Cisco Cisco Unified MeetingPlace Audio Server Installation Guide

Page of 217
Cisco MeetingServer 5.1 Installation Planning Guide  
 
25 
 
Cisco Systems 
                                  
March 2003 
For more information about Reserve All Ports meetings, see the Reserve 
All Ports Meetings
 section in Chapter 2 of the MeetingServer System 
Manager’s Guide. 
Issues to Consider Before Installation 
There are some important things to consider when planning for the 
installation and setup of your MeetingPlace system. Your implementation of 
MeetingPlace should support your business policies and be consistent with 
your other business practices. Make these decisions before you begin 
installation so that you do not have to go back later and redo portions of the 
installation and setup. 
Security 
As with your other enterprise-wide resources (such as network, e-mail, and 
voicemail), security is an important issue when installing and configuring 
MeetingPlace. Potential threats are posed by outside parties, ex-employees 
and even current employees. As you plan for the security of your 
MeetingPlace system, be sure to consider its overall ease of use. There are 
several areas of security to consider:
 
 
Unauthorized entrance to legitimate meetings 
 
Scheduling and participation in unauthorized meetings 
 
Outdialing abuse and toll fraud 
 
Unauthorized access to system configuration and parameters via the 
System Manager Profile
 
In addition to the security parameters in the MeetingPlace system itself, 
there are several Best Practices that your organization can adopt that will 
greatly enhance security. Your MeetingPlace support organization will gladly 
discuss MeetingPlace security with you and assist in configuring the system 
and developing Best Practices to ensure a secure conferencing environment.
 
Appendix B lists the MeetingPlace parameters that affect security, arranged 
by the types of threats listed above. 
Summary of Best Practices 
 
Write and implement a policy regarding user and group profiles, 
including the security parameter settings from Appendix B for each user 
and group.