1-16
Cisco Unified IP Phone 6921, 6941, 6945, and 6961 Administration Guide for Cisco Unified Communications Manager 8.5 (SCCP and SIP)
OL-23769-01
Chapter
Understanding Security Features for Cisco Unified IP Phones
All Cisco Unified IP Phones that support Cisco Unified CM use a security profile, which defines whether
the phone is nonsecure or secure.
For information about configuring the security profile and applying the profile to the phone, refer to
Cisco Unified Communications Manager Security Guide.
Overview of Supported Security Features
Table 1-6 provides an overview of the security features that the Cisco Unified IP Phone 6921, 6941, and
6961 support. For more information about these features and about Cisco Unified CM and
Cisco Unified IP Phone security, refer to Cisco Unified Communications Manager Security Guide.
For information about current security settings on a phone, choose Applications > Admin Settings >
Security Setup. For more information, see the “Security Configuration Menu” section on page 4-9.
Note Most security features are available only if a certificate trust list (CTL) is installed on the phone. For
more information about the CTL, refer to “Configuring the Cisco CTL Client” chapter in Cisco Unified
Communications Manager Security Guide.
Resetting or restoring the phone See the “Resetting or Restoring the Cisco Unified IP Phone” section on
page 9-12
802.1X Authentication for Cisco Unified IP
Phones See these sections:
“Supporting 802.1X Authentication on Cisco Unified IP Phones”
section on page 1-21
“Security Configuration Menu” section on page 4-9
“Status Menu” section on page 7-2
“Troubleshooting Cisco Unified IP Phone Security” section on
page 9-8
Table 1-5 Cisco Unified IP Phone and Cisco Unified CM Security Topics (continued)
Topic Reference
Table 1-6 Overview of Security Features
Feature Description
Image authentication Signed binary files (with the extension .sgn) prevent tampering with the
firmware image before it is loaded on a phone. Tampering with the image causes
a phone to fail the authentication process and reject the new image.
Customer-site certificate installation Each Cisco Unified IP Phone requires a unique certificate for device
authentication. Phones include a manufacturing installed certificate (MIC), but
for additional security, you can specify in Cisco Unified CM Administration that
a certificate be installed by using the Certificate Authority Proxy Function
(CAPF). Alternatively, you can install a Locally Significant Certificate (LSC)
from the Security Configuration menu on the phone. See the “Configuring
Security on the Cisco Unified IP Phone” section on page 3-15 for more
information.