Cisco Cisco Unified MeetingPlace Audio Server Guida All'Installazione
![Cisco](https://files.manualsbrain.com/attachments/7380d0050044647c30f5c24bbbf5d0c0b6d9bb84/common/fit/150/50/faa183d287233c52228cfea3dbc2a127fe780f60564fcb0955d9c3d1cd23/brand_logo.png)
About Cisco MeetingPlace 2-11
February 27, 2004
Cisco MeetingPlace Audio Server Installation Planning Guide
•
Plan your responses to different types of unauthorized access. In particular,
determine any changes you will make to MeetingPlace security
parameters, other system access (such as changing phone numbers), and
procedural changes you might make in your organization.
determine any changes you will make to MeetingPlace security
parameters, other system access (such as changing phone numbers), and
procedural changes you might make in your organization.
•
Keep the audio server behind a firewall in a protected part of the network.
There is no need to access the audio server directly from outside.
There is no need to access the audio server directly from outside.
•
Make sure the TCP port used by MeetingTime (port 5001) is blocked at
the firewall. Cisco does not recommend allowing Internet access using
MeetingTime.
the firewall. Cisco does not recommend allowing Internet access using
MeetingTime.
•
Consider installing SSH on the audio server and disabling the use of
Telnet. Note that SSH is installed separately from the base software release
to comply with export regulations.
Telnet. Note that SSH is installed separately from the base software release
to comply with export regulations.
•
Consider disabling SNMP queries on the audio server. Note that SNMP
traps, indicating alarm conditions, can still be generated even if queries are
disabled.
traps, indicating alarm conditions, can still be generated even if queries are
disabled.
•
Make sure the technician (“tech”) command line password has been
changed from the factory default.
changed from the factory default.
•
Consider upgrading the various gateway products to use GWSIM 5.0 or
higher, particularly those that are placed outside the protected part of the
network. GWSIM 5.0 uses an encrypted data stream to communicate with
the audio server. It can also communicate with the audio server using a
data stream originating from the audio server, thus requiring fewer holes in
the firewall.
higher, particularly those that are placed outside the protected part of the
network. GWSIM 5.0 uses an encrypted data stream to communicate with
the audio server. It can also communicate with the audio server using a
data stream originating from the audio server, thus requiring fewer holes in
the firewall.