Cisco 7906G Administration Guide - Page 5

Contents, Understanding the Cisco Unified IP Phones 7906G and 7911G

Page 5 highlights

1 C H A P T E R OL-14585-01 CONTENTS Preface xiii Overview xiii Audience xiii Organization xiv Related Documentation xv Obtaining Documentation, Obtaining Support, and Security Guidelines xvi Document Conventions xvi An Overview of the Cisco Unified IP Phone 1-1 Understanding the Cisco Unified IP Phones 7906G and 7911G 1-2 What Networking Protocols Are Used? 1-4 What Features are Supported? 1-9 Feature Overview 1-10 Configuring Telephony Features 1-11 Configuring Network Parameters Using the Cisco Unified IP Phone 1-11 Providing Users with Feature Information 1-12 Understanding Security Features for Cisco Unified IP Phones 1-12 Overview of Supported Security Features 1-15 Understanding Security Profiles 1-19 Identifying Encrypted and Authenticated Phone Calls 1-19 Establishing and Identifying Secure Conference Calls 1-20 Call Security Interactions and Restrictions 1-21 Supporting 802.1X Authentication on Cisco Unified IP Phones 1-23 Cisco Unified IP Phone 7906G and 7911G for Cisco Unified Communications Manager 6.1 v

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278

v
Cisco Unified IP Phone 7906G and 7911G for Cisco Unified Communications Manager 6.1
OL-14585-01
CONTENTS
Preface
xiii
Overview
xiii
Audience
xiii
Organization
xiv
Related Documentation
xv
Obtaining Documentation, Obtaining Support, and Security Guidelines
xvi
Document Conventions
xvi
CHAPTER
1
An Overview of the Cisco Unified IP Phone
1-1
Understanding the Cisco Unified IP Phones 7906G and 7911G
1-2
What Networking Protocols Are Used?
1-4
What Features are Supported?
1-9
Feature Overview
1-10
Configuring Telephony Features
1-11
Configuring Network Parameters Using the Cisco Unified IP Phone
1-11
Providing Users with Feature Information
1-12
Understanding Security Features for Cisco Unified IP Phones
1-12
Overview of Supported Security Features
1-15
Understanding Security Profiles
1-19
Identifying Encrypted and Authenticated Phone Calls
1-19
Establishing and Identifying Secure Conference Calls
1-20
Call Security Interactions and Restrictions
1-21
Supporting 802.1X Authentication on Cisco Unified IP Phones
1-23