Cisco Unified IP Phone 7970G/7971G-GE
Administration Guide for Cisco Unified
Communications Manager 7.0
(SCCP
Americas Headquarters
Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134-1706
USA
http://www.cisco.com
Tel: 408 526-4000
Fax: 408 527-0883
and SIP)
800 553-NETS (6387)
Text Part Number: OL-15299-01
THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL
STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT
WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS.
THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT
SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE
OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY.
The following information is for FCC compliance of Class A devices: This equipment has been tested and found to comply with the limits for a Class A digital device, pursuant
to part 15 of the FCC rules. These limits are designed to provide reasonable protection against harmful interference when the equipment is operated in a commercial
environment. This equipment generates, uses, and can radiate radio-frequency energy and, if not installed and used in accordance with the instruction manual, may cause
harmful interference to radio communications. Operation of this equipment in a residential area is likely to cause harmful interference, in which case users will be required
to correct the interference at their own expense.
The following information is for FCC compliance of Class B devices: The equipment described in this manual generates and may radiate radio-frequency energy. If it is not
installed in accordance with Cisco’s installation instructions, it may cause interference with radio and television reception. This equipment has been tested and found to
comply with the limits for a Class B digital device in accordance with the specifications in part 15 of the FCC rules. These specifications are designed to provide reasonable
protection against such interference in a residential installation. However, there is no guarantee that interference will not occur in a particular installation.
Modifying the equipment without Cisco’s written authorization may result in the equipment no longer complying with FCC requirements for Class A or Class B digital
devices. In that event, your right to use the equipment may be limited by FCC regulations, and you may be required to correct any interference to radio or television
communications at your own expense.
You can determine whether your equipment is causing interference by turning it off. If the interference stops, it was probably caused by the Cisco equipment or one of its
peripheral devices. If the equipment causes interference to radio or television reception, try to correct the interference by using one or more of the following measures:
• Turn the television or radio antenna until the interference stops.
• Move the equipment to one side or the other of the television or radio.
• Move the equipment farther away from the television or radio.
• Plug the equipment into an outlet that is on a different circuit from the television or radio. (That is, make certain the equipment and the television or radio are on circuits
controlled by different circuit breakers or fuses.)
Modifications to this product not authorized by Cisco Systems, Inc. could void the FCC approval and negate your authority to operate the product.
NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS” WITH
ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT
LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF
DEALING, USAGE, OR TRADE PRACTICE.
IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING,
WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO
OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
CCDE, CCENT, Cisco Eos, Cisco Lumin, Cisco Nexus, Cisco StadiumVision, the Cisco logo, DCE, and Welcome to the Human Network are trademarks; Changing the Way
We Work, Live, Play, and Learn is a service mark; and Access Registrar, Aironet, AsyncOS, Bringing the Meeting To You, Catalyst, CCDA, CCDP, CCIE, CCIP, CCNA,
CCNP, CCSP, CCVP, Cisco, the Cisco Certified Internetwork Expert logo, Cisco IOS, Cisco Press, Cisco Systems, Cisco Systems Capital, the Cisco Systems logo,
Cisco Unity, Collaboration Without Limitation, EtherFast, EtherSwitch, Event Center, Fast Step, Follow Me Browsing, FormShare, GigaDrive, HomeLink, Internet Quotient,
IOS, iPhone, iQ Expertise, the iQ logo, iQ Net Readiness Scorecard, iQuick Study, IronPort, the IronPort logo, LightStream, Linksys, MediaTone, MeetingPlace, MGX,
Networkers, Networking Academy, Network Registrar, PCNow, PIX, PowerPanels, ProConnect, ScriptShare, SenderBase, SMARTnet, Spectrum Expert, StackWise, The
Fastest Way to Increase Your Internet Quotient, TransPath, WebEx, and the WebEx logo are registered trademarks of Cisco Systems, Inc. and/or its affiliates in the United
States and certain other countries.
All other trademarks mentioned in this document or Website are the property of their respective owners. The use of the word partner does not imply a partnership relationship
between Cisco and any other company. (0805R)
The Java logo is a trademark or registered trademark of Sun Microsystems, Inc. in the U.S. or other countries.
Cisco Unified IP Phone 7970G/7971G-GE Administration Guide for Cisco Unified Communications Manager 7.0
Obtaining Documentation, Obtaining Support, and Security Guidelinesxiii
Cisco Product Security Overviewxiii
Document Conventionsxiii
CHAPTER
1An Overview of the Cisco Unified IP Phone1-1
Understanding the Cisco Unified IP Phone 7970 Series1-1
What Networking Protocols Are Used?1-3
What Features are Supported on the Cisco Unified IP Phone 7970 Series?1-7
Feature Overview1-7
Configuring Telephony Features1-8
Configuring Network Parameters Using the Cisco Unified IP Phone1-8
Providing Users with Feature Information1-8
Understanding Security Features for Cisco Unified IP Phones1-8
Overview of Supported Security Features1-10
Understanding Security Profiles1-12
Identifying Authenticated, Encrypted, and Protected Phone Calls1-13
Establishing and Identifying Secure Conference Calls1-14
Establishing and Identifying Protected Calls1-14
Call Security Interactions and Restrictions 1-15
Supporting 802.1X Authentication on Cisco Unified IP Phones1-16
Overview1-16
Required Network Components1-16
Best Practices—Requirements and Recommendations1-17
Security Restrictions1-17
OL-15299-01
Overview of Configuring and Installing Cisco Unified IP Phones1-18
Configuring Cisco Unified IP Phones in Cisco Unified Communications Manager1-18
Checklist for Configuring the Cisco Unified IP Phone 7970 Series in
Cisco Unified Communications Manager1-19
Cisco Unified IP Phone 7970G/7971G-GE Administration Guide for Cisco Unified Communications Manager 7.0
iii
Contents
Installing Cisco Unified IP Phones1-21
Checklist for Installing the Cisco Unified IP Phone 7970 Series1-21
CHAPTER
2Preparing to Install the Cisco Unified IP Phone on Your Network2-1
Understanding Interactions with Other Cisco Unified IP Communications Products2-2
Understanding How the Cisco Unified IP Phone Interacts with Cisco Unified Communications
Manager2-2
Understanding How the Cisco Unified IP Phone Interacts with the VLAN2-3
Providing Power to the Phone2-3
Power Guidelines2-4
Phone Power Consumption and Display Brightness2-5
Power Outage2-5
Obtaining Additional Information about Power2-6
Understanding Phone Configuration Files2-6
Understanding the Phone Startup Process2-7
Adding Phones to the Cisco Unified Communications Manager Database2-9
Adding Phones with Auto-Registration2-10
Adding Phones with Auto-Registration and TAPS2-11
Adding Phones with Cisco Unified Communications Manager Administration2-12
Adding Phones with BAT2-12
Using Cisco Unified IP Phones with Different Protocols2-12
Converting a New Phone from SCCP to SIP2-13
Converting an In-Use Phone from SCCP to SIP2-13
Converting an In-Use Phone from SIP to SCCP2-13
Deploying a Phone in an SCCP and SIP Environment2-14
CHAPTER
iv
Determining the MAC Address of a Cisco Unified IP Phone2-14
8Monitoring the Cisco Unified IP Phone Remotely8-1
Accessing the Web Page for a Phone8-1
Disabling and Enabling Web Page Access8-3
Device Information8-3
Network Configuration8-4
Network Statistics8-8
Device Logs8-10
Streaming Statistics8-10
9Troubleshooting and Maintenance9-1
Resolving Startup Problems9-1
Symptom: The Cisco Unified IP Phone Does Not Go Through its Normal Startup Process9-2
Symptom: The Cisco Unified IP Phone Does Not Register with Cisco Unified Communications
Cisco CallManager and TFTP Services Are Not Running9-4
Creating a New Configuration File9-5
Registering the Phone with Cisco Unified Communications Manager9-5
Symptom: Cisco Unified IP Phone Unable to Obtain IP Address9-6
OL-15299-01
Cisco Unified IP Phone Resets Unexpectedly9-6
Verifying Physical Connection9-6
Identifying Intermittent Network Outages9-6
Verifying DHCP Settings9-7
Checking Static IP Address Settings9-7
Verifying Voice VLAN Configuration9-7
Verifying that the Phones Have Not Been Intentionally Reset9-7
Eliminating DNS or Other Connectivity Errors9-7
Checking Power Connection9-8
Troubleshooting Cisco Unified IP Phone Security9-8
General Troubleshooting Tips9-10
Cisco Unified IP Phone 7970G/7971G-GE Administration Guide for Cisco Unified Communications Manager 7.0
vii
Contents
General Troubleshooting Tips for the Cisco Unified IP Phone Expansion Module 79149-12
Resetting or Restoring the Cisco Unified IP Phone9-13
Performing a Basic Reset9-13
Performing a Factory Reset9-14
Using the Quality Report Tool9-14
Monitoring the Voice Quality of Calls9-15
Using Voice Quality Metrics9-15
Troubleshooting Tips9-16
Where to Go for More Troubleshooting Information9-17
Cleaning the Cisco Unified IP Phone9-17
APPENDIX
APPENDIX
APPENDIX
AProviding Information to Users Via a WebsiteA-1
How Users Obtain Support for the Cisco Unified IP PhoneA-1
Giving Users Access to the User Options Web PagesA-1
How Users Access the Online Help System on the PhoneA-2
How Users Get Copies of Cisco Unified IP Phone ManualsA-2
Accessing Cisco 7900 Series Unified IP Phone eLearning Tutorials (SCCP Phones Only)A-2
How Users Subscribe to Services and Configure Phone FeaturesA-3
How Users Access a Voice-Messaging SystemA-3
How Users Configure Personal Directory EntriesA-4
Installing and Configuring the Cisco Unified IP Phone Address Book SynchronizerA-4
BFeature Support by Protocol for the Cisco Unified IP Phones 7970 SeriesB-1
CSupporting International UsersC-1
Adding Language Overlays to Phone ButtonsC-1
Installing the Cisco Unified Communications Manager Locale InstallerC-1
Support for International Call LoggingC-2
APPENDIX
APPENDIX
viii
DTechnical SpecificationsD-1
Physical and Operating Environment SpecificationsD-1
Cable SpecificationsD-2
Network and Access Port PinoutsD-2
EBasic Phone Administration StepsE-1
Example User Information for these ProceduresE-1
Cisco Unified IP Phone 7970G/7971G-GE Administration Guide for Cisco Unified Communications Manager 7.0
OL-15299-01
I
NDEX
Contents
Adding a User to Cisco Unified Communications ManagerE-2
Adding a User From an External LDAP DirectoryE-2
Adding a User Directly to Cisco Unified Communications ManagerE-2
Configuring the PhoneE-3
Performing Final End User Configuration StepsE-7
OL-15299-01
Cisco Unified IP Phone 7970G/7971G-GE Administration Guide for Cisco Unified Communications Manager 7.0
ix
Contents
Cisco Unified IP Phone 7970G/7971G-GE Administration Guide for Cisco Unified Communications Manager 7.0
x
OL-15299-01
Overview
Preface
Cisco Unified IP Phone 7970G/7971G-GE Administration Guide for Cisco Unified Communications
Manager 7.0 provides the information you need to understand, install, configure, manage, and
troubleshoot the phones in the Cisco Unified IP Phone 7970 series on a Voice-over-IP (VoIP) network.
Because of the complexity of a Unified Communications network, this guide does not provide complete
and detailed information for procedures that you need to perform in Cisco Unified Communications
Manager (formerly Cisco Unified CallManager) or other network devices. See the “Related
Documentation” section on page xii for a list of related documentation.
