Security Profiles - Cisco DX650 Administration Manual

Desktop collaboration experience video conferencing
Hide thumbs Also See for DX650:
Table of Contents

Advertisement

Feature
Security profile
Encrypted configuration files
Optional web server disabling for a
phone
Phone hardening
802.1X Authentication
Secure SIP Failover for SRST
Signaling encryption

Security Profiles

All Cisco Desktop Collaboration Experience DX600 devices that support Cisco Unified Communications
Manager use a security profile, which defines whether the phone is nonsecure, authenticated, or encrypted.
For information about configuring the security profile and applying the profile to the phone, see the Cisco
Unified Communications Manager Security Guide.
Description
Defines whether the phone is nonsecure, authenticated, encrypted, or protected. Other entries
in this table describe security features. For more information about these features, about
Cisco Unified Communications Manager, and about Cisco DX600 Series phone security,
see the Cisco Unified Communications Manager Security Guide.
Lets you ensure the privacy of phone configuration files.
For security purposes, you can prevent access to the web pages for a phone (which display
a variety of operational statistics for the phone) and User Options web pages. For more
information, see
Manage the User Options Web Pages, on page
Additional security options, which you control from Cisco Unified Communications Manager
Administration:
• Disable PC port
• Disable Gratuitous ARP (GARP)
• Disable PC Voice VLAN access
• Provide restricted access to the web applications
• Disable Bluetooth Accessory Port
• Disable access to web pages for a phone
• Require a screen lock
• Control access to Google Play
• Control access to installation of applications from unknown sources
The Cisco DX600 Series phone can use 802.1X authentication to request and gain access
to the network. See
802.1X Authentication Support, on page 24
After you configure a Survivable Remote Site Telephony (SRST) reference for security and
then reset the dependent devices in Cisco Unified Communications Manager Administration,
the TFTP server adds the SRST certificate to the phone cnf.xml file and sends the file to the
phone. A secure phone then uses a TLS connection to interact with the SRST-enabled router.
Ensures that all SCCP and SIP signaling messages that are sent between the device and the
Cisco Unified Communications Manager server are encrypted.
Cisco Desktop Collaboration Experience DX650 Administration Guide, Release 10.1(1)
Security Features
151.
for more information.
21

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents