19.07.2013 Views

Cisco Unified Contact Center Enterprise Solution Reference ...

Cisco Unified Contact Center Enterprise Solution Reference ...

Cisco Unified Contact Center Enterprise Solution Reference ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Network Firewalls<br />

Deployment<br />

Topology<br />

7-8<br />

<strong>Cisco</strong> <strong>Unified</strong> <strong>Contact</strong> <strong>Center</strong> <strong>Enterprise</strong> 7.x SRND<br />

Chapter 7 Securing <strong>Unified</strong> CCE<br />

To aid in firewall configuration, these guides list the protocols and ports used for agent desktop-to-server<br />

communication, application administration, and reporting. They also provide a listing of the ports used<br />

for intra-server communication.<br />

If firewalls are used inside the data center as part of the <strong>Unified</strong> CCE network, do not place them between<br />

<strong>Cisco</strong> <strong>Unified</strong> CallManager and the <strong>Unified</strong> CCE servers (Peripheral Gateways and<br />

<strong>Cisco</strong> <strong>Unified</strong> Outbound Dialer (<strong>Unified</strong> OUTD)) that communicate with the cluster for the site.<br />

You can configure <strong>Cisco</strong> IOS and PIX/ASA firewalls for application inspection to process traffic<br />

between the <strong>Cisco</strong> <strong>Unified</strong> CallManager and <strong>Cisco</strong> <strong>Unified</strong> IP phones with the Skinny Client Control<br />

Protocol (SCCP). The inspection is handled by SCCP without any special configuration. The inspection<br />

is not designed for traffic between the <strong>Unified</strong> OUTD and the <strong>Cisco</strong> <strong>Unified</strong> CallManager. The<br />

<strong>Unified</strong> OUTD uses SCCP to communicate with the <strong>Cisco</strong> <strong>Unified</strong> CallManager and Real-Time<br />

Transport Protocol (RTP) to communicate with voice gateways for the Call Progress Analysis feature.<br />

<strong>Cisco</strong> firewall devices also feature the Computer Telephony Integration Quick Buffer Encoding<br />

(CTI-QBE) application inspection. CTI-QBE is the protocol used by JTAPI to interface between the<br />

<strong>Unified</strong> CCE Agent PG and the <strong>Cisco</strong> <strong>Unified</strong> CallManager. Note that the inspection feature in the <strong>Cisco</strong><br />

Firewalls is not compatible with the traffic flow between the PG and <strong>Cisco</strong> <strong>Unified</strong> CallManager.<br />

The inspection limitations dictate that <strong>Cisco</strong> <strong>Unified</strong> CallManager and <strong>Unified</strong> CCE servers must be on<br />

the same firewall interface (Figure 7-2).<br />

The deployment in Figure 7-2 represents the recommended placement of firewalls and other network<br />

infrastructure components in a <strong>Unified</strong> CCE deployment. The design model in Figure 7-2 incorporates<br />

a parent <strong>Unified</strong> ICM system with legacy peripheral hosts and a child <strong>Cisco</strong> <strong>Unified</strong> System <strong>Contact</strong><br />

<strong>Center</strong> (<strong>Unified</strong> SCC) with a <strong>Cisco</strong> <strong>Unified</strong> CallManager cluster. The following best practices apply to<br />

this type of deployment:<br />

<strong>Cisco</strong> <strong>Unified</strong> CallManager and <strong>Unified</strong> CCE servers must be on the same firewall interface.<br />

– Keep firewall deployment simple, with no more than two interfaces.<br />

– Avoid using voice fixups, as they tend to reduce throughput.<br />

– Block all traffic except for what is required by the applications (refer to the published port<br />

guides listed in TCP/IP Ports, page 7-7).<br />

Block the following ports at the enterprise perimeter firewall:<br />

– UDP ports 135, 137, 138, and 445<br />

– TCP ports 135, 139, 445, and 593<br />

Deploy Layer-3 and Layer-4 ACLs that are configured as described in the port guides.<br />

Isolate database and web services by installing dedicated WebView servers and historical data<br />

servers.<br />

Minimize the number of administrative workstation distributors (AWD) and make use of client AWs<br />

(no database required) and Internet script editor clients.<br />

Use the same deployment guidelines when the parent <strong>Unified</strong> ICM or child system <strong>Unified</strong> CCE<br />

central controllers are geographically distributed.<br />

OL-8669-05

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!