CISCO Unity Connection Unified Communications Manager User Guide

June 15, 2024
Cisco

cisco logo

Securing the Connection between Cisco Unity
Connection, Cisco Unified Communications
Manager, and IP Phones

CISCO Unity Connection Unified Communications Manager

• Securing the Connection between Cisco Unity Connection, Cisco Unified Communications Manager, and IP Phones, on page 1
Securing the Connection between Cisco Unity Connection, Cisco Unified Communications Manager, and IP Phones

Introduction

In this chapter, you would find descriptions of potential security issues related to connections between Cisco Unity Connection, Cisco Unified Communications Manager, and IP phones; information on any actions you need to take; recommendations that helps you make decisions; discussion of the ramifications of the decisions you make; and best practices.

Security Issues for Connections between Unity Connection, Cisco Unified Communications Manager, and IP Phones
A potential point of vulnerability for a Cisco Unity Connection system is the connection between Unity Connection voice messaging ports (for an SCCP integration) or port groups (for a SIP integration), Cisco Unified Communications Manager, and the IP phones.

Possible threats include:

  • Man-in-the-middle attacks (when the information flow between Cisco Unified CM and Unity Connection is observed and modified)
  • Network traffic sniffing (when software is used to capture phone conversations and signaling information that flow between Cisco Unified CM, Unity Connection, and IP phones that are managed by Cisco Unified CM)
  • Modification of call signaling between Unity Connection and Cisco Unified CM
  • Modification of the media stream between Unity Connection and the endpoint (for example, an IP phone or a gateway)
  • Identity theft of Unity Connection (when a non-Unity Connection device presents itself to Cisco Unified CM as a Unity Connection server)
  • Identity theft of the Cisco Unified CM server (when a non-Cisco Unified CM server presents itself to Unity Connection as a Cisco Unified CM server)

CiscoUnifiedCommunicationsManagerSecurityFeaturesforUnity Connection Voice Messaging Ports
Cisco Unified CM can secure the connection with Unity Connection against the threats listed in the Security Issues for Connections between Unity Connection, Cisco Unified Communications Manager, and IP Phones.
The Cisco Unified CM security features that Unity Connection can take advantage of are described in Table 1: Cisco Unified CM Security Features Used by Cisco Unity Connection.

Table 1: Cisco Unified CM Security Features Used by Cisco Unity Connection

Security Feature Description
Signaling authentication The process that uses the Transport Layer Security

(TLS) protocol to validate that no tampering has occurred to signaling packets during transmission.
Signaling authentication relies on the creation of the Cisco Certificate Trust List (CTL) file.
This feature protects against:
• Man-in-the-middle attacks that modify the information flow between Cisco Unified CM and Unity Connection.
• Modification of the call signalling.
• Identity theft of the Unity Connection server.
• Identity theft of the Cisco Unified CM server.
Device authentication| The process that validates the identity of the device and ensures that the entity is what it claims to be. This process occurs between Cisco Unified CM and either Unity Connection voice messaging ports (for an SCCP integration) or Unity Connection port groups (for a SIP integration) when each device accepts the certificate of the other device. When the certificates are accepted, a secure connection between the devices is established. Device authentication relies on the creation of the Cisco Certificate Trust List (CTL) file.
This feature protects against:
• Man-in-the-middle attacks that modify the information flow between Cisco Unified CM and Unity Connection.
• Modification of the media stream.
• Identity theft of the Unity Connection server.
• Identity theft of the Cisco Unified CM server.
Signaling encryption| The process that uses cryptographic methods to protect (through encryption) the confidentiality of all SCCP or SIP signaling messages that are sent between Unity Connection and Cisco Unified CM. Signaling encryption ensures that the information that pertains to the parties, DTMF digits that are entered by the parties, call status, media encryption keys, and so on are protected against unintended or unauthorized access.
This feature protects against:
• Man-in-the-middle attacks that observe the information flow between Cisco Unified CM and Unity Connection.
• Network traffic sniffing that observes the signaling information flow between Cisco Unified CM and Unity Connection.
Media encryption| The process whereby the confidentiality of the media occurs through the use of cryptographic procedures.
This process uses Secure Real Time Protocol (SRTP) as defined in IETF RFC 3711, and ensures that only the intended recipient can interpret the media streams between Unity Connection and the endpoint (for example, a phone or gateway). Support includes audio streams only. Media encryption includes creating a Media Player key pair for the devices, delivering the keys to Unity Connection and the endpoint, and securing the delivery of the keys while the keys are in transport. Unity Connection and the endpoint use the keys to encrypt and decrypt the media stream.
This feature protects against:
• Man-in-the-middle attacks that listen to the media stream between Cisco Unified CM and Unity Connection.
• Network traffic sniffing that eavesdrops on phone conversations that flow between Cisco Unified CM, Unity Connection, and IP phones that are managed by Cisco Unified CM.

