Security Guide for Cisco Unified Communications Manager, Release 11.0(1) First Published: 2015-06-08
Total Page:16
File Type:pdf, Size:1020Kb
Security Guide for Cisco Unified Communications Manager, Release 11.0(1) First Published: 2015-06-08 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883 THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS. THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY. The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB's public domain version of the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California. NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS" WITH ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE. IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and phone numbers. Any examples, command display output, network topology diagrams, and other figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses or phone numbers in illustrative content is unintentional and coincidental. Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: http:// www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (1110R) © 2016 Cisco Systems, Inc. All rights reserved. CONTENTS Preface Preface xv Purpose xv Audience xvi Organization xvi Related Documentation xviii Conventions xviii Obtain Documentation, Support, and Security Guidelines xix Cisco Product Security Overview xix PART I Security Basics 1 CHAPTER 1 Security Overview 3 Terms and Acronyms 3 System Requirements 7 Features List 8 Security Icons 9 Interactions and Restrictions 10 Interactions 10 Restrictions 11 Authentication and Encryption 12 Barge and Encryption 12 Wideband Codecs and Encryption 13 Media Resources and Encryption 13 Phone Support and Encryption 13 Phone Support and Encrypted Setup Files 14 Security Icons and Encryption 14 Cluster and Device Security Modes 14 Security Guide for Cisco Unified Communications Manager, Release 11.0(1) iii Contents Digest Authentication and Encryption 15 Packet Capturing and Encryption 15 Best Practices 15 Device Resets, Server and Cluster Reboots, and Service Restarts 16 Reset Devices, Reboot Servers and Clusters, and Restart Services 16 Media Encryption with Barge Setup 17 CTL Client, SSL, CAPF, and Security Token Installation 18 TLS and IPSec 18 Certificates 18 Phone Certificate Types 19 Server Certificate Types 20 Support for Certificates From External CAs 21 Authentication, Integrity, and Authorization 22 Image Authentication 22 Device Authentication 22 File Authentication 23 Signaling Authentication 23 Digest Authentication 24 Authorization 26 Encryption 27 Signaling Encryption 27 Media Encryption 27 Configuration File Encryption 29 NMAP Scan Operation 29 Set Up Authentication and Encryption 30 Where to Find More Information 32 CHAPTER 2 Hypertext Transfer Protocol Over Secure Sockets Layer (HTTPS) 35 HTTPS 35 HTTPS for Cisco Unified IP Phone Services 37 Cisco Unified IP Phones Supporting HTTPS 37 Features That Support HTTPS 37 Cisco Unified IP Phone Services Settings 38 Enterprise Parameter Settings for HTTPS Support 40 Save Certificate to Trusted Folder Using Internet Explorer 8 40 Security Guide for Cisco Unified Communications Manager, Release 11.0(1) iv Contents Copy Internet Explorer 8 Certificate to File 41 First-Time Authentication for Firefox with HTTPS 42 Save Certificate to Trusted Folder Using Firefox 3.x 43 Copy Firefox 3.x Certificate to File 43 First-Time Authentication for Safari with HTTPS 44 Save Certificate to Trusted Folder Using Safari 4.x 45 Copy Safari 4.x Certificate to File 46 Where to Find More Information About HTTPS Setup 46 CHAPTER 3 Default Security Setup 47 Default Security Features 47 Trust Verification Service 48 TVS Description 48 Initial Trust List 48 ITL Files 49 ITL File Contents 49 ITL and CTL File Interaction 49 Certificate Management Changes for ITLRecovery Certificate 50 Update ITL File for IP Phones 50 Autoregistration 50 Obtain Cisco Unified IP Phone Support List 51 ECDSA Support for Common Criteria for Certified Solutions 51 Certificate Manager ECDSA Support 51 SIP ECDSA Support 52 CAPF ECDSA Support 52 Entropy 53 HTTPS Support for Configuration Download 53 CTI Manager Support 54 Certificate Regeneration 54 Regenerate CAPF Certificate 54 Regenerate TVS Certificate 55 Regenerate TFTP Certificate 55 Tomcat Certificate Regeneration 55 System Back-Up Procedure After TFTP Certificate Regeneration 56 Security Guide for Cisco Unified Communications Manager, Release 11.0(1) v Contents Refresh Upgrade From Cisco Unified Communications Manager Release 7.x to Release 8.6 Or Later 56 Roll Back Cluster to a Pre-8.0 Release 57 Switch Back to Release 8.6 or Later After Revert 58 Migrate IP Phones Between Clusters with Cisco Unified Communications Manager and ITL Files 59 Bulk Certificate Export 60 Generate Self-Signed Certificate 60 Self-signed Certificate Fields 61 Generate Certificate Signing Request 62 Certificate Signing Request Fields 63 Interactions and Restrictions 64 Perform Bulk Reset of ITL File 64 View the Validity of ITLRecovery Certificate 65 CHAPTER 4 Cisco CTL Client Setup 67 About Cisco CTL Client Setup 68 Addition of Second SAST Role in the CTL File for Recovery 68 Cluster Encryption Configuration Through CLI 69 Return to CTL Client for Cluster Encryption 70 Remove eToken Run Time Environment 3.00 for CTL Client 5.0 Plug-In 70 Cisco CTL Client Setup Tips 71 Set Up Cisco CTL Client 72 Activate Cisco CTL Provider Service 73 Cisco CAPF Service Activation 74 Set Up Ports for TLS Connection 74 Cisco CTL Client Installation 75 Upgrade Cisco CTL Client and Migrate Cisco CTL File 76 Set Up Cisco CTL Client 76 Update CTL File 80 Delete CTL File Entry 82 Update Cisco Unified Communications Manager Security Mode 82 Cisco CTL Client Settings 83 Verify Cisco Unified Communications Manager Security Mode 85 Set Up Smart Card Service to Started or Automatic 86 Security Guide for Cisco Unified Communications Manager, Release 11.0(1) vi Contents Security Token Password (eToken) Modification 86 Delete CTL File on Cisco Unified IP Phone 87 Determine Cisco CTL Client Version 87 Verify or Uninstall Cisco CTL Client 88 CHAPTER 5 Certificate Setup 89 About Certificate Setup 89 Find Certificate 89 Upload Certificate or Certificate Chain 90 Certificate Settings 90 PART II Security for Cisco Unified IP Phone and Cisco Voice-Messaging Ports 93 CHAPTER 6 Phone Security 95 Phone Security 95 Trusted Devices 96 Cisco Unified Communications Manager Administration 96 Device Called Trust Determination Criteria 97 Phone Model Support 97 Preferred Vendor SIP Phone Security Set Up 98 Set Up Preferred Vendor SIP Phone Security Profile Per-Device Certificates 98 Set Up Preferred Vendor SIP Phone Security Profile Shared Certificates 98 View Phone Security Settings 99 Set Up Phone Security 99 Where to Find More Information About Phone Security 100 CHAPTER 7 Phone Security Profile Setup 101 About Phone Security Profile Setup 101 Phone Security Profile Setup Tips 102 Find Phone Security Profile 102 Set Up Phone Security Profile 103 Phone Security Profile Settings 104 Apply Phone Security Profile 110 Synchronize Phone Security Profile with Phones 111 Delete Phone Security Profile 112 Security Guide for Cisco Unified Communications Manager, Release 11.0(1) vii Contents Find Phones with Phone Security Profiles 112 Where to Find More Information About Security Profiles 113 CHAPTER 8 Secure and Nonsecure Indication Tone Setup 115 Secure and Nonsecure Indication Tones 115 Protected Devices 115 Supported Devices 116 Secure and Nonsecure Indication Tones Important Information 116 Secure Tone Setup Requirements 117 CHAPTER 9 Encryption to Analog Endpoint Setup 119 Analog Phone Security Profile 119 Certificate Management for Secure Analog Phones 119 CHAPTER 10 Certificate Authority Proxy Function 121 About Certificate Authority Proxy Function 121 Cisco Unified IP Phone and CAPF Interaction 122 CAPF Interaction with IPv6 Addressing 123 CAPF System Interactions and