Cisco Unified Presence, Release 7.x -- About Secure Voicemail Messaging

From DocWiki

Jump to: navigation, search

Main page: Cisco Unified Presence, Release 7.x

Contents

Previous Topic



Secure Voicemail Messaging on Cisco Unity Connection

In Cisco Unity Connection, when a user sends a message, class-of-service settings determine the security level of the message. When a user marks a message as private, Cisco Unity Connection automatically marks the message as secure.


Cisco Unity Connection provides audio for secure voicemail messages through a special IMAP port, port 7993. This port requires Transport Layer Security (TLS). Cisco Unified Personal Communicator uses this port to access, download, and play the secure message.


For information on installing and configuring secure message features on Cisco Unity Connection, see the Cisco Unity Connection documentation.


Related Topics
  • See the Cisco Unity Connection Security Guide at the following URL:
http://www.cisco.com/en/US/products/ps6509/prod_maintenance_guides_list.html


Secure Voicemail Messaging on Cisco Unity

Cisco Unity uses public-key cryptography to send secure messages. Each Cisco Unity server in the network has a public key and a private key. The public key for each server is stored in the Cisco Unity database and is shared through Active Directory with other Cisco Unity servers in the network.


The Cisco Unity server generates new session keys daily. The server uses the session key to encrypt the voice mail, and to control the age of messages. Users cannot play messages that are encrypted with keys that are older than the age policy allows.


Cisco Unity uses Microsoft Exchange to store secure messages. You configure all subscriber mailboxes on these message store servers. Cisco Unified Personal Communicator connects to the message store and performs the following actions:

  1. Uses IMAP to download the message from Exchange.
  2. Determines if the message is encrypted.
  3. If the message is not encrypted, Cisco Unified Personal Communicator plays the message.
  4. If the message is encrypted, the following happens:
    1. Cisco Unified Personal Communicator extracts the encrypted session keys from the .wav file for the message.
    2. Cisco Unified Personal Communicator submits the keys to the Cisco Unity server.
    3. The Cisco Unity server tries to decrypt the session keys. The server uses the private key certificates in the Cisco Unity database.
    4. If the Cisco Unity server decrypts the session key, Cisco Unified Personal Communicator uses the key to decrypt the message, and plays the messages to the user.
    5. If the Cisco Unity server cannot decrypt the session key, Cisco Unified Personal Communicator plays a decoy message to the user.


Related Topics
  • See the Cisco Unity Security Guide with Microsoft Exchange at the following URL:
http://www.cisco.com/en/US/products/sw/voicesw/ps2237/prod_maintenance_guides_list.htm


Secure Voicemail Messaging Configuration

The required configuration is different, depending on what type of secure messaging you want to configure:

Secure Messaging Type Action Menu path

SOAP

Make sure that the web service port and protocol are configured. You configure the web service port and protocol when you specify the voicemail server name and address.

Cisco Unified Presence Administration > Application > Cisco Unified Personal Communicator > Voicemail Server

IMAP

Make sure that the IMAP port and protocol are configured. You configure the IMAP port and protocol when you specify the mailstore server name and address.

Cisco Unified Presence Administration > Application > Cisco Unified Personal Communicator > Mailstore


Related Topics
  • See the Cisco Unity security guide with Microsoft Exchange at the following URL:
http://www.cisco.com/en/US/products/sw/voicesw/ps2237/prod_maintenance_guides_list.html

Rating: 0.0/5 (0 votes cast)

Personal tools