Datasheet
Data Sheet
All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 7 of 14
●
Station-to-station calls
●
Station-through-trunk calls (MGCP gateways)
JTAPI and TAPI applications enabled with automated failover and automatic update
Triple Cisco Unified CallManager redundancy per device (phones, gateway, and
applications) with automated failover and recovery
Trunk groups
MGCP BRI support (European Telecommunications Standards Institute [ETSI] BRI
basic-net3 user-side only)
●
Security
Configurable operation modes—Nonsecure or secure
Device authentication—New model phones have an embedded X.509v3
Certificate; a certificate authority proxy function (CAPF) is used to install a locally
significant certificate in phones
Data integrity—Transparent LAN services (TLS) cipher “NULL-SHA” supported;
messages are appended with SHA1 hash of the message to ensure that the message is
not altered on the wire and can be trusted
HTTPS support for the following applications: Cisco Unified CallManager Administration,
Cisco Unified CallManager Serviceability, Cisco Unified CallManager User, Cisco Unified
CallManager RTMT, Cisco Unified CallManager TraceAnalysis, Cisco Unified
CallManager Service, the Cisco Unified CallManager Trace Collection tool, and the Cisco
Unified CallManager CAR tool
Privacy—Support for encryption of signaling and media; phone types include Cisco
Unified IP Phone 7940G, 7941G, 7941G-GE, 7960G, 7961G, 7961G-GE, 7970G, and
7971G models; Cisco Unified Survivable Remote Site Telephony (SRST) and MGCP
gateways are supported
Secure Sockets Layer (SSL) for directory—Supported applications include BAT, CAR,
Cisco Unified CallManager Administration User Pages, Cisco Unified CallManager
Assistant Administration Pages, Cisco Unified CallManager User Pages and IP Phone
Options Pages, CTI Manager, Extension Mobility, Cisco Unified CallManager Assistant,
and Multilevel Administration (MLA)
USB eToken containing a Cisco rooted X.509v3 certificate—Used to generate a
Certificate Trust List (CTL) file for the phones as well as configuring the security mode of
the cluster
Phone security—Provided by Trivial File Transfer Protocol (TFTP) files (configuration and
firmware loads) signed with the self-signed certificate of the TFTP server; the Cisco
Unified CallManager system administrator can disable HTTP and Telnet on the IP
phones
●
Session Initiation Protocol (SIP) trunk
●
Cisco Unified SRST
●
Shared resource and application management and configuration
Transcoder resource
Conference bridge resource










