Specifications

1-10
Cisco Unified IP Phone 7906G and 7911G for Cisco Unified Communications Manager 8.0
OL-21033-01
Chapter 1 An Overview of the Cisco Unified IP Phone
Understanding Security Features for Cisco Unified IP Phones
Understanding Security Features for Cisco Unified IP Phones
Implementing security in the Cisco Unified Communications Manager system prevents identity theft of
the phone and Cisco Unified Communications Manager server, prevents data tampering, and prevents
call signaling and media stream tampering.
To alleviate these threats, the Cisco Unified Communications network establishes and maintains
authenticated and encrypted communication streams between a phone and the server, digitally signs files
before they are transferred to a phone and encrypts media streams between Cisco Unified IP phones.
If you configure security-related settings in Cisco Unified Communications Manager Administration,
the phone configuration file will contain sensitive information. To ensure the privacy of a configuration
file, you must configure it for encryption. For detailed information, refer to Configuring Encrypted
Phone Configuration Files in Cisco Unified Communications Manager Security Guide.
Table 1-3 shows where you can find additional information about security in this and other documents.
Table 1-3 Cisco Unified IP Phone Security Topics
Topic Reference
Detailed explanation of security, including set up,
configuration, and troubleshooting information
for Cisco Unified Communications Manager and
Cisco Unified IP Phones
Refer to the Troubleshooting Guide for Cisco Unified Communications
Manager.
Security features supported on the Cisco Unified
IP Phone
See Overview of Supported Security Features, page 1-11.
Restrictions regarding security features See Security Restrictions, page 1-18.
Identifying phone calls for which security is
implemented
See Identifying Authenticated, Encrypted and Protected Phone Calls,
page 1-13.
Transport Layer Security (TLS) connection
See What Networking Protocols are Used?, page 1-3.
See Understanding Phone Configuration Files, page 2-4.
802.1X authentication for Cisco Unified IP
Phones
See these sections:
Supporting 802.1X Authentication on Cisco Unified IP Phones,
page 1-16.
Security Configuration Menu, page 4-33.
802.1X Authentication and Status, page 4-37.
Troubleshooting Cisco Unified IP Phone Security, page 9-8.
Security and the phone startup process See Understanding the Phone Startup Process, page 2-5.
Security and phone configuration files See Understanding Phone Configuration Files, page 2-4.
Changing the TFTP Server 1 or TFTP Server 2
option on the phone when security is implemented
See Network Configuration Menu, page 4-5.
Understanding security icons in the
Communications Manager 1 through
Communications Manager 5 options in the Device
Configuration Menu on the phone
See Unified CM Configuration Menu, page 4-18.
Items on the Security Configuration menu that you
access from the Device Configuration menu on the
phone
See Security Configuration Menu, page 4-27.