Chapter 1
An Overview of the Cisco Unified IP Phone
Understanding Security Features for Cisco Unified IP Phones
Implementing security in the Cisco Unified Communications Manager system prevents identity theft of
the phone and Cisco Unified Communications Manager server, prevents data tampering, and prevents
call signaling and media stream tampering.
To alleviate these threats, the Cisco IP telephony network establishes and maintains authenticated and
encrypted communication streams between a phone and the server, digitally signs files before they are
transferred to a phone, and encrypts media streams and call signaling between Cisco Unified IP phones.
The Cisco Unified IP Phone 7962G and 7942G (SIP) use the Phone security profile, which defines
whether the device is nonsecure, authenticated, or encrypted. For information on applying the security
profile to the phone, refer to the Cisco Unified Communications Manager Security Guide.
If you configure security-related settings in Cisco Unified Communications Manager Administration,
the phone configuration file will contain sensitive information. To ensure the privacy of a configuration
file, you must configure it for encryption. For detailed information, refer to the "Configuring Encrypted
Phone Configuration Files" chapter in Cisco Unified Communications Manager Security Guide.
Table 1-2
Table 1-2
Topic
Detailed explanation of security,
including set up, configuration, and
troubleshooting information for Cisco
Unified Communications Manager and
Cisco Unified IP Phones
Security features supported on the Cisco
Unified IP Phone
Restrictions regarding security features
Viewing a security profile name
Identifying phone calls for which
security is implemented
TLS connection
Security and the phone startup process
Security and phone configuration files
OL-12641-01
shows where you can find additional information about security in this and other documents.
Cisco Unified IP Phone and Cisco Unified Communications Manager Security Topics
Cisco Unified IP Phone 7962G and 7942G Administration Guide for Cisco Unified Communications Manager 6.0
Understanding Security Features for Cisco Unified IP Phones
Reference
Refer to Cisco Unified
Communications Manager Security
Guide
See the
"Overview of Supported
Security Features" section on
page 1-11
See the
"Security Restrictions"
section on page 1-18
See the
"Understanding Security
Profiles" section on page 1-13
See the
"Identifying Encrypted and
Authenticated Phone Calls" section
on page 1-14
See the
"What Networking
•
Protocols are Used?" section on
page 1-4
•
See the
"Adding Phones to the
Cisco Unified Communications
Manager Database" section on
page 2-8
See the
"Understanding the Phone
Startup Process" section on page 2-6
See the
"Adding Phones to the Cisco
Unified Communications Manager
Database" section on page 2-8
1-9