Cisco CP-7961G-GE Administration Guide - Page 25

Providing Users with Feature Information, Understanding Security Features for Cisco Unified IP Phones

Page 25 highlights

Chapter 1 An Overview of the Cisco Unified IP Phone Understanding Security Features for Cisco Unified IP Phones Providing Users with Feature Information If you are a system administrator, you are likely the primary source of information for Cisco Unified IP Phone users in your network or company. To ensure that you distribute the most current feature and procedural information, familiarize yourself with Cisco Unified IP Phone documentation. Make sure to visit the Cisco Unified IP Phone web site: http://www.cisco.com/en/US/products/hw/phones/ps379/tsd_products_support_series_home.html From this site, you can view various user guides. In addition to providing documentation, it is important to inform users of available Cisco Unified IP Phone features-including those specific to your company or network-and of how to access and customize those features, if appropriate. For a summary of some of the key information that phone users need their system administrators to provide, see Appendix A, Providing Information to Users Via a Website. Understanding Security Features for Cisco Unified IP Phones Implementing security in the Cisco Unified Communications Manager system prevents identity theft of the phone and Cisco Unified Communications Manager server, prevents data tampering, and prevents call signaling and media stream tampering. To alleviate these threats, the Cisco IP telephony network establishes and maintains authenticated and encrypted communication streams between a phone and the server, digitally signs files before they are transferred to a phone, and encrypts media streams and call signaling between Cisco Unified IP phones. The Cisco Unified IP Phone 7962G and 7942G use the Phone security profile, which defines whether the device is nonsecure, authenticated, or encrypted. For information on applying the security profile to the phone, refer to Cisco Unified Communications Manager Security Guide. If you configure security-related settings in Cisco Unified Communications Manager Administration, the phone configuration file will contain sensitive information. To ensure the privacy of a configuration file, you must configure it for encryption. For detailed information, refer to Configuring Encrypted Phone Configuration Files in Cisco Unified Communications Manager Security Guide. Table 1-3 shows where you can find additional information about security in this and other documents. Table 1-3 Cisco Unified IP Phone and Cisco Unified Communications Manager Security Topics Topic Reference Detailed explanation of security, including set up, configuration, and troubleshooting information for Cisco Unified Communications Manager and Cisco Unified IP Phones Refer to Troubleshooting Guide for Cisco Unified Communications Manager Security features supported on the Cisco Unified IP Phone See Overview of Supported Security Features, page 1-13 Restrictions regarding security features See Security Restrictions, page 1-20 Viewing a security profile name See Understanding Security Profiles, page 1-15 Identifying phone calls for which security is implemented See Identifying Authenticated, Encrypted, and Protected Phone Calls, page 1-15 OL-21011-01 Cisco Unified IP Phone Administration Guide for Cisco Unified Communications Manager 8.0 (SCCP and SIP) 1-11

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241

1-11
Cisco Unified IP Phone Administration Guide for Cisco Unified Communications Manager 8.0 (SCCP and SIP)
OL-21011-01
Chapter 1
An Overview of the Cisco Unified IP Phone
Understanding Security Features for Cisco Unified IP Phones
Providing Users with Feature Information
If you are a system administrator, you are likely the primary source of information for Cisco Unified IP
Phone users in your network or company. To ensure that you distribute the most current feature and
procedural information, familiarize yourself with Cisco Unified IP Phone documentation. Make sure to
visit the Cisco Unified IP Phone web site:
From this site, you can view various user guides.
In addition to providing documentation, it is important to inform users of available Cisco Unified IP
Phone features—including those specific to your company or network—and of how to access and
customize those features, if appropriate.
For a summary of some of the key information that phone users need their system administrators to
provide, see
Appendix A, Providing Information to Users Via a Website
.
Understanding Security Features for Cisco Unified IP Phones
Implementing security in the Cisco Unified Communications Manager system prevents identity theft of
the phone and Cisco Unified Communications Manager server, prevents data tampering, and prevents
call signaling and media stream tampering.
To alleviate these threats, the Cisco IP telephony network establishes and maintains authenticated and
encrypted communication streams between a phone and the server, digitally signs files before they are
transferred to a phone, and encrypts media streams and call signaling between Cisco Unified IP phones.
The Cisco Unified IP Phone 7962G and 7942G use the Phone security profile, which defines whether
the device is nonsecure, authenticated, or encrypted. For information on applying the security profile to
the phone, refer to
Cisco Unified Communications Manager Security Guide
.
If you configure security-related settings in Cisco Unified Communications Manager Administration,
the phone configuration file will contain sensitive information. To ensure the privacy of a configuration
file, you must configure it for encryption. For detailed information, refer to
Configuring Encrypted
Phone Configuration Files
in
Cisco Unified Communications Manager Security Guide.
Table 1-3
shows where you can find additional information about security in this and other documents.
Table 1-3
Cisco Unified IP Phone and Cisco Unified Communications Manager Security
Topics
Topic
Reference
Detailed explanation of security, including set
up, configuration, and troubleshooting
information for Cisco Unified Communications
Manager and Cisco Unified IP Phones
Refer to
Troubleshooting Guide for Cisco Unified
Communications Manager
Security features supported on the Cisco
Unified IP Phone
See
Overview of Supported Security Features,
page 1-13
Restrictions regarding security features
See
Security Restrictions, page 1-20
Viewing a security profile name
See
Understanding Security Profiles, page 1-15
Identifying phone calls for which security is
implemented
See
Identifying Authenticated, Encrypted, and
Protected Phone Calls, page 1-15