What equipment is needed for secure voip environment?

I have tried searching it but seems like i can't find any...
I need to setup a secure voip environment for a demostration,with least costing. What equipment do i need?
Can CCME handle or i need to go for callmanager at least, if so which version?
As for voip phone, i just need 7960 with latest firmware?
Regarding those certs and stuff, what do i need? A windows server , a ACS or ?

I haven't secured CME but CCM can be secured out of the box with encryption for the phones. Here is the documentation for this.
http://www.cisco.com/univercd/cc/td/doc/product/voice/c_callmg/4_1/sec_vir/ae/sec413/secugd.pdf
Also Cisco provides a standalone version of their Security Agent for CCM. Here is the link.
http://www.cisco.com/univercd/cc/td/doc/product/voice/c_callmg/4_2/sec_vir/csa/csa_ccmg.htm
Lastly anti-virus protection is offered by 3rd party vendors. Here is a list of supported 3rd parties.
http://www.cisco.com/en/US/products/sw/voicesw/ps556/prod_bulletin0900aecd800f8572.html
Please rate any helpful posts
Thanks
Fred

Similar Messages

  • What Equipment is Needed for CCNP Security Lab

    Hello,
    Im Looking to find out what Devices are needed for a ccnp security home lab. I keep hearing that 2 5510's are a must for labbing. The downside Is the Prices avg $800 each on the low end. I also saw some ppl had an ips in their lab. Im looking to find out what is 100% needed. I alredy have a lab in place used for my ccnp r&s.
    Thanks                  

    I would also say that two ASAs is a must to practice with them. But in my opinion, 2 5505 SecPlus are enough. What are the differences to the 5510? You configure subinterfaces instead of vlan-interfaces. But that's something you know from R/S. And the failover is only stateless, but failover in general also works. Sof if you find these ASAs for less money, take them. IPS is probably the topic where most CCNP Security students are least familar with. So owning a sensor would also help.
    And don't forget that the bigger CCIE-Training vendors have complete labs for rent with all you need for CCNP Sec preparation. That could also save some money.
    Don't stop after you've improved your network! Improve the world by lending money to the working poor:
    http://www.kiva.org/invitedby/karsteni

  • I just purchased MBP and it is my first Apple computer. How concerned should I be about virus software and what do you recommend for security software?

    I just purchased MBP and it is my first Apple computer. How concerned should I be about virus software and what do you recommend for security software?

    1. This comment applies to malicious software ("malware") that's installed unwittingly by the victim of a network attack. It does not apply to software, such as keystroke loggers, that may be installed deliberately by an intruder who has hands-on access to the victim's computer. That threat is in a different category, and there's no easy way to defend against it. If you have reason to suspect that you're the target of such an attack, you need expert help.
    2. All versions of OS X since 10.6.7 have been able to detect known Mac malware in downloaded files, and to block insecure web plugins. This feature is transparent to the user, but internally Apple calls it "XProtect." The malware recognition database is automatically checked for updates once a day; however, you shouldn't rely on it, because the attackers are always at least a day ahead of the defenders.
    The following caveats apply to XProtect:
    It can be bypassed by some third-party networking software, such as BitTorrent clients and Java applets (see below.)
    It only applies to software downloaded from the network. Software installed from a CD or other media is not checked.
    3. Starting with OS X 10.7.5, there has been another layer of built-in malware protection, designated "Gatekeeper" by Apple. By default, applications and Installer packages downloaded from the network will only run if they're digitally signed by a developer with a certificate issued by Apple. Software certified in this way hasn't actually been tested by Apple (unless it comes from the Mac App Store), but you can be reasonably sure that it hasn't been modified by anyone other than the developer. His identity is known to Apple, so he could be held legally responsible if he distributed malware. For most practical purposes, applications recognized by Gatekeeper as signed can be considered safe.
    Gatekeeper has, however, the same limitations as XProtect, and in addition the following:
    It can easily be disabled or overridden by the user.
    A malware attacker could get control of a code-signing certificate under false pretenses, or could find some other way to evade Apple's controls.
    For more information about Gatekeeper, see this Apple Support article.
    4. Beyond XProtect and Gatekeeper, there’s no benefit, in most cases, from any other automated protection against malware. The first and best line of defense is always your own intelligence. All known malware circulating on the Internet that affects a fully-updated installation of OS X 10.6 or later takes the form of so-called "trojan horses," which can only have an effect if the victim is duped into running them. The threat therefore amounts to a battle of wits between you and the malware attacker. If you're smarter than he thinks you are, you'll win.
    That means, in practice, that you never use software that comes from an untrustworthy source. How do you know whether a source is trustworthy?
    Any website that prompts you to install a “codec,” “plug-in,” "player," "extractor," or “certificate” that comes from that same site, or an unknown one, is untrustworthy.
    A web operator who tells you that you have a “virus,” or that anything else is wrong with your computer, or that you have won a prize in a contest you never entered, is trying to commit a crime with you as the victim. (Some reputable websites did legitimately warn visitors who were infected with the "DNSChanger" malware. That exception to this rule no longer applies.)
    Pirated copies or "cracks" of commercial software, no matter where they come from, are unsafe.
    Software of any kind downloaded from a BitTorrent or from a Usenet binary newsgroup is unsafe.
    Software with a corporate brand, such as Adobe Flash Player, must be downloaded directly from the developer’s website. If it comes from any other source, it's unsafe.
    5. Java on the Web (not to be confused with JavaScript, to which it's not related, despite the similarity of the names) is a weak point in the security of any system. Java is, among other things, a platform for running complex applications in a web page, on the client. That was never a good idea, and Java's developers have had a lot of trouble implementing it without also creating a portal for malware to enter. Past Java exploits are the closest thing there has ever been to a Windows-style "virus" affecting OS X. Merely loading a page with malicious Java content could be harmful. Fortunately, Java on the Web is mostly extinct. Only a few outmoded sites still use it. Try to hasten the process of extinction by avoiding those sites, if you have a choice.
    Java is not included in OS X 10.7 and later. Discrete Java installers are distributed by Apple and by Oracle (the developer of Java.) Don't use either one unless you need it. Most people don't. If Java is installed, disable it — not JavaScript — in your browsers. In Safari, this is done by unchecking the box marked Enable Java in the Security tab of the preferences dialog.
    Regardless of version, experience has shown that Java on the Web can't be trusted. If you must use a Java applet for a specific task, enable Java only when needed for the task and disable it immediately when done. Close all other browser windows and tabs, and don't visit any other sites while Java is active. Never enable Java on a public web page that carries third-party advertising. Use it only on well-known, password-protected, secure websites without ads. In Safari 6 or later, you'll see a lock icon in the address bar with the abbreviation "https" when visiting a secure site.
    Follow these guidelines, and you’ll be practically as safe from malware as you can be.
    6. Never install any commercial "anti-virus" or "Internet security" products for the Mac, as they all do more harm than good, if they do any good at all. If you need to be able to detect Windows malware in your files, use the free software ClamXav — nothing else.
    Why shouldn't you use commercial "anti-virus" products?
    Their design is predicated on the nonexistent threat that malware may be injected at any time, anywhere in the file system. Malware is downloaded from the network; it doesn't materialize from nowhere.
    In order to meet that nonexistent threat, the software modifies or duplicates low-level functions of the operating system, which is a waste of resources and a common cause of instability, bugs, and poor performance.
    By modifying the operating system, the software itself may create weaknesses that could be exploited by malware attackers.
    7. ClamXav doesn't have these drawbacks. That doesn't mean it's entirely safe. It may report email messages that have "phishing" links in the body, or Windows malware in attachments, as infected files, and offer to delete or move them. Doing so will corrupt the Mail database. The messages should be deleted from within the Mail application.
    ClamXav is not needed, and should not be relied upon, for protection against OS X malware. It's useful only for detecting Windows malware. Windows malware can't harm you directly (unless, of course, you use Windows.) Just don't pass it on to anyone else.
    A Windows malware attachment in email is usually easy to recognize. The file name will often be targeted at people who aren't very bright; for example:
    ♥♥♥♥♥♥♥♥♥♥♥♥♥♥!!!!!!!H0TBABEZ4U!!!!!!!.AVI♥♥♥♥♥♥♥♥♥♥♥♥♥♥.exe
    ClamXav may be able to tell you which particular virus or trojan it is, but do you care? In practice, there's seldom a reason to use ClamXav unless a network administrator requires you to run an anti-virus application.
    8. The greatest harm done by anti-virus software, in my opinion, is in its effect on human behavior. It does little or nothing to protect people from emerging threats, but they get a false sense of security from it, and then they may behave in ways that expose them to higher risk. Nothing can lessen the need for safe computing practices.
    9. It seems to be a common belief that the built-in Application Firewall acts as a barrier to infection, or prevents malware from functioning. It does neither. It blocks inbound connections to certain network services you're running, such as file sharing. It's disabled by default and you should leave it that way if you're behind a router on a private home or office network. Activate it only when you're on an untrusted network, for instance a public Wi-Fi hotspot, where you don't want to provide services. Disable any services you don't use in the Sharing preference pane. All are disabled by default.

