Cisco Unified Presence, Release 7.x -- About Secure Voicemail Messaging
Main page: Cisco Unified Presence, Release 7.x
- Secure Voicemail Messaging on Cisco Unity Connection
- Secure Voicemail Messaging on Cisco Unity
- Secure Voicemail Messaging Configuration
Secure Voicemail Messaging on Cisco Unity Connection
In Cisco Unity Connection, when a user sends a message, class-of-service settings determine the security level of the message. When a user marks a message as private, Cisco Unity Connection automatically marks the message as secure.
Cisco Unity Connection provides audio for secure voicemail messages through a special IMAP port, port 7993. This port requires Transport Layer Security (TLS). Cisco Unified Personal Communicator uses this port to access, download, and play the secure message.
For information on installing and configuring secure message features on Cisco Unity Connection, see the Cisco Unity Connection documentation.
- See the Cisco Unity Connection Security Guide at the following URL:
Secure Voicemail Messaging on Cisco Unity
Cisco Unity uses public-key cryptography to send secure messages. Each Cisco Unity server in the network has a public key and a private key. The public key for each server is stored in the Cisco Unity database and is shared through Active Directory with other Cisco Unity servers in the network.
The Cisco Unity server generates new session keys daily. The server uses the session key to encrypt the voice mail, and to control the age of messages. Users cannot play messages that are encrypted with keys that are older than the age policy allows.
Cisco Unity uses Microsoft Exchange to store secure messages. You configure all subscriber mailboxes on these message store servers. Cisco Unified Personal Communicator connects to the message store and performs the following actions:
- Uses IMAP to download the message from Exchange.
- Determines if the message is encrypted.
- If the message is not encrypted, Cisco Unified Personal Communicator plays the message.
- If the message is encrypted, the following happens:
- Cisco Unified Personal Communicator extracts the encrypted session keys from the .wav file for the message.
- Cisco Unified Personal Communicator submits the keys to the Cisco Unity server.
- The Cisco Unity server tries to decrypt the session keys. The server uses the private key certificates in the Cisco Unity database.
- If the Cisco Unity server decrypts the session key, Cisco Unified Personal Communicator uses the key to decrypt the message, and plays the messages to the user.
- If the Cisco Unity server cannot decrypt the session key, Cisco Unified Personal Communicator plays a decoy message to the user.
- See the Cisco Unity Security Guide with Microsoft Exchange at the following URL:
Secure Voicemail Messaging Configuration
The required configuration is different, depending on what type of secure messaging you want to configure:
|Secure Messaging Type||Action||Menu path|
Make sure that the web service port and protocol are configured. You configure the web service port and protocol when you specify the voicemail server name and address.
Cisco Unified Presence Administration > Application > Cisco Unified Personal Communicator > Voicemail Server
Make sure that the IMAP port and protocol are configured. You configure the IMAP port and protocol when you specify the mailstore server name and address.
Cisco Unified Presence Administration > Application > Cisco Unified Personal Communicator > Mailstore
- See the Cisco Unity security guide with Microsoft Exchange at the following URL: