Chapter 1 An Overview of the Cisco Unified IP Phones

Understanding Security Features for Cisco Unified IP Phones

Table 1-4

Overview of Security Features (continued)

 

 

 

Feature

 

Description

 

 

Phone hardening

Additional security options, which you control from Cisco Unified Communications Manager

 

 

Administration:

 

 

Disabling PC port

 

 

Disabling Gratuitous ARP (GARP)

 

 

Disabling PC Voice VLAN access

 

 

Disabling access to the Setting menus, or providing restricted access that allows access to

 

 

the User Preferences menu and saving volume changes only

 

 

Disabling access to web pages for a phone

 

 

Note You can view current settings for the PC Port Disabled, GARP Enabled, and Voice

 

 

VLAN enabled options by looking at the phone’s Security Configuration menu. For

 

 

more information, see Device Configuration Menu, page 4-18.

 

 

802.1X Authentication

The Cisco Unified IP Phone can use 802.1X authentication to request and gain access to the

 

 

network. See Supporting 802.1X Authentication on Cisco Unified IP Phones, page 1-19for

 

 

more information.

 

 

 

Related Topics

Understanding Security Profiles, page 1-15

Identifying Authenticated, Encrypted, and Protected Phone Calls, page 1-15

Security Restrictions, page 1-21

Device Configuration Menu, page 4-18

Understanding Security Profiles

All Cisco Unified IP Phones that support Cisco Unified Communications Manager use a security profile, which defines whether the phone is nonsecure, authenticated, or encrypted. For information about configuring the security profile and applying the profile to the phone, see Cisco Unified Communications Manager Security Guide.

To view the phone security mode, look at the Security Mode setting in the Security Configuration menu. For more information, see Security Configuration Menu, page 4-32.

Related Topics

Identifying Authenticated, Encrypted, and Protected Phone Calls, page 1-15

Security Restrictions, page 1-21

Device Configuration Menu, page 4-18

Identifying Authenticated, Encrypted, and Protected Phone Calls

When security is implemented for a phone, you can identify authenticated or encrypted phone calls by icons on the screen on the phone. You can also determine if the connected phone is secure and protected if a security tone plays at the beginning of the call.

 

 

Cisco Unified IP Phone Administration Guide for Cisco Unified Communications Manager 8.6 (SCCP and SIP)

 

 

 

 

 

 

OL-23091-01

 

 

1-15

 

 

 

 

 

Page 29
Image 29
Cisco Systems 8.6 manual Understanding Security Profiles, More information, see Device Configuration Menu