Chapter1 An Overview of the Cisco Unified IP Phone
Understanding Security Features for Cisco Unified IP Phones
1-12
Cisco Unified IP Phone Administration Guide for Cisco Unified CallManager 5.1 (SIP), Cisco Unified IP Phones
OL-11524-01
Understanding Security Features for Cisco Unified IP Phones
Implementing security in the CiscoUnified CallManager system prevents identity
theft of the phone and Cisco Unified CallManager server, prevents data
tampering, and prevents call signaling and media stream tampering.
To alleviate these threats, the Cisco IP telephony network establishes and
maintains authenticated and encrypted communication streams between a phone
and the server, digitally signs files before they are transferred to a phone, and
encrypts media streams and call signaling between Cisco Unified IP phones.
The Cisco Unified IP Phones 7970G/7971G-GE (SIP) use the SIP Phone security
profile, which defines whether the device is nonsecure, authenticated, or
encrypted. For information on applying the security profile to the phone, refer to
the Cisco Unified CallManager Security Guide.
If you configure security-related settings in CiscoUnified CallManager
Administration, the phone configuration file will contain sensitive information.
To ensure the privacy of a configuration file, you must configure it for encryption.
For detailed information, refer to the “Configuring Encrypted Phone
Configuration Files” chapter in Cisco Unified CallManager Security Guide.
Table 1 -2 shows where you can find additional information about security in this
and other documents.
Table1-2 Cisco Unified IP Phone and Cisco Unified CallManager Security Topics
Topic Reference
Detailed explanation of security, including set up,
configuration, and troubleshooting information
for Cisco Unified CallManager and Cisco
UnifiedIP Phones
Refer to Cisco Unified CallManager Security
Guide.
Security features supported on the Cisco Unified
IP Phone
See the “Overview of Supported Security
Features” section on page 1-14.
Restrictions regarding security features See the “Security Restrictions” section on
page 1-21.
Identifying phone calls for which security is
implemented
See the “Identifying Encrypted and Authenticated
Phone Calls” section on page1-17.