Cisco CP-7975G Administration Guide - Page 27

Understanding Security Features for Cisco Unified IP Phones

Page 27 highlights

Chapter 1 An Overview of the Cisco Unified IP Phone Understanding Security Features for Cisco Unified IP Phones Understanding Security Features for Cisco Unified IP Phones Implementing security in the Cisco Unified Communications Manager system prevents identity theft of the phone and Cisco Unified Communications Manager server, prevents data tampering, and prevents call signaling and media stream tampering. To alleviate these threats, the Cisco Unified IP telephony network establishes and maintains authenticated and encrypted communication streams between a phone and the server, digitally signs files before they are transferred to a phone, and encrypts media streams and call signaling between Cisco Unified IP phones. The Cisco Unified IP Phones 7975G, 7971G-GE, 7970G, 7965G, and 7945G use the Phone Security Profile, which defines whether the device is nonsecure, authenticated, or encrypted. For information on applying the security profile to the phone, refer to Cisco Unified Communications Manager Security Guide. If you configure security-related settings in Cisco Unified Communications Manager Administration, the phone configuration file will contain sensitive information. To ensure the privacy of a configuration file, you must configure it for encryption. For detailed information, refer to Configuring Encrypted Phone Configuration Files in Cisco Unified Communications Manager Security Guide. Table 1-3 shows where you can find additional information about security in this and other documents. Table 1-3 Cisco Unified IP Phone and Cisco Unified Communications Manager Security Topics Topic Reference Detailed explanation of security, including set up, configuration, and troubleshooting information for Cisco Unified Communications Manager and Cisco Unified IP Phones Refer to the Troubleshooting Guide for Cisco Unified Communications Manager Security features supported on the Cisco Unified IP Phone See Overview of Supported Security Features, page 1-14 Restrictions regarding security features See Security Restrictions, page 1-21 Viewing a security profile name See Understanding Security Profiles, page 1-16 Identifying phone calls for which security is implemented See Identifying Authenticated, Encrypted, and Protected Phone Calls, page 1-17 TLS connection See What Networking Protocols are Used?, page 1-6 See Understanding Phone Configuration Files, page 2-7 Security and the phone startup process See Understanding the Phone Startup Process, page 2-9 Security and phone configuration files See Understanding Phone Configuration Files, page 2-7 Changing the TFTP Server 1 or TFTP Server 2 option on the See Table 4-2 in the Network Configuration Menu, page 4-5 phone when security is implemented Understanding security icons in the Unified CM 1 through See Unified CM Configuration, page 4-18 Unified CM 5 options in the Device Configuration Menu on the phone Items on the Security Configuration menu that you access See Security Configuration Menu, page 4-30 from the Device Configuration menu on the phone Items on the Security Configuration menu that you access See Security Configuration Menu, page 4-36 from the Settings menu on the phone OL-23092-01 Cisco Unified IP Phone Administration Guide for Cisco Unified Communications Manager 8.5 1-13

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266

1-13
Cisco Unified IP Phone Administration Guide for Cisco Unified Communications Manager 8.5
OL-23092-01
Chapter 1
An Overview of the Cisco Unified IP Phone
Understanding Security Features for Cisco Unified IP Phones
Understanding Security Features for Cisco Unified IP Phones
Implementing security in the Cisco Unified Communications Manager system prevents identity theft of
the phone and Cisco Unified Communications Manager server, prevents data tampering, and prevents
call signaling and media stream tampering.
To alleviate these threats, the Cisco Unified IP telephony network establishes and maintains
authenticated and encrypted communication streams between a phone and the server, digitally signs files
before they are transferred to a phone, and encrypts media streams and call signaling between
Cisco Unified IP phones.
The Cisco Unified IP Phones 7975G, 7971G-GE, 7970G, 7965G, and 7945G use the Phone Security
Profile, which defines whether the device is nonsecure, authenticated, or encrypted. For information on
applying the security profile to the phone, refer to
Cisco Unified Communications Manager Security
Guide
.
If you configure security-related settings in Cisco Unified Communications Manager Administration,
the phone configuration file will contain sensitive information. To ensure the privacy of a configuration
file, you must configure it for encryption. For detailed information, refer to
Configuring Encrypted
Phone Configuration Files
in
Cisco Unified Communications Manager Security Guide
.
Table 1-3
shows where you can find additional information about security in this and other documents.
Table 1-3
Cisco Unified IP Phone and Cisco Unified Communications Manager Security Topics
Topic
Reference
Detailed explanation of security, including set up,
configuration, and troubleshooting information for Cisco
Unified Communications Manager and Cisco Unified
IP Phones
Refer to the
Troubleshooting Guide for Cisco Unified
Communications Manager
Security features supported on the Cisco Unified IP Phone
See
Overview of Supported Security Features, page 1-14
Restrictions regarding security features
See
Security Restrictions, page 1-21
Viewing a security profile name
See
Understanding Security Profiles, page 1-16
Identifying phone calls for which security is implemented
See
Identifying Authenticated, Encrypted, and Protected
Phone Calls, page 1-17
TLS connection
See
What Networking Protocols are Used?, page 1-6
See
Understanding Phone Configuration Files, page 2-7
Security and the phone startup process
See
Understanding the Phone Startup Process, page 2-9
Security and phone configuration files
See
Understanding Phone Configuration Files, page 2-7
Changing the TFTP Server 1 or TFTP Server 2 option on the
phone when security is implemented
See
Table 4-2
in the
Network Configuration Menu, page 4-5
Understanding security icons in the Unified CM 1 through
Unified CM 5 options in the Device Configuration Menu on
the phone
See
Unified CM Configuration, page 4-18
Items on the Security Configuration menu that you access
from the Device Configuration menu on the phone
See
Security Configuration Menu, page 4-30
Items on the Security Configuration menu that you access
from the Settings menu on the phone
See
Security Configuration Menu, page 4-36