Security Features - Cisco 7925G Administration Manual

Unified wireless ip phone
Hide thumbs Also See for 7925G:
Table of Contents

Advertisement

Security Features

In addition to providing documentation, it is important to inform users about available Cisco Unified Wireless
IP Phone features (including features specific to your company or network) and about how to access and
customize those features, if appropriate.
Related Topics
Internal Support Website
Security Features
Implementing security in a wireless network protects against data tampering to Cisco Unified Communications
Manager data, call signaling, and media stream. It also reduces the chances for identity theft. To reduce the
threats, the Cisco wireless LAN (WLAN) provides options for user authentication with servers and for
encrypting communications streams between phones and network devices.
For information about supported security options for the Cisco Unified Wireless IP Phone, see
Methods.
For information about security features supported by Cisco Unified Communications Manager and Cisco
Unified Wireless IP Phones, see
The following table provides additional information about security topics.
Table 2: Security Topics
Topic
Detailed explanation of security, including
setup, configuration, and troubleshooting
information for Cisco
Unified Communications Manager and
Cisco Unified IP Phones
Security features supported on the Cisco
Unified IP Phone
Restrictions regarding security features
Viewing a security profile name when
running Cisco Unified Communications
Manager 5.0 or later
Identifying phone calls for which security
is implemented
Transport Layer Security (TLS) connection
Security and the phone startup process
Security and phone configuration files
Cisco Unified Wireless IP Phone 7925G, 7925G-EX, and 7926G Administration Guide
14
Supported Security Features, on page
Reference
See Cisco Unified Communications Manager Security Guide
See
Supported Security Features, on page 15
See
Security Restrictions, on page 19
See
Security Profiles, on page 17
See
Authenticated, Encrypted, and Protected Phone Calls, on
page 18
See
Network Protocols
See
Phone Configuration Files and Profile Files
See
Phone Startup Process
See
Phone Configuration Files and Profile Files
Cisco Unified Wireless IP Phone
Authentication
15.

Advertisement

Table of Contents
loading

This manual is also suitable for:

7925g-ex7926g

Table of Contents