Administration Manual

1-7
Cisco Unified IP Conference Station 7937G Administration Guide for Cisco Unified Communications Manager 6.0
OL-11560-01 Rev. B0
Chapter 1 An Overview of the Conference Station
Understanding Security Features for Conference Stations
Providing Users with Feature Information
If you are a system administrator, you are likely the primary source of information for conference station
users in your network or company. To ensure that you distribute the most current feature and procedural
information, familiarize yourself with conference station documentation. Make sure to visit the
Cisco
Unified IP Conference Station web site:
http://www.cisco.com/en/US/products/hw/phones/ps3
79/tsd_products_support_series_home.html
From this site, you can access various user guides.
In addition to providing users with documentation, it is important to inform them about available
con
ference station features—including features specific to your company or network—and about how to
access and customize those features, if appropriate.
For a summary of some of the key information tha
t conference station users need their system
administrators to provide, see Appendix A, “Providing Information to Users Via a Website.
Understanding Security Features for Conference Stations
Implementing security in the Cisco Unified Communications Manager system prevents identity theft of
the conference station and Cisco Unified Communications Manager server and p
revents data tampering.
Table 1-2
shows where you can find additional information about security in this and other documents.
Ta b l e 1-2 Conference Station and Cisco Unified Communications Manager
Security Topics
Topic Reference
Detailed explanation of security, including set up,
conf
iguration, and troubleshooting information
for Cisco Unified Communications Manager and
conference stations
Refer to Cisco Unified Communications Manager
Security Guide
Security features supported on the
conference
station
See the “Overview of Supported Security
Features” section on page 1-8
Viewing a security profile name See the “U
nderstanding Security Profiles” section
on page 1-9
Security and the conference st
ation startup process See the “Understanding the Conference Station
Startup Process” section on page 2-5
Security and conference station configuration files See the “U
nderstanding Conference Station
Configuration Files” section on page 2-4
Changing the TFTP Server 1 or TFTP Server 2
op
tion on the conference station when security is
implemented
See Table 4-3 on page 4-5
Understanding security icons in the
Ca
llManager 1 through CallManager 5 options in
th
e CallManager Configuration menu on the
conference station
See the
CallManager Configuration Menu”
section on page 4-9
Items on the Security Configuration menu on the
conference station
See the “Se
curity Configuration Menu” section on
page 4-11 and the “Security Configuration Menu”
section on page 4-12