Cisco Cisco E-Mail Manager Unity Integration Option Guida All'Installazione
4-9
Remote Silent Monitoring Installation and Administration Guide
Chapter 4 Installation
Security Settings
Security Settings
This section describes host and network level security considerations for the
integration of RSM into a Cisco environment, after RSM is installed.
integration of RSM into a Cisco environment, after RSM is installed.
Host Level Security
Host level RSM security can be hardened and configured using Windows Server
Windows 2003 Firewall and Cisco Security Agent (CSA), as described below.
Windows 2003 Firewall and Cisco Security Agent (CSA), as described below.
Windows Security Hardening
It is highly recommended that the ICM recommended Windows Security
Hardening policies be applied to the RSM server.
Hardening policies be applied to the RSM server.
To do this, copy the ICM security hardening script (located in the
C:\CiscoUtils\SecurityTemplates directory of any PG in the environment) to the
same directory on the RSM server, creating the directory if necessary. The script
can then be invoked from the RSM server.
C:\CiscoUtils\SecurityTemplates directory of any PG in the environment) to the
same directory on the RSM server, creating the directory if necessary. The script
can then be invoked from the RSM server.
For more information, refer to the “Manually Installing Cisco ICM Security
Settings” topic in Chapter 5 of the Security Best Practices Guide for ICM and
IPCC Enterprise & Hosted Editions document, located at
Settings” topic in Chapter 5 of the Security Best Practices Guide for ICM and
IPCC Enterprise & Hosted Editions document, located at
Windows 2003 Firewall
Windows Firewall may be manually enabled and used on the RSM server, if
desired. Exceptions must be created for ports 8080, 29001, and 5060. (Refer to
Table 4-2, Port Numbers Used, for RSM port and protocol usage when creating
exceptions.)
desired. Exceptions must be created for ports 8080, 29001, and 5060. (Refer to
Table 4-2, Port Numbers Used, for RSM port and protocol usage when creating
exceptions.)
If your VLEngine and PhoneSim configuration uses ports other than those listed,
be sure to create firewall exceptions for those ports.
be sure to create firewall exceptions for those ports.