Cisco 7921G Administration Guide - Page 21

Understanding Security Features for Cisco Unified IP Phones - unlock settings

Page 21 highlights

Chapter 1 Overview of the Cisco Unified Wireless IP Phone 7921G Understanding Security Features for Cisco Unified IP Phones Understanding Security Features for Cisco Unified IP Phones Implementing security in the Cisco Unified Communications Manager system prevents identity theft and prevents data, call signaling, and media stream tampering. To reduce or eliminate threats, the Cisco IP telephony network establishes and maintains authenticated and encrypted communication streams between a phone and the Cisco Unified Communications Manager server, digitally signs files before transferring the files to a phone, and encrypts media streams and call signaling between Cisco Unified IP phones. Table 1-1 contains additional information about security. Table 1-1 Cisco Unified IP Phone and Cisco Unified Communications Manager Security Topics Topic Reference Detailed explanation of security, including set up, configuration, and troubleshooting information for Cisco Unified Communications Manager and Cisco Unified IP Phones Refer to Cisco Unified Communications Manager Security Guide Security features supported on the Cisco Unified See the "Overview of Supported Security IP Phone Features" section on page 1-8 Restrictions regarding security features See the "Security Restrictions" section on page 1-11 Viewing a security profile name when running Cisco Unified Communications Manager 5.0 or later See the "Understanding Security Profiles" section on page 1-10 Identifying phone calls for which security is implemented See the "Identifying Encrypted and Authenticated Phone Calls" section on page 1-11 Transport Layer Security (TLS) connection See the "Networking Protocols Used with Cisco Unified Wireless IP Phones" section on page 2-7 See the "Phone Configuration Files and Profile Files" section on page 2-12 Security and the phone startup process See the "Understanding the Phone Startup Process" section on page 3-18 Security and phone configuration files See the "Phone Configuration Files and Profile Files" section on page 2-12 Changing the TFTP Server 1 or TFTP Server 2 See the "Configuring Network Profiles" section option on the phone when security is implemented on page 4-8 Items on the Security Configuration menu on the See the "Viewing Security Information" section phone on page 8-1 Unlocking the CTL file See the "Accessing the CTL File Screen" section on page 8-3 Disabling access to phone web pages See the "Product-Specific Configuration Options for the Cisco Unified Wireless IP Phone 7921G" section on page 7-13 OL-15985-01 Cisco Unified Wireless IP Phone 7921G Administration Guide for Cisco Unified Communications Manager Release 7.0 1-7

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234

1-7
Cisco Unified Wireless IP Phone 7921G Administration Guide for Cisco Unified Communications Manager Release 7.0
OL-15985-01
Chapter 1
Overview of the Cisco Unified Wireless IP Phone 7921G
Understanding Security Features for Cisco Unified IP Phones
Understanding Security Features for Cisco Unified IP Phones
Implementing security in the Cisco Unified Communications Manager system prevents identity theft
and prevents data, call signaling, and media stream tampering. To reduce or eliminate threats, the Cisco
IP telephony network establishes and maintains authenticated and encrypted communication streams
between a phone and the Cisco Unified Communications Manager server, digitally signs files before
transferring the files to a phone, and encrypts media streams and call signaling between Cisco Unified
IP phones.
Table 1-1
contains additional information about security.
Table 1-1
Cisco Unified IP Phone and Cisco Unified Communications Manager
Security Topics
Topic
Reference
Detailed explanation of security, including set up,
configuration, and troubleshooting information
for Cisco Unified Communications Manager and
Cisco Unified IP Phones
Refer to
Cisco Unified Communications Manager
Security Guide
Security features supported on the Cisco Unified
IP Phone
See the
“Overview of Supported Security
Features” section on page 1-8
Restrictions regarding security features
See the
“Security Restrictions” section on
page 1-11
Viewing a security profile name when running
Cisco Unified Communications Manager 5.0 or
later
See the
“Understanding Security Profiles” section
on page 1-10
Identifying phone calls for which security is
implemented
See the
“Identifying Encrypted and Authenticated
Phone Calls” section on page 1-11
Transport Layer Security (TLS) connection
See the
“Networking Protocols Used with Cisco
Unified Wireless IP Phones” section on page 2-7
See the
“Phone Configuration Files and Profile
Files” section on page 2-12
Security and the phone startup process
See the
“Understanding the Phone Startup
Process” section on page 3-18
Security and phone configuration files
See the
“Phone Configuration Files and Profile
Files” section on page 2-12
Changing the TFTP Server 1 or TFTP Server 2
option on the phone when security is implemented
See the
“Configuring Network Profiles” section
on page 4-8
Items on the Security Configuration menu on the
phone
See the
“Viewing Security Information” section
on page 8-1
Unlocking the CTL file
See the
“Accessing the CTL File Screen” section
on page 8-3
Disabling access to phone web pages
See the
“Product-Specific Configuration Options
for the Cisco Unified Wireless IP Phone 7921G”
section on page 7-13