Audience
Network engineers, system administrators, or telecom engineers should review this guide to learn the
steps required to properly set up the Cisco Unified IP Phone 7970 Series on the network.
The tasks described are administration-level tasks and are not intended for end-users of the phones.
Many of the tasks involve configuring network settings and affect the phone’s ability to function in the
network.
Because of the close interaction between the Cisco Unified IP Phone and
Cisco Unified Communications Manager, many of the tasks in this manual require familiarity with
Cisco Unified Communications Manager.
Organization
This manual is organized as follows:
Chapter 1, “An Overview of the Cisco Unified IP Phone”Provides a conceptual overview and description of the
Cisco Unified IP Phone
Chapter 2, “Preparing to Install the Cisco Unified IP Phone
on Your Network”
Chapter 3, “Setting Up the Cisco Unified IP Phone”Describes how to properly and safely install and configure the
Describes how the Cisco Unified IP Phone interacts with
other key IP telephony components, and provides an overview
of the tasks required prior to installation
Cisco Unified IP Phone on your network
OL-15299-01
Cisco Unified IP Phone 7970G/7971G-GE Administration Guide for Cisco Unified Communications Manager 7.0
xi
Preface
Chapter 4, “Configuring Settings on the Cisco
Unified IP Phone”
Chapter 5, “Configuring Features, Templates, Services, and
Users”
Chapter 6, “Customizing the Cisco Unified IP Phone”Explains how to customize phone ring sounds, background
Chapter 7, “Viewing Model Information, Status, and
Statistics on the Cisco Unified IP Phone”
Chapter 8, “Monitoring the Cisco Unified IP Phone
Remotely”
Chapter 9, “Troubleshooting and Maintenance”Provides tips for troubleshooting the Cisco Unified IP Phone
Appendix A, “Providing Information to Users Via a Website” Provides suggestions for setting up a website for providing
Appendix B, “Feature Support by Protocol for the Cisco
Unified IP Phones 7970 Series”
Appendix C, “Supporting International Users”Provides information about setting up phones in non-English
Appendix D, “Technical Specifications”Provides technical specifications of the
Appendix E, “Basic Phone Administration Steps”Provides procedures for basic administration tasks such as
Describes how to configure network settings, verify status,
and make global changes to the Cisco Unified IP Phone
Provides an overview of procedures for configuring telephony
features, configuring directories, configuring phone button
and softkey templates, setting up services, and adding users to
Cisco Unified Communications Manager
images, and the phone idle display at your site
Explains how to view model information, status messages,
network statistics, and firmware information from
the Cisco Unified IP Phone
Describes the information that you can obtain from the
phone’s web page, and how to use this information to
remotely monitor the operation of a phone and to assist with
troubleshooting
users with important information about their Cisco Unified IP
Phones
Provides information about feature support for the Cisco
Unified IP Phone using the SCCP or SIP protocol
environments
Cisco Unified IP Phone
adding a user and phone to Cisco Unified Communications
Manager and then associating the user to the phone.
Related Documentation
For more information about Cisco Unified IP Phones or Cisco Unified Communications Manager, refer
to the following publications:
Cisco Unified IP Phone 7970 Series
These publications are available at the following URL:
Obtaining Documentation, Obtaining Support, and Security
Guidelines
For information on obtaining documentation, obtaining support, providing documentation feedback,
security guidelines, and also recommended aliases and general Cisco documents, see the monthly What’s
New in Cisco Product Documentation, which also lists all new and revised Cisco technical
documentation, at:
This product contains cryptographic features and is subject to United States and local country laws
governing import, export, transfer and use. Delivery of Cisco cryptographic products does not imply
third-party authority to import, export, distribute or use encryption. Importers, exporters, distributors
and users are responsible for compliance with U.S. and local country laws. By using this product you
agree to comply with applicable laws and regulations. If you are unable to comply with U.S. and local
laws, return this product immediately.
Further information regarding U.S. export regulations may be found at
http://www.access.gpo.gov/bis/ear/ear_data.html.
Document Conventions
This document uses the following conventions:
ConventionDescription
boldface fontCommands and keywords are in boldface.
italic fontArguments for which you supply values are in italics.
[ ]Elements in square brackets are optional.
{ x | y | z }Alternative keywords are grouped in braces and separated by vertical bars.
[ x | y | z ]Optional alternative keywords are grouped in brackets and separated by vertical bars.
stringA nonquoted set of characters. Do not use quotation marks around the string or the string
will include the quotation marks.
screen fontTerminal sessions and information the system displays are in screen font.
OL-15299-01
Cisco Unified IP Phone 7970G/7971G-GE Administration Guide for Cisco Unified Communications Manager 7.0
xiii
Preface
ConventionDescription
boldface screen fontInformation you must enter is in boldface screen font.
italic screen fontArguments for which you supply values are in italic screen font.
^The symbol ^ represents the key labeled Control—for example, the key combination ^D in
a screen display means hold down the Control key while you press the D key.
< >Nonprinting characters, such as passwords are in angle brackets.
NoteMeans reader take note. Notes contain helpful suggestions or references to material not covered in the
publication.
CautionMeans reader be careful. In this situation, you might do something that could result in equipment
damage or loss of data.
Warning
Means danger. You are in a situation that could cause bodily injury. Before you work on any
equipment, be aware of the hazards involved with electrical circuitry and be familiar with standard
practices for preventing accidents.
xiv
Cisco Unified IP Phone 7970G/7971G-GE Administration Guide for Cisco Unified Communications Manager 7.0
OL-15299-01
CHAP T ER
1
An Overview of the Cisco Unified IP Phone
The Cisco Unified IP Phone 7970 Series are full-featured telephones that provide voice communication
over an Internet Protocol (IP) network. They function much like digital business phones, allowing you
to place and receive phone calls and to access features such as mute, hold, transfer, speed dial, call
forward, and more. In addition, because Cisco Unified IP Phones are connected to your data network,
they offer enhanced IP telephony features, including access to network information and services, and
customizeable features and services. The phones also support security features that include file
authentication, device authentication, signaling encryption, and media encryption.
The Cisco Unified IP Phone 7970 Series provides a color touchscreen, support for up to eight line or
speed dial numbers, context-sensitive online help for buttons and features, and a variety of other
sophisticated functions.
The Cisco Unified IP Phone, like other network devices, must be configured and managed. These phones
encodes G.711a, G.711µ, G.722, G.729a, G.729ab, iLBC, and decode G.711a, G.711µ, G722, iLBC, and
G.729, G729a, G.729b, and G.729ab. These phones also support uncompressed wideband (16bits,
16kHz) audio.
This chapter includes the following topics:
• Understanding the Cisco Unified IP Phone 7970 Series, page 1-1
• What Networking Protocols Are Used?, page 1-3
• What Features are Supported on the Cisco Unified IP Phone 7970 Series?, page 1-7
• Understanding Security Features for Cisco Unified IP Phones, page 1-8
• Overview of Configuring and Installing Cisco Unified IP Phones, page 1-18
CautionUsing a cell, mobile, or GSM phone, or two-way radio in close proximity to a Cisco Unified IP Phone
might cause interference. For more information, refer to the manufacturer documentation of the
interfering device.
Understanding the Cisco Unified IP Phone 7970 Series
Figure 1-1 shows the main components of the Cisco Unified IP Phone 7970 Series.
OL-15299-01
Cisco Unified IP Phone 7970G/7971G-GE Administration Guide for Cisco Unified Communications Manager 7.0
1-1
Understanding the Cisco Unified IP Phone 7970 Series
Figure 1-1Cisco Unified IP Phone
1617
Chapter 1 An Overview of the Cisco Unified IP Phone
1
2
3
4
5
6
7
8
9
10
1112131415
186428
1Programmable buttonsDepending on configuration, programmable buttons provide access to:
• Phone lines (line buttons)
• Speed-dial numbers (speed-dial buttons, including the BLF speed-dial feature)
• Web-based services (for example, a Personal Address Book button)
• Phone features (for example, a Privacy button)
Buttons illuminate to indicate status:
Green, steady—Active call
Green, flashing—Held call
Amber, steady—Privacy in use
Amber, flashing—Incoming call
Red, steady—Remote line in use (shared line or BLF status)
2Footstand adjustment
Allows you to adjust the angle of the phone base.
button
3Display buttonAwakens the touchscreen from sleep mode or disables it for cleaning.
No color—Ready for input
Green flashing—Disabled
Green steady—Sleep mode
4Messages buttonAuto-dials your voice message service (varies by service).
Cisco Unified IP Phone 7970G/7971G-GE Administration Guide for Cisco Unified Communications Manager 7.0
1-2
OL-15299-01
Chapter 1 An Overview of the Cisco Unified IP Phone
What Networking Protocols Are Used?
5Directories buttonOpens/closes the Directories menu. Use it to access call logs and directories.
6Help
7Settings buttonOpens/closes the Settings menu. Use it to change touchscreen and ring settings.
8Services buttonOpens/closes the Services menu.
9Volume buttonControls the handset, headset, and speakerphone volume (off-hook) and the ringer volume
10Speaker buttonToggles the speakerphone on or off.
11Mute buttonToggles the Mute feature on or off.
12Headset buttonToggles the headset on or off.
13Navigation buttonAllows you to scroll through menus and highlight items. When the phone is on-hook, displays
14KeypadAllows you to dial phone numbers, enter letters, and choose menu items.
15Softkey buttonsEach activates a softkey option (displayed on your touchscreen).
buttonActivates the Help menu.
(on-hook).
phone numbers from your Placed Calls log.
16Handset light stripIndicates an incoming call or new voice message.
17TouchscreenShows phone features.
What Networking Protocols Are Used?
Cisco Unified IP Phones support several industry-standard and Cisco networking protocols required for
voice communication. Table 1 - 1 provides an overview of the networking protocols that the
Cisco Unified IP Phone 7970 Series supports.
OL-15299-01
Cisco Unified IP Phone 7970G/7971G-GE Administration Guide for Cisco Unified Communications Manager 7.0
1-3
Chapter 1 An Overview of the Cisco Unified IP Phone
What Networking Protocols Are Used?
Table 1-1Supported Networking Protocols on the Cisco Unified IP Phone
Networking ProtocolPurposeUsage Notes
Bootstrap Protocol (BootP)BootP enables a network device such as the
Cisco Unified IP Phone to discover certain
startup information, such as its IP address.
Cisco Discovery Protocol
(CDP)
CDP is a device-discovery protocol that runs
on all Cisco-manufactured equipment.
Using CDP, a device can advertise its
existence to other devices and receive
information about other devices in the
network.
Cisco Peer-to-Peer
Distribution Protocol
(CPPDP)
CPPDP is a Cisco proprietary protocol used to
form a-peer-to-peer hierarchy of devices.
CPPDP is also used to copy firmware or other
files from peer devices to neighboring
devices.
Dynamic Host Configuration
Protocol (DHCP)
DHCP dynamically allocates and assigns an
IP address to network devices.
DHCP enables you to connect an IP phone
into the network and have the phone become
operational without needing to manually
assign an IP address or configure additional
network parameters.
Hypertext Transfer Protocol
(HTTP)
HTTP is the standard way of transferring
information and moving documents across the
Internet and the web.
IEEE 802.1XThe IEEE 802.1X standard defines a
client-server-based access control and
authentication protocol that restricts
unauthorized clients from connecting to a
LAN through publicly accessible ports.
Until the client is authenticated, 802.1X
access control allows only Extensible
Authentication Protocol over LAN (EAPOL)
traffic through the port to which the client is
connected. After authentication is successful,
normal traffic can pass through the port.
