Cisco Cisco IPCC Web Option インストールガイド

ページ / 134
4-9
Remote Silent Monitoring Installation and Administration Guide
Chapter 4      Installation
Security Settings
Security Settings
This section describes host and network level security considerations for the 
integration of RSM into a Cisco environment, after RSM is installed. 
Host Level Security
Host level RSM security can be hardened and configured using Windows Server 
Windows 2003 Firewall and Cisco Security Agent (CSA), as described below. 
Windows Security Hardening
It is highly recommended that the ICM recommended Windows Security 
Hardening policies be applied to the RSM server. 
To do this, copy the ICM security hardening script (located in the 
C:\CiscoUtils\SecurityTemplates directory of any PG in the environment) to the 
same directory on the RSM server, creating the directory if necessary. The script 
can then be invoked from the RSM server. 
For more information, refer to the “Manually Installing Cisco ICM Security 
Settings” topic in Chapter 5 of the Security Best Practices Guide for ICM and 
IPCC Enterprise & Hosted Editions
 document, located at
Windows 2003 Firewall
Windows Firewall may be manually enabled and used on the RSM server, if 
desired. Exceptions must be created for ports 8080, 29001, and 5060. (Refer to 
Table 4-2, Port Numbers Used, for RSM port and protocol usage when creating 
exceptions.)
If your VLEngine and PhoneSim configuration uses ports other than those listed, 
be sure to create firewall exceptions for those ports.