Supported Security Features
The following table provides an overview of the security features that the Cisco Unified IP Phones support. For more information about these features and about Cisco Unified Communications Manager and Cisco Unified IP Phone security, see Cisco Unified Communications Manager Security Guide.
For information about current security settings on a phone, choose Settings > Security Configuration and choose Settings > Device Configuration > Security Configuration.
Note Most security features are available only if a certificate trust list (CTL) is installed on the phone. For more information about the CTL, see “Configuring the Cisco CTL Client” chapter in Cisco Unified Communications Manager Security Guide.
Feature
|
Description
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Uses SRTP to ensure that the media streams
between supported devices proves secure
and that only the intended device receives and reads the data. Includes creating a media master key pair for the
devices, delivering the keys to the devices,
and securing the delivery of the keys while the keys are in transport.
|
|
|
|
|
Security profiles
|
Defines whether the phone is nonsecure, authenticated,
encrypted, or protected
|
Encrypted configuration files
|
Lets you ensure the privacy of phone configuration files.
|
Optional disabling of the web server functionality for a
phone
|
You can prevent access to a phone’s web page, which displays a variety of operational statistics for the phone.
|
Phone hardening
|
Additional security options, which you control from Cisco Unified Communications Manager Administration:
|
802.1X Authentication
|
The Cisco Unified IP Phone can use 802.1X authentication to request and gain access to the network. |
Related Topics
Authenticated, Encrypted, and Protected Phone Calls
Cisco Unified IP Phone Security