Cisco Cisco Collaboration Server Dynamic Content Adapter
DCA 2.01 Administration and Configuration Guide
About DCA Server Security 141
About DCA Server Security
The DCA includes the following mechanisms to allow you to secure access your DCA
server:
server:
DCA Server Security / Firewall Support
DCA Ports and Firewalls
The server on which you install your DCA is typically deployed in a demilitarized zone
(DMZ) outside your corporate firewall. For security purposes, you may want to close
server ports unused by the DCA.
(DMZ) outside your corporate firewall. For security purposes, you may want to close
server ports unused by the DCA.
If you are deploying the DCA behind a firewall, you must enable access to the ports
used by the DCA. By default, the DCA uses the following ports:
used by the DCA. By default, the DCA uses the following ports:
• HTTP Port: 80/TCP (default)
• HTTPS Port: 443/TCP (default)
In a typical deployment, your DCA and Collaboration servers are located within the
same DMZ. However, if a firewall will stand between the DCA and CCS, you must
also enable the following ports on that firewall for the DCA-CCS connection:
same DMZ. However, if a firewall will stand between the DCA and CCS, you must
also enable the following ports on that firewall for the DCA-CCS connection:
• RMI Registry Port: 1099/TCP
The port the DCA uses to register a connection instance with CCS.
• RMI Connection Port: TCP (no default, defined when you create the DCA-CCS
connection)
The port CCS uses to connect to and communicate with the DCA.
For more information on the DCA-CCS connection, see the DCA Installation and
Integration Guide.
Integration Guide.
DCA-CCS Connection
The DCA-CCS connection establishes a communications link between the DCA and
CCS for the Agent Reporting and Management (ARM) service. This communication:
CCS for the Agent Reporting and Management (ARM) service. This communication: