Cisco 7970G Administration Guide - Page 31

Topic, Reference, The Cisco Unified IP Phones Series use the Phone Security Profile, which defines

Page 31 highlights

Chapter 1 An Overview of the Cisco Unified IP Phone Understanding Security Features for Cisco Unified IP Phones The Cisco Unified IP Phones Series use the Phone Security Profile, which defines whether the device is nonsecure, authenticated, or encrypted. For information on applying the security profile to the phone, refer to Cisco Unified Communications Manager Security Guide. If you configure security-related settings in Cisco Unified Communications Manager Administration, the phone configuration file will contain sensitive information. To ensure the privacy of a configuration file, you must configure it for encryption. For detailed information, refer to the "Configuring Encrypted Phone Configuration Files" chapter in Cisco Unified Communications Manager Security Guide. Table 1-2 shows where you can find additional information about security in this and other documents. Table 1-2 Cisco Unified IP Phone and Cisco Unified Communications Manager Security Topics Topic Reference Detailed explanation of security, Refer to Cisco Unified including set up, configuration, and Communications Manager Security troubleshooting information for Cisco Guide Unified Communications Manager and Cisco Unified IP Phones Security features supported on the Cisco Unified IP Phone See the "Overview of Supported Security Features" section on page 1-15 Restrictions regarding security features See the "Security Restrictions" section on page 1-25 Viewing a security profile name See the "Understanding Security Profiles" section on page 1-19 Identifying phone calls for which security is implemented See the "Identifying Encrypted and Authenticated Phone Calls" section on page 1-19 TLS connection See the "What Networking Protocols Are Used?" section on page 1-4 See the "Understanding Phone Configuration Files" section on page 2-8 Cisco Unified IP Phone 7970G/7971G-GE Administration Guide for Cisco Unified Communications Manager 6.1 OL-14626-01 1-13

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301

1-13
Cisco Unified IP Phone 7970G/7971G-GE Administration Guide for Cisco Unified Communications Manager 6.1
OL-14626-01
Chapter 1
An Overview of the Cisco Unified IP Phone
Understanding Security Features for Cisco Unified IP Phones
The Cisco Unified IP Phones Series use the Phone Security Profile, which defines
whether the device is nonsecure, authenticated, or encrypted. For information on
applying the security profile to the phone, refer to
Cisco Unified Communications
Manager Security Guide
.
If you configure security-related settings in Cisco Unified Communications
Manager Administration, the phone configuration file will contain sensitive
information. To ensure the privacy of a configuration file, you must configure it
for encryption. For detailed information, refer to the “Configuring Encrypted
Phone Configuration Files” chapter in
Cisco Unified Communications Manager
Security Guide
.
Table 1-2
shows where you can find additional information about security in this
and other documents.
Table 1-2
Cisco Unified IP Phone and Cisco Unified Communications
Manager Security Topics
Topic
Reference
Detailed explanation of security,
including set up, configuration, and
troubleshooting information for Cisco
Unified Communications Manager and
Cisco Unified IP Phones
Refer to
Cisco Unified
Communications Manager Security
Guide
Security features supported on the
Cisco Unified IP Phone
See the
“Overview of Supported
Security Features” section on
page 1-15
Restrictions regarding security
features
See the
“Security Restrictions” section
on page 1-25
Viewing a security profile name
See the
“Understanding Security
Profiles” section on page 1-19
Identifying phone calls for which
security is implemented
See the
“Identifying Encrypted and
Authenticated Phone Calls” section on
page 1-19
TLS connection
See the
“What Networking Protocols
Are Used?” section on page 1-4
See the
“Understanding Phone
Configuration Files” section on
page 2-8