Cisco Cisco Unified Contact Center Management Portal 8.5(2) Dépliant
8-2
Cisco Unified Contact Center Enterprise 7.5 SRND
Chapter 8 Securing Unified CCE
Introduction to Security
Introduction to Security
Achieving Unified CCE system security requires an effective security policy that accurately defines
access, connection requirements, and systems management within your contact center. Once you have a
good security policy, you can use many state-of-the-art Cisco technologies and products to protect your
data center resources from internal and external threats and to ensure data privacy, integrity, and system
availability.
access, connection requirements, and systems management within your contact center. Once you have a
good security policy, you can use many state-of-the-art Cisco technologies and products to protect your
data center resources from internal and external threats and to ensure data privacy, integrity, and system
availability.
An essential security resource is the Unified Communications Security Solution portal, accessible at
This site contains important documents and references that are meant to aid the application architect in
designing a secure and reliable Cisco Unified Communications environment with its endpoints, call
control systems, transport networks, and applications.
designing a secure and reliable Cisco Unified Communications environment with its endpoints, call
control systems, transport networks, and applications.
As one of those applications in the Cisco Unified Communications network, Unified CCE security
considerations at a high level are not very different than those of other applications making up a
Cisco Unified Communications solution. Deployments of Unified CCE vary greatly and often call for
complex network designs that require competence in all areas of Layer 2 and Layer 3 networking as well
as voice, VPN, QoS, Microsoft Windows Active Directory, and so forth. While this chapter provides
some guidance that may touch on these various areas, it is not meant to be an all-inclusive guide for
deploying a secure Unified CCE network.
considerations at a high level are not very different than those of other applications making up a
Cisco Unified Communications solution. Deployments of Unified CCE vary greatly and often call for
complex network designs that require competence in all areas of Layer 2 and Layer 3 networking as well
as voice, VPN, QoS, Microsoft Windows Active Directory, and so forth. While this chapter provides
some guidance that may touch on these various areas, it is not meant to be an all-inclusive guide for
deploying a secure Unified CCE network.
Along with the Unified Communications Security Solution portal, you should use other Cisco solution
reference network design guides (SRNDs) in addition to this document to answer many design and
deployment questions. The SRNDs provide proven best practices for building a network infrastructure
for Cisco Unified Communications. The SRNDs are available at
reference network design guides (SRNDs) in addition to this document to answer many design and
deployment questions. The SRNDs provide proven best practices for building a network infrastructure
for Cisco Unified Communications. The SRNDs are available at
Among the SRNDs at this site are the following relevant documents relating to security and
Cisco Unified Communications, which you should use in order to deploy a Unified CCE network
successfully:
Cisco Unified Communications, which you should use in order to deploy a Unified CCE network
successfully:
•
Cisco Unified Communications SRND Based on Cisco Unified Communications Manager
•
Data Center Networking: Server Farm Security SRNDv2
•
Site-to-Site IPSec VPN SRND
•
Voice and Video Enabled IPSec VPN (V3PN) SRND
Updates and additions to these documents are posted periodically, so frequent visits to the Design Zone
website are recommended.
website are recommended.
This chapter provides limited guidance on the intricacies of designing and deploying a Windows Active
Directory. Additional information is available from Microsoft on designing a new Active Directory
logical structure, deploying Active Directory for the first time, upgrading an existing Windows
environment to Windows Server 2000 or 2003 Active Directory, and restructuring your current
environment to a Windows Active Directory environment. In particular, the Designing and Deploying
Directory and Security Services section of the Microsoft Windows Server 2003 Deployment Kit can assist
you in meeting all of the Active Directory design and deployment goals for your organization. This
development kit and its related documentation are available from Microsoft at
Directory. Additional information is available from Microsoft on designing a new Active Directory
logical structure, deploying Active Directory for the first time, upgrading an existing Windows
environment to Windows Server 2000 or 2003 Active Directory, and restructuring your current
environment to a Windows Active Directory environment. In particular, the Designing and Deploying
Directory and Security Services section of the Microsoft Windows Server 2003 Deployment Kit can assist
you in meeting all of the Active Directory design and deployment goals for your organization. This
development kit and its related documentation are available from Microsoft at