Chapter 16 Implementing Security in CUCM
Cisco Unified Communications implementations and CUCM, like anything on the network, are subject to several threats, including eavesdropping, identity spoofing, and denial of service (DoS) attacks. CUCM can be secured against these threats by enabling authentication and encryption features that are based on the CUCM public key infrastructure (PKI).
This chapter explains how to enable the Cisco PKI and how to implement PKI-enabled cryptographic features.
Chapter Objectives
Upon completing this chapter, you will be able to configure a CUCM cluster for secure operation. You will be able to meet these objectives: ...
Get Authorized Self-Study Guide Implementing Cisco Unified Communications Manager, Part 2 (CIPT2) now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.