If you are using BootP to assign IP addresses
to the Cisco Unified IP Phone, the BOOTP
Server option shows “Yes” in the network
configuration settings on the phone.
The Cisco Unified IP Phone uses CDP to
communicate information such as auxiliary
VLAN ID, per port power management details,
and Quality of Service (QoS) configuration
information with the Cisco Catalyst switch.
CPPDP is used by the Peer Firmware Sharing
feature.
DHCP is enabled by default. If disabled, you
must manually configure the IP address,
subnet mask, gateway, and a TFTP server on
each phone locally.
Cisco recommends that you use DHCP
custom option 150. With this method, you
configure the TFTP server IP address as the
option value. For additional information
about DHCP configurations, refer to the
“Cisco TFTP” chapter in Cisco
Unified Communications Manager System
Guide.
Cisco Unified IP Phones use HTTP for the
XML services and for troubleshooting
purposes.
The Cisco Unified IP Phone implements the
IEEE 802.1X standard by providing support
for the EAP-MD5 option for 802.1X
authentication.
When 802.1X authentication is enabled on the
phone, you should disable the PC port and
voice VLAN. Refer to the “Supporting
802.1X Authentication on Cisco Unified IP
Phones” section on page 1-16 for additional
information.
1-4
Cisco Unified IP Phone 7970G/7971G-GE Administration Guide for Cisco Unified Communications Manager 7.0
OL-15299-01
Chapter 1 An Overview of the Cisco Unified IP Phone
What Networking Protocols Are Used?
Table 1-1Supported Networking Protocols on the Cisco Unified IP Phone (continued)
Networking ProtocolPurposeUsage Notes
Internet Protocol (IP)IP is a messaging protocol that addresses and
sends packets across the network.
To communicate using IP, network devices
must have an assigned IP address, subnet, and
gateway.
IP addresses, subnets, and gateways
identifications are automatically assigned if
you are using the Cisco Unified IP Phone
with Dynamic Host Configuration Protocol
(DHCP). If you are not using DHCP, you must
manually assign these properties to each
phone locally.
Link Layer Discovery
Protocol (LLDP)
Link Layer Discovery
Protocol-Media Endpoint
Devices (LLDP-MED)
Real-Time Control Protocol
(RTCP)
Real-Time Transport Protocol
(RTP)
LLDP is a standardized network discovery
protocol (similar to CDP) that is supported on
some Cisco and third-party devices.
LLDP-MED is an extension of the LLDP
standard developed for voice products.
RTCP works with Real-Time Transport
Protocol (RTP) to provide QoS data (such as
jitter, latency, and round trip delay) on RTP
streams.
RTP is a standard protocol for transporting
real-time data, such as interactive voice and
video, over data networks.
The Cisco Unified IP Phone supports LLDP
on the PC port.
The Cisco Unified IP Phone supports
LLDP-MED on the SW port to communicate
information such as:
• Voice VLAN configuration
• Device discovery
• Power management
• Inventory management
For more information about LLDP-MED
support, see the LLDP-MED and Cisco Discovery Protocol white paper:
RTCP is disabled by default, but you can
enable it on a per-phone basis using Cisco
Unified Communications Manager. For more
information, see the “Network Configuration”
section on page 4-25.
Cisco Unified IP Phones use the RTP protocol
to send and receive real-time voice traffic
from other phones and gateways.
OL-15299-01
Cisco Unified IP Phone 7970G/7971G-GE Administration Guide for Cisco Unified Communications Manager 7.0
1-5
Chapter 1 An Overview of the Cisco Unified IP Phone
What Networking Protocols Are Used?
Table 1-1Supported Networking Protocols on the Cisco Unified IP Phone (continued)
Networking ProtocolPurposeUsage Notes
Session Initiation Protocol
(SIP)
SIP is the Internet Engineering Task Force
(IETF) standard for multimedia conferencing
over IP. SIP is an ASCII-based
application-layer control protocol (defined in
RFC 3261) that can be used to establish,
maintain, and terminate calls between two or
more endpoints.
Like other VoIP protocols, SIP is designed to
address the functions of signaling and session
management within a packet telephony
network. Signaling allows call information to
be carried across network boundaries. Session management provides the ability to control
the attributes of an end-to-end call.
You can configure the Cisco Unified IP Phone
to use either SIP or Skinny Client Control
Protocol (SCCP).
Skinny Client Control
Protocol (SCCP)
Session Description Protocol
(SDP)
Transmission Control
Protocol (TCP)
Transport Layer Security
(TLS)
Trivial File Transfer Protocol
(TFTP)
User Datagram Protocol
(UDP)
SCCP includes a messaging set that allows
communications between call control servers
and endpoint clients such as IP Phones. SCCP
is proprietary to Cisco Systems.
SDP is the portion of the SIP protocol that
determines which parameters are available
during a connection between two endpoints.
Conferences are established using only the
SDP capabilities that are supported by all
endpoints in the conference.
TCP is a connection-oriented transport
protocol.
TLS is a standard protocol for securing and
authenticating communications.
TFTP allows you to transfer files over the
network.
On the Cisco Unified IP Phone, TFTP enables
you to obtain a configuration file specific to
the phone type.
UDP is a connectionless messaging protocol
for delivery of data packets.
Cisco Unified IP Phones use SCCP for call
control. You can configure the Cisco
Unified IP Phone to use either SCCP or
Session Initiation Protocol (SIP).
SDP capabilities, such as codec types, DTMF
detection, and comfort noise, are normally
configured on a global basis by Cisco Unified
Communications Manager or Media Gateway
in operation. Some SIP endpoints may allow
these parameters to be configured on the
endpoint itself.
Cisco Unified IP Phones use TCP to connect
to Cisco Unified Communications Manager
and to access XML services.
When security is implemented, Cisco
Unified IP Phones use the TLS protocol when
securely registering with Cisco
Unified Communications Manager.
TFTP requires a TFTP server in your network,
which can be automatically identified from
the DHCP server. If you want a phone to use
a TFTP server other than the one specified by
the DHCP server, you must manually assign
TFTP server from the Network Configuration
menu on the phone.
Cisco Unified IP Phones transmit and receive
RTP streams, which utilize UDP.
1-6
Related Topics
• Understanding Interactions with Other Cisco Unified IP Communications Products, page 2-2
• Understanding the Phone Startup Process, page 2-7
• Network Configuration Menu, page 4-5
Cisco Unified IP Phone 7970G/7971G-GE Administration Guide for Cisco Unified Communications Manager 7.0
OL-15299-01
Chapter 1 An Overview of the Cisco Unified IP Phone
What Features are Supported on the Cisco Unified IP Phone 7970 Series?
What Features are Supported on the Cisco
Unified
IP Phone 7970 Series?
The Cisco Unified IP Phone functions much like a digital business phone, allowing you to place and
receive telephone calls. In addition to traditional telephony features, the Cisco Unified IP Phone includes
features that enable you to administer and monitor the phone as a network device.
This section includes the following topics:
• Feature Overview, page 1-7
• Configuring Telephony Features, page 1-8
• Configuring Network Parameters Using the Cisco Unified IP Phone, page 1-8
• Providing Users with Feature Information, page 1-8
Feature Overview
Cisco Unified IP Phones provide traditional telephony functionality, such as call forwarding and
transferring, redialing, speed dialing, conference calling, and voice messaging system access.
Cisco Unified IP phones also provide a variety of other features. For an overview of the telephony
features that the Cisco Unified IP Phone supports, see the “Telephony Features Available for the Phone”
section on page 5-1.
As with other network devices, you must configure Cisco Unified IP Phones to prepare them to access
Cisco Unified Communications Manager and the rest of the IP network. By using DHCP, you have fewer
settings to configure on a phone, but if your network requires it, you can manually configure an IP
address, TFTP server, subnet information, etc. For instructions on configuring the network settings on
the Cisco Unified IP Phones, see Chapter 4, “Configuring Settings on the Cisco Unified IP Phone.”
The Cisco Unified IP Phone can interact with other services and devices on your IP network to provide
enhanced functionality. For example, you can integrate the Cisco Unified IP Phones with the corporate
Lightweight Directory Access Protocol 3 (LDAP3) standard directory to enable users to search for
co-workers contact information directly from their IP phones. You can also use XML to enable users to
access information such as weather, stocks, quote of the day, and other web-based information. For
information about configuring such services, see the “Configuring Corporate Directories” section on
page 5-17 and the “Setting Up Services” section on page 5-20.
Finally, because the Cisco Unified IP Phone is a network device, you can obtain detailed status
information from it directly. This information can assist you with troubleshooting any problems users
might encounter when using their IP phones. See Chapter 7, “Viewing Model Information, Status, and
Statistics on the Cisco Unified IP Phone,” for more information.
OL-15299-01
Related Topics
• Configuring Settings on the Cisco Unified IP Phone, page 4-1
• Configuring Features, Templates, Services, and Users, page 5-1
• Troubleshooting and Maintenance, page 9-1
Cisco Unified IP Phone 7970G/7971G-GE Administration Guide for Cisco Unified Communications Manager 7.0
1-7
Understanding Security Features for Cisco Unified IP Phones
Configuring Telephony Features
You can modify certain settings for the Cisco Unified IP Phone from the Cisco Unified Communications
Manager Administration application. Use this web-based application to set up phone registration criteria
and calling search spaces, to configure corporate directories and services, and to modify phone button
templates, among other tasks. See the “Telephony Features Available for the Phone” section on page 5-1
and Cisco Unified Communications Manager Administration Guide for additional information.
For more information about the Cisco Unified Communications Manager Administration application,
refer to Cisco Unified Communications Manager documentation, including Cisco Unified Communications Manager System Guide. You can also use the context-sensitive help available
within the application for guidance.
You can access the complete Cisco Unified Communications Manager documentation suite at this
location:
• Telephony Features Available for the Phone, page 5-1
Chapter 1 An Overview of the Cisco Unified IP Phone
Configuring Network Parameters Using the Cisco Unified IP Phone
You can configure parameters such as DHCP, TFTP, and IP settings on the phone itself. You can also
obtain statistics about a current call or firmware versions on the phone.
For more information about configuring features and viewing statistics from the phone, see Chapter 4,
“Configuring Settings on the Cisco Unified IP Phone,” and see Chapter 7, “Viewing Model Information,
Status, and Statistics on the Cisco Unified IP Phone.”
Providing Users with Feature Information
If you are a system administrator, you are likely the primary source of information for Cisco Unified IP
Phone users in your network or company. To ensure that you distribute the most current feature and
procedural information, familiarize yourself with Cisco Unified IP Phone documentation. Make sure to
visit the Cisco Unified IP Phone web site:
From this site, you can access various user guides, including wallet cards.
In addition to providing users with documentation, it is important to inform them about available
Cisco Unified IP Phone features—including features specific to your company or network—and about
how to access and customize those features, if appropriate.
For a summary of some of the key information that phone users need their system administrators to
provide, see Appendix A, “Providing Information to Users Via a Website.”
Understanding Security Features for Cisco Unified IP Phones
Implementing security in the Cisco Unified Communications Manager system prevents identity theft of
the phone and Cisco Unified Communications Manager server, prevents data tampering, and prevents
call signaling and media stream tampering.
Cisco Unified IP Phone 7970G/7971G-GE Administration Guide for Cisco Unified Communications Manager 7.0
1-8
OL-15299-01
Chapter 1 An Overview of the Cisco Unified IP Phone
Understanding Security Features for Cisco Unified IP Phones
To alleviate these threats, the Cisco Unified IP telephony network establishes and maintains
authenticated and encrypted communication streams between a phone and the server, digitally signs files
before they are transferred to a phone, and encrypts media streams and call signaling between
Cisco Unified IP phones.
