc #: 400075-06 May 2012 Information in this document is subject to change without notice. Reproduction in any manner

More information

Polycom RealPresence Access Director System Administrator s Guide

Polycom RealPresence Access Director System Administrator s Guide [Type the document title] 2.0 November 2012 3725-78703-001A Polycom RealPresence Access Director System Administrator s Guide Polycom Document Title 1 Trademark Information POLYCOM and the names and marks

More information

Administrator s Guide for the Polycom Video Control Application (VCA)

Administrator s Guide for the Polycom Video Control Application (VCA) Administrator s Guide for the Polycom Video Control Application (VCA) Version 1.1 November 2007 Edition 3725-26448-004/A Trademark Information Polycom and the Polycom logo design are registered trademarks

More information

Cisco UCS Director Payment Gateway Integration Guide, Release 4.1

Cisco UCS Director Payment Gateway Integration Guide, Release 4.1 First Published: April 16, 2014 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883

More information

FileMaker Server 7. Administrator s Guide. For Windows and Mac OS

FileMaker Server 7. Administrator s Guide. For Windows and Mac OS FileMaker Server 7 Administrator s Guide For Windows and Mac OS 1994-2004, FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker is a trademark

More information

Installation and configuration of Real-Time Monitoring Tool (RTMT)

Installation and configuration of Real-Time Monitoring Tool (RTMT) Installation and configuration of Real-Time Monitoring Tool (RTMT) How to install and upgrade RTMT, page 1 Services, servlets, and service parameters on server, page 5 Navigation of RTMT, page 6 Nonconfigurable

More information

Getting Started. Symantec Client Security. About Symantec Client Security. How to get started

Getting Started. Symantec Client Security. About Symantec Client Security. How to get started Getting Started Symantec Client Security About Security Security provides scalable, cross-platform firewall, intrusion prevention, and antivirus protection for workstations and antivirus protection for

More information