  • HT1222 Since I'm an American, what's the need for me to update?

    Since I'm an American, what's the need for me to update?
    How does the new update apply to me?

    What update are you referring to? If you mean iOS 6.1.3, there are a number of security updates that apply to all iOS devices:
    http://support.apple.com/kb/HT5704
    If that's not what you mean, please explain further.
    Regards.

  • What permission is needed for a login to access the restored database(backup from different server)

    what permission is needed for a login to access the restored database(backup from different server)
    frequently reach the situation, when vendor restores a database, but he cannot access it unless I remap or add his login to the restored database. What permssion can grant the vendor so that he can but only can access the database he restored, not all other
    databases.

    Hi George,
    According to your description, When you move a database from one server that is running SQL Server to another server that is running SQL Server, a mismatch may occur between the security identification numbers (SIDs) of the logins in the master database
    and the users in the user database. As other post, you can use the sp_change_users_login stored procedure to map SQL Server logins. Also , you can use the following statement after doing the restore database. It will
     fix the mis-mapped SID inside the restored DB.
    ALTER USER <username> WITH LOGIN = <username>
    For more information, you can review the following article.
    http://blogs.lessthandot.com/index.php/DataMgmt/DBAdmin/MSSQLServerAdmin/do-you-still-use-sp_change_users_login/
    Regards,
    Sofiya Li
    Sofiya Li
    TechNet Community Support

  • What RAM is needed for Laserjet Printer CP1525nw Windows 7 64-bit

    What RAM is needed for Laserjet Printer CP1525nw Windows 7 64-bit

    Hi,
    just found your post...
    To install your HP1010 on Win7do the following:
    Start
    Devices & Printers
    Add a printer
    Adda local printer
    Use an existing port: DOT4_001 (Generic IEEE...)
    Next
    Pick HP from manufacturer
    Select HP LaserJet 3055 PCL5
    Next
    Name the printer something to your liking
    Finish (or so, just follow the prompts)
    Here you are!
    Works every time for me, never had a problem from any application.
    I don't know how this forum works and if i am notified if you reply or anyone else posts on this thread, so i try to check it again soon to check if you left a message.  Be with me...
    Matt

  • What is the need for setting property data inside the JMSMesage

    Hi
    Could anybody please let me know
    *What is the need for setting property data inside the JMSMesage??
    For example i have a seen a similar example as shown ??
    I have seen a
    Message.setStringProperty("Sport","Basketball");
    and also please tell me how can the MDB recievies this property data ??
    Thanks in advance .

    raviprivate wrote:
    Could anybody please let me know
    *What is the need for setting property data inside the JMSMesage??
    For example i have a seen a similar example as shown ??
    I have seen a
    Message.setStringProperty("Sport","Basketball"); Look at the detail JMS documentation on [Message Properties|http://java.sun.com/j2ee/sdk_1.3/techdocs/api/javax/jms/Message.html] .
    >
    and also please tell me how can the MDB recievies this property data ?? MDB onMessage method argument is the Message object and if you look at the documentation, Message interface has getter methods to retrieve the properties.

  • What is the need for calling default constructor by JVM?

    What is the need for calling default constructor by JVM? why the JVM should intiializes default values to the data
    fields if the constructor is not there in our class?

    mahar wrote:
    What is the need for calling default constructor by JVM? Huh? The JVM does not need to call the default constructor. It needs to call a constructor.
    You decide which one by the way you use "new".
    why the JVM should initialize default values to the data fieldsHuh?
    ... if the constructor is not there in our class?Huh? The default constructor is always there. It may be private but it is still there.

  • Just bought a new iPod touch 16G - I think it's a 5th gen. - I used my old iPod to record rehearsals.  The new one is stating that my Belken mic is not compatible.  Can I record with this new one?  If so, what do I need for a mic?

    Just bought a new iPod Touch 16G - (I think it's a 5th gen.).   I used my old iPod to record music rehearsals.  This new iPod is stating that my old Belken mic (with new adaptor) is not compatible.  Does this new iPod Touch have ability to record audio?     If so, what do I need for a mic??

    Thanks very much!   I found the app, tested it, and it sounds fairly lifelike.    Big help!!

  • I have already bought a macbook pro in USA and I want to use it in Europe. What adapter I need for my Airport Extreme?

    I have already bought a macbook pro in USA and I want to use it in Europe. What adapter I need for my Airport Extreme?

    No power adaptor is needed as the power units are auto-switching. But you will need wall outlet adaptors such as you will find in Apple's World Travel Kit, at AAA stores, and other vendors.

  • Can someone tell me what settings I need for ipad texting.  Went to Mexico and now can't get the texting to work at all on ipad.  Thanls

    Can someone tell me what settings I need for ipad texting.  I went to Mexico and when I returned the texting does not work on my ipad.  The support at Apple wanted to charge me to get info.
    THanks

    Can't address the problem directly, cause even though my iPad4 is Cell+Wi-Fi, I've never put a SIM in it and never had the need to text, SMS or iMessage, from it. When away from the office or home wireless network, I tether it off the iPhone. Skype, both text and video, work just fine thru the Wi-Fi link, though.
    HOWEVER, when I was hashing out the contract details to get the iPhone 5 about 14 months ago at Telcel, the representative distinctly mentioned that both Visual Voicemail as well as iMessages would be included in the package and they would be mandatory cause "I was getting a (subsidized) Apple iPhone" on a 24 month leash. Then when the gizmo came out of its box for SIM installation and activation, she went thru the motions of making sure both were working properly.  So I assume the carrier has some say in the matter.

  • What all is needed for this type of Flash Design Studio

    What all is needed for this type of Flash Design Studio.
    There are a couple of sites out there that use both flash and
    shockwave. I am looking ot get somethign like this started and need
    some help getting pointed in the right direction. here are some
    examples:
    http://www.uberprints.com/studio/
    http://www.customavenue.com/online-design-studio/online-design-studio.html
    https://www.youdesignit.com/youdesignit.cfm
    http://www.pixeltees.com/make

    Rclarkhaddock,
    > What all is needed for this type of Flash Design Studio.
    There
    > are a couple of sites out there that use both flash and
    shockwave.
    Of the examples you showed, I saw Flash (Adobe Flash),
    Shockwave (Adobe
    Director), and JavaScript, but never a combination on the
    same site. (It
    might make sense to combine Flash with JavaScript or
    Shockwave with
    JavaScript, but not really to combine Flash with Shockwave.)
    > I am looking ot get somethign like this started and need
    some help
    > getting pointed in the right direction.
    Any of the above technologies will do it. You could also use
    a Java
    applet or even a .NET solution of some kind, so the choice
    you take will
    depend largely on what platform you want to support and code
    for. This sort
    of project will require significant amounts of custom
    programming. My
    personal approach would be to use Flash, mainly because of
    the popularity of
    the plugin. The Shockwave example looks beautiful, and I
    started out years
    ago using Director, but fewer people nowadays have the
    Shockwave plugin
    installed. It doesn't look like any of the sites shown use 3D
    modeling,
    which is the only relevant feature that Shockwave has over
    the other
    approaches. JavaScript (probably some Ajax approach) would
    work -- as
    seen -- but then you're dealing with compatibility issues
    among various
    JavaScript implementations in the great variety of browsers
    out there.
    Flash minimizes that, in my opinion.
    All you really "need" to produce what you've seen is Flash
    and some sort
    of database back end (MySQL, say), which means you'll need a
    bit of
    middleware (PHP, ASP, Cold Fusion, etc.) to act as your
    ambassador between
    Flash and the database.
    David Stiller
    Adobe Community Expert
    Dev blog,
    http://www.quip.net/blog/
    "Luck is the residue of good design."

  • What software is needed for system recovery? (cont'd)

    What software is needed for system recovery of a Toshiba Satellite Pale8u-02p01D (also known as L355D-S7901) running Vista?
    If I can just get the name/number for the recover software I will get it from eBay.
    Thanks!
    Solved!
    Go to Solution.

