Chapter 16 Implementing Security in CUCM

Cisco Unified Communications implementations and CUCM, like anything on the network, are subject to several threats, including eavesdropping, identity spoofing, and denial of service (DoS) attacks. CUCM can be secured against these threats by enabling authentication and encryption features that are based on the CUCM public key infrastructure (PKI).

This chapter explains how to enable the Cisco PKI and how to implement PKI-enabled cryptographic features.

Chapter Objectives

Upon completing this chapter, you will be able to configure a CUCM cluster for secure operation. You will be able to meet these objectives: ...

Get Authorized Self-Study Guide Implementing Cisco Unified Communications Manager, Part 2 (CIPT2) now with the O’Reilly learning platform.

O’Reilly members experience live online training, plus books, videos, and digital content from nearly 200 publishers.