Authentication and signaling encryption serve as the minimum requirements for media encryption; that is, if the devices do not support signaling encryption and authentication, media encryption cannot occur.
Cisco Unified CM security (authentication and encryption) only protects calls to Unity Connection. Messages recorded on the message store are not protected by the Cisco Unified CM authentication and encryption features but can be protected by the Unity Connection private secure messaging feature. For details on the Unity Connection secure messaging feature, see the Handling Messages Marked Private and Secure.

Self-encrypting drive

Cisco Unity Connection also supports self-encrypting drives (SED). This is also called Full Disk Encryption (FDE). FDE is a cryptographic method that is used to encrypt all the data that is available on the hard drive.
The data include files, operating system and software programs. The hardware available on the disk encrypts all the incoming data and decrypts all the outgoing data. When the drive is locked, an encryption key is created and stored internally. All data that is stored on this drive is encrypted using that key and stored in the encrypted form. The FDE comprises a key ID and a security key.
For more information, see https://www.cisco.com/c/en/us/td/docs/unified_computing/ucs/c/sw/gui/config/guide/2-0 /b_Cisco_UCS_C-series_GUI_Configuration_Guide_201/b_Cisco_UCS_C- series_GUI_Configuration_Guide_201_chapter_010011.html#concept_E8C37FA4A71F4C8F8E1B9B94305AD844.

Security Mode Settings for Cisco Unified Communications Manager and Unity Connection
Cisco Unified Communications Manager and Cisco Unity Connection have the security mode options shown in Table 2: Security Mode Options for voice messaging ports (for SCCP integrations) or port groups (for SIP integrations).

Caution
The Cluster Security Mode setting for Unity Connection voice messaging ports (for SCCP integrations) or port groups (for SIP integrations) must match the security mode setting for the Cisco Unified CM ports.
Otherwise, Cisco Unified CM authentication and encryption fails.

Table 2: Security Mode Options

Setting Effect
Non-secure The integrity and privacy of call-signaling messages are not

ensured because call-signaling messages are sent as clear (unencrypted) text connected to Cisco Unified CM through a non-authenticated port rather than an authenticated TLS port. In addition, the media stream cannot be encrypted.
Authenticated| The integrity of call-signaling messages are ensured because they are connected to Cisco Unified CM through an authenticated TLS port. However, the
privacy of call-signaling messages are not ensured because they are sent as clear (unencrypted) text. In addition, the media stream is not encrypted.
Encrypted| The integrity and privacy of call-signaling messages are ensured because they are connected to Cisco Unified CM through an authenticated TLS port, and the call-signaling messages are encrypted. In addition, the media stream can be encrypted. Both end points must be registered in encrypted mode
for the media stream to be encrypted. However, when one end point is set for non-secure or authenticated mode and the other end point is set for encrypted mode, the media stream are not encrypted. Also, if an intervening device (such as a transcoder or gateway) is not enabled for encryption, the media stream is not encrypted.

Best Practices for Securing the Connection between Unity Connection, Cisco Unified Communications Manager, and IP Phones
If you want to enable authentication and encryption for the voice messaging ports on both Cisco Unity Connection and Cisco Unified Communications Manager, see the Cisco Unified Communications Manager SCCP Integration Guide for Unity Connection Release 12.x, available at
https://www.cisco.com/c/en/us/td/docs/voice_ip_comm/connection/12x/integration/guide/cucm_sccp/b_12xcucintcucmskinny.html

Securing the Connection between Cisco Unity Connection, Cisco Unified Communications Manager, and IP Phones

References

Read User Manual Online (PDF format)

Loading......

Download This Manual (PDF format)

Download this manual  >>

Related Manuals