The Cisco Unified IP Phones Series use the Phone Security Profile, which defines whether the device is
nonsecure, authenticated, or encrypted. For information on applying the security profile to the phone,
refer to Cisco Unified Communications Manager Security Guide.
If you configure security-related settings in Cisco Unified Communications Manager Administration,
the phone configuration file will contain sensitive information. To ensure the privacy of a configuration
file, you must configure it for encryption. For detailed information, refer to the “Configuring Encrypted
Phone Configuration Files” chapter in Cisco Unified Communications Manager Security Guide.
Table 1-2 shows where you can find additional information about security in this and other documents.
Table 1-2Cisco Unified IP Phone and Cisco Unified Communications Manager Security Topics
TopicReference
Detailed explanation of security, including set up,
configuration, and troubleshooting information for Cisco
Unified Communications Manager and Cisco Unified IP
Phones
Security features supported on the Cisco Unified IP PhoneSee the “Overview of Supported Security Features” section on
Restrictions regarding security featuresSee the “Security Restrictions” section on page 1-17
Viewing a security profile nameSee the “Understanding Security Profiles” section on
Identifying phone calls for which security is implementedSee the “Identifying Authenticated, Encrypted, and Protected
TLS connectionSee the “What Networking Protocols Are Used?” section on
Refer to Cisco Unified Communications Manager Security
Guide
page 1-10
page 1-12
Phone Calls” section on page 1-13
page 1-3
See the “Understanding Phone Configuration Files” section on
page 2-6
Security and the phone startup processSee the “Understanding the Phone Startup Process” section on
page 2-7
Security and phone configuration filesSee the “Understanding Phone Configuration Files” section on
page 2-6
Changing the TFTP Server 1 or TFTP Server 2 option on the
phone when security is implemented
Understanding security icons in the Unified CM 1 through
See Table 4-2 in the “Network Configuration Menu” section
on page 4-5
See the “Unified CM Configuration” section on page 4-11
Unified CM 5 options in the Device Configuration Menu on
the phone
Items on the Security Configuration menu that you access
See the “Security Configuration Menu” section on page 4-23
from the Device Configuration menu on the phone
Items on the Security Configuration menu that you access
See the “Security Configuration Menu” section on page 4-29
from the Settings menu on the phone
Unlocking the CTL fileSee the “CTL File Menu” section on page 4-30
Cisco Unified IP Phone 7970G/7971G-GE Administration Guide for Cisco Unified Communications Manager 7.0
OL-15299-01
1-9
Chapter 1 An Overview of the Cisco Unified IP Phone
Understanding Security Features for Cisco Unified IP Phones
Table 1-2Cisco Unified IP Phone and Cisco Unified Communications Manager Security Topics (continued)
TopicReference
Disabling access to web pages for a phoneSee the “Disabling and Enabling Web Page Access” section on
page 8-3
TroubleshootingSee the “Troubleshooting Cisco Unified IP Phone Security”
section on page 9-8
Refer to Cisco Unified Communications Manager Security Guide, Troubleshooting chapter
Deleting the CTL file from the phoneSee the “Resetting or Restoring the Cisco Unified IP Phone”
section on page 9-13
Resetting or restoring the phoneSee the “Resetting or Restoring the Cisco Unified IP Phone”
section on page 9-13
802.1X Authentication for Cisco Unified IP PhonesSee these sections:
• “Supporting 802.1X Authentication on Cisco Unified IP
Phones” section on page 1-16
• “802.1X Authentication and Status” section on page 4-31
• “Troubleshooting Cisco Unified IP Phone Security”
Overview of Supported Security Features
Table 1-3 provides an overview of the security features that the Cisco Unified IP Phone 7970 Series
supports. For more information about these features and about Cisco Unified Communications Manager
and Cisco Unified IP Phone security, refer to Cisco Unified Communications Manager Security Guide.
For information about current security settings on a phone, look at the Security Configuration menus on
the phone (choose Settings > Security Configuration and choose Settings > Device Configuration > Security Configuration). For more information, see Chapter 4, “Configuring Settings on the Cisco
Unified IP Phone.”
NoteMost security features are available only if a certificate trust list (CTL) is installed on the phone. For
more information about the CTL, refer to “Configuring the Cisco CTL Client” chapter in the Cisco
Unified Communications Manager Security Guide.
section on page 9-8
1-10
Cisco Unified IP Phone 7970G/7971G-GE Administration Guide for Cisco Unified Communications Manager 7.0
OL-15299-01
Chapter 1 An Overview of the Cisco Unified IP Phone
Understanding Security Features for Cisco Unified IP Phones
Table 1-3Overview of Security Features
FeatureDescription
Image authenticationSigned binary files (with the extension .sbn) prevent tampering with the firmware
image before it is loaded on a phone. Tampering with the image causes a phone to
fail the authentication process and reject the new image.
Customer-site certificate installationEach Cisco Unified IP Phone requires a unique certificate for device
authentication. Phones include a manufacturing installed certificate (MIC), but for
additional security, you can specify in Cisco Unified Communications Manager
Administration that a certificate be installed by using the CAPF (Certificate
Authority Proxy Function). Alternatively, you can install an LSC from the Security
Configuration menu on the phone. See the “Configuring Security on the Cisco
Unified IP Phone” section on page 3-12 for more information.
Device authenticationOccurs between the Cisco Unified Communications Manager server and the phone
when each entity accepts the certificate of the other entity. Determines whether a
secure connection between the phone and a Cisco Unified Communications
Manager should occur, and, if necessary, creates a secure signaling path between
the entities using TLS protocol. Cisco Unified Communications Manager does not
register phones unless they can be authenticated by the
Cisco Unified Communications Manager.
