O'Reilly logo

Authorized Self-Study Guide Implementing Cisco Unified Communications Manager, Part 2 (CIPT2) by CCSI, CCVP Chris Olsen

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Image

Chapter 16 Implementing Security in CUCM

Cisco Unified Communications implementations and CUCM, like anything on the network, are subject to several threats, including eavesdropping, identity spoofing, and denial of service (DoS) attacks. CUCM can be secured against these threats by enabling authentication and encryption features that are based on the CUCM public key infrastructure (PKI).

This chapter explains how to enable the Cisco PKI and how to implement PKI-enabled cryptographic features.

Chapter Objectives

Upon completing this chapter, you will be able to configure a CUCM cluster for secure operation. You will be able to meet these objectives: ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required