Chapter 4

Maintaining Security Across UC Deployment Types

This chapter covers a variety of topics on how to maintain security across the different Unified Communications deployment models. To start, we cover the different UC deployment models with some associated security considerations surrounding availability and providing redundancy and resiliency for the UC environment. Then we follow up with common methods for securing the communication within the core UC applications. We focus on securing Network Time Protocol (NTP) to ensure the authenticity of the NTP servers the UC applications are synchronizing with. Next, we follow up with securing intracluster signaling between clustered UC application nodes such as Unified CM using IPsec. IPsec ...

Get Practical Cisco Unified Communications Security now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.