Cisco 7921G Administration Guide - Page 24

Understanding Security Profiles, SETTINGS > Device, Information > Security > Security Mode - wireless controller configuration

Page 24 highlights

Understanding Security Features for Cisco Unified IP Phones Chapter 1 Overview of the Cisco Unified Wireless IP Phone 7921G Table 1-2 Overview of Security Features (continued) Feature Optional disabling of the web server functionality for a phone Phone hardening Description You can prevent access to a phone's web page, which displays a variety of operational statistics for the phone. Additional security options, which you control from Cisco Unified Communications Manager Administration: • Disabling Gratuitous ARP (GARP) • Disabling access to the Setting menus • Disabling access to web pages for a phone Note You can view current settings for the GARP Enabled, and Web Access options by looking at the phone's Device Information menu. For more information, see the "Viewing Security Information" section on page 8-1. Related Topics • Understanding Security Profiles, page 1-10 • Identifying Encrypted and Authenticated Phone Calls, page 1-11 • Viewing Device Information, page 8-4 • Security Restrictions, page 1-11 Understanding Security Profiles A security profile defines whether a phone is non-secure, authenticated, or encrypted and associated with every Cisco Unified IP Phone that is supported by Cisco Unified Communications Manager Administration. For information about configuring the security profile and applying the profile to the phone, refer to Cisco Unified Communications Manager Security Guide. Note Security is configured on each Cisco Unified IP Phone. For more information about configuring security, refer to Cisco Unified CallManager Security Guide at http://www.cisco.com/en/US/products/sw/voicesw/ps556/prod_maintenance_guides_list.html. To view the security mode that is set for the phone, from the phone screen, choose SETTINGS > Device Information > Security > Security Mode. For more information, see the "Viewing Security Information" section on page 8-1. Related Topics • Identifying Encrypted and Authenticated Phone Calls, page 1-11 • Viewing Device Information, page 8-4 • Security Restrictions, page 1-11 1-10 Cisco Unified Wireless IP Phone 7921G Administration Guide for Cisco Unified Communications Manager Release 7.0 OL-15985-01

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234

1-10
Cisco Unified Wireless IP Phone 7921G Administration Guide for Cisco Unified Communications Manager Release 7.0
OL-15985-01
Chapter 1
Overview of the Cisco Unified Wireless IP Phone 7921G
Understanding Security Features for Cisco Unified IP Phones
Related Topics
Understanding Security Profiles, page 1-10
Identifying Encrypted and Authenticated Phone Calls, page 1-11
Viewing Device Information, page 8-4
Security Restrictions, page 1-11
Understanding Security Profiles
A security profile defines whether a phone is non-secure, authenticated, or encrypted and associated with
every Cisco Unified IP Phone that is supported by Cisco Unified Communications Manager
Administration. For information about configuring the security profile and applying the profile to the
phone, refer to
Cisco Unified Communications Manager Security Guide
.
Note
Security is configured on each Cisco Unified IP Phone. For more information about configuring security,
refer to
Cisco Unified CallManager Security Guide
at
.
To view the security mode that is set for the phone, from the phone screen, choose
SETTINGS > Device
Information > Security > Security Mode
. For more information, see the
“Viewing Security
Information” section on page 8-1
.
Related Topics
Identifying Encrypted and Authenticated Phone Calls, page 1-11
Viewing Device Information, page 8-4
Security Restrictions, page 1-11
Optional disabling of the web
server functionality for a phone
You can prevent access to a phone’s web page, which displays a
variety of operational statistics for the phone.
Phone hardening
Additional security options, which you control from
Cisco Unified Communications Manager Administration:
Disabling Gratuitous ARP (GARP)
Disabling access to the Setting menus
Disabling access to web pages for a phone
Note
You can view current settings for the GARP Enabled, and
Web Access options by looking at the phone’s Device
Information menu. For more information, see the
“Viewing
Security Information” section on page 8-1
.
Table 1-2
Overview of Security Features (continued)
Feature
Description