Understanding Security Features For Cisco Unified Ip Phones; Overview Of Supported Security Features - Cisco 7945G Administration Manual

For cisco unified communications manager 6.1(3)
Hide thumbs Also See for 7945G:
Table of Contents

Advertisement

Chapter 1
An Overview of the Cisco Unified IP Phone
Providing Users with Feature Information
If you are a system administrator, you are likely the primary source of information for Cisco Unified IP
Phone users in your network or company. To ensure that you distribute the most current feature and
procedural information, familiarize yourself with Cisco Unified IP Phone documentation. Make sure to
visit the Cisco Unified IP Phone web site:
http://www.cisco.com/en/US/products/hw/phones/ps379/tsd_products_support_series_home.html
From this site, you can access various user guides, including wallet cards.
In addition to providing users with documentation, it is important to inform them about available
Cisco Unified IP Phone features—including features specific to your company or network—and about
how to access and customize those features, if appropriate.
For a summary of some of the key information that phone users need their system administrators to
provide, see

Understanding Security Features for Cisco Unified IP Phones

Implementing security in the Cisco Unified Communications Manager system prevents identity theft of
the phone and Cisco Unified Communications Manager server, prevents data tampering, and prevents
call signaling and media stream tampering.
To alleviate these threats, the Cisco IP telephony network establishes and maintains authenticated and
encrypted communication streams between a phone and the server, digitally signs files before they are
transferred to a phone, and encrypts media streams and call signaling between Cisco Unified IP phones.
The Cisco Unified IP Phones Series use the Phone Security Profile, which defines whether the device is
nonsecure, authenticated, or encrypted. For information on applying the security profile to the phone,
refer to Cisco Unified Communications Manager Security Guide.
If you configure security-related settings in Cisco Unified Communications Manager Administration,
the phone configuration file will contain sensitive information. To ensure the privacy of a configuration
file, you must configure it for encryption. For detailed information, refer to the "Configuring Encrypted
Phone Configuration Files" chapter in Cisco Unified Communications Manager Security Guide.
Table 1-2
Table 1-2
Topic
Detailed explanation of security, including set
up, configuration, and troubleshooting
information for Cisco Unified Communications
Manager and Cisco Unified IP Phones
Security features supported on the Cisco Unified
IP Phone
Restrictions regarding security features
Viewing a security profile name
Identifying phone calls for which security is
implemented
Cisco Unified IP Phone 7965G and 7945G Administration Guide for Cisco Unified Communications Manager 6.1(3)
OL-17755-01
Appendix A, "Providing Information to Users Via a Website."
shows where you can find additional information about security in this and other documents.
Cisco Unified IP Phone and Cisco Unified Communications Manager Security
Topics
Understanding Security Features for Cisco Unified IP Phones
Reference
Refer to Cisco Unified Communications Manager
Security Guide
See the

"Overview of Supported Security Features"

section on page 1-11
See the
"Security Restrictions" section on page 1-17
See the
"Understanding Security Profiles" section
on page 1-13
See the
"Identifying Encrypted and Authenticated
Phone Calls" section on page 1-13
1-9

Advertisement

Table of Contents
loading

This manual is also suitable for:

7965g

Table of Contents