Cisco CP-7911G Administration Guide - Page 30

Providing Users with Feature Information, Understanding Security Features for CiscoUnified IP Phones - user guide

Page 30 highlights

Understanding Security Features for Cisco Unified IP Phones Chapter 1 An Overview of the Cisco Unified IP Phone Providing Users with Feature Information If you are a system administrator, you are likely the primary source of information for Cisco Unified IP Phone users in your network or company. To ensure that you distribute the most current feature and procedural information, familiarize yourself with Cisco Unified IP Phone documentation. Make sure to visit the Cisco Unified IP Phone web site: http://www.cisco.com/en/US/products/hw/phones/ps379/tsd_products_support_s eries_home.html From this site, you can view and order various user guides, including wallet cards. For complete ordering information, see the "Document Conventions" section on page xiv. In addition to providing users with documentation, it is important to inform them of available Cisco Unified IP Phone features-including features specific to your company or network-and of how to access and customize those features, if appropriate. For a summary of some of the key information that phone users need their system administrators to provide, see Appendix A, "Providing Information to Users." Understanding Security Features for Cisco Unified IP Phones Implementing security in the Cisco Unified Communications Manager system prevents identity theft of the phone and Cisco Unified Communications Manager server, prevents data tampering, and prevents call signaling and media stream tampering. To alleviate these threats, the Cisco Unified Communications network establishes and maintains authenticated and encrypted communication streams between a phone and the server, digitally signs files before they are transferred to a phone and encrypts media streams between Cisco Unified IP phones. If you configure security-related settings in Cisco Unified Communications Manager Administration, the phone configuration file will contain sensitive information. To ensure the privacy of a configuration file, you must configure it 1-12 Cisco Unified IP Phone 7906G and 7911G for Cisco Unified Communications Manager 6.0 OL11954-01

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284

Chapter 1
An Overview of the Cisco Unified IP Phone
Understanding Security Features for Cisco Unified IP Phones
1-12
Cisco Unified IP Phone 7906G and 7911G for Cisco Unified Communications Manager 6.0
OL11954-01
Providing Users with Feature Information
If you are a system administrator, you are likely the primary source of information
for Cisco Unified IP Phone users in your network or company. To ensure that you
distribute the most current feature and procedural information, familiarize
yourself with Cisco Unified IP Phone documentation. Make sure to visit the
Cisco Unified IP Phone web site:
eries_home.html
From this site, you can view and order various user guides, including wallet cards.
For complete ordering information, see the
“Document Conventions”
section on
page xiv.
In addition to providing users with documentation, it is important to inform them
of available Cisco Unified IP Phone features—including features specific to your
company or network—and of how to access and customize those features, if
appropriate.
For a summary of some of the key information that phone users need their system
administrators to provide, see
Appendix A, “Providing Information to Users.”
Understanding Security Features for Cisco
Unified IP
Phones
Implementing security in the Cisco Unified Communications Manager system
prevents identity theft of the phone and Cisco Unified Communications Manager
server, prevents data tampering, and prevents call signaling and media stream
tampering.
To alleviate these threats, the Cisco
Unified Communications network establishes
and maintains authenticated and encrypted communication streams between a
phone and the server, digitally signs files before they are transferred to a phone
and encrypts media streams between Cisco Unified IP phones.
If you configure security-related settings in Cisco Unified Communications
Manager Administration, the phone configuration file will contain sensitive
information. To ensure the privacy of a configuration file, you must configure it