Specifications
Table Of Contents
- Cisco Unified Wireless IP Phone 7921G Administration Guide for Cisco Unified CallManager Release 4.1, 4.2, 5.0 and Later
- Contents
- Preface
- An Overview of the Cisco Unified Wireless IP Phone 7921G
- An Overview of the Voice Over IP Wireless Network
- Understanding the Wireless LAN
- Components of the VoIP Wireless Network
- Voice Over IP Wireless Network Configuration
- Site Survey Verification
- Setting Up the Cisco Unified Wireless IP Phone 7921G
- Before You Begin
- Installing the Cisco Unified Wireless IP Phone 7921G
- Powering On the Cisco Unified Wireless IP Phone 7921G
- Understanding the Phone Startup Process
- Using the Cisco Unified Wireless IP Phone 7921G Web Pages
- Using the USB Connection for Initial Phone Configuration
- Updating Phones Remotely
- Configuring Network Profiles
- Configuring USB Settings
- Configuring Trace Settings
- Using System Settings
- Configuring Settings on the Cisco Unified Wireless IP Phone 7921G
- Accessing Network and Phone Settings
- Configuring Network Profile Settings
- Changing Phone Settings
- Configuring the Security Certificate on the Phone
- Changing the USB Configuration
- Configuring Features, Templates, Services, and Users
- Configuring Cisco Unified Wireless IP Phones in Cisco Unified CallManager
- Telephony Features Available for the Phone
- Specific Configuration Options for the Cisco Unified Wireless IP Phone 7921G
- Configuring Softkey Templates
- Modifying Phone Button Templates
- Setting Up Services
- Configuring Corporate and Personal Directories
- Adding Users to Cisco Unified CallManager
- Managing the User Options Web Pages
- Creating Custom Phone Rings
- Viewing Security, Device, Model, and Status Information on the Phone
- Monitoring the Cisco Unified Wireless IP Phone Remotely
- Troubleshooting the Cisco Unified Wireless IP Phone 7921G
- Resolving Startup and Connectivity Problems
- Resolving Voice Quality and Roaming Problems
- General Troubleshooting Information
- Erasing the Local Configuration
- Providing Information to Users By Using a Website
- Supporting International Users
- Physical and Operating Environment Specifications
- Checklist for Deploying the Cisco Unified Wireless IP Phone 7921G
- Index

1-15
Cisco Unified Wireless IP Phone 7921G Administration Guide for Cisco Unified CallManager Release 4.1, 4.2, 5.0
OL-10802-02
Chapter 1 An Overview of the Cisco Unified Wireless IP Phone 7921G
Understanding Security Features for Cisco Unified IP Phones
To view the security mode that is set for the phone, from the phone screen, choose
Settings > Device Information > Security > Security Mode. For more
information, see the
“Viewing Security Information” section on page 7-2.
Related Topics
• Identifying Encrypted and Authenticated Phone Calls, page 1-15
• Viewing Device Information, page 7-6
• Security Restrictions, page 1-16
Identifying Encrypted and Authenticated Phone Calls
When security is implemented for a phone, you can identify authenticated or
encrypted phone calls by icons on the screen on the phone.
In an authenticated call, all devices participating in the establishment of the call
are authenticated by the Cisco
Unified CallManager. When a call in progress is
authenticated, the call progress icon to the right of the call duration timer in the
phone screen changes to this icon:
In an encrypted call, all devices participating in the establishment of the call are
authenticated by the Cisco
Unified CallManager. In addition, call signaling and
media streams are encrypted. An encrypted call offers the highest level of
security, providing integrity and privacy to the call. When a call in progress is
being encrypted, the call progress icon to the right of the call duration timer in the
phone screen changes to this icon:
Note If the call is routed through non-IP call legs, such as the PSTN, the call might be
non-secure even though it is encrypted within the IP network and has a lock icon
associated with it.
Related Topics
• Understanding Security Features for Cisco Unified IP Phones, page 1-9
• Understanding Security Profiles, page 1-14
• Security Restrictions, page 1-16