Cisco 7962G Administration Guide - Page 23
Topic, Reference, Cisco Unified Communications Manager Security Guide, Security Guide
UPC - 882658140341
View all Cisco 7962G manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 23 highlights
Chapter 1 An Overview of the Cisco Unified IP Phone Understanding Security Features for Cisco Unified IP Phones OL-14625-01 To alleviate these threats, the Cisco IP telephony network establishes and maintains authenticated and encrypted communication streams between a phone and the server, digitally signs files before they are transferred to a phone, and encrypts media streams and call signaling between Cisco Unified IP phones. The Cisco Unified IP Phone 7962G and 7942G use the Phone security profile, which defines whether the device is nonsecure, authenticated, or encrypted. For information on applying the security profile to the phone, refer to the Cisco Unified Communications Manager Security Guide. If you configure security-related settings in Cisco Unified Communications Manager Administration, the phone configuration file will contain sensitive information. To ensure the privacy of a configuration file, you must configure it for encryption. For detailed information, refer to the "Configuring Encrypted Phone Configuration Files" chapter in Cisco Unified Communications Manager Security Guide. Table 1-2 shows where you can find additional information about security in this and other documents. Table 1-2 Cisco Unified IP Phone and Cisco Unified Communications Manager Security Topics Topic Reference Detailed explanation of security, including set up, configuration, and troubleshooting information for Cisco Unified Communications Manager and Cisco Unified IP Phones Refer to Cisco Unified Communications Manager Security Guide Security features supported on the Cisco Unified IP Phone See the "Overview of Supported Security Features" section on page 1-10 Restrictions regarding security features See the "Security Restrictions" section on page 1-16 Viewing a security profile name See the "Understanding Security Profiles" section on page 1-12 Identifying phone calls for which security is implemented See the "Identifying Encrypted and Authenticated Phone Calls" section on page 1-13 TLS connection • See the "What Networking Protocols are Used?" section on page 1-4 • See the "Adding Phones to the Cisco Unified Communications Manager Database" section on page 2-8 Security and the phone startup process See the "Understanding the Phone Startup Process" section on page 2-7 Security and phone configuration files See the "Adding Phones to the Cisco Unified Communications Manager Database" section on page 2-8 Changing the TFTP Server 1 or TFTP Server 2 See Table 4-2, in the "Network Configuration option on the phone when security is Menu" section on page 4-5 implemented Understanding security icons in the Communications Manager 1 through Communications Manager 5 options in the Device Configuration Menu on the phone See the "CallManager Configuration Menu" section on page 4-10 Items on the Security Configuration menu that See the "Security Configuration Menu" section on you access from the Device Configuration menu page 4-21 on the phone Cisco Unified IP Phone 7962G and 7942G Administration Guide for Cisco Unified Communications Manager 6.1 1-9