Cisco 8961 Administration Manual page 35

Administration guide for cisco unified communications manager 8.6 (sip)
Hide thumbs Also See for 8961:
Table of Contents

Advertisement

Chapter 1
An Overview of the Cisco Unified IP Phone
Table 1-6
Overview of Security Features (continued)
Feature
CAPF (Certificate Authority Proxy
Function)
Security profiles
Encrypted configuration files
Optional disabling of the web
server functionality for a phone
Phone hardening
802.1X Authentication
Secure SIP Failover for SRST
Signaling encryption
Related Topics
Cisco Unified IP Phone 8961, 9951, and 9971 Administration Guide for Cisco Unified Communications Manager 8.6 (SIP)
Description
Implements parts of the certificate generation procedure that are too
processing-intensive for the phone, and interacts with the phone for key generation and
certificate installation. The CAPF can be configured to request certificates from
customer-specified certificate authorities on behalf of the phone, or it can be
configured to generate certificates locally.
Defines whether the phone is nonsecure, authenticated, encrypted, or protected. See
Table
1-6, which provides an overview of the security features that the Cisco Unified
IP Phone 9971 supports. For more information about these features and about
Cisco Unified Communications Manager and Cisco Unified IP Phone security, see the
Cisco Unified Communications Manager Security Guide.
Lets you ensure the privacy of phone configuration files.
For security purposes, you can prevent access to the web pages for a phone (which
displays a variety of operational statistics for the phone) and user options web pageuser
options web pages. For more information, see the
Access" section on page
Additional security options, which you control from Cisco Unified Communications
Manager Administration:
Disabling PC port
Disabling Gratuitous ARP (GARP)
Disabling PC Voice VLAN access
Disabling access to the Setting menus, or providing restricted access that allows
access to the Preferences menu and saving volume changes only
Disabling access to web pages for a phone
Disabling Bluetooth Accessory Port
The Cisco Unified IP Phone can use 802.1X authentication to request and gain access
to the network. See the
Phones" section on page 1-22
After you configure an SRST reference for security and then reset the dependent
devices in Cisco Unified CM Administration, the TFTP server adds the SRST
certificate to the phone cnf.xml file and sends the file to the phone. A secure phone then
uses a TLS connection to interact with the SRST-enabled router.
Ensures that all SCCP and SIP signaling messages that are sent between the device and
the Cisco Unified CM server are encrypted.
Identifying Secure (Encrypted) Phone Calls, page 1-20
Security Restrictions, page 1-24
Understanding Security Features for Cisco Unified IP Phones
11-3.
"Supporting 802.1X Authentication on Cisco Unified IP
for more information.
"Enabling and Disabling Web Page
1-19

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

99519971

Table of Contents