Cisco CP-7911G Administration Guide - Page 24

Networking Protocol, Purpose, Usage Notes, The Cisco Unified IP Phones use - manual

Page 24 highlights

What Networking Protocols Are Used? Chapter 1 An Overview of the Cisco Unified IP Phone Table 1-1 Supported Networking Protocols on the Cisco Unified IP Phone (continued) Networking Protocol Dynamic Host Configuration Protocol (DHCP) HyperText Transfer Protocol (HTTP) IEEE 802.1X Purpose Usage Notes DHCP dynamically allocates and assigns an IP address to network devices. DHCP enables you to connect an IP phone into the network and have the phone become operational without you needing to manually assign an IP address or to configure additional network parameters. DHCP is enabled by default. If disabled, you must manually configure the IP address, subnet mask, gateway, and a TFTP server on each phone locally. Cisco recommends that you use DHCP custom option 150. With this method, you configure the TFTP server IP address as the option value. For additional information about DHCP configurations, refer to the "Cisco TFTP" chapter in the Cisco Unified Communications Manager System Guide. HTTP is the standard way of transferring information and moving documents across the Internet and the World Wide Web. The Cisco Unified IP Phones use HTTP for the XML services and for troubleshooting purposes. The IEEE 802.1X standard defines a client-server-based access control and authentication protocol that restricts unauthorized clients from connecting to a LAN through publicly accessible ports. Until the client is authenticated, 802.1X access control allows only Extensible Authentication Protocol over LAN (EAPOL) traffic through the port to which the client is connected. After authentication is successful, normal traffic can pass through the port. The Cisco Unified IP Phone implements the IEEE 802.1X standard by providing support for the EAP-MD5 option for 802.1X authentication. When 802.1X authentication is enabled on the phone, you should disable the PC port and voice VLAN. See the "Supporting 802.1X Authentication on Cisco Unified IP Phones" for additional information. Cisco Unified IP Phone 7906G and 7911G for Cisco Unified Communications Manager 6.0 1-6 OL11954-01

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284

Chapter 1
An Overview of the Cisco Unified IP Phone
What Networking Protocols Are Used?
1-6
Cisco Unified IP Phone 7906G and 7911G for Cisco Unified Communications Manager 6.0
OL11954-01
Dynamic Host
Configuration Protocol
(DHCP)
DHCP dynamically allocates and
assigns an IP address to network
devices.
DHCP enables you to connect an IP
phone into the network and have the
phone become operational without
you needing to manually assign an IP
address or to configure additional
network parameters.
DHCP is enabled by default. If
disabled, you must manually
configure the IP address, subnet
mask, gateway, and a TFTP server on
each phone locally.
Cisco recommends that you use
DHCP custom option 150. With this
method, you configure the TFTP
server IP address as the option value.
For additional information about
DHCP configurations, refer to the
“Cisco TFTP” chapter in the
Cisco Unified Communications
Manager System Guide
.
HyperText Transfer
Protocol (HTTP)
HTTP is the standard way of
transferring information and moving
documents across the Internet and the
World Wide Web.
The Cisco Unified IP Phones use
HTTP for the XML services and for
troubleshooting purposes.
IEEE 802.1X
The IEEE 802.1X standard defines a
client-server-based access control
and authentication protocol that
restricts unauthorized clients from
connecting to a LAN through
publicly accessible ports.
Until the client is authenticated,
802.1X access control allows only
Extensible Authentication Protocol
over LAN (EAPOL) traffic through
the port to which the client is
connected. After authentication is
successful, normal traffic can pass
through the port.
The Cisco Unified IP Phone
implements the IEEE 802.1X
standard by providing support for the
EAP-MD5 option for 802.1X
authentication.
When 802.1X authentication is
enabled on the phone, you should
disable the PC port and voice VLAN.
See the
“Supporting 802.1X
Authentication on Cisco Unified IP
Phones”
for additional information.
Table 1-1
Supported Networking Protocols on the Cisco Unified IP Phone (continued)
Networking Protocol
Purpose
Usage Notes