O'Reilly logo

Authorized Self-Study Guide Implementing Cisco Unified Communications Manager, Part 2 (CIPT2) by CCSI, CCVP Chris Olsen

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Image

Chapter 15 Understanding Native CUCM Security Features and CUCM PKI

CUCM supports several security features. Some are natively supported, and others are based on the CUCM public key infrastructure (PKI) discussed in the preceding chapter. PKI does require extra hardware in a CUCM implementation, called Cisco security tokens. The CUCM PKI is standards-based and has some modifications that allow it to be used with Cisco IP Phones. It is important to understand which security features are natively supported, which features rely on the Cisco PKI, and how the CUCM PKI differs from a standard PKI that is used on the Internet. This chapter discusses ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required