Cisco 7971G-GE Administration Guide - Page 23

The Cisco Unified IP Phones Series use the Phone Security Profile, which defines whether the device is

Page 23 highlights

Chapter 1 An Overview of the Cisco Unified IP Phone Understanding Security Features for Cisco Unified IP Phones To alleviate these threats, the Cisco Unified IP telephony network establishes and maintains authenticated and encrypted communication streams between a phone and the server, digitally signs files before they are transferred to a phone, and encrypts media streams and call signaling between Cisco Unified IP phones. The Cisco Unified IP Phones Series use the Phone Security Profile, which defines whether the device is nonsecure, authenticated, or encrypted. For information on applying the security profile to the phone, refer to Cisco Unified Communications Manager Security Guide. If you configure security-related settings in Cisco Unified Communications Manager Administration, the phone configuration file will contain sensitive information. To ensure the privacy of a configuration file, you must configure it for encryption. For detailed information, refer to the "Configuring Encrypted Phone Configuration Files" chapter in Cisco Unified Communications Manager Security Guide. Table 1-2 shows where you can find additional information about security in this and other documents. Table 1-2 Cisco Unified IP Phone and Cisco Unified Communications Manager Security Topics Topic Reference Detailed explanation of security, including set up, configuration, and troubleshooting information for Cisco Unified Communications Manager and Cisco Unified IP Phones Refer to Cisco Unified Communications Manager Security Guide Security features supported on the Cisco Unified IP Phone See the "Overview of Supported Security Features" section on page 1-10 Restrictions regarding security features See the "Security Restrictions" section on page 1-17 Viewing a security profile name See the "Understanding Security Profiles" section on page 1-12 Identifying phone calls for which security is implemented See the "Identifying Authenticated, Encrypted, and Protected Phone Calls" section on page 1-13 TLS connection See the "What Networking Protocols Are Used?" section on page 1-3 See the "Understanding Phone Configuration Files" section on page 2-6 Security and the phone startup process See the "Understanding the Phone Startup Process" section on page 2-7 Security and phone configuration files See the "Understanding Phone Configuration Files" section on page 2-6 Changing the TFTP Server 1 or TFTP Server 2 option on the See Table 4-2 in the "Network Configuration Menu" section phone when security is implemented on page 4-5 Understanding security icons in the Unified CM 1 through See the "Unified CM Configuration" section on page 4-11 Unified CM 5 options in the Device Configuration Menu on the phone Items on the Security Configuration menu that you access See the "Security Configuration Menu" section on page 4-23 from the Device Configuration menu on the phone Items on the Security Configuration menu that you access See the "Security Configuration Menu" section on page 4-29 from the Settings menu on the phone Unlocking the CTL file See the "CTL File Menu" section on page 4-30 OL-15299-01 Cisco Unified IP Phone 7970G/7971G-GE Administration Guide for Cisco Unified Communications Manager 7.0 1-9

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219

1-9
Cisco Unified IP Phone 7970G/7971G-GE Administration Guide for Cisco Unified Communications Manager 7.0
OL-15299-01
Chapter 1
An Overview of the Cisco Unified IP Phone
Understanding Security Features for Cisco Unified IP Phones
To alleviate these threats, the Cisco Unified IP telephony network establishes and maintains
authenticated and encrypted communication streams between a phone and the server, digitally signs files
before they are transferred to a phone, and encrypts media streams and call signaling between
Cisco Unified IP phones.
The Cisco Unified IP Phones Series use the Phone Security Profile, which defines whether the device is
nonsecure, authenticated, or encrypted. For information on applying the security profile to the phone,
refer to
Cisco Unified Communications Manager Security Guide
.
If you configure security-related settings in Cisco Unified Communications Manager Administration,
the phone configuration file will contain sensitive information. To ensure the privacy of a configuration
file, you must configure it for encryption. For detailed information, refer to the “Configuring Encrypted
Phone Configuration Files” chapter in
Cisco Unified Communications Manager Security Guide
.
Table 1-2
shows where you can find additional information about security in this and other documents.
Table 1-2
Cisco Unified IP Phone and Cisco Unified Communications Manager Security Topics
Topic
Reference
Detailed explanation of security, including set up,
configuration, and troubleshooting information for Cisco
Unified Communications Manager and Cisco Unified IP
Phones
Refer to
Cisco Unified Communications Manager Security
Guide
Security features supported on the Cisco Unified IP Phone
See the
“Overview of Supported Security Features” section on
page 1-10
Restrictions regarding security features
See the
“Security Restrictions” section on page 1-17
Viewing a security profile name
See the
“Understanding Security Profiles” section on
page 1-12
Identifying phone calls for which security is implemented
See the
“Identifying Authenticated, Encrypted, and Protected
Phone Calls” section on page 1-13
TLS connection
See the
“What Networking Protocols Are Used?” section on
page 1-3
See the
“Understanding Phone Configuration Files” section on
page 2-6
Security and the phone startup process
See the
“Understanding the Phone Startup Process” section on
page 2-7
Security and phone configuration files
See the
“Understanding Phone Configuration Files” section on
page 2-6
Changing the TFTP Server 1 or TFTP Server 2 option on the
phone when security is implemented
See
Table 4-2
in the
“Network Configuration Menu” section
on page 4-5
Understanding security icons in the Unified CM 1 through
Unified CM 5 options in the Device Configuration Menu on
the phone
See the
“Unified CM Configuration” section on page 4-11
Items on the Security Configuration menu that you access
from the Device Configuration menu on the phone
See the
“Security Configuration Menu” section on page 4-23
Items on the Security Configuration menu that you access
from the Settings menu on the phone
See the
“Security Configuration Menu” section on page 4-29
Unlocking the CTL file
See the
“CTL File Menu” section on page 4-30