Cisco 7941G Administration Guide - Page 32

Topic, Reference, The Cisco Unified IP Phones 7961G/7961G-GE and 7941G/7941G-GE use

Page 32 highlights

Understanding Security Features for Cisco Unified IP Phones Chapter 1 An Overview of the Cisco Unified IP Phone The Cisco Unified IP Phones 7961G/7961G-GE and 7941G/7941G-GE use the Phone security profile, which defines whether the device is nonsecure, authenticated, or encrypted. For information on applying the security profile to the phone, refer to the Cisco Unified Communications Manager Security Guide. If you configure security-related settings in Cisco Unified Communications Manager Administration, the phone configuration file will contain sensitive information. To ensure the privacy of a configuration file, you must configure it for encryption. For detailed information, refer to the "Configuring Encrypted Phone Configuration Files" chapter in Cisco Unified Communications Manager Security Guide. Table 1-2 shows where you can find additional information about security in this and other documents. Table 1-2 Cisco Unified IP Phone Security Topics Topic Reference Detailed explanation of security, including set up, configuration, and troubleshooting information for Cisco Unified Communications Manager and Cisco Unified IP Phones Refer to Cisco Unified Communications Manager Security Guide Security features supported on the Cisco Unified See the "Overview of Supported Security IP Phone Features" section on page 1-16 Restrictions regarding security features See the "Security Restrictions" section on page 1-26 Viewing a security profile name See the "Understanding Security Profiles" section on page 1-20 Identifying phone calls for which security is implemented See the "Identifying Encrypted and Authenticated Phone Calls" section on page 1-20 TLS connection • See the "What Networking Protocols are Used?" section on page 1-5 • See the "Adding Phones to the Cisco Unified Communications Manager Database" section on page 2-14 Security and the phone startup process See the "Understanding the Phone Startup Process" section on page 2-10 1-14 Cisco Unified IP Phone 7961G/7961G-GE and 7941G/7941G-GE for Cisco Unified Communications Manager 6.1 OL-14620-01

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302

Chapter 1
An Overview of the Cisco Unified IP Phone
Understanding Security Features for Cisco Unified IP Phones
1-14
Cisco Unified IP Phone 7961G/7961G-GE and 7941G/7941G-GE for Cisco Unified Communications Manager 6.1
OL-14620-01
The Cisco Unified IP Phones 7961G/7961G-GE and 7941G/7941G-GE use the
Phone security profile, which defines whether the device is nonsecure,
authenticated, or encrypted. For information on applying the security profile to
the phone, refer to the
Cisco Unified Communications Manager Security Guide
.
If you configure security-related settings in Cisco Unified Communications
Manager Administration, the phone configuration file will contain sensitive
information. To ensure the privacy of a configuration file, you must configure it
for encryption. For detailed information, refer to the “Configuring Encrypted
Phone Configuration Files” chapter in
Cisco Unified Communications Manager
Security Guide.
Table 1-2
shows where you can find additional information about security in this
and other documents.
Table 1-2
Cisco Unified IP Phone Security Topics
Topic
Reference
Detailed explanation of security, including set up,
configuration, and troubleshooting information
for Cisco Unified Communications Manager and
Cisco Unified IP Phones
Refer to
Cisco Unified Communications Manager
Security Guide
Security features supported on the Cisco Unified
IP Phone
See the
“Overview of Supported Security
Features” section on page 1-16
Restrictions regarding security features
See the
“Security Restrictions” section on
page 1-26
Viewing a security profile name
See the
“Understanding Security Profiles” section
on page 1-20
Identifying phone calls for which security is
implemented
See the
“Identifying Encrypted and Authenticated
Phone Calls” section on page 1-20
TLS connection
See the
“What Networking Protocols are
Used?” section on page 1-5
See the
“Adding Phones to the Cisco Unified
Communications Manager Database” section
on page 2-14
Security and the phone startup process
See the
“Understanding the Phone Startup
Process” section on page 2-10