Introducing the New Cisco PowerPoint Templates

Transcription

Introducing the New Cisco PowerPoint Templates
CCE Security Best
Practice Guide
Carlos Gonzales, CBABU Engineering Manager
BRKCCT-1041
Agenda
•
Cisco Secure Development Lifecycle
•
UCCE Security Best Practice Guide
•
Security Reference Information
•
PCI-DSS Guidance
•
UCCE Security Update for 11.0
Cisco Secure Development
Lifecycle (CSDL)
Purpose and Intent
•
Provide awareness.
•
Cisco Secure Development Lifecycle is an internal security baseline.
•
CSDL does not intend to full fill customer certification requirements.
•
Security is a broad and endless topic to be covered in a 90 min. presentation.
Product Security Requirements
•
Product Security Baseline (PSB)
•
•
•
•
•
•
Attack Surface Reduction /
Documentation
Logging / Audit Infrastructure
Trusted Product Architecture
Credential / Password Controls
Traffic Controls
Processes
•
Product Security Baseline 5.1
•
•
•
•
•
•
•
•
•
Privacy and Data Security
Secure Development
Application Security
Authentication and Authorization
Encryption
Infrastructure Security
Logging and Auditability
Vulnerability Management
Support and Operations
3rd Party Security
•
Cisco Open Source Initiative (COSI)
•
Register libraries in IP Central
•
Establish maintenance plan
•
Address known vulnerabilities
•
Cisco Intelishield Alert Manager (CIAM)
•
Register for alerts on any 3rd party code
Secure Design
•
Threat Modeling
•
Identify system data flow and trust boundaries
• Review auto-generated threats
• Prioritize and implement mitigations
Secure Coding
•
Cisco/CBABU Secure Coding Guidelines
•
Use “SAFE” libraries
Cisco’s Safe C libraries
• Open Web Application Security Project (OWASP)
•
•
•
Enterprise Security API (ESAPI) Toolkit
Security Awareness/Training/Emphasis
•
Cisco White/Green/Black Belt Ninja Training
• Annual Security Conference
Static Analysis
•
Tools
•
Coverity for C/C++
• Jtest or Sonar for Java
•
70+ rule checks for code inspection
•
Automated as part of the build and Continuous Integration
Vulnerability Testing
•
Fuzz testing
•
All protocols implemented in the product
•
All ports and services
• Cisco Internal VT Tool,
• Codenomicon for Protocol
Robustness Testing
• IBM Rational AppScan for
Application VT.
Takeaways
•
CBABU is working hard to secure the application in the solution. By performing
application security, it will increase product quality and decrease TCO.
•
Cisco CSDL is the practice in CBABU and within the Cisco development
community.
•
Security Baseline, Threat Modeling, COSI, Coding Best Practice (SA and Secure
Coding) and Vulnerability Testing are key elements into securing the CCE
application.
UCCE Security Best
Practice Guide
Purpose and Intent
•
Provide the current published security strategy for CCE.
•
CUCM, IOS, UCS, and other products references are found in the appendix.
•
Active Directory and GPO information are found in the appendix.
•
Intent is to start a discussion through feedback and use case to build a solid
security story in the long run.
UCCE Security Best Practice Guide 10.0(1)/10.5
•
Deployment Coverage: UCCE
•
Not Covered: Finesse, CVP, CUIC/LiveData, MediaSense, UCS, CUCM, Nexus
Switches, IOS, Unified EIM/WIM, RSM, etc.
•
OS Covers: Windows Server 2008 R2
•
Enabling CTI OS Security and IPSec will have scalability impact. See the design
guide for details.
CCE Encryption Support
•
Application user and contact center agent passwords are stored in the Logger databases as well
as the Distributor databases as an RSA MD5 Message-Digest Algorithm hash.
•
The passwords are passed as MD5 hashes as opposed to clear text between Router/Logger
and PG.
•
Data sent in Call Variables or Expanded Call Context (ECC) variable relies on the IPSec
between servers running Windows 2008 R2.
• IPSec between CUCM and the Agent PG is supported.
•
•
•
•
Use SHA-1 as integrity algorithm and 3DES as your encryption algorithm.
For Internet Key Exchange (IKE), use at least Diffie-Hellman Group 2 for 1024 bit key.
Diffie-Hellman 2048-bit key is also supported if processing and compute resources are available.
By default, ISE, Web Setup, and Agent Re-Skilling supports TLS v1.0 protocol using the
OpenSSL library. It uses 128-bit SSL encryption in Microsoft Internet Information Services (IIS).
CCE Encryption Support - Continued
•
CTIOS and CAD implements TLS v1.0 protocol using the OpenSSL libraries
between Agent Desktop and CTI Object Server.
•
The cipher suite uses Diffie-Hellman for Key exchange, RSA for Authentication, AES
(128-bit) for encryption, and SHA1 for message digest algorithm. This is not enabled by
default and scaling needs to be considered when security is enabled.
•
For SNMP service, CCE supports SNMPv1, 2c, & 3 with SHA-1 for message
digest algorithm and the following for encryption: 3DES, AES-192, and AES256.
•
From a deployment level, CCE supports Cisco IOS IPSec in Tunnel Mode with
HMAC-SHA1 Authentication (ESP-SHA-HMAC) and 3DES Encryption (ESP3DES).
•
Encryption needs to be enabled between devices through tunneling mode.
RSA MD5 Hash and IPSEC between CCE
Components
HTTPS: Finesse,
CTIOS, and CAD
TLS1.0
Generic PG
CUCM PIM
MD5 HASH – Agent
Information in DB
MD5 HASH transmitted
over unencrypted wire
VRU PIMs
CTI Server
CUCM
JTAPI
Rogger
CTI OS
Router
SIP Dialer
Logger
MR PG
IPSEC Tunnel Mode
AW/HDS/DDS
Campgn Mgr
IPSEC Transport
Mode or Tunnel
Mode
HTTPS: ISE,
WebSetup, and
Agent Reskilling
TLSv1.0
SNMPv3
CCE IPSec Overview
•
CCE support IPSec Tunnel Mode (Layer 3) between Central Controller and remote
Peripheral Gateway using Cisco IOS gateways as IPSec peers.
•
CCE also support IPSec in Transport Mode (Layer 4) via Windows Server 2008 R2 OS to
secure server to server communications:
•
•
•
•
•
•
•
Between NAM Router and CICM Router
Between Public/Private Connections of a Router/Logger pair.
Between Public/Private Connections of a PG Pair.
All Connections between Router and the PG.
All Connections between the Router/Logger and the AW/HDS.
All Connections between the CUCM and the Agent PG (via AD/Kerberos).
MRPG connections to Multi-Channel Systems (i.e. SocialMiner or EIM/WIM) is Tunneled
via IOS Gateways
Clustering over the WAN
Deployment Example – Tunnel Mode
RLG SIDE B
RLG SIDE A
Public/Private
Public/Private
Public/Private
Public/Private
PG SIDE A
PG SIDE B
IPSEC Tunnel Mode
Cluster over the WAN Deployment Example –
Transport Mode
RLG SIDE A
RLG SIDE B
Public/Private
Public/Private
Public/Private
Public/Private
PG SIDE B
PG SIDE A
IPSEC Transport Mode
(via AD Kerberos
Authentication or x.509
certificate)
IPSec Network Isolation Utility Overview
•
Tool that automatically sets a preconfigured policy to/from each CCE server.
•
CLI (c:\CiscoUtils\NetworkIsolation\cscript) or Security Wizard deployment
•
Each server shares the same policy and can be configured to accept exceptions.
•
Trusted Devices are devices with IPSec policy configured.
•
•
•
Router, Logger, PG(s), AW/HDS, CTIOS,
Sets Trusted components using authentication and optional encryption between Trusted devices. Untrusted devices
are denied unless it is classified as a Boundary device. Each Trusted device has a list of its own Boundary device
defined as IP address, IP Subnet, or IP/port address. Boundary devices are configured manually.
Boundary Devices do not have IPSec Policy but are allowed access to Trusted Devices:
•
•
Domain Controller, Serviceability servers, NTP, Unified CM, Gateways, CTI OS Desktops, etc.
No configuration needed on Boundary devices.
IPSec Network Isolation Utility Tips
•
If remotely provisioning, make sure the host you are using is in the boundary list.
•
AD/DNS and NTP needs to be in the boundary list of all trusted devices.
•
Adding new devices or change in pre-shared key requires change to the IPSec policy.
•
Enable encryption on ALL or NONE on the Trusted Devices.
•
Do not use Windows IPSec MMC plug-in. The Network Isolation Utility tool creates and manages its
own changes.
•
If behind the firewall, allow port 50 (ESP) and UDP source/destination port 5000 (IKE).
•
If using NAT, allow port 4500 UDP-ESP encapsulation
IPSec Network Isolation Utility Deployment Example
Step 1 : Fully Functional Unified CCE System with no
existing IPSec Policy.
IPSec Network Isolation Utility Deployment Example
Step 2 : Run Network Isolation Utility on Router/Logger, and AW/HDS.
Set IPSec Policy on each server and boundary devices such as
serviceability devices, AD/DNS, etc..
IPSec Network Isolation Utility Deployment Example
Step 2 : Put PGs as Trusted Devices and then put clients, UCM, or ACD
servers as boundary devices to the PG.
Network Isolation Utility Troubleshooting
•
Disable the policy
•
Verify IP Address or port is in the boundary device list.
•
Verify there were no changes in the boundary device list.
•
Verify that the device is not configured for both Trusted and Boundary device.
•
Verify that encryption is set to ALL or NONE.
•
Verify that Microsoft MMC did not change the IPSec policy set by the tool.
Branch, Remote, & Home Office Deployment
Latency:
• Not to exceed 400ms RTT
Bandwidth Considerations:
• RTP Stream
• UCM Signaling to IP Phones
• CTI Data (Agent Desktop Traffic)
• ISE Client to ISE Server
• Administration Client
• CUIC Client to Server Traffic
• Recording RTP
• Music On Hold
Home Office w/ Broadband Considerations
•
•
•
•
Minimum supported bandwidth: 256kbps upload / 1.0Mbs download.
Cisco Virtual Office 88x Series Router for Secure VPN, Firewall, Content Filtering, etc.
• http://www.cisco.com/c/en/us/products/routers/888-integrated-services-router-isr/index.html
Mobile Agent Latency must not exceed 150ms RTT; jitter must not exceed 60ms.
Firewall Configuration for Mobile Agent – Verify that the firewall is not blocking the media
stream.
• In a nailed up connection, the firewall idle timeout should be longer than the nailed
connection mode time out value. If not, then the media stream will be blocked by the
firewall.
AS5500 SSL/IPSec VPN Enterprise
•
Wide Range of Options from the ASA 5505 supporting 25 concurrent sessions
to ASA5585-S60 supporting 10,000 concurrent connection.
•
With ASA Software Release, customers can combine up to eight Cisco ASA
5580 or 5585-X Adaptive Security Appliance firewall modules to be joined in a
single cluster for up to 128 Gbps of real-world throughput (320 Gbps max) and
more than 50 million concurrent connections.
•
Supports Cisco AnyConnect
•
For more information:
•
•
•
•
http://www.cisco.com/c/en/us/products/security/asa-5500-series-next-generation-firewalls/models-comparison.html#~tab-a
http://www.cisco.com/c/en/us/products/collateral/security/asa-5500-series-next-generationfirewalls/prod_brochure0900aecd80402e39.html
http://www.cisco.com/c/en/us/products/collateral/security/adaptive-security-appliance-asa-software/data_sheet_c78714849.html
http://www.cisco.com/c/en/us/products/collateral/security/asa-5500-series-next-generation-firewalls/data_sheet_c78527494.html
NAT Support
•
Supported: IP Phones, Remote PG from the Central Controller via NAT router,
Agent Desktop.
•
Not Supported: CTIOS Agent Desktop with Silent Monitoring and Recording
•
Sniffing packets : Call Center IP Scheme (local) vs. Datacenter IP Scheme (NAT);
CTIOS Server detects NAT IP which is not the local AD IP in order for the sniffing to
work.
•
IPSec NAT Transparency enables IPSec to travel through NAT/PAT which is
automatically detected and negotiated using NAT-T. Use Cisco IOS 12.2(13)T
and later and both end VPN devices are NAT-T capable.
•
No NAT between MediaSense and other systems.
•
Finesse supports basic NAT between server and clients.
Unified Contact Center Security Wizard
•
GUI interface that enables you to configure the
following:
•
•
•
Windows Server 2008 R2 Firewall Utility
IPSec Network Isolation Utility
Automated SQL 2008 R2 Hardening Utility
•
Run via
%SYSTEMDRIVE%\CiscoUtils\UCCSecurityWizard
or START> PROGRAMS> Cisco Unified CCE
Tools>Security Wizard.
•
Relies on the CLI tools to be installed.
•
Needs to run after the CCE environment has been
configured and working properly.
SQL Server Hardening
•
Top SQL Hardening Consideration:
•
•
•
•
•
•
•
Do not install SQL Server on an Active Directory Domain Controller
Install the latest applicable SQL Server service pack and security updates.
Set a strong password for the “sa” account before installing ICM.
Always install SQL Server service to run using a least privilege account. Never install
SQL Server to run using the built-in Local System account.
Apply a strict password policy and do not set the password to expire. If it expires, the
SQL Server service and Administration & Data Server fails.
Mixed mode authentication is enforced through SQL Server 2008 R2 automated
hardening.
During web setup, if the “sa” password is blank, an auto generated strong password is
used.
SQL Server Hardening
SQL Server Password and Account Setting minimum recommendation:
SETTING
VALUE
Enforce Password History
24 Passwords Remembered
Minimum Password Length
12 characters
Password Complexity
Enabled
Minimum Password Age
1 Day
Account Lockout Duration
15 minutes
Account Lockout Threshold
3 Invalid Logo Attempts
Reset Account Lockout Counter After
15 minutes
Automated SQL 2008 R2 Hardening
•
Hardens or Rolls Back the SQL Server security on Logger and AD/HDS.
•
Utility Location: %SYSTEMDRIVE%\CiscoUtils\SQLSecurity
•
Current SQL Server configuration is backed up and saved at the following:
<ICMInstallDrive>:\CiscoUtils\SQLSecurity\ICMSQLSecurity.bkp
-
•
CLI
•
•
•
To Harden: “Perl ICMSQLSecurity.pl HARDEN”
To Rollback: “Perl ICMSQLSecurity.pl ROLLBACK”
Log:
•
%SYSTEMDRIVE%\CiscoUtils\SQLSecurity\Logs\ICMSQLSecurity.log
•
By default without hardening, SQL Server 2008 R2 disables VIA endpoint and limits the Dedicated
Administrator Connection (DAC) to local access.
•
Enable only Named Pipes and TCP/IP endpoints during setup for ICM/CCE. Named pipes has higher
priority than TCP/IP. By default, other logins are enabled (i.e. Shared Memory, VIA, etc.)
Automated SQL 2008 R2 Hardening
•
Hardening performs the following:
•
Enforces mixed mode authentication
• Verifies that Named Pipe (np) is listed before TCP/IP (tcp) in the SQL Server Client
Network Protocol Order.
• Disabled SQLWriter, SQLBrowser, and MSSQLServerADHelper100 Services.
• Forces SQL server user ‘sa’ password if found blank.
•
Rollback does not remove the following:
•
SQL Server security mode is set to Windows Only Authentication
• SQL Server “sa” is set to random password
• SQLVSSWriter, SQLBrowser, and MSSQLServerADHelper100 services are disabled.
SSL Encryption Utility – IIS Security
•
Only supported on Windows 2008 R2
•
SSLUtil.exe – helps with the task of configuring web servers for use with SSL (HTTPS).
Can be invoked as standalone or automatically as part of setup.
•
Located: <ICMInstallDrive>\icm\bin folder.
•
Log: <SystemDrive>\temp\SSLUtil.log
•
Performs the following:
•
•
•
SSL Configuration
SSL Certificate Administration
Available only on ICM Web Applications running on Windows Server 2008 R2
-
Internet Script Editor (ISE)
Agent Re-Skilling
SSL Encryption Utility
•
Do not use IIS security setup and the utility at the
same time.
•
If IIS SSL port is blank, the utility sets IIS port to 443.
•
Certificate Administration:
•
•
•
•
•
•
Creates self-signed certificates.
Installs self-signed certificate in IIS.
Removal of certificate from IIS.
Generates certificates via OpenSSL.
Management of certificates – if it exist, it does not create a
new one but logs an entry.
Enables Virtual Directories and configures it for 128 bit
encryption
Secured Endpoints – SRTP
•
Unified CCE supports Unified Communication
Manager’s Authenticated Device Security Mode
•
CTI OS and CAD support TLS encryption to the server.
•
Cisco Finesse supports HTTPS for the Administration
Console and Agent and Supervisor Desktops.
•
HTTPS is not supported for Agent and Supervisor Desktops
in large deployments (over 1000 agents).
•
Unified CVP VXML Browser does not support Secure
Real-Time Transport Protocol (SRTP)
•
UCCE does not support SRTP when using Spanbased Silent Monitoring.
•
Mobile Agents does not support SRTP.
•
Outbound Option does not support SRTP.
•
RSM SimPhone does not support SRTP.
Active Directory Guidance
•
Use Case 1: Administration Users and Agent Supervisors moving to another OU
in the same domain.
•
No impact as long as the native services (Logger/Distributor) are not moved.
• Drag and Drop using MSFT AD Users and Computers Tool
•
Use Case 2: Changing AD structure but still in the same domain.
•
Yes and most common activity
• Stop all services and use the MSFT AD Users and Computer Tool.
•
Use Case 3: Migration to a new domain
•
Create a new Cisco_ICM root OU – DO NOT COPY from old to new target domain (not
supported).
Check out the Appendix and Staging Guide for
more details.
GPOs
•
Most Group Policy Restrictions Do Not Apply To Nor Affect Cisco Root OU
•
•
The Cisco_ICM OU structure does not contain any servers and only contains service
account users in the Instance OU
Applying GPO’s To An OU
•
Indirectly via top-down inheritance from a higher-level OU or domain root
• Directly linked within the OU
•
Block Policy Inheritance (Indirect GPO)
•
Prevents higher-level policies from applying to users and computers within a site,
domain, or OU
• This can be overridden if higher-level policies have the “Enforced” option checked
Check out the Appendix and Staging Guide for
more details.
Put it all together…
SNMPv3
Active Directory
GPO
Direct/Indirect
Policy
Router ACL and AAA
Configuration
Generic PG CSDL
IPSEC Tunnel Mode
CUCM PIM
MD5 HASH – Agent
Information in DB
MD5 HASH transmitted
over unencrypted wire
VRU PIMs
CUCM
JTAPI
CSDL
CTI Server
Rogger
CTI OS
Router
SIP Dialer
Logger
MR PG
CSDL
AW/HDS/DDS
Campgn Mgr
IPSEC Transport
Mode or Tunnel
Mode
AnyConnect
VPN
Cisco CVO
88x
Certificates/Anti-Virus
Protections
Remote Agents:
Finesse/CTIOS
(HTTPS)
SSL/TLS1.0
Client SSL
Certificates/Anti-Virus
Protections
Premise Agents:
Finesse/CTIOS
(HTTPS)
SSL/TLS1.0
Administrators: ISE,
WebSetup, and Agent
Reskilling
(HTTPS)
TLSv1.0
Security Reference Links
Security Guides
•
CUCM 10.0 (1) Security Guide
•
•
CUCM Phone Security
•
•
http://www.cisco.com/c/en/us/td/docs/voice_ip_comm/cucm/security/10_0_1/secugd/CUCM_B
K_C68276B4_00_cucm-security-guide-100.html
http://www.cisco.com/c/en/us/td/docs/voice_ip_comm/cucm/security/10_0_1/secugd/CUCM_B
K_C68276B4_00_cucm-security-guide-100/CUCM_BK_C68276B4_00_cucm-security-guide100_chapter_0110.html
CTI/JTAPI Security
•
http://www.cisco.com/c/en/us/td/docs/voice_ip_comm/cucm/security/10_0_1/secugd/CUCM_B
K_C68276B4_00_cucm-security-guide-100/CUCM_BK_C68276B4_00_cucm-security-guide100_chapter_010111.html
Security Guides
•
UCS
•
•
IOS
•
•
https://www.youtube.com/watch?v=FeSdFhsKGG0
Best Practice for Securing Microsoft Active Directory
•
•
http://www.vmware.com/security/hardening-guides.html
REST/JSON Security
•
•
http://www.cisco.com/c/en/us/support/docs/ip/access-lists/13608-21.html
VMWARE
•
•
https://supportforums.cisco.com/document/111121/securing-and-hardening-cisco-ucs-systems
http://www.microsoft.com/en-us/download/details.aspx?id=38785
Windows Firewall Administration
•
http://technet.microsoft.com/en-us/library/cc739696(v=WS.10).aspx
PCI-DSS Guidance
PCI-DSS compliance requires corporate policy
and operational practice in addition to product
features, so customers that are crafting PCI-DSS
compliant systems should plan to provide those
in addition to security features that are needed
to achieve compliance in their specific
deployment.
– CCE Product Manager
PCI-DSS Guidance
High Level Requirements
Build and Maintain a Secure
Network and Systems
Future PCI Guidance Whitepaper Location:
https://communities.cisco.com/community/partner/collaboration/contactcenter
PCI DSS Requirements
Reference Information
1. Install and maintain a firewall
configuration to protect cardholder data
Use Cisco Firewall products to secure the network
http://www.cisco.com/c/en/us/products/security/firew
alls/index.html
2. Do not use vendor-supplied defaults for
system passwords and other security
parameters
CCE Security Guide recommends using strong custom
password for SQL and other accounts.
http://www.cisco.com/c/en/us/td/docs/voice_ip_comm
/cust_contact/contact_center/icm_enterprise/icm_ente
rprise_10_5_1/Configuration/Guide/UCCE_BK_S02F26F
D_00_security-best-practices-guide-cce.html
3. Protect stored cardholder data
Protect Cardholder Data
4. Encrypt transmission of cardholder data
across open, public networks
5. Protect all systems against malware and
regularly update anti-virus software or
programs
Maintain a Vulnerability
Management Program
Cisco UCCE Enterprise Position
6. Develop and maintain secure systems and
applications
Customers should use PCI certified 3rd party data storage
devices to store sensitive customer information. PCI
certified 3rd party storage devices is beyond the scope of
Cisco UCCE documentation or guidelines. Its also best
practice to only store cardholder data in memory for the
Specific Customer Enterprise Implementation
real-time transaction and not stored permanently in any
database. Cardholder data should also be partially (last
four digits) be stored for tracking purposes. Lastly, call
recording should be disabled when cardholder data is
being discussed.
http://www.cisco.com/c/en/us/td/docs/voice_ip_comm
CCE Security Guide recommends using Transport or
/cust_contact/contact_center/icm_enterprise/icm_ente
Tunnel IPSEC in order to encrypt data.
rprise_10_5_1/Configuration/Guide/UCCE_BK_S02F26F
D_00_security-best-practices-guide-cce.html
http://www.cisco.com/c/en/us/td/docs/voice_ip_comm
CCE Security Guide documents Anti-Virus Guidelines,
/cust_contact/contact_center/icm_enterprise/icm_ente
Chapter 9.
rprise_10_5_1/Configuration/Guide/UCCE_BK_S02F26F
D_00_security-best-practices-guide-cce.html
CBABU implements Cisco Secure Development Lifecycle
(CSDL) to develop secure systems and applications. Using
3rd party software for protection and monitoring is
allowed but Cisco 3rd party software policy should be
followed. Lastly, for Windows based patches, customers
should follow Microsoft guidelines when applying
updates. This does not include Service Packs.
http://www.cisco.com/c/en/us/products/collateral/cust
omer-collaboration/unified-ip-interactive-voiceresponse-ivr/prod_bulletin09186a0080207fb9.html;
http://www.cisco.com/c/en/us/products/collateral/cust
omer-collaboration/unified-contact-centerenterprise/product_bulletin_c25-455396.html
PCI-DSS Guidance
High Level Requirements
Implement Strong Access
Control Measures
Regularly Monitor and Test
Networks
Maintain an Information
Security Policy
Future Whitepaper Location:
https://communities.cisco.com/community/partner/collaboration/contactcenter
PCI DSS Requirements
Cisco UCCE Enterprise Position
Reference Information
7. Restrict access to cardholder data by
business need to know
Due to the integration of Active Directory supervisors
and administrators, user credentials are limited to the
inherited privileges set in the AD Organization Unit,
Group Policy, and/or User Policy. Please review the
UCCE Staging Guide.
http://www.cisco.com/c/en/us/td/docs/voice_ip_com
m/cust_contact/contact_center/icm_enterprise/UCCE_
BK_S737967D_00_staging-guide-for-cisco-unified.html
8. Identify and authenticate access to
system components
The UCCE system component has the capability to
identify and authenticate access via agent and AD
credentials in order to identify, trace, and account user
access to the system.
http://www.cisco.com/c/en/us/td/docs/voice_ip_com
m/cust_contact/contact_center/icm_enterprise/icm_e
nterprise_10_5_1/Administration/UCCE_BK_S0A920A1
_00_ucce-administration-guide.html
9. Restrict physical access to cardholder
data
Use Cisco Connected Safety and Security
http://www.cisco.com/c/en/us/products/physicalsecurity/index.html
10. Track and monitor all access to network
resources and cardholder data
Use Cisco Cloud and Systems Management - Network
Management for IT Organizations Products such as Cisco
http://www.cisco.com/c/en/us/products/cloudPrime Infrastructure and Prime Collaboration. In
systems-management/index.html
addition, Cisco UCCE supports Audit Trail/Report and
Syslog functionality.
11. Regularly test security systems and
processes
Customers should implement security policies, process,
and testing activities in order to improve the enterprise
security integrity. This topic is beyond the scope of Cisco
Specific Customer Enterprise Policy
UCCE documentation and guidelines. The UCCE Security
Best Practice Guide should be considered as a
component of an overall Enterprise solution.
12. Maintain a policy that addresses
information security for all personnel
Customers should implement security policies, process,
and testing activities in order to improve the enterprise
security integrity. This topic is beyond the scope of Cisco
Specific Customer Enterprise Policy
UCCE documentation and guidelines. The UCCE Security
Best Practice Guide should be considered as a
component of an overall Enterprise solution.
Security Update for 11.0
CCE Security Update – 11.0
•
Windows 2012 and SQL 2014 Platform Update
•
REST API – SQL Column Encryption – AES 256-bits
•
Security Hardening Update
•
GPO Documentation Publication
•
VOS 10.5 Update
•
Antivirus Software Updates
•
Tomcat and JRE/JVM Update
•
Struts Update
•
SQL Rule and Code Update
•
OpenSSL Update
•
Bash Shell and GlibC Update
Participate in the “My Favorite Speaker” Contest
Promote Your Favorite Speaker and You Could Be a Winner
•
Promote your favorite speaker through Twitter and you could win $200 of Cisco
Press products (@CiscoPress)
•
Send a tweet and include
Your favorite speaker’s Twitter handle @CiscoCC
• Two hashtags: #CLUS #MyFavoriteSpeaker
•
•
You can submit an entry for more than one of your “favorite” speakers
•
Don’t forget to follow @CiscoLive and @CiscoPress
•
View the official rules at http://bit.ly/CLUSwin
Complete Your Online Session Evaluation
•
Give us your feedback to be
entered into a Daily Survey
Drawing. A daily winner
will receive a $750 Amazon
gift card.
•
Complete your session surveys
though the Cisco Live mobile
app or your computer on
Cisco Live Connect.
Don’t forget: Cisco Live sessions will be available
for viewing on-demand after the event at
CiscoLive.com/Online
Continue Your Education
•
Demos in the Cisco campus
•
Walk-in Self-Paced Labs
•
Table Topics
•
Meet the Engineer 1:1 meetings
•
Related sessions
Thank you
Contact Center Sessions Week at a Glance
Monday
Tuesday
Wednesday
Thursday
8:00-9:30 (90)
BRKCCT- 1011
Cisco Unified Contact Center
Express Update and Roadmap
8:00-9:30 (90)
BRKCCT-1041
CCE Security Best Practice Guide
Overview
8:00-9:30 (90)
BRKCCT-1002
Hosted Collaboration Service
Contact Center Update
(G.Variyath)
(C. Gonzales)
9:30-10:30 (60)
PSOCCT-1008
Omnichannel Customer Care Preparing for the Mobile
Customer
11:30-12:30 Table Topic
Reporting and Analytics
8:00-10:00 (2hr)
BRKCCT-2007 Cisco Unified
Contact Center Enterprise Planning
and Design (M. Berenjian,M.Eady)
8:00-10:00 (2hr)
BRKCCT-2019 Cisco Unified
Contact Center Express Planning
and Design and Support
(K.McPartlan,K.Gouda))
10:00-11:30 (90)
BRKCCT- 1051
Cisco Unified Contact Center
Enterprise and CVP Overview
and Roadmap
(J.Lundy/S.Vashist)
11:00-11:30 (30)
DEVNET-1130
Cisco Finesse API’s (T.Phipps)
12:00-1:00 Table Topics
UCCX (G.Variyath)
Finesse(T.Phipps)
Color Coding
UCCE
UCCX
MediaSense
Omnichannel
(C.Logue/G.Variyath)
1:00-2:00 (60)
CCSCOL-1400
Case Study: Providing a Total Customer
Experience (C.Botting, M.Voornhout)
1:00-2:30 (90)
BRKCCT-1006
Omnichannel Contact Center Solutions
Overview (W.E.Nijenhuis)
1:00-3:00 (2 hr)
BRKCCT-3005
Solution Troubleshooting for Unified
Contact Center Enterprise (C.Palau)
3:30-5:00 (90)
BRKCCT-1031 Cisco Finesse - The Next
Generation Agent Collaboration
Experience (T.Phipps)
4:00-5:00 (60)
CCSCCT-1405
Case Study: American Century
Investments (N.Westvold)
(G.Burton,M.Turnbow)
8:00-10:00 (2hr)
BRKUCC-2270 Network Media
Recording and Streaming with
Cisco MediaSense (C.Ward)
11:30-12:30 Table Topic
UCCE(PCCE,HCS) & CVP
(J.Lundy, C.Logue)
1:00-3:00 (2hr)
BRKCCT-2050 Building recording
and monitoring applications with the
MediaSense API (K.Rehor)
1:00-3:00 (2hr)
BRKCCT-2056 Contact Center
Reporting & Analytics: Unified
Intelligence Center (V.Gururaj,C.Logue)
3:00-5:00 (2hr)
BRKCCT-2027 UCCE Solution
Service Creation (including CCE
and CVP Scripting) (S.Vashist,,B.Cole)
(A.Mermel,M.Varghese)
10:00-12:00 (2hr)
BRKCCT-2080
Deliver omnichannel Customer
Experience with Remote Expert
Mobile
(R.Gupta,Y.Fedotov)
10:00-11:30 (90)
BRKCCT-1005 Context Service:
the new cloud-based
omnichannel solution for Contact
Center Enterprise and Express
(V.Chhabra)
1:00-2:30 (90)
BRKCCT-1009
Cisco Customer Collaboration
Architectural Vision and Cloud
Evolution
(M.Lepore,T.Famous)
Appendix: Extra CCE
Security Materials
Windows 2008 R2 Firewall
•
Stateful Firewall – drops packets that are unsolicited.
•
Disabled by default on SP1 but new installs have it enabled.
•
Remote configuration is not recommended.
•
“Cscript” or ConfigFirewall.bat is used to configure the firewall for CCE applications. It uses the
CiscoICMfwConfig_exc.xml file.
•
The CiscoICMfwConfig_exc.xml file contains: Allowed Services, Open Ports, and excluded
Applications.
•
Verify it using START > SETTINGS > CONTROL PANEL > WINDOWS FIREWALL tool.
•
Exceptions and Inbound/Outbound Rules tab will show the configuration settings based on the .xml file.
•
Use “Ntfrsult” and “Portqry” tools to test and validate connectivity between two Domain Controller with
firewall configured.
•
Undo Firewall Settings:
•
•
•
Stop all applications.
Use %SYSTEMDRIVE%\CiscoUtils\FirewallConfig\UndoConfigFirewall.bat
Reboot Server
Windows Server 2008 R2 Firewall Ports
Server Port
Protocol
Protocol
Services
135
TCP
RPC
RPC Connector Helper
137
TCP
UDP
NetBIOS Name
UDP
NetBIOS NetLogon and Browsing
138
139
NetBIOS Session
123
UDP
389
TCP
636
TCP
NTP
LDAP
UDP
LDAP SSL
3268
LDAP GC
Server Port
Reference the “Port Utilization Guide”
in order to determine CCE ports that
need to be open for your firewall
configuration.
Protocol Protocol
Services
3269
LDAP GC SSL
42
WINS Replication
53
TCP
UDP
DNS
88
TCP
UDP
Kerberos
445
TCP
UDP
SMB over IP (Microsoft-DS)
10000
TCP
RPC NTFRS
10001
TCP
RPC NTDS
10002 to
10200
TCP
RPC – Dynamic High Open
Ports
Domain Controller (DC) in the DMZ
•
When deploying a DC in the Demilitarized Zone (DMZ), we recommend the
following:
•
Restrict File Replication Services (FRS) to a specific static port.
• Restrict Active Directory Replication traffic to a specific port.
• Configure Remote Procedure Call (RPC) port allocation.
Security Monitoring
•
IP Security Monitor (ipsecmon) – monitors IPSec traffic
•
Network Monitor (netmon) – captures frames sent to/from the server.
•
System Monitoring (perfmon) – system performance data and network activity –
see pg. 11 for recommended counters.
•
Enable IPSec Logging
•
\\System\CurrentControlSet\Services\PolicyAgent
•
•
•
•
Add Key = Oakley
DWORD Value = EnableLogging
DWORD Value = 1
Enable/Disable PolicyAgent
•
•
“net stop policyagent” and “net start policyagent”
Log found at %winddir%\debug\Oakley.log
Auditing
•
Tracks events per system.
•
Types:
Local Policies: Start > Programs > Administrative Tools > Local Security Policies
- SNMP Real-Time Alerts: polls events from Windows eventlog and converts to SNMP
traps (evntwin.exe or evntcmd.exe).
- SQL Server C2 Auditing is not supported with ICM/UCCE. May have significant impact
to the system.
- Active Directory tools to audit logins and management of hosts.
-
Antivirus Guidelines
•
Update AV software scanning engines and definition files regularly, following your organization's
current policies.
•
Upgrade to the latest supported version of the third-party antivirus application. Newer versions
improve scanning speed over previous versions, resulting in lower overhead on servers.
•
Avoid scanning of any files accessed from remote drives (such as network mappings or UNC
connections). Where possible, ensure that each of these remote machines has its own antivirus
software installed, thus keeping all scanning local. With a multitiered antivirus strategy, scanning across
the network and adding to the network load is not required.
•
Schedule full scans of systems by AV software only during scheduled maintenance windows, and
when the AV scan cannot interrupt other Unified ICM maintenance activities.
•
Do not set AV software to run in an automatic or background mode for which all incoming data or
modified files are scanned in real time.
•
Due to the higher scanning overhead of heuristics scanning over traditional antivirus scanning, use this
advanced scanning option only at key points of data entry from untrusted networks (such as email
and internet gateways).
Antivirus Guidelines
•
Real-time or on-access scanning can be enabled, but only on incoming files (when writing to disk).
This approach is the default setting for most antivirus applications. Implementing on-access scanning
on file reads yields a higher impact on system resources than necessary in a high-performance
application environment.
•
While on-demand and real-time scanning of all files gives optimum protection, this configuration does
have the overhead of scanning those files that cannot support malicious code (for example, ASCII text
files). Exclude files or directories of files, in all scanning modes, that are known to present no risk to the
system.
•
Schedule regular disk scans only during low-usage times and at times when application activity is
lowest.
•
Disable the email scanner if the server does not use email.
•
Additionally, set the AV software to block port 25 to block any outgoing email.
•
Block IRC ports.
Antivirus Guidelines
•
If your AV software has spyware detection and removal, then enable this feature. Clean
infected files, or delete them (if these files cannot be cleaned).
•
Enable logging in your AV application. Limit the log size to 2 MB.
•
Set your AV software to scan compressed files.
•
Set your AV software to not use more than 20% CPU utilization at any time.
•
When a virus is found, the first action is to clean the file, the second to delete or
quarantine the file.
•
If it is available in your AV software, enable buffer overflow protection.
•
Set your AV software to start on system startup.
•
Omit files with the following file extensions from the drive and on-access scanning
configuration of the AV program:
•
• *.hst applies to PG
• *.ems applies to ALL
Windows Remote Desktop
•
Native Remote Desktop Protocol (RDP) encryption between client and server is
supported. It’s the preferred method due to its security and low impact on performance.
•
Windows 2008 R2 Terminal Services (aka Remote Desktop) can replace pcAnywhere and
VNC.
-
•
Mstsc /v:<server[:port]>
RDP-TCP Guidelines:
-
-
Limit active connections to 1.
End disconnected sessions in 5 mins or less.
Inactive sessions limited to 1 day.
Idle sessions limited to 30mins.
Set permissions for users and groups – Administrator Full Control vs. User Limited vs. Guess
Access Restricted.
Set High encryption levels of connections.
Limit permission from specific host via ip address.
pcAnywhere and VNC
•
PcAnywhere provides the following:
Restrict Access to specific host via IP address.
Provides Serialization using a secure code between host and server.
Provides credentials for access and authorization.
Protects Data stream between host and server through encryption.
-
-
Prevent host integrity – prevents file and application changes.
Logging for sessions and identification through Symantec Remote Access Perimeter Scanner
(RAPS).
-
-
•
pCAnywhere encryption
Symmetric encryption
Public Key encryption
Logging features covers pcAnywhere log, NT Event log (Windows Server 2008 R2) or SNMP monitor.
Limited to 1 user at a time.
For VNC, SSH Servers to provide encrypted tunnels for VNC sessions are not supported
by Cisco.
Enable Transport Layer Security (TLS) 1.0
•
FIPS compliance for strong encryption requires TLS 1.0 protocol instead of SSL
2.0 or 3.0.
•
IE Setup:
-
-
•
Launch Internet Explorer
Tools > Internet Options
Advance Tab
Scroll to Security and check the “Use TLS 1.0” box.
*Note: If hardening is applied and IE is unable to connect to ISE or Agent Re-skilling,
make sure that IE is configured for TLS 1.0.
Firefox Setup
•
- Firefox 23+ no longer has a user interface setting to disable TLS or SSL3 but there are
manual methods. Please see - http://kb.mozillazine.org/Security.tls.version.*
Endpoint Security
•
IP Phone Hardening
PC Voice VLAN Access – disabling will prevent the PC to send/receive date on the
voice VLAN.
- Span to PC Port – disabling will inhibit the use of desktop-based monitoring and
recording.
- Gratuitous ARP – disable to prevent man in the middle attacks (MITM) or spoofing.
-
-
Third party uses G-ARP to capture voice streams.
CTIOS Silent Monitoring and CAD Silent Monitoring & Recording do not depend on G-ARP.
Other Security Considerations
•
There is a rate limit of Unified CCE agent login attempts with incorrect password. By default, the agent
account is disabled for 15 minutes after three incorrect password attempts, counted over a period of 15
minutes.
•
There is a rate limit on CTI OS Monitor Mode connection. When TLS is enabled and a password is
required, Monitor Mode is disabled for 15 minutes after three incorrect password attempts
(configurable).
•
Windows Management Instrumentation (WMI) is used to manage Windows systems. WMI security is an
extension of the security subsystem built into Windows operating systems. WMI security includes: WMI
namespace-level security; Distributed COM (DCOM) security; and Standard Windows OS security.
•
Microsoft native SNMP service is disabled by the Web Setup tool and its functionality replaced by a
more secure agent infrastructure. Do not re-enable the Microsoft SNMP service because it can cause
conflicts with the Cisco-installed SNMP agents. Use of SNMP v3 is highly preferred.
•
Cisco has qualified Unified ICM software with the Operating System implementations of NTLM,
Kerberos V, and IPsec security protocols.
Active Directory
Active Directory with UCCE
•
High Level Requirements
•
Interaction and Usage
•
Access Rights and Limitations
•
Maintain and Operate
Active Directory with UCCE – High Level
Requirements
•
Compatibility Matrix = AD Version Support
•
•
•
Functional Level agnostic
Staging Guide = Active Directory Integration Requirements
•
Single AD Forest
• No Read-Only Domain Controllers (RODC)
• Adhere to Cisco naming conventions for AD Root (Cisco_ICM) structure
• No co-locating CCE servers with Domain Controllers and/or DNS servers
• Global Catalog at each CCE site for multi-domain deployments
•
You must use the Domain Manager
tool to create the Cisco Root OU,
Cisco_ICM
Group Policy (GPOs)
•
•
•
•
We’ll get to this later but in the meantime, consider the following best practices…
Move UCCE servers into their own OU. Server OU should be at the same or lower level relative to the UCCE Root
OU (Cisco_ICM)
Discuss “blocking” and “enforced” requirements to Cisco OU’s (root + servers)
This, above all: UCCE servers are sophisticated, real-time enterprise application servers
Active Directory with UCCE – Interaction and Usage
•
UCCE Core Components
•
•
•
•
Other Components
•
•
•
•
Loggers and Administration Data Servers require service accounts
(created in Cisco_ICM) for database management
Peripheral Gateways don’t typically make AD calls unless running PG Setup…
CallRouters don’t typically make AD calls
Finesse integrates with a UCCE Administration Data Server for agent and API login (NTLMv1 ONLY)
CUIC login credentials can reside in either LDAP AD and/or CUIC’s Informix DB.
CVP – No AD integration or requirements
UCCE Tools
•
•
Setup Security Group membership: Web Setup, PG Setup, Service Control, Domain Manager, Service Account
Manager (SAM), ICMDBA, Configuration Manager*
Requiring Config Security Group membership: Configuration Manager, Script Editor, ISE
*The only time you require Setup rights for Configuration Manager is when you promote and/or create an
agent/person to a Supervisor. Configuration Manager will associate the Supervisor to the Instance Config Security
Group.
UCCE New Deployment – UCCE AD Security
Groups
•
Access Rights Are Nested In Cisco_ICM
•
•
•
•
Downstream recursive, if you are a member of a Facility
security group, you will have those same rights for the
Instance(s) in that Facility.
Config Security Group (No AD Write Access)
•
•
Configuration Manager tools
Script Editor and ISE (Internet Script Editor)
Corporate Domain
Contact Center Applications
Cisco_ICM
Facility
Config
Setup
Instance
Config
Setup
Config
Setup
Services
•
Setup Security Group (AD Read/Write Access)
•
•
•
•
• Service Security Group (Read-Only)
UCCE installation, patching, and WebSetup tools
Manage security group memberships via Domain Manager Instance level only
Manage service accounts via SAM tool
Users created via Service Account Manager
Configuration Manager: User and Agent list tools
(SAM) tool are members of this group
Logger/Distributor service account
membership
UCCE AD Security Groups Impact On
AD Domain Tools
•
I’m The AD Administrator And I Have A Few Concerns…
•
Assuming An AD User Is A Member Of All UCCE Security Groups, What Can They Do In
My Active Directory Domain?
•
•
•
•
•
•
Not much…
User cannot log onto the Domain Controller
User cannot make any changes in the AD domain whatsoever
User cannot create domain OUs, Users, Groups, Policies, etc.
Unless the user is a member of the Setup security group, he/she won’t
be able to stop/start UCCE services.
•
Users With UCCE Security Group Membership(s) Can Only
Administor UCCE Related Objects
•
UCCE Software Does Not Modify AD Objects Without Direct
User Intervention and Control
UCCE New Deployment – UCCE Domain Manager
•
Creates the Cisco_ICM (Root) OUs
•
•
•
•
Creates and defines all UCCE security groups and permissions for
root, Facility, and Instance.
Requires domain administrator read/write privileges and this user
becomes a member of the Setup security group during OU creation.
Manages AD User Membership To UCCE Security Groups
•
•
•
•
•
Control access rights to UCCE tools
Hierarchical approach for maximum administration flexibility
Nested, downward recursive security group rights. Example: A user
that’s a member of the Facility Config security group will have
UCCE
configuration rights to all Instances in that Facility.
After initial setup of the UCCE Root, you may use standard AD tools associate users to our Security Groups
UCCE New Deployment – Service Account Manager
•
UCCE Service Account Management
•
•
•
•
•
•
Must be ran locally on each respective server
User must be a member of the Setup Security Group
User must have local-domain administrator read/write
privileges.
Modify (after initial account creation) Domain Service
Account names and passwords.
Used As A Post-Install Diagnostic Tool
•
•
Check and manage the health of UCCE service accounts
Health status and remediation: 9.0(y) Staging Guide page 64 - 69
By default when you install UCCE, all component services (PG,
Router, Dialer, CG, CTIOS, etc.) will use the Local System
Account. The Logger and Distributor services however, will be
bound to a specific AD user account in the Instance OU.
Moving UCCE AD Objects
Reasons Why You May Have To Move AD Objects
•
User Story 1
•
•
User Story 2
•
•
“We need to move our UCCE administration users and agent supervisors to another OU
in the same domain. Will this impact UCCE functionality?”
“We are changing our AD structure. Currently, the Cisco_ICM OU is located directly
under the domain CORP.COM  Cisco_ICM. We would like to move the Cisco root OU
to a lower level container like,
CORP.COM  Applications  Contact Center Enterprise  Cisco_ICM. Is this
possible and what are the steps?”
User Story 3
•
“We are moving our UCCE Servers (and thus, the Cisco_ICM) to a new domain.”
Moving AD Objects – Intra-Domain (Simple)
A few things to know about moving objects in Active Directory…
•
After Windows 2000, Moving AD Objects Is Drag and Drop Simple
•
Especially so for intra-domain tasks
• Inter-domain moves are more complicated
•
Permissions Assigned Directly To AD Objects Remains With The Object After
A Move
•
•
Inherited Permissions Are Lost
•
•
UCCE tools assign AD permissions directly
AD objects will inherit permissions (and restrictions) assigned to the new OU
In AD, Objects With Similar Permission Settings Are Usually Grouped Together
•
Know the target OU policies before you move the Cisco_ICM root OU.
Moving A UCCE AD User Object – Intra-Domain
(Simple)
•
User Story 1
•
•
Answer
•
•
“We need to move our UCCE administration users and agent supervisors to another OU
in the same domain. Will this impact UCCE functionality?”
This type of AD object move will not impact UCCE functionality. So long as you are not
moving the native UCCE service accounts (Logger/Distributor), this AD task is
transparent to UCCE.
What’s Involved?
•
Ensure that all users are completely logged out.
• Using Microsoft Active Directly Users and Computers, drag and drop the user object to
its new location.
Moving A UCCE AD User Object – Intra-Domain
(Simple)
Moving UCCE Servers To Another OU – Intra-Domain
(Simple)
•
What About Moving Servers In The Same Domain?
•
•
Must Stop All UCCE Services Before Moving UCCE Servers
•
•
•
Similar To Moving Users
Including duplexed peers … plan a maintenance window.
Computers Vs. Users
•
Unlike users who may have direct policies and permissions applied, servers in AD typcially inherit
their operational rules through a Group Policy. Example: You may have separate containers in AD for
Windows 2003 and Windows 2008 R2 servers so that GPO management can be applied
respectively.
•
In short, when you move users around in an AD domain, their permissions will follow as they are
often times applied directly. However, moving computers around in an AD domain will often times
result in inheritance of different policy objects depending on the source and target OU’s.
No Post-Actions On UCCE To Accommodate This Task
Moving The Cisco_ICM Root OU – Intra-Domain
(Simple)
•
User Story 2
•
•
Answer
•
•
“We are changing our AD structure. Currently, the Cisco_ICM OU is located directly
under the domain CORP.COM  Cisco_ICM. We would like to move the root to a lower
level container like,
CORP.COM  Applications  Contact Center Enterprise  Cisco_ICM. Is this
possible and what are the steps?”
Yes, this is possible and it’s the most supported and least risky move possible for the
UCCE root OU.
What’s Involved?
•
I’m about to show you…
Moving The Cisco_ICM Root OU – Intra-Domain
(Simple)
1.
•
2.
•
3.
•
Stop All UCCE Services Via Service Control
This includes duplexed peers.
Run WebSetup On The Central Controller
Record all Facility and Instance names and numbers.
Launch Microsoft Active Directory Users And Computers
Drag and drop the OU to the new location
OR
Or right-click on the OU you want to move
Moving The Cisco_ICM Root OU – Intra-Domain
(Simple)
4.
•
Start Up All UCCE Services Via Service Control
Graceful startup order: LoggerA, RouterA, RouterB, LoggerB, PG’s and Administration
Servers
5.
Launch UCCE Service Account Manager (SAM)
•
Validate that Logger and Distributor service accounts are healthy
6.
Launch UCCE User List Tool
•
Validate permissions for UCCE users were properly migrated/retained post-OU move
DONE
Moving UCCE AD Objects – Inter-Domain (Complex)
•
User Story 3
•
•
Answer
•
•
“We are moving our UCCE Servers to a new domain. We understand that the UCCE servers must
reside in the same domain as the Cisco_ICM root OU. Can we copy the existing Cisco_ICM OU to
the new domain?”
No. Copying the existing Cisco_ICM root OU to the new/target domain is not supported.
What’s Involved?
•
•
•
•
•
•
Create a new Cisco_ICM root OU in the new/target domain using CCE’s Domain Manager tool
Root, Facility, and Instance from the source Cisco_ICM OU must all match the newly created
root OU
All UCCE services must be stopped prior to moving the servers; move the UCCE servers to the new
domain
Run WebSetup and PGSetup, respectively to map the instance to the new domain
Run CCE’s Service Account Manager (SAM) tool to validate the Logger and Distributor service
accounts were properly setup in the new domain
Decide whether or not to migrate the UCCE user and supervisor accounts to the new domain
Moving UCCE AD Objects – Inter-Domain
(Complex)
•
Inter-Domain AD User Objects From The Viewpoint Of UCCE…
•
UCCE Supervisors, Configuration, and Setup Users Can Reside Outside Of The UCCE
Root OU
Cisco_ICM
UCCE Servers and
Users
UCCE Users
Config, Setup, Supervisor
UCCE Users
Config, Setup, Supervisor
•
UCCE Agent Explorer & User List Tool Have Resource Access To Domains In The Forest
•
•
Two-way transitive trusts
One-way outgoing external trusts allowing users from other domains to access resources in root domain
Agent Explorer
User List Tool
Moving UCCE AD Objects – Inter-Domain
(Complex)
•
Inter-Domain AD Server Objects From The Viewpoint Of UCCE…
•
UCCE Servers Must Be In An OU That’s Local To / In The Same Domain As The UCCE
Root OU
Cisco_ICM
UCCE Servers and
Users
UCCE Users
UCCE Users
Config, Setup, Supervisor
UCCE Servers
Config, Setup, Supervisor
•
UCCE Servers Are Linked To Root OU Facility/Instance Via WebSetup’s Instance
Management
•
Note the ‘Change Domain’ option
Moving UCCE AD Objects – Inter-Domain
(Complex)
•
OK, Back To The User Story…
•
•
“We are moving our UCCE Servers to a new domain. We understand that the UCCE servers must
reside in the same domain as the Cisco_ICM root OU. Can we copy the existing Cisco_ICM OU to
the new domain?”
Order Of Operations
1.
Using CCE’s Domain Manager, create a new (carbon copy) of the UCCE root OU in the new
Two-way transitive trust
domain.
One-way outgoing external trust
2.
3.
Shutdown all UCCE servers and move them into a similar OU in the new domain.
Run CCE’s WebSetup on each Central Controller server (including Distributors) and click the,
‘Change Domain’ button in the Instance Management drawer
Moving UCCE AD Objects – Inter-Domain
(Complex)
•
Order Of Operations Continued…
4.
Run CCE’s Service Account Manager (SAM) tool on all Central Controller components to create a
new AD service accounts for: LoggerA, LoggerB, and your Distributors.
At this stage, you have successfully migrated the UCCE servers
Now, we need to migrate the UCCE users and supervisors
5.
When it comes to the users, you have a couple of options…
①
②
You can add the Config and Setup Security Group from the source domain as a member of the Config and Setup
Security Group in the new domain. This will allow the UCCE instance in the new root OU to access the original
permissions mapping from the old root OU. Note: The source UCCE root OU must not be touched!
OR
You can use the User Migration Tool to export UCCE users from the source domain and then import them into
the target domain. This will create duplicate users in AD between the source and target domains. All UCCE
permissions will be properly mapped over. Note: User Migration Tool is a separate download via cisco.com
Moving UCCE AD Objects – Inter-Domain
(Complex)
•
When Moving Objects To A New Domain, You May Have The Need To Also
Rename UCCE Facility and/or Instance OUs
•
Renaming Cisco_ICM Facility As Part Of A Domain Move
•
•
Supported and does not change previous steps discussed
Renaming Cisco_ICM Instance As Part Of A Domain Move
•
NOT supported. If you rename the UCCE Instance, you are in-a-sense installing a brand
new UCCE customer from scratch.
• There is no migration path when the Instance name is changed
Group Policy Objects
(GPOs)
Playing Nice With UCCE OU’s and Group Policy
Objects

Understand How UCCE Works With AD
•

Know the dependencies for tools and general functionality
Understand The Intent/Purpose Behind Group Policies
•
UCCE servers are real-time application servers and often times fall into their own management
category

Consult Cisco’s UCCE Security Best Practices Guide

Test GPO Changes In The Lab Prior To Production Rollout

Document Changes
•
•
•
•
What
When
Where
Why
What Are Group Policy Objects?
•
What Is A Group Policy?
•
•
Common Windows 2008 Group Policy Security Settings
•
•
•
•
•
Mechanism used to define a set of rules to centrally secure, manage, enforce, and deploy across a
group of computers and users
Limiting an AD user’s administrative authority
Enforced passwords
Advanced security through Windows firewall
User Account Control (UAC)
Policy Considerations For UCCE Computers and Users OU
•
•
Audit Policies
Policies that control:



Passwords, encryption and certificates
Auto-updates
Downloads, scans, exclusions
Consult
the UCCE Security Best Practices Guide
How Are Group Policies Deployed In Active
Directory?
•
Group Policy Types
•
Local group policies exists on all Windows systems
• Active Directory (AD) group policies are only available
in an AD Forest
•
Group Policy Editor
•
Primary function of this tool is to configure group policy
settings within a GPO
•
Group Policy Management
•
Primary function of this tool is to apply, link, and control
GPO behavior within Active Directory forests, domains, and OU’s.
What Are Group Policy Objects?
•
Most Group Policy Restrictions Do Not Apply To Nor Affect Cisco Root OU
•
The Cisco_ICM OU structure does not contain any servers and only contains service
account users in the Instance OU
Playing Nice With UCCE OU’s and Group Policy
Objects
•
Applying GPO’s To An OU
•
•
•
Block Policy Inheritance (Indirect GPO)
•
•
Indirectly via top-down inheritance from a higher-level OU or domain root
Directly linked within the OU
•
Prevents higher-level policies from applying to users and computers within a site, domain, or OU
This can be overridden if higher-level policies have the “Enforced” option checked
•
Preference to have UCCE Root OU directly under the domain root and not nested (if possible)
No Override – 2003 / Enforced – 2008 (Direct GPO)
•
•
Ensures that the linked GPO is always enabled/enforced
Notice the ‘padlock’ on the linked policy when it’s Enforced
Summary
•
Demystified How UCCE and Active Directory Works Together
•
Aliviated Common Security Concerns
•
Security groups
• GPOs
•
Domain Manager Used To Create UCCE Root OU Footprint
•
Service Account Manager (SAM) Used To Diagnose And Resolve Service
Accounts
•
User Story Examples Highlight Common Questions Asked
•
Cisco forums
• Cisco TAC
•
Confidence = Go Forth And Concur!