Cisco Cisco Collaboration Server Dynamic Content Adapter

Page of 223
DCA 2.01 Administration and Configuration Guide 
About DCA Server Security   141 
About DCA Server Security 
The DCA includes the following mechanisms to allow you to secure access your DCA 
server: 
DCA Server Security / Firewall Support 
DCA Ports and Firewalls 
The server on which you install your DCA is typically deployed in a demilitarized zone 
(DMZ) outside your corporate firewall. For security purposes, you may want to close 
server ports unused by the DCA.  
If you are deploying the DCA behind a firewall, you must enable access to the ports 
used by the DCA. By default, the DCA uses the following ports: 
•  HTTP Port: 80/TCP (default) 
•  HTTPS Port: 443/TCP (default) 
In a typical deployment, your DCA and Collaboration servers are located within the 
same DMZ. However, if a firewall will stand between the DCA and CCS, you must 
also enable the following ports on that firewall for the DCA-CCS connection: 
•  RMI Registry Port: 1099/TCP 
The port the DCA uses to register a connection instance with CCS.  
•  RMI Connection Port: TCP (no default, defined when you create the DCA-CCS 
connection) 
The port CCS uses to connect to and communicate with the DCA.  
For more information on the DCA-CCS connection, see the DCA Installation and 
Integration Guide
DCA-CCS Connection 
The DCA-CCS connection establishes a communications link between the DCA and 
CCS for the Agent Reporting and Management (ARM) service. This communication: