Cisco Unified Communications Manager Common Criteria Configuration Guide Version 0.4 EDCS 1502594 20 July 2015 ©2015, Cisco Systems, Inc. All rights reserved. This document can be reproduced in full without any modifications. Cisco Unified Communications Manager Common Criteria Guidance Table of Contents 1 Introduction ............................................................................................................................. 8 Audience ......................................................................................................................... 8 Purpose ............................................................................................................................ 8 Document References ..................................................................................................... 8 Supported Hardware and Software ................................................................................. 9 Operational Environment .............................................................................................. 11 Supported non-TOE Hardware/ Software/ Firmware ............................................... 11 Excluded Functionality ................................................................................................. 11 2 Secure Acceptance of the TOE ............................................................................................. 12 3 Secure Installation and Configuration .................................................................................. 14 Physical Installation ...................................................................................................... 14 Initial Setup of CUCM .................................................................................................. 14 Enabling FIPS Mode ................................................................................................. 14 Certificates ................................................................................................................ 15 Administrator Configuration, Credentials and Session Termination ........................ 16 Logging Configuration.............................................................................................. 16 Endpoint Devices and User Association ....................................................................... 25 Network Protocols and Cryptographic Settings ............................................................ 26 Remote Administration Protocols ............................................................................. 26 SIP Connections and Protocols ................................................................................. 26 Clusters and Route Patterns ...................................................................................... 27 4 Secure Management .............................................................................................................. 28 User Roles ..................................................................................................................... 28 Clock Management ....................................................................................................... 28 Identification and Authentication ................................................................................. 29 Login Banners ............................................................................................................... 29 Product Updates ............................................................................................................ 29 5 Security Relevant Events ...................................................................................................... 29 Reviewing, Downloading and Deleting Audit Records ................................................ 30 6 Network Services and Protocols ........................................................................................... 31 Page 2 of 35 Cisco Unified Communications Manager Common Criteria Guidance 7 Modes of Operation .............................................................................................................. 32 8 Security Measures for the Operational Environment............................................................ 33 9 Related Documentation ......................................................................................................... 34 Documentation Feedback.............................................................................................. 34 Obtaining Technical Assistance.................................................................................... 34 Page 3 of 35 Cisco Unified Communications Manager Common Criteria Guidance List of Tables Table 1: Acronyms .......................................................................................................................... 5 Table 2 Terminology...................................................................................................................... 6 Table 3 Cisco Documentation........................................................................................................ 8 Table 4: Operational Environment Components .......................................................................... 11 Table 5 Excluded Functionality .................................................................................................... 11 Table 6 TOE External Identification............................................................................................ 12 Table 7 Evaluated Software Images ............................................................................................ 13 Table 8 Audit Entries ................................................................................................................... 18 Table 10: Protocols and Services .................................................................................................. 31 Table 11 Operational Environment Security Measures .............................................................. 33 Page 4 of 35 Cisco Unified Communications Manager Common Criteria Guidance List of Acronyms The following acronyms and abbreviations may be used in this document: Table 1: Acronyms Acronyms / Abbreviations AAA ACL AES BRI CC CEM CM CTI CUCM DHCP EAL EHWIC ESP GE HTTP HTTPS ICMP IT NDPP OS PoE PP SBC SHS SIP ST TCP TLS TOE TSC TSF TSP UCM UDP UCS VoIP WAN WIC Definition Administration, Authorization, and Accounting Access Control Lists Advanced Encryption Standard Basic Rate Interface Common Criteria for Information Technology Security Evaluation Common Evaluation Methodology for Information Technology Security Configuration Management Computer Telephony Integration ports Cisco Unified Communications Manager Dynamic Host Configuration Protocol Evaluation Assurance Level Ethernet High-Speed WIC Encapsulating Security Payload Gigabit Ethernet port Hyper-Text Transport Protocol Hyper-Text Transport Protocol Secure Internet Control Message Protocol Information Technology Network Device Protection Profile Operating System Power over Ethernet Protection Profile Session Border Controllers Secure Hash Standard Session Initiation Protocol Security Target Transport Control Protocol Transport Layer Security Target of Evaluation TSF Scope of Control TOE Security Function TOE Security Policy Unified Communications Manager User datagram protocol Unified Computing System Voice over IP Wide Area Network WAN Interface Card Page 5 of 35 Cisco Unified Communications Manager Common Criteria Guidance Terminology Table 2 Terminology Term Authorized Administrator Peer CUCM Security Administrator SIP Server User Definition Any user which has been assigned to a privilege level that is permitted to perform all TSF-related functions. Another CUCM on the network that the TOE interfaces with. Synonymous with Authorized Administrator for the purposes of this evaluation. The SIP Server (the TOE) interacts with a VoIP client (user smartphone) and provides registrar and proxy capabilities required for call-session management as well as establishing, processing, and terminating VoIP calls. Any entity (human user or external IT entity) outside the TOE that interacts with the TOE. Page 6 of 35 Cisco Unified Communications Manager Common Criteria Guidance DOCUMENT INTRODUCTION Prepared By: Cisco Systems, Inc. 170 West Tasman Dr. San Jose, CA 95134 This document provides supporting evidence for an evaluation of a specific Target of Evaluation (TOE), the Cisco Unified Communications Manager (CUCM). This Operational User Guidance with Preparative Procedures addresses the administration of the TOE software and hardware and describes how to install, configure, and maintain the TOE in the Common Criteria evaluated configuration. REVISION HISTORY Rev Date Description .01 2 March 2015 Initial Draft .02 14 April 2015 Updated based on Evaluator findings .03 20 May 2015 Updated based on Evaluator findings .04 20 July 2015 Updated based on Evaluator findings Page 7 of 35 Cisco Unified Communications Manager Common Criteria Guidance 1 Introduction This Operational User Guidance with Preparative Procedures documents the administration of the Cisco Unified Communications Manager (CUCM), the TOE, as it was certified under Common Criteria. The Cisco Unified Communications Manager (CUCM ) may be referenced below as the Cisco Unified Communications Manager, CUCM, or simply TOE. Audience This document is written for administrators configuring the TOE. This document assumes that you are familiar with Cisco or equivalent call processing and unified communications products. It is also assumed that you have a general understanding and knowledge with the basic concepts and terminologies used in enterprise telephony features and functions to packet telephony network devices such as IP phones, media processing devices, voice-over-IP (VoIP) gateways, and multimedia applications, that you are a trusted individual, and that you are trained to use the operating systems on which you are running your network. Purpose This document is the Operational User Guidance with Preparative Procedures for the Common Criteria evaluation. It was written to highlight the specific TOE configuration and administrator functions and interfaces that are necessary to configure and maintain the TOE in the evaluated configuration. The evaluated configuration is the configuration of the TOE that satisfies the requirements as defined in the Security Target (ST). This document covers all of the security functional requirements specified in the ST and as summarized in Section 3 of this document. This document does not mandate configuration settings for the features of the TOE that are outside the evaluation scope, which should be set according to your organizational security policies. This document is not meant to detail specific actions performed by the administrator but rather is a road map for identifying the appropriate locations within Cisco documentation to get the specific details for configuring and maintaining CUCM operations. It is recommended that you read all instructions in this document and any references before performing steps outlined and entering commands. Section 9 of this document provides information for obtaining assistance. Document References This section lists the Cisco Systems documentation that is also the Common Criteria Configuration Item (CI) List. The documents used are shown below in Table 3. Throughout this document, the guides will be referred to by the “#”, such as [1]. Table 3 Cisco Documentation # [1] Title Cisco Unified Communications Manager (CallManager) Maintain and Operate Guides Link http://www.cisco.com/c/en/us/support/unifiedcommunications/unified-communications-managercallmanager/tsd-products-support-maintain-and-operate.html Page 8 of 35 Cisco Unified Communications Manager Common Criteria Guidance # Title Link Cisco UCS C220 Server Installation and Service Guide http://www.cisco.com/c/en/us/td/docs/unified_computing/ucs/c/hw /C220/install/C220.html Cisco UCS C210 Installation and Service Guide http://www.cisco.com/c/en/us/td/docs/unified_computing/ucs/c/hw /C210M1/install/C210M1.html [3] Administration Guide for Cisco Unified Communications Manager, Release 11.0(1) http://www.cisco.com/c/en/us/td/docs/voice_ip_comm/cucm/admi n/11_0_1/administration/CUCM_BK_A0A10476_00_administrati on-guide-for-cisco-unified.html [4] Cisco Unified Real-Time Monitoring Tool Administration Guide, Release 11.0(1) http://www.cisco.com/c/en/us/td/docs/voice_ip_comm/cucm/servi ce/11_0_1/RTMT/CUCM_BK_CC660A6B_00_cisco-unifiedrtmt-administration-1101.html [5] System Configuration Guide for Cisco Unified Communications Manager, Release 11.0(1) http://www.cisco.com/c/en/us/td/docs/voice_ip_comm/cucm/admi n/11_0_1/sysConfig/CUCM_BK_C733E983_00_cucm-systemconfiguration-guide.html [6] Security Guide for Cisco Unified Communications Manager, Release 11.0(1) http://www.cisco.com/c/en/us/td/docs/voice_ip_comm/cucm/secur ity/11_0_1/secugd/CUCM_BK_C1A78C1D_00_cucm-securityguide-1101.html [7] Cisco Unified Communications Manager FIPS 140-2 Certificate Refer to FIPS certificate 2100; Cisco FIPS Object Module [8] Cisco Unified Communications Manager Common Criteria Guidance, version 0.1 This will be updated with a link to the Cisco certification webpage [9] Cisco Unified Communications Manager Security Target, version .01 This will be updated with the link to the NIAP webpage [10] Installation Guide for Cisco Unified Communications Manager, Release 11.0(1) http://www.cisco.com/c/en/us/td/docs/voice_ip_comm/cucm/instal l/11_0_1/CUCM_BK_IDF93684_00_installing-cucm_1101.html [11] Release Notes for Cisco Unified Communications Manager and IM and Presence Service, Release 11.0(1) http://www.cisco.com/c/en/us/td/docs/voice_ip_comm/cucm/rel_n otes/11_0_1/CUCM_BK_R30921A8_00_CUCM_releasenotes_1101.html [12] Cisco Collaboration on Virtual Servers http://www.cisco.com/c/en/us/td/docs/voice_ip_comm/cucm/virtua l/CUCM_BK_CF3D71B4_00_cucm_virtual_servers.html [2] (Software Version: 4.1) Supported Hardware and Software Only the hardware and software listed in section 1.5 of the Security Target (ST) is compliant with the Common Criteria evaluation. Using hardware not specified in the ST invalidates the secure configuration. Likewise, using any software version other than the evaluated software Page 9 of 35 Cisco Unified Communications Manager Common Criteria Guidance listed in the ST will invalidate the secure configuration. The TOE is a hardware and software solution that makes up the CUCM system as follows: • • The hardware is comprised of the Cisco Unified Computing System™ (Cisco UCS) C220 M3 Rack Server or the Cisco Unified Computing System™ (Cisco UCS) C210 M2 Rack Server The software is comprised of the CUCM software image Release 11.0 The software comes pre-installed on the UCS C220 M3 Server or the UCS C210 M2 Server and is comprised of the Cisco CUCM 11.0 software. Cisco Unified CM Administration is a web-based application that is the main administration and configuration interface for Cisco Unified Communications Manager. The CUCM Administration is used to manage the system, features, server settings, call routing rules, phones and end users. CUCM Administration supports the following operating system browsers: • • • • Microsoft Internet Explorer (IE) 7 when running on Microsoft Windows XP SP3 Microsoft Internet Explorer (IE) 8 when running on Microsoft Windows XP SP3 or Microsoft Vista SP2 Firefox 3.x when running on Microsoft Windows XP SP3, Microsoft Vista SP2 or Apple MAC OS X Safari 4.x when running on Apple MAC OS X HTTPS is used to secure the connection between CUCM and the browser. Hypertext Transfer Protocol Over Secure Sockets Layer (HTTPS) Refer to [6] Cisco Unified Communications Manager works as an Appliance on a non-Windows-based Operating System. The Cisco Unified Communications Manager appliance refers to the following functions: • • • Works on a specific hardware platform(s) that Cisco specifies and supplies and, in some cases, the customer supplies Works in a carefully controlled software environment that Cisco specifies and installs Includes all software that is required to operate, maintain, secure, and manage servers Cisco Unified Communications Manager servers get preinstalled with software to ease customer and partner deployment and automatically search for updates and notify administrators when key security fixes and software upgrades are available for their system. This process comprises Electronic Software Delivery. Because Cisco Unified Communications Manager is a software application, enhancing its capabilities in production environments requires only upgrading software on the server platform. Page 10 of 35 Cisco Unified Communications Manager Common Criteria Guidance Operational Environment Supported non-TOE Hardware/ Software/ Firmware The TOE supports (in some cases optionally) the following hardware, software, and firmware in its environment: Table 4: Operational Environment Components Component Local Console Required No Management Workstation using web browser for HTTPS NTP Server Yes RADIUS or TACACS+ AAA Server No Syslog Server Remote Endpoint Yes Yes Yes Usage/Purpose Description for TOE performance This includes any IT Environment Console that is directly connected to the TOE via the Serial Console Port and is used by the TOE administrator to support TOE administration. This includes any IT Environment Management workstation with a web browser installed that is used by the TOE administrator to support TOE administration through HTTPS protected channels. Any web browser that supports TLSv1.0 with the supported ciphersuites may be used. The TOE supports communications with an NTP server in order to synchronize the date and time on the TOE with the NTP server’s date and time. This includes any IT environment RADIUS or TACACS+ AAA server that provides single-use authentication mechanisms. This can be any RADIUS or TACACS+ AAA server that provides single-use authentication. This includes any syslog server to which the TOE would transmit syslog messages. This includes any peer (other SIP servers) or VoIP client with which the TOE communicates with the end points over a protected TLS channel. Excluded Functionality Table 5 Excluded Functionality Excluded Functionality Exclusion Rationale Non-FIPS 140-2 mode of operation on the router. This mode of operation includes non-FIPS allowed operations. The exclusion of this functionality does not affect compliance to the U.S. Government Protection Profile for Security Requirements for Network Devices PP or the SIP Server EP. Page 11 of 35 Cisco Unified Communications Manager Common Criteria Guidance 2 Secure Acceptance of the TOE In order to ensure the correct TOE is received, the TOE should be examined to ensure that that is has not been tampered with during delivery. Verify that the TOE software and hardware were not tampered with during delivery by performing the following actions: Step 1 Before unpacking the TOE, inspect the physical packaging the equipment was delivered in. Verify that the external cardboard packing is printed with the Cisco Systems logo and motifs. If it is not, contact the supplier of the equipment (Cisco Systems or an authorized Cisco distributor/partner). Step 2 Verify that the packaging has not obviously been opened and resealed by examining the tape that seals the package. If the package appears to have been resealed, contact the supplier of the equipment (Cisco Systems or an authorized Cisco distributor/partner). Step 3 Verify that the box has a white tamper-resistant, tamper-evident Cisco Systems bar coded label applied to the external cardboard box. If it does not, contact the supplier of the equipment (Cisco Systems or an authorized Cisco distributor/partner). This label will include the Cisco product number, serial number, and other information regarding the contents of the box. Step 4 Note the serial number of the TOE on the shipping documentation. The serial number displayed on the white label affixed to the outer box will be that of the device. Verify the serial number on the shipping documentation matches the serial number on the separately mailed invoice for the equipment. If it does not, contact the supplier of the equipment (Cisco Systems or an authorized Cisco distributor/partner). Step 5 Verify that the box was indeed shipped from the expected supplier of the equipment (Cisco Systems or an authorized Cisco distributor/partner). This can be done by verifying with the supplier that they shipped the box with the courier company that delivered the box and that the consignment note number for the shipment matches that used on the delivery. Also verify that the serial numbers of the items shipped match the serial numbers of the items delivered. This verification should be performed by some mechanism that was not involved in the actual equipment delivery, for example, phone/FAX or other online tracking service. Step 6 Inspect the TOE according to the instructions in [2] Unpack and Inspect the Cisco Unified Computing System™ (Cisco UCS) C220 M3 or the Cisco UCS C210 M2. Rack Server installed with CUCM software image Release 11.0. Verify that the serial number displayed on the unit itself matches the serial number on the shipping documentation and the invoice. If it does not, contact the supplier of the equipment (Cisco Systems or an authorized Cisco distributor/partner). Also verify that the unit has the following external identification as described in Table 6 below. Table 6 TOE External Identification Product Name Model Number External Identification Cisco Unified Computing System™ (Cisco UCS) C220 M3S UCS C220 M3S Cisco Unified Computing System™ (Cisco UCS) C210 M2 UCS C210 M2 Page 12 of 35 Cisco Unified Communications Manager Common Criteria Guidance Step 7 As noted above, Cisco Unified Communications Manager servers get preinstalled with software. To verify the software version and to register the license, from a PC in your network that has been installed with one of the supported browsers, browse into a server that is running Cisco Unified Communications Manager Administration and log in with administrative privileges. Follow the instructions in [3] Administration Overview -> Getting Started -> Sign In Step 8 To verify the software version CUCM 11.0 Follow the instructions in [3] Manage the System -> Monitor System Status -> View Installed Software. See Table 7 below for the details that must be checked to ensure the software has not been modified in anyway. Table 7 Evaluated Software Images Software Version Image Name Hash Unified Communications Manager Version 11.0 UCSInstall_UCOS_11.0.1.1000010.sgn.iso MD5 Checksum: 0fea04be800597d7e414984afed5ae26 File size - 5194.11 MB (5446422528 bytes) SHA512 Checksum: 27f41b24ee75a91a59a18ea857feca48... Page 13 of 35 Cisco Unified Communications Manager Common Criteria Guidance 3 Secure Installation and Configuration Physical Installation Follow the instructions in [2] Preparing for Server Installation following with Installing the Server In a Rack and Initial Setup. There are network requirements that must be met before deploying CUCM. Initial Setup of CUCM Follow the instructions in Configure Initial Parameters for the System in [5] for the initial setup configurations. There are network requirements that must be met before deploying CUCM such as IP addressing, DNS requirements, software and supported browsers and their associated certificates. During the initial startup of the Cisco Unified Communications Manager you will be required to reset the Administrator default setting. Refer to the password requirements listed below in Section 3.2.2 Administrator Configuration, Credentials and Session Termination. The Initial configuration setup the licensing requirements, the server name and ports, systemwide parameters that are required when you setup a node for the first time and the core settings for server groups, time zone information and regions. . The Post-Installation Tasks for Cisco Unified Communications Manager in [10] will guide you through activating services and installing the license. After the initial setup and activating licenses and services are completed, the remainder of this guide will guide you through setting up enterprise parameters for end users, endpoint devices and call administration control [5]. The default method to administer is CUCM is securely connecting to the CUCM GUI interface using TLS. If local administration is required via directly connected to the UCS appliance, refer to Administration in [12] using vSphere client. Enabling FIPS Mode The TOE must be run in the FIPS mode of operation. Refer to [6] Security for SRST References, Trunks, and Gateways -> FIPS 140-2 Mode Setup for the configuration settings. The self-tests for the cryptographic functions in the TOE are run automatically during power-on as part of the POST. The same POST self-tests for the cryptographic operations are also run periodically during operational state. If any of the self-tests fail, the TOE transitions into an error state. In the error state, all secure management and data transmission that is affected by the failure is halted and the TOE outputs status information indicating the failure. In an error state the Administrator may be able to log in to troubleshoot the issue. During the POST, all ports are blocked from moving to forwarding state. If all components of all modules pass the POST, the system is placed in FIPS PASS state and ports are allowed to forward management and data traffic. If the POST fails the TOE will continuously reboot in attempts to correct the failure. During this state no one can login, no traffic is passed, the TOE is not operational. If the problem is not corrected by the reboot, Cisco Technical Support provides 24-hour-a-day award-winning technical assistance. The Cisco Technical Support & Page 14 of 35 Cisco Unified Communications Manager Common Criteria Guidance Documentation website on Cisco.com features extensive online support resources. In addition, if you have a valid Cisco service contract, Cisco Technical Assistance Center (TAC) engineers provide telephone support. Contact Cisco TAC as described in 9.2 Obtaining Technical Assistance. In this 11.0 release of CUCM, the TOE provides support to monitor the Entropy Monitoring Daemon. This feature does not require any configuration, though it can be turned off by using the CLI. In the evaluated configuration, this service should not be turned off [6] Default Security Setup -> ECDSA Support for Common Criteria for Certified Solutions -> Entropy. Certificates The CUCM supports self-signed and third party signed certificates. The certificates are used to securely authenticate devices, encrypt data and to hash data to ensure its integrity. The most important part of certificates is that you know and define how your data is encrypted and shared with entities such as the intended website, phone, or FTP server. When your system trusts a certificate, this means that there is a preinstalled certificate on your system which states it is fully confident that it shares information with the correct destination. Otherwise, it terminates the communication between these points. In order to trust a certificate, trust must already be established with a third-party certificate authority (CA). Your devices must know that they can trust both the CA and intermediate certificates first, before they can trust the server certificate presented by the exchange of messages called the secure sockets layer (SSL) handshake. Refer to Manage Certificates in [3] and Security Overview -> Certificates and Security Overview -> Certificate Setup in [6]. The CUCM also supports EDCSA certificates and in the evaluated configuration, it is required to use these certificates [10]. When you install Cisco Unified Communications Manager, the selfsigned certificate is generated. Cisco Unified Communications Manager Release 11.0 always has an ECDSA certificate and uses that certificate in its SIP interface. All SIP connections support the ECDSA ciphers and use ECDSA certificates. For third-party signed certificates or certificate chain, you will need to upload the certificate authority root certificate of the certificate authority that signed an application certificate. If a subordinate certificate authority signs an application certificate, you must upload the certificate authority root certificate of the subordinate certificate authority. You can also upload the PKCS#7 format certificate chain of all certificate authority certificates. You can upload certificate authority root certificates and application certificates by using the Upload Certificate dialog box. When you upload a certificate authority root certificate or certificate chain that contains only certificate authority certificates, choose the certificate name with the format certificate type-trust. When you upload an application certificate or certificate chain that contains an application certificate and certificate authority certificates, choose the certificate name that includes only the certificate type. To download certificates, on the Cisco Unified OS Administration page, choose Security > Certificate Management. Next, specify the search criteria and then click Find, then choose the file name of the certificate or certificate trust list (CTL) and click Download. To upload any new certificates or certificate chains that you want your system to trust, from the Cisco Unified OS Administration, choose Security > Certificate Management, click Upload Certificate/Certificate Chain, choose the certificate name from the Certificate Purpose dropdown list, then choose the file to upload by performing one of the following steps: Page 15 of 35 Cisco Unified Communications Manager Common Criteria Guidance o In the Upload File text box, enter the path to the file. o Click Browse, navigate to the file, and then click Open. To upload the file to the server, click Upload File Note, certificates will also be required for each device that communicates with CUCM. Refer to [3] Manage Certificates. Administrator Configuration, Credentials and Session Termination The CUCM must be configured to use a username and password for each administrator. Once the CUCM has been setup and configured, the Administrator can create additional administrative user accounts, refer to [3] Manage Users -> Manage User Access. Also refer to Manage User Access -> Standard Roles and Access Control Groups. The security policies for administrative users include the settings for: • • • idle timeouts (session termination) is set by default to 30 minutes password criteria o by default, is set to a minimum of six (6) characters. In the evaluated configuration the password must be set to a minimum of at least 15 characters o password complexity include the following settings: password must be a combination of upper and lower case letters (a-z and A-Z), numbers (0-9) and the following special characters “!”, “@”, “#”, “$”, “%”, “^”, “&”, “*”, “(“,”)” pins (personal identification number) needs to be set to at least eight (8) characters The credential policies control the authentication process for resources (users) of the TOE. The defines password requirements and account lockout details such as failed login attempts, expiration periods and lockout durations for end user passwords, end user PINs, and application user passwords. Credential policies can be assigned broadly to all accounts of a specific credential type, such as all end user PINs, or they can be customized for a specific application user, or end user. Refer to [5] Configure Credential Policy. Inactivity settings must trigger termination of the administrator session. The default value for the CUCM Web Interface is 30 minutes. If the TOE detects there is no activity for 30 minutes, the CUCM Web Interface times out and the Administrator will be logged off. These settings are only configurable by using the Command Line Interface. It is recommended to accept the default time in the evaluated configuration as the CLI was not included. Logging Configuration Once the TOE becomes operational, auditing is on by default, though can be configured via the access the Audit Log Configuration window in the serviceability GUI to configure the settings for the audit logs [3] Tools and Reports -> Audit Logs -> Set up audit log. Cisco Unified Serviceability logs the following events: • Activation, deactivation, start, or stop of a service. • Changes in trace configurations and alarm configurations. • Changes in SNMP configurations. Page 16 of 35 Cisco Unified Communications Manager Common Criteria Guidance • Changes in CDR management. (Cisco Unified Communications Manager only) • Review of any report in the Serviceability Reports Archive. This log gets viewed on the reporter node. (Cisco Unified Communications Manager only) The Cisco Unified Real-Time Monitoring Tool can also be used to monitor system performance, operations and events on the TOE. Refer to [4]. Cisco Unified Real-Time Monitoring Tool logs the following events with an audit event alarm: • Alert configuration • Alert suspension • E-mail configuration • Set node alert status • Alert addition • Add alert action • Clear alert • Enable alert • Remove alert action • Remove alert By default, the logs are configured to rotate. If the AuditLogAlarmMonitor cannot write an audit event, the AuditLogAlarmMonitor logs this failure as a critical error in the syslog file. The Alert Manager reports this error as part of a SeverityMatchFound alert. The actual operation continues even if the event logging fails. All audit logs get collected, viewed, and deleted from Trace and Log Central in the Cisco Unified Real-Time Monitoring Tool. Audit logging contains the following parts: • Audit logging framework - The framework comprises an API that uses an alarm library to write audit events into audit logs. An alarm catalog that is defined as GenericAlarmCatalog.xml applies for these alarms. Different system components provide their own logging. The following example displays an API that a Cisco Unified Communications Manager component can use to send an alarm: User ID: CCMAdministratorClient IP Address: 172.19.240.207 Severity: 3 EventType: ServiceStatusUpdated ResourceAccessed: CCMService EventStatus: Successful Description: CallManager Service status is stopped • Audit event logging - An audit event represents any event that is required to be logged. The following example displays a sample audit event: Page 17 of 35 Cisco Unified Communications Manager Common Criteria Guidance CCM_TOMCAT-GENERIC-3-AuditEventGenerated: Audit Event Generated UserID:CCMAdministrator Client IP Address:172.19.240.207 Severity:3 EventType:ServiceStatusUpdated ResourceAccessed: CCMService EventStatus:Successful Description: Call Manager Service status is stopped App ID:Cisco Tomcat Cluster ID:StandAloneCluster Node ID:sa-cm1-3 For additional information refer to [3] Tools and Reports ->Audit Logs and [4] Traces and Logs Audit Trail Log Entries The following table identifies the elements of the audit record. Table 8 Audit Entries Heading Definition User ID The user that triggered the event Client IP Address IP address of the client device used Severity Level of the event EventType The type of event that was performed ResourceAccessed The resource that was accessed EventStatus The status of the event; successful, failed Description The description of the event; CallManager service status is stopped Audit trail records capture the following activities: Auditable Event Sample Audit Record Rationale All use of the user identification mechanism. 05/04/2015 17:54:01.881, acumenadmin, 192.168.50.60, Info, UserLogging, Cisco CallManager Administration, Success, No, AdministrativeEvent, Cisco CCM Application, Successfully Logged into Cisco CCM Webpages, Cisco Tomcat, , CUCM1, 0 Events will be generated for attempted identification/ authentication, and the username attempting to authenticate and source address or interface will be included in the log record. 05/04/2015 19:39:00.331, acumenadmin, 192.168.50.60, Info, UserLogging, CUCMAdmin, Success, No, CriticalEvent, Cisco CUCM Page 18 of 35 Cisco Unified Communications Manager Common Criteria Guidance Auditable Event Sample Audit Record Rationale Any use of the authentication mechanism. Administration, Successfully Logged out Cisco CCM Web Pages, Cisco Tomcat, , CUCM1, 15 Events will be generated for attempted identification/ authentication, and the username attempting to authenticate will be included in the log record, along with the origin or source of the attempt. 05/04/2015 22:09:56.498, acumensec, 192.168.50.60, Warning, UserLogging, Cisco CallManager Administration, Failure, No, AdministrativeEvent, Cisco CCM Application, Failed to Log into Cisco CCM Webpages, Cisco Tomcat, , CUCM1, 16 Management functions 05/04/2015 19:08:59.564, acumenadmin, 192.168.50.60, Notice, UserRoleMembershipUpdate, CUCMAdmin, Success, No, AdministrativeEvent, Cisco CUCM Administration, End user acumensec added to usergroup Standard CCM End Users, Cisco Tomcat, , CUCM1, 12 The use of the security management functions is logged; modifications of the behavior of the functions in the TSF and modifications of default settings. 05/04/2015 22:18:41.070, acumenadmin, 192.168.50.60, Notice, DeviceUpdate, CUCMAdmin, Success, No, AdministrativeEvent, Cisco CUCM Administration, New Phone added with MAC address=UPCDIVICE , CAL mode=< None > and CAL value=< None >, Cisco Tomcat, , CUCM1, 21 05/04/2015 22:55:44.631, acumenadmin, 192.168.50.60, Info, GeneralConfigurationUpdate, CUCMServiceability, Success, No, AdministrativeEvent, Cisco CCM Servicability, Cisco Location Bandwidth Manager Was Activated on node CUCM1, Cisco Tomcat, , CUCM1, 35 Changes to the time. Dec 17 16:22:23 ryhooper-cucm-dev Info ntpd : synchronized to 10.122.81.30, stratum 11 Changes to the time are logged. Dec 18 02:19:53 ryhooper-cucm-dev Notice ntpd : time reset +35850.207006 s Dec 18 02:19:53 ryhooper-cucm-dev Notice ntpd : kernel time sync status change 2001 Dec 18 02:20:56 ryhooper-cucm-dev Info ntpd : synchronized to 10.122.81.30, stratum 11 Failure to establish and/or establishment/termination of a TLS session : 6: dchokshi-cucm1.cisco.com Dec 16 2014 15:12:10 UTC : %UC_CALLMANAGER-6EndPointRegistered: %[DeviceName=SEP001B545235C9][IPAddress=1 0.116.81.152][Protocol=SIP][DeviceType=119][Per fMonObjType=2][Description=SEP001B545235C9 Attempts to establish a TLS session or the failure to establish a TLS session is logged as well as successfully established and Page 19 of 35 Cisco Unified Communications Manager Common Criteria Guidance Auditable Event Sample Audit Record ][LoadID=SIP70.9-4-21S][AssociatedDNs=2002][MACAddress=001B54 5235C9][IPAddrAttributes=0][ActiveLoadId=SIP7 0.9-4-21S][ClusterID=StandAloneCluster][NodeID=dchok shi-cucm1]: Endpoint registered Rationale terminated sessions. TLS : 7: dchokshi-cucm1.cisco.com Dec 16 2014 15:12:10 UTC : %UC_CALLMANAGER-6DeviceDnInformation: %[DeviceName=SEP001B545235C9][DeviceType =119][StationDesc=SEP001B545235C9][StationDn =2002][ClusterID=StandAloneCluster][NodeID=dc hokshi-cucm1]: List of directory numbers (DN) associated with this device Dec 16 10:34:42 dchokshi-cucm1 local7 3 : 18: dchokshi-cucm1.cisco.com: Dec 16 2014 15:34:42.155 UTC : %UC_CALLMANAGER-3ServicePortOnline: %[Protocol=Secure SCCP][PortNumber=2443][ AppID=Cisco CallManager][ClusterID=StandAloneCluster][Node ID=dchokshi-cucm1]: A Cisco CallManager service port is online Failure to establish and/or establishment/termination of a HTTPS session 11:51:57.849 |LogMessage UserID : appadmin ClientAddress : 10.116.81.148 Severity : 3 EventType : UserLogging ResourceAccessed: Cisco CallManager Serviceability RTMT Servlet EventStatus : Success CompulsoryEvent : No AuditCategory : AdministrativeEvent ComponentID : Cisco CCM Application AuditDetails : Login Authentication Successful App ID: Cisco Tomcat Cluster ID: Node ID: dchokshi-cucm1 Attempts to establish a HTTPS session or the failure to establish a HTTPS session is logged as well as successfully established and terminated HTTPS sessions. 12:11:31.121 |LogMessage UserID : fakeuser ClientAddress : 10.116.81.148 Severity : 3 EventType : UserLogging ResourceAccessed: Cisco CallManager Serviceability RTMT Servlet EventStatus : Failure CompulsoryEvent : No AuditCategory : AdministrativeEvent ComponentID : Cisco CCM Application AuditDetails : Login Authentication Failed App ID: Cisco Tomcat Cluster ID: Node ID: dchokshicucm1 Session Establishment with 11:51:57.849 |LogMessage UserID : appadmin ClientAddress : 10.116.81.148 Severity : 3 The establishment of a Page 20 of 35 Cisco Unified Communications Manager Common Criteria Guidance Auditable Event peer (TLS) Sample Audit Record EventType : UserLogging ResourceAccessed: Cisco CallManager Serviceability RTMT Servlet EventStatus : Success CompulsoryEvent : No AuditCategory : AdministrativeEvent ComponentID : Cisco CCM Application AuditDetails : Login Authentication Successful App ID: Cisco Tomcat Cluster ID: Node ID: dchokshi-cucm1 Rationale TLS session is logged 12:11:31.121 |LogMessage UserID : fakeuser ClientAddress : 10.116.81.148 Severity : 3 EventType : UserLogging ResourceAccessed: Cisco CallManager Serviceability RTMT Servlet EventStatus : Failure CompulsoryEvent : No AuditCategory : AdministrativeEvent ComponentID : Cisco CCM Application AuditDetails : Login Authentication Failed App ID: Cisco Tomcat Cluster ID: Node ID: dchokshicucm1 Session Establishment with peer (SIP) 00162750.001 |13:23:05.002 |AppInfo |SIPTcp wait_SdlSPISignal: Outgoing SIP TCP message to 10.116.81.152 on port 53092 index 5 00162756.002 |13:23:06.221 |AppInfo |SIPTcp wait_SdlReadRsp: Incoming SIP TCP message from 10.116.81.152 on port 53092 index 5 with 1478 bytes: The establishment of a SIP session is logged 00162891.031 |13:23:07.301 |AppInfo |//SIP/SIPHandler/ccbId=1677/scbId=0/insertConta ctIntoContainer: Outgoing Contact=[<sip:2002@10.122.81.3:5061;transport=tl s>] Establishing session with CA 05/04/2015 22:55:44.644, acumenadmin, 192.168.50.60, Info, GeneralConfigurationUpdate, CUCMServiceability, Success, No, AdministrativeEvent, Cisco CCM Servicability, Self Provisioning IVR Was Activated on node CUCM1, Cisco Tomcat, , CUCM1, 43 The connection to CA’s for the purpose of certificate verification is logged. 05/04/2015 22:55:44.649, acumenadmin, 192.168.50.60, Info, GeneralConfigurationUpdate, CUCMServiceability, Success, No, AdministrativeEvent, Cisco CCM Servicability, Cisco Certificate Authority Proxy Function Was Activated on node CUCM1, Cisco Tomcat, , CUCM1, 52 Indication that TSF selftest was completed. The status of startup operation is currently being audited as syslog entries. Examples are pasted below: During bootup, if the self-test fails, the failure is logged. Page 21 of 35 Cisco Unified Communications Manager Common Criteria Guidance Auditable Event Sample Audit Record Rationale Sep 4 17:56:30 Infy-S64-cucm6 local7 2 : 7: InfyS64-cucm6.cisco.com: Sep 04 2014 12:26:30.313 UTC : %UC_SERVICEMANAGER-2ServiceFailed: %[ServiceName=Cisco CallManager Admin][Reason=Service stopped abruptly][AppID=Cisco Service Manager][ClusterID=][NodeID=Infy-S64-cucm6]: Service terminated. Sep 4 17:56:30 Infy-S64-cucm6 local7 6 : 8: InfyS64-cucm6.cisco.com: Sep 04 2014 12:26:30.314 UTC : %UC_GENERIC-6-ServiceStarted: %[ServiceName=Cisco Trust Verification Service][ProcessID=25112][AppID=Cisco Service Manager][ClusterID=][NodeID=Infy-S64-cucm6]: Service started. 1411760392262,0,CiscoSystemInDemo, Reason : CiscoSystemInDemo AppID : Cisco License Manager ClusterID : NodeID : Infy-S64-cucm6 TimeStamp : Sat Sep 27 01:09:37 IST 2014. The alarm is generated on Sat Sep 27 01:09:37 IST 2014., ,4,1, ,Infy-S64-cucm6.cisco.com,UCM 1412017344060,1,AuthenticationFailed, Number of AuthenticationFailed events exceeds configured threshold during configured interval of time 1 within 3 minutes on cluster StandAloneCluster. There are 2 AuthenticationFailed events (up to 30) received during the monitoring interval From Tue Sep 30 00:31:24 IST 2014 to Tue Sep 30 00:34:24 IST 2014: TimeStamp : 9/30/14 12:31 AM LoginFrom : 10.106.211.201 Interface : Cisco RTMT Reporter Servlet UserID : CUCService AppID : Cisco Tomcat ClusterID : NodeID : InfyS64-cucm6 TimeStamp : Tue Sep 30 00:31:59 IST 2014 TimeStamp : 9/30/14 12:31 AM LoginFrom : 10.106.211.201 Interface : Cisco RTMT Reporter Servlet UserID : CUCService AppID : Cisco Tomcat ClusterID : NodeID : Infy-S64-cucm6 TimeStamp : Tue Sep 30 00:31:28 IST 2014 , ,2,0, , ,System Initiation of update 16:43:21.574 |LogMessage UserID : admin ClientAddress : 10.77.25.43 Severity : 6 EventType : CLICommand ResourceAccessed: GenericCLI EventStatus : Success CompulsoryEvent : No AuditCategory : AdministrativeEvent ComponentID : CLI Audit event is generated for the initiation of a software update. Page 22 of 35 Cisco Unified Communications Manager Common Criteria Guidance Auditable Event Sample Audit Record Rationale AuditDetails : utils system upgrade status Command status= App ID: Command Line Cluster ID: Node ID: infyvoscm30-lnx Any attempts at unlocking of an interactive session. This requirement is satisfied based on CUCM does not provide the ability to 'lock' the admin’s session. The sessions are terminated when the admin logsout or session is terminated due to inactivity. The admin must re-establish the session and log-on to gain access. We will reference the FIA audit logs. Audit event is generated after a user’s session is locked and the admin user is required to reauthenticate. Once a remote interactive session is terminated after a Security Administratorconfigurable time interval of session inactivity. 16:50:45.034 |LogMessage UserID : admin ClientAddress : 10.77.24.223 Severity : 6 EventType : UserLogging ResourceAccessed: CUCMAdmin EventStatus : Success CompulsoryEvent : No AuditCategory : CriticalEvent ComponentID : Cisco CUCM Administration AuditDetails : Successfully Logged out Cisco CCM Web Pages App ID: Cisco Tomcat Cluster ID: Node ID: infyvoscm28-lnx An audit event is generated by when sessions are terminated after exceeding the inactivity settings. The termination of interactive session. an 15:46:35.085 |LogMessage UserID : admin ClientAddress : 10.77.24.223 Severity : 6 EventType : UserLogging ResourceAccessed: CUCMAdmin EventStatus : Success CompulsoryEvent : No AuditCategory : CriticalEvent ComponentID : Cisco CUCM Administration AuditDetails : Successfully Logged out Cisco CCM Web Pages App ID: Cisco Tomcat Cluster ID: Node ID: infyvoscm28-lnx An audit event is generated by an authorized administrator when the exit command is used. Initiation of the trusted channel/ path. Termination of the trusted channel/ path. Failure of the trusted channel/ path functions. 11:51:57.849 |LogMessage UserID : appadmin ClientAddress : 10.116.81.148 Severity : 3 EventType : UserLogging ResourceAccessed: Cisco CallManager Serviceability RTMT Servlet EventStatus : Success CompulsoryEvent : No AuditCategory : AdministrativeEvent ComponentID : Cisco CCM Application AuditDetails : Login Authentication Successful App ID: Cisco Tomcat Cluster ID: Node ID: dchokshi-cucm1 Also see the rows for TLS above. 12:11:31.121 |LogMessage UserID : fakeuser ClientAddress : 10.116.81.148 Severity : 3 EventType : UserLogging ResourceAccessed: Cisco CallManager Serviceability RTMT Servlet EventStatus : Failure CompulsoryEvent : No AuditCategory : AdministrativeEvent ComponentID : Cisco CCM Application AuditDetails : Login Authentication Failed App ID: Page 23 of 35 Cisco Unified Communications Manager Common Criteria Guidance Auditable Event Sample Audit Record Cisco Tomcat Cluster ID: cucm1 Rationale Node ID: dchokshi- Audit Trail Capacities Log Partition Monitoring (LPM), which is installed automatically with the CUCM, uses configurable thresholds to monitor the disk usage of the log partition on a server. The Cisco Log Partition Monitoring Tool service starts automatically after installation of the CUCM. Every 5 minutes, Log Partition Monitoring uses the following configured thresholds to monitor the disk usage of the log partition and the spare log partition on a server: • LogPartitionLowWaterMarkExceeded (% disk space): When the disk usage is above the percentage that you specify, LPM sends out an alarm message to syslog and an alert to RTMT Alert central. To save the log files and regain disk space, you can use trace and log central option in RTMT. • LogPartitionHighWaterMarkExceeded (% disk space): When the disk usage is above the percentage that you specify, LPM sends an alarm message to syslog and an alert to RTMT Alert central. • SparePartitionLowWaterMarkExceeded (% disk space): When the disk usage is above the percentage that you specify, LPM sends out an alarm message to syslog and an alert to RTMT Alert central. To save the log files and regain disk space, you can use trace and log central option in RTMT. • SparePartitionHighWaterMarkExceeded (% disk space): When the disk usage is above the percentage that you specify, LPM sends a n alarm message to syslog and an alert to RTMT Alert central. To utilize log partition monitor, verify that the Cisco Log Partitioning Monitoring Tool service, a network service, is running on Cisco Unified Serviceability on the server or on each server in the cluster (if applicable). Warning, stopping the service causes a loss of feature functionality. When the log partition monitoring services starts at system startup, the service checks the current disk space utilization. If the percentage of disk usage is above the low water mark, but less than the high water mark, the service sends an alarm message to syslog and generates a corresponding alert in RTMT Alert central. To configure Log Partitioning Monitoring, set the alert properties for the LogPartitionLowWaterMarkExceeded and LogPartitionHighWaterMarkExceeded alerts in Alert Central. If the percentage of disk usage is above the high water mark that you configured, the system sends an alarm message to syslog, generates a corresponding alert in RTMT Alert Central, and automatically purges log files until the value reaches the low water mark. Refer to [4] Chapter 2, Log Partition Monitoring Tool. Page 24 of 35 Cisco Unified Communications Manager Common Criteria Guidance You can download the audit and trace logs using the Cisco Unified Real-Time Monitoring Tool (RTMT). Before downloading the logs, there are a few configuration options that need to be setup. Also you will need to import the proper security certificates. Refer to [4] Chapter 8 Traces and Logs -> Preparation through View Trace and Log Central Options. To download the trace logs, using the Cisco Unified Real-Time Monitoring Tool (RTMT) refer to [4] Chapter 8, Traces and Logs -> Collect files through Collect Installation Logs. To download the audit logs, using the Cisco Unified Real-Time Monitoring Tool (RTMT) refer to [4] Chapter 8, Traces and Logs -> Collect audit logs through Download Audit Logs. Logging Protection If an authorized administrator wants to backup the logs to a syslog server using the Cisco Unified Real-Time Monitoring Tool (RTMT), then protection must be provided for the syslog server communications. The secure HTTPS/TLS communications protects the audit records while being archived to the storage area/syslog server. Refer to [4] Getting Started for the setup and installation instructions. In the evaluated configuration, the HTTPS connection is using the configured TLSv1.2 that is using TLS_RSA_WITH_AES_128_CBC_SHA ciphersuites. Endpoint Devices and User Association The TOE supports analog telephone adapter that acts as an interface between analog telephones and IP-based telephony networks, Cisco IP Phones and third party SIP endpoints. To configure the profiles and templates that define the services, features, and directory numbers that associate with a particular device refer to [5] Endpoint Devices Overview. o Device Profiles o A device profile defines the services, features, and directory numbers that associate with a particular device. You can configure a device profile and then you can assign the user device profile to a user, so that when the user logs in to a device, those features and services are available on that device. o SIP Profiles for End Points o A SIP profile comprises the set of SIP attributes that are associated with SIP endpoints. SIP profiles include information such as name, description, timing, retry, call pickup URI, and so on. The profiles contain some standard entries that cannot be deleted or changed. o Device Profiles and Templates o Cisco Unified Communications Manager also supports a default device profile. Cisco Unified Communications Manager uses the default device profile whenever a user logs on to a phone model for which no user device profile exists. To associate users to endpoints, first you must configure end users and application users. The end user can control devices that they are associated with, whereas applications that are identified as users can control devices, such as phones and CTI ports. Refer to [5] Associate Users with Endpoints. Page 25 of 35 Cisco Unified Communications Manager Common Criteria Guidance Network Protocols and Cryptographic Settings Remote Administration Protocols The Authorized Administrates manages the TOE by connecting via a web browser. The remote administration sessions are protected by HTTPS/TLS. The evaluated configuration requires that when connecting to the TOE over HTTPS/TLS for administrative management, TLS1.2 is used with the following ciphersuites, TLS_RSA_WITH_AES_128_CBC_SHA and optionally any of the following ciphersuites: • • TLS_RSA_WITH_AES_256_CBC_SHA TLS_DHE_RSA_WITH_AES_128_CBC_SHA After the initial configuration, use the following procedures to into the server and log in to Cisco Unified Communications Manager Administration. Step 1 Start your preferred operating system browser. Step 2 In the address bar of the web browser, enter the following case-sensitive URL: https://<Unified CM-server-name>:{8443}/ccmadmin/showHome.do where: <Unified CM-server-name> equals the name or IP address of the server Note: You can optionally specify a port number. Step 3 A Security Alert dialog box displays. Click the appropriate button. Step 4 At the main Cisco Unified Communications Manager Administration window, enter the username and password that you specified during Cisco Unified Communications Manager installation and click Login. Note: For security purposes, Cisco Unified Communications Manager Administration logs you out after 30 minutes of inactivity, and you must log back in. If the HTTPS/TLS connection fails for an unknown reason, you can attempt to re-establish the connection and/or you will want to check the alert and trace logs for a possible cause. You may also need to use the Cisco Unified Serviceability application to start or restart services on the Cisco Unified Communications Manager nodes. Cisco Unified Serviceability is a web-based troubleshooting tool. Refer to [5] Getting Started. SIP Connections and Protocols The Assured Services SIP (AS-SIP) endpoints are SIP endpoints compliant with MLPP, DSCP, TLS/SRTP, and IPv6 requirements. AS-SIP provides for multiple endpoint interfaces on the TOE. The Third-Party AS-SIP Endpoint device type allows a third-party AS-SIP-compliant generic endpoint to be configured and used with CUCM [2]. In the evaluated configuration, the SIP connections are secured with TLS. For the SIP connections, TLS v1.2 is supported with the following ciphersuites: • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, • TLS_ECDHE_RSA_WITH _AES_256_GCM_SHA384, Page 26 of 35 Cisco Unified Communications Manager Common Criteria Guidance • • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 Setting up a SIP Trunk profile allows you to a single security profile to multiple SIP trunks. Security-related settings include device security mode, digest authentication, encryption (including TLS settings), port settings (should be set to port 5061) and incoming/outgoing transport type settings. Refer to Security for SRST References, Trunks, and Gateways -> SIP Trunk Security Profile Setup in [3]. The SIP profile configuration settings contain an 'Is Assured SIP Service Enabled' checkbox. This should be checked for third-party AS-SIP endpoints, as well as AS-SIP trunks. This setting provides specific Assured Service behavior that affects services such as Conference factory and SRTP. Refer to Security for SRST References, Trunks, and Gateways -> Secure Survivable Remote Site Telephony (SRST) Reference in [3]. Note, SRTP allowed must be set. For the phone security profile configuration, use the System > Security > Phone Security Profile menu path to configure phone security profiles. The Phone Security Profile window includes security-related settings such as device security mode, CAPF settings, digest authentication settings (only for phones that are running SIP), and encrypted configuration file settings. You must apply a security profile to all phones that are configured in Unified CM Administration. Refer to Security for Cisco Unified IP Phone and Cisco Voice-Messaging Ports -> Phone Security -> Phone Security Profile Setup in [3]. To set the TLS enterprise parameters for all SIP connections, refer to [5] Configure Initial Parameters for the System -> Configure System and Enterprise Parameters. Also refer to SIP Trunk Encryption in [6] for TLS and SRTP settings to support secure calls. Clusters and Route Patterns A cluster comprises a set of Cisco Unified Communications Manager servers that share the same database and resources. You can configure the servers in a cluster in various ways to perform various functions such as database replication. For the Cisco Unified Communications Managers that form a cluster, you should, as much as possible, evenly balance the call-processing load across the system by distributing the devices (such as phones, gateways, CTI route points, CTI ports, and route lists) among the various Cisco Unified Communications Managers in the cluster. To distribute the devices, you configure Cisco Unified Communications Manager groups and device pools and then assign the devices to the device pools in a way that achieves the balance that you want. You can use various nodes in the cluster for call-processing redundancy and for load balancing Cisco Unified Communications Manager uses route patterns to route or block both internal and external calls. For ease of balancing you can setup and configure route patterns. Cisco Unified Communications Manager uses route patterns to route or block internal and external calls. You can assign route patterns to gateways, to trunks, or to a route list that contains one or more route groups. The route pattern can point directly to a gateway, we recommend that you configure Page 27 of 35 Cisco Unified Communications Manager Common Criteria Guidance route lists and route groups. This approach provides the greatest flexibility in call routing and scalability. Refer to [5] Chapter 21 Configure Call Routing -> Configure Route Pattern. 4 Secure Management User Roles During the initial setup of the TOE the user that installs the TOE is deemed the Authorized Administrator and has full permissions and access to manage the TOE. Refer to [3], [5] and [6] The Authorized Administrator is responsible for managing users and users’ access. The end users can be assigned to access control groups which are associated to a role. Each role defines a set of permissions for a specific resource within Cisco Unified Communications Manager. When you assign a role to an access control group and then assign end users to that access control group, you grant those end users all the access permissions that are defined by the role. Upon installation Cisco Unified Communications Manager comes with predefined default roles that are assigned to predefined default access control groups. You can assign your end users to the default access control groups, or you can customize access settings by setting up new access control groups and roles. Refer to [3] Manage User Access. The Authorized Administrator will also need to configure end users. The end users are the consumers of the TOE. End users can be assigned to phones and directory numbers thereby allowing your end users to make calls and communicate with other users in the system as well as placing calls. Refer to Configure End User [5]. Clock Management The TOE maintains a clock that is used as the source for the date and time stamp in the audit trail records to record the time of the event. The clock timing is also used to monitor inactivity of administrator sessions. In the evaluated configuration, it is required to configure NTP server for synchronizing the time clock. To add an NTP Server, click Add in the Administrators window -> Settings -> NTP Servers. Enter the hostname or NTP server IP address and click Save. When the time clock is synchronized with NTP you will want to setup Phone NTP references and date/time groups [5]. The Phone NTP reference ensures that an IP phone that is running SIP gets its date and time from an NTP server. If a phone that is running SIP cannot get its date and time information from the provisioned “Phone NTP Reference,” the phone receives this information when it registers with Cisco Unified Communications Manager. The date/time groups define time zones for the various devices that are connected to Cisco Unified Communications Manager. The default group, CMLocal, configures automatically upon installation. However, it is recommended that you configure a group for each local time zone. The TOE is configured to sync time with an NTP server. Refer to Operating System Administration Overview -> NTP Servers settings [3]. Page 28 of 35 Cisco Unified Communications Manager Common Criteria Guidance Identification and Authentication Configuration of Identification and Authentication settings is restricted to the Administrator. The CUCM can be configured to use any of the following authentication methods. Local authentication is the default setting and is required in the evaluated configuration. • Local authentication (password authentication); o Note: this is the default authentication configuration and should also be configured as a fallback authentication mechanism if the remote authentication server is not available. . Login Banners The TOE may be configured by the Administrator to display a login waning banner that displays in the main Cisco Unified Communications Manager Administration window. To upload a customized log-on message, follow this procedure: Step 1: From the Cisco Unified Communications Operating System Administration window, navigate to Software Upgrades > Customized Logon Message. The Customized Logon Message window displays. Step 2: To choose the text file that you want to upload, click Browse. Step 3: Click Upload File. Note: You cannot upload a file that is larger than 10kB. The system displays the customized log-on message. Step 4: To revert to the default log-on message, click Delete. Your customized log-on message gets deleted, and the system displays the default log-on message. Note: Check the Require User Acknowledgment checkbox if you want the custom message to be displayed on the login screens of the Cisco Unified Communications Operating System Administration, Cisco Unified CM Administration, Cisco Unified Serviceability, Disaster Recovery System Administration, Cisco Prime License Manager, and the command line interface. This banner is displayed before the username and password prompts. Product Updates Verification of authenticity of updated software is done in the same manner as ensuring that the TOE is running a valid image. See Section 2 in this document for the method to download and verify an image prior to running it on the TOE. Also refer to Software Upgrades [3] 5 Security Relevant Events The TOE is able to generate audit records that are stored internally within the TOE whenever an audited event occurs, as well as archiving to a remote storage area/syslog server. The details for Page 29 of 35 Cisco Unified Communications Manager Common Criteria Guidance protection of that communication are covered in Section 3.2.3 Logging Configuration of this document. Also refer to [3], Tools and Reports -> Audit Logs -> Set up audit log. The TOE generates an audit record whenever an audited event occurs. The types of events that cause audit records to be generated include, cryptography related events, identification and authentication related events, and administrative events (the specific events and the contents of each audit record are listed in the table below). Each of the events is specified in syslog records in enough detail to identify the user for which the event is associated, when the event occurred, where the event occurred, the outcome of the event, and the type of event that occurred. Additionally, the startup and shutdown of the audit functionality is audited. The local audit trail consists of the individual audit records; one audit record for each event that occurred. Refer to 3.2.3 Logging Configuration of this document for the security relevant events that are applicable to the TOE. Reviewing, Downloading and Deleting Audit Records The Cisco Unified Real-Time Monitoring Tool can also be used to monitor system performance, operations and events on the TOE. Refer to [4]. Cisco Unified Real-Time Monitoring Tool. . Page 30 of 35 6 Network Services and Protocols The table below lists the network services/protocols available on the TOE as a client (initiated outbound) and/or server (listening for inbound connections), all of which run as system-level processes. The table indicates whether each service or protocol is allowed to be used in the certified configuration. For more detail about each service, including whether the service is limited by firewall mode (routed or transparent), or by context (single, multiple, system), refer to the Command Reference guides listed in Table 3. Table 9: Protocols and Services Description Allowed Server (terminating) Allowed Yes No No n/a Use HTTPS instead. Hypertext Transfer Protocol Yes No Yes No Use HTTPS instead. HTTPS Hypertext Transfer Protocol Secure Yes Yes Yes Yes No restrictions. NTP Network Time Protocol Yes Yes No n/a If used for time synchronization, secure through HTTPS or TLS.. SNMP Simple Network Management Protocol Yes (snmptrap) Yes Yes No Outbound (traps) only. SSH Secure Shell Yes No Yes No Use HTTPS instead SSL (not TLS) Secure Sockets Layer Yes No Yes No Use TLS instead. Telnet A protocol used for terminal emulation Yes No Yes No Use HTTPS instead. TLS Transport Layer Security Yes Yes Yes Yes As described in the section 3.3 of this document. Service or Protocol FTP File Transfer Protocol HTTP Client (initiating) The table above does not include the types of protocols and services listed here: ©2015, Cisco Systems, Inc. All rights reserved. This document can be reproduced in full without any modifications. Allowed use in the certified configuration 7 Modes of Operation The CUCM has two modes of operation, a non-secure mode (default mode) and a mixed mode (secure mode). The Non-secure mode is the default mode when a CUCM cluster (or server) is installed fresh. In this mode, CUCM cannot provide secure signaling or media services. To enable secure mode on a CUCM server/cluster, the Certificate Authority Proxy Function (CAPF) service must be enabled on the publisher and the Certificate Trust List (CTL) service must be enabled on the publisher and subscribers. Then the cluster can be changed from non-secure mode to mixed mode. The reason it is known as mixed mode is that in this mode CUCM can support both secured and non-secured endpoints. For endpoint security, Transport Layer Security (TLS) is used for signaling and Secure RTP (SRTP) is used for media. ©2015, Cisco Systems, Inc. All rights reserved. This document can be reproduced in full without any modifications. Cisco Unified Communications Manager Common Criteria Guidance 8 Security Measures for the Operational Environment Proper operation of the TOE requires functionality from the environment. It is the responsibility of the authorized administrator of the TOE to ensure that the Operational Environment provides the necessary functions, and adheres to the environment security objectives listed below. The environment security objective identifiers map to the environment security objectives as defined in the Security Target. Table 10 Operational Environment Security Measures IT Environment Security Objective Definition Environment Security Objective Reproduced from the NDPPvError! Unknown document property name. OE.NO_GENERAL_PURPOSE There are no general-purpose computing capabilities (e.g., compilers or user applications) available on the TOE, other than those services necessary for the operation, administration and support of the TOE. OE.PHYSICAL Physical security, commensurate with the value of the TOE and the data it contains, is provided by the environment. OE.TRUSTED_ADMIN TOE Administrators are trusted to follow and apply all administrator guidance in a trusted manner. Reproduced from the SIPEP v1.1 OE.NO_GENERAL_PURPOSE There are no general-purpose computing capabilities (e.g., compilers or user applications) available on the TOE, other than those services necessary for the operation, administration and support of the TOE. OE.PHYSICAL Physical security, commensurate with the value of the TOE and the data it contains, is provided by the environment. OE.TRUSTED_ADMIN TOE Administrators are trusted to follow and apply all administrator guidance in a trusted manner. Page 33 of 35 Cisco Unified Communications Manager Common Criteria Guidance 9 Related Documentation For information on obtaining documentation, submitting a service request, and gathering additional information, see the monthly What's New in Cisco Product Documentation, which also lists all new and revised Cisco technical documentation at: With CCO login: http://www.cisco.com/en/US/partner/docs/general/whatsnew/whatsnew.html Without CCO login: http://www.cisco.com/en/US/docs/general/whatsnew/whatsnew.html Subscribe to the What's New in Cisco Product Documentation as a Really Simple Syndication (RSS) feed and set content to be delivered directly to your desktop using a reader application. The RSS feeds are a free service and Cisco currently supports RSS version 2.0. You can access the most current Cisco documentation on the World Wide Web at the following sites: • • • http://www.cisco.com http://www-china.cisco.com http://www-europe.cisco.com Documentation Feedback If you are reading Cisco product documentation on the World Wide Web, you can submit technical comments electronically. Click Feedback in the toolbar and select Documentation. After you complete the form, click Submit to send it to Cisco. You can e-mail your comments to bug-doc@cisco.com. To submit your comments by mail, for your convenience many documents contain a response card behind the front cover. Otherwise, you can mail your comments to the following address: Cisco Systems, Inc., Document Resource Connection 170 West Tasman Drive San Jose, CA 95134-9883 We appreciate your comments. Obtaining Technical Assistance Cisco provides Cisco.com as a starting point for all technical assistance. Customers and partners can obtain documentation, troubleshooting tips, and sample configurations from online tools. For Cisco.com registered users, additional troubleshooting tools are available from the TAC website. Cisco.com is the foundation of a suite of interactive, networked services that provides immediate, open access to Cisco information and resources at anytime, from anywhere in Page 34 of 35 Cisco Unified Communications Manager Common Criteria Guidance the world. This highly integrated Internet application is a powerful, easy-to-use tool for doing business with Cisco. Cisco.com provides a broad range of features and services to help customers and partners streamline business processes and improve productivity. Through Cisco.com, you can find information about Cisco and our networking solutions, services, and programs. In addition, you can resolve technical issues with online technical support, download and test software packages, and order Cisco learning materials and merchandise. Valuable online skill assessment, training, and certification programs are also available. Customers and partners can self-register on Cisco.com to obtain additional personalized information and services. Registered users can order products, check on the status of an order, access technical support, and view benefits specific to their relationships with Cisco. To access Cisco.com, go to the following website: http://www.cisco.com Page 35 of 35