    Satellite L355D-S7901 
    If you want to look for that on eBay, look for the recovery discs for the model above. I doubt you'll find them there.
    You can order them from Toshiba, of course.
       Order Toshiba Recovery Media
    And you might get them cheaper from a third-party vendor.
       Digitalmedia-labs.com
       MyRecoveryCDs.com
       Recovery-CD.com
       RestoreDisks.com
       RestoreCD4u
    -Jerry

  • What equipment to rent for a cruise to Alsaka, with a trip to Katmai National Park

    We are planning a cruisetour to Alaska in the summer of 2014. I was wondering what equipment would be best to rent for the trip. I am at best a total amature when it comes to photography. We will on on shio for seven days, then going to Danali National Park, and also to Katmai National Park. Any and all help with this is greatly appreciated. Thanks. George
    Solved!
    Go to Solution.

    Alaska is a target rich State to shoot some really breathtaking shots.  But, you do have to be careful.  YOU will not be at the top of the food chain.  That place is firmly secured by the Polar Bear.  You don't want to get close to these guys.  If you go looking for bears, take as long a lens you can get.  The absolute minimum would be a 100-400mm zoom.  Alaska, is also home of some really big grizzly bears, these guys are no slouch either.  For the beautiful panaramas you may want to invest in a ultra wide angle lens, like the EF-S-10-22mm.  It does not have IS, but you can get some stunning wide angle shots from from the trusty tripod.  Also, the 10-22 gets rave reviews of image quality from some of the major reviewers, Ken Rockwell, give it a "L" quality review.  I wouldn't spend any extra money on a EF 70-200 f2.8L IS USM.  It is a large heavy lens.  But I would opt for the EF 70-200 f4L IS USM, it is much lighter, and has good IS, and will be easy to sling around on those eagles.  You fail to mention what lenses you now have, but a good mid range telephoto would be good to have for the trip.  Shots taken from the cruise ship should be hand held, because of the vibration of the ship will pass through to the tripod.  So, any lens you shoot with from the ship should have IS, if not you may have to up your ISO to 1000 or more, and shoot at a high shutter speed, to keep out blur of movement.  For that mid range telephoto you may want to look at either the EF 24-105 f4L IS USM, or the EF 24-70 f4L IS USM, both are Canon L quality lenses, and reasonably priced.  Those lenses I have suggested will fill all your needs for your trip, with the sharpest quality lenses for your camera.  I would suggest you purchase a refurbished 7D to upgrade your camera body.  The 7D is the best wildlife camera available now.  You can get one from Adorama, now on a refurbished special from Canon.  You can also buy the lenses refurbished from Adorama, and B&H, and even used from KEH and save a good amount of money.  
    Enjoy your trip.

  • What do I need for this?

    I would to write some code where a web surfer would
    enter in some data (criteria) that would be sent to a
    web server where the criteria would be used to cut
    a small section of a large image file and send that
    smaller image back to the end users browser.
    What do I need to start development (simple & quick)?
    Are there java components that need loaded on the
    server for this to happen?
    Will applets do what I want?
    Thanks!

    Certainly you will want some sort of processing to take place on the server. Otherwise, all the server could do is stupidly send the entire image file. It sounds like servlets or CGI we what you want to use.

Maybe you are looking for

  • Can I use new iPods on my old Mac?

    Hi all, Thinking of getting a new iPod but my G4 computer doesn't have USB 2.0., just FW and older USB. I've got OS 10.4.1 and the newest version of iTunes loaded. Are new iPods and old computers compatible somehow? Thanks! Sue

  • How do I transfer music that was not purchased on iTunes or iPhone (were from my computer files) onto my iPhone 3gs using iCloud?

    I have done all the settings for iCloud on both my PC (Windows 7) and my iPhone 3gs, and I had to research how to get music from my iTunes onto my iPhone through iCloud. I go to store > Purchased > Music > Not on this iPhone, but this only brings up

  • ADF MenuModel: Dynamic changes to shown property

    Hi all, I have been doing some testing, and not sure if this is a bug or I am doing something wrong. To set the stage, I've got a menu defined via managed beans (using the MenuItem, MenuModelAdapter, MenuTreeModelAdapter from SRDemo). I also have a s

  • Query running time

    Hai, I am new to Oracle. How to find the query running time in SQL plus. Edited by: user12283394 on Dec 20, 2009 10:33 PM

  • I can't reinstall my Logic 9 software???

    After a few years of enjoyable, proffesional use of my Logic 9 software I needed to rebuild my MacBook Pro OSX by restoring it to it's factory settings. I was able to reinstall all of my other applications and extraneous software successfully but the