Cisco 7925G Administration Guide - Page 23

Topic, Reference, Table 1-2 - unlock settings

Page 23 highlights

Chapter 1 Overview of the Cisco Unified Wireless IP Phone 7925G Understanding Security Features for Cisco Unified IP Phones For information about security features supported by Cisco Unified Communications Manager and Cisco Unified IP Phones, see the "Understanding Security Features for Cisco Unified IP Phones" section on page 1-8. Table 1-2 provides additional information about security topics. Table 1-2 Cisco Unified IP Phone and Cisco Unified Communications Manager Security Topics Topic Reference Detailed explanation of security, including set up, configuration, and troubleshooting information for Cisco Unified Communications Manager and Cisco Unified IP Phones Refer to Cisco Unified Communications Manager Security Guide Security features supported on the Cisco Unified See the "Understanding Security Features for IP Phone Cisco Unified IP Phones" section on page 1-8 Restrictions regarding security features See the "Security Restrictions" section on page 1-13 Viewing a security profile name when running Cisco Unified Communications Manager 5.0 or later See the "Understanding Security Profiles" section on page 1-12 Identifying phone calls for which security is implemented See the "Identifying Authenticated, Encrypted, and Protected Phone Calls" section on page 1-12 Transport Layer Security (TLS) connection See the "Networking Protocols Used with Cisco Unified Wireless IP Phones" section on page 2-9 See the "Phone Configuration Files and Profile Files" section on page 2-14 Security and the phone startup process See the "Understanding the Phone Startup Process" section on page 3-17 Security and phone configuration files See the "Phone Configuration Files and Profile Files" section on page 2-14 Changing the TFTP Server 1 or TFTP Server 2 See the "Configuring Network Profiles" section option on the phone when security is implemented on page 4-8 Items on the Security Configuration menu on the See the "Viewing Security Information" section phone on page 8-1 Unlocking the CTL file See the "Accessing the CTL File Screen" section on page 8-3 Disabling access to phone web pages See the "Specific Configuration Options for the Cisco Unified Wireless IP Phone 7925G" section on page 7-13 Troubleshooting See the "General Troubleshooting Information" section on page 10-14 Refer to Cisco Unified Communications Manager Security Guide, Troubleshooting chapter Resetting or restoring the phone See the "Erasing the Local Configuration" section on page 10-18 OL-15984-01 Cisco Unified Wireless IP Phone 7925G Administration Guide for Cisco Unified Communications Manager 7.0(1) 1-9

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244

1-9
Cisco Unified Wireless IP Phone 7925G Administration Guide for Cisco Unified Communications Manager 7.0(1)
OL-15984-01
Chapter 1
Overview of the Cisco Unified Wireless IP Phone 7925G
Understanding Security Features for Cisco Unified IP Phones
For information about security features supported by Cisco Unified Communications Manager and Cisco
Unified IP Phones, see the
“Understanding Security Features for Cisco Unified IP Phones” section on
page 1-8
.
Table 1-2
provides additional information about security topics.
Table 1-2
Cisco Unified IP Phone and Cisco Unified Communications Manager Security Topics
Topic
Reference
Detailed explanation of security, including set up,
configuration, and troubleshooting information
for Cisco Unified Communications Manager and
Cisco Unified IP Phones
Refer to
Cisco Unified Communications Manager
Security Guide
Security features supported on the Cisco Unified
IP Phone
See the
“Understanding Security Features for
Cisco Unified IP Phones” section on page 1-8
Restrictions regarding security features
See the
“Security Restrictions” section on
page 1-13
Viewing a security profile name when running
Cisco Unified Communications Manager 5.0 or
later
See the
“Understanding Security Profiles” section
on page 1-12
Identifying phone calls for which security is
implemented
See the
“Identifying Authenticated, Encrypted,
and Protected Phone Calls” section on page 1-12
Transport Layer Security (TLS) connection
See the
“Networking Protocols Used with Cisco
Unified Wireless IP Phones” section on page 2-9
See the
“Phone Configuration Files and Profile
Files” section on page 2-14
Security and the phone startup process
See the
“Understanding the Phone Startup
Process” section on page 3-17
Security and phone configuration files
See the
“Phone Configuration Files and Profile
Files” section on page 2-14
Changing the TFTP Server 1 or TFTP Server 2
option on the phone when security is implemented
See the
“Configuring Network Profiles” section
on page 4-8
Items on the Security Configuration menu on the
phone
See the
“Viewing Security Information” section
on page 8-1
Unlocking the CTL file
See the
“Accessing the CTL File Screen” section
on page 8-3
Disabling access to phone web pages
See the
“Specific Configuration Options for the
Cisco Unified Wireless IP Phone 7925G” section
on page 7-13
Troubleshooting
See the
“General Troubleshooting Information”
section on page 10-14
Refer to
Cisco Unified Communications Manager
Security Guide,
Troubleshooting chapter
Resetting or restoring the phone
See the
“Erasing the Local Configuration” section
on page 10-18