User's Manual
Table Of Contents
- Cisco Unified IP Phone Administration Guide for Cisco Unified Communications Manager 8.6 (SCCP and SIP)
- Contents
- Preface
- An Overview of the Cisco Unified IP Phones
- Understanding the Cisco Unified IP Phone 7962G and 7942G 7962G, 7942G, 7961G, 7961G-GE, 7941G, and 7941G-GE
- What Networking Protocols are Used?
- What Features are Supported on the Cisco Unified IP Phone 7962G and 7942G?
- Understanding Security Features for Cisco Unified IP Phones
- Reducing Power Consumption on the Phones
- Overview of Configuring and Installing Cisco Unified IP Phones
- Preparing to Install the Cisco Unified IP Phones on Your Network
- Understanding Interactions with Other Cisco Unified IP Telephony Products
- Providing Power to the Cisco Unified IP Phones
- Understanding Phone Configuration Files
- Understanding the Phone Startup Process
- Adding Phones to the Cisco Unified Communications Manager Database
- Using Cisco Unified IP Phones with Different Protocols
- Determining the MAC Address for a Cisco Unified IP Phones
- Setting Up the Cisco Unified IP Phones
- Before You Begin
- Understanding the Cisco Unified IP Phone Components
- Installing the Cisco Unified IP Phones
- Attaching a Cisco Unified IP Phone Expansion Module
- Adjusting the Placement of the Cisco Unified IP Phone
- Verifying the Phone Startup Process
- Configuring Startup Network Settings
- Configuring Security on the Cisco Unified IP Phones
- Configuring Settings on the Cisco Unified IP Phones
- Configuration Menus on the Cisco Unified IP Phones
- Overview of Options Configurable from a Phone
- Network Configuration Menu
- Device Configuration Menu
- Unified CM Configuration Menu
- SIP Configuration Menu for SIP Phones Only
- Call Preferences Menu for SIP Phones
- HTTP Configuration Menu
- Locale Configuration Menu
- UI Configuration Menu
- Media Configuration Menu
- Ethernet Configuration Menu
- Security Configuration Menu
- QoS Configuration Menu
- Network Configuration Menu
- Security Configuration Menu
- Configuring Features, Templates, Services, and Users
- Telephony Features Available for the Cisco Unified IP Phone
- Configuring Product Specific Configuration Parameters
- Configuring Corporate and Personal Directories
- Modifying Phone Button Templates
- Configuring Softkey Templates
- Setting Up Services
- Adding Users to Cisco Unified Communications Manager
- Managing the User Options Web Pages
- Enabling EnergyWise on the Cisco Unified IP Phone
- Customizing the Cisco Unified IP Phones
- Monitoring the Cisco Unified IP Phones Remotely
- Viewing Model Information, Status, and Statistics on the Cisco Unified IP Phones
- Troubleshooting and Maintenance
- Resolving Startup Problems
- Symptom: The Cisco Unified IP Phone Does Not Go Through its Normal Startup Process
- Symptom: The Cisco Unified IP Phone Does Not Register with Cisco Unified Communications Manager
- Identifying Error Messages
- Checking Network Connectivity
- Verifying TFTP Server Settings
- Verifying IP Addressing and Routing
- Verifying DNS Settings
- Verifying Cisco Unified Communications Manager Settings
- Cisco CallManager and TFTP Services Are Not Running
- Creating a New Configuration File
- Registering the Phone with Cisco Unified Communications Manager
- Symptom: Cisco Unified IP Phone Unable to Obtain IP Address
- Symptom: The Cisco Unified IP Phone Displays the Message Security Error
- Cisco Unified IP Phone Resets Unexpectedly
- Troubleshooting Cisco Unified IP Phone Security
- General Troubleshooting Tips
- General Troubleshooting Tips for the Cisco Unified IP Phone Expansion Module
- Resetting or Restoring the Cisco Unified IP Phones
- Using the Quality Report Tool
- Monitoring the Voice Quality of Calls
- Where to Go for More Troubleshooting Information
- Cleaning the Cisco Unified IP Phone
- Resolving Startup Problems
- Providing Information to Users Via a Website
- How Users Obtain Support for the Cisco Unified IP Phones
- Giving Users Access to the User Options Web Pages
- How Users Access the Online Help System on the Cisco Unified IP Phone
- How Users Get Copies of Cisco Unified IP Phone Manuals
- Accessing Cisco 7900 Series Unified IP Phone eLearning Tutorials for SCCP Phones Only
- How Users Subscribe to Services and Configure Phone Features
- How Users Access a Voice Messaging System
- How Users Configure Personal Directory Entries
- Feature Support by Protocol for Cisco Unified IP Phone
- Supporting International Users
- Technical Specifications
- Basic Phone Administration Steps
- Index

1-17
Cisco Unified IP Phone Administration Guide for Cisco Unified Communications Manager 8.6 (SCCP and SIP)
OL-23091-01
Chapter 1 An Overview of the Cisco Unified IP Phones
Understanding Security Features for Cisco Unified IP Phones
Establishing and Identifying Protected Calls
A protected call is established when your phone, and the phone on the other end, is configured for
protected calling. The other phone can be in the same Cisco IP network, or on a network outside the IP
network. Protected calls can only be made between two phones. Conference calls and other multiple-line
calls cannot be protected.
A protected call is established using this process:
1. A user initiates the call from a protected phone (protected security mode).
2. The phone displays the icon (encrypted) on the phone screen. This icon indicates that the phone
is configured for secure (encrypted) calls, but this does not mean that the other connected phone is
also protected.
3. A security tone plays if the call is connected to another protected phone, indicating that both ends
of the conversation are encrypted and protected. If the call is connected to a non-protected phone,
then the secure tone does not play.
Note Protected calling is supported for conversations between two phones. Some features, such as conference
calls, shared lines, Cisco Extension Mobility, and Join Across Lines, are not available when protected
calling is configured.
Call Security Interactions and Restrictions
Cisco Unified Communications Manager checks the phone security status when conferences are
established and changes the security indication for the conference or blocks the completion of the call
to maintain integrity and security in the system.
Table 1-5 provides information about changes to call
security levels when using Barge.
Table 1-6 provides information about changes to conference security levels depending on the initiator’s
phone security level, the security levels of participants, and the availability of secure conference bridges.
Ta b l e 1-5 Call Security Interactions When Using Barge
Initiator’s Phone
Security Level
Feature Used Call Security Level Results of Action
Non-secure Barge Encrypted call Call barged and identified as non-secure call
Secure (encrypted) Barge Authenticated call Call barged and identified as authenticated call
Secure
(authenticated)
Barge Encrypted call Call barged and identified as authenticated call
Non-secure Barge Authenticated call Call barged and identified as non-secure call