File authenticationValidates digitally signed files that the phone downloads. The phone validates the
signature to make sure that file tampering did not occur after the file creation. Files
that fail authentication are not written to Flash memory on the phone. The phone
rejects such files without further processing.
Signaling AuthenticationUses the TLS protocol to validate that no tampering has occurred to signaling
packets during transmission.
Manufacturing installed certificateEach Cisco Unified IP Phone contains a unique manufacturing installed certificate
(MIC), which is used for device authentication. The MIC is a permanent unique
proof of identity for the phone, and allows Cisco Unified Communications
Manager to authenticate the phone.
Secure SRST reference
(SCCP phones only)
Media encryptionUses SRTP to ensure that the media streams between supported devices proves
Signaling encryption
(SCCP phones only)
CAPF (Certificate Authority Proxy
Function)
After you configure a SRST reference for security and then reset the dependent
devices in Cisco Unified Communications Manager Administration, the TFTP
server adds the SRST certificate to the phone cnf.xml file and sends the file to the
phone. A secure phone then uses a TLS connection to interact with the
SRST-enabled router.
secure and that only the intended device receives and reads the data. Includes
creating a media master key pair for the devices, delivering the keys to the devices,
and securing the delivery of the keys while the keys are in transport.
Ensures that all SCCP signaling messages that are sent between the device and the
Cisco Unified Communications Manager server are encrypted.
Implements parts of the certificate generation procedure that are too
processing-intensive for the phone, and it interacts with the phone for key
generation and certificate installation. The CAPF can be configured to request
certificates from customer-specified certificate authorities on behalf of the phone,
or it can be configured to generate certificates locally.
OL-15299-01
Cisco Unified IP Phone 7970G/7971G-GE Administration Guide for Cisco Unified Communications Manager 7.0
1-11
Chapter 1 An Overview of the Cisco Unified IP Phone
Understanding Security Features for Cisco Unified IP Phones
Table 1-3Overview of Security Features (continued)
FeatureDescription
Security profilesDefines whether the phone is nonsecure, authenticated, encrypted, or protected.
See the “Understanding Security Profiles” section on page 1-12 for more
information.
Encrypted configuration filesLets you ensure the privacy of phone configuration files.
Optional disabling of the web server
functionality for a phone
Phone hardeningAdditional security options, which you control from
802.1X AuthenticationThe Cisco Unified IP Phone can use 802.1X authentication to request and gain
You can prevent access to a phone’s web page, which displays a variety of
operational statistics for the phone.
• Disabling access to the Setting menus, or providing restricted access that
allows access to the User Preferences menu and saving volume changes only
• Disabling access to web pages for a phone.
NoteYou can view current settings for the PC Port Disabled, GARP Enabled,
and Voice VLAN enabled options by looking at the phone’s Security
Configuration menu. For more information, see the “Device Configuration
Menu” section on page 4-10.
access to the network. See the “Supporting 802.1X Authentication on Cisco
Unified IP Phones” section on page 1-16 for more information.
Related Topics
• Understanding Security Profiles, page 1-12
• Identifying Authenticated, Encrypted, and Protected Phone Calls, page 1-13
• Establishing and Identifying Secure Conference Calls, page 1-14
• Device Configuration Menu, page 4-10
• Supporting 802.1X Authentication on Cisco Unified IP Phones, page 1-16
• Security Restrictions, page 1-17
Understanding Security Profiles
Cisco Unified IP Phones that support Cisco Unified Communications Manager 7.0 or later use a security
profile, which defines whether the phone is nonsecure, authenticated, or encrypted. For information
about configuring the security profile and applying the profile to the phone, refer to Cisco Unified Communications Manager Security Guide.
To view the security mode that is set for the phone, look at the Security Mode setting in the Security
Configuration menu. For more information, see the “Security Configuration Menu” section on
page 4-23.
1-12
Cisco Unified IP Phone 7970G/7971G-GE Administration Guide for Cisco Unified Communications Manager 7.0
OL-15299-01
Chapter 1 An Overview of the Cisco Unified IP Phone
Understanding Security Features for Cisco Unified IP Phones
Related Topics
• Identifying Authenticated, Encrypted, and Protected Phone Calls, page 1-13
• Device Configuration Menu, page 4-10
• Security Restrictions, page 1-17
Identifying Authenticated, Encrypted, and Protected Phone Calls
When security is implemented for a phone, you can identify authenticated or encrypted phone calls by
icons on the screen that is on the phone.You can also determine if the connected phone is secure and
protected if a security tone plays at the beginning of the call.
In an authenticated call, all devices participating in the establishment of the call are authenticated by
Cisco Unified Communications Manager. When a call in progress is authenticated, the call progress icon
to the right of the call duration timer in the phone screen changes to this icon:
In an encrypted call, all devices participating in the establishment of the call are authenticated by the
Cisco Unified Communications Manager. In addition, call signaling and media streams are encrypted.
An encrypted call offers a high level of security, providing integrity and privacy to the call. When a call
in progress is being encrypted, the call progress icon to the right of the call duration timer in the phone
screen changes to this icon:
NoteIf the call is routed through non-IP call legs, for example, PSTN, the call may be nonsecure even though
it is encrypted within the IP network and has a lock icon associated with it.
In a protected call, a security tone plays at the beginning of a call to indicate that the other connected
phone is also receiving and transmitting encrypted audio. If your call is connected to a non-protected
phone, the security tone does not play.
NoteProtected calling is supported for connections between two phones only. Some features, such as
conference calling, shared lines, Extension Mobility, and Join Across Lines are not available when
protected calling is configured. Protected calls are not authenticated.
Related Topic
• Understanding Security Features for Cisco Unified IP Phones, page 1-8
• Understanding Security Profiles, page 1-12
OL-15299-01
• Security Restrictions, page 1-17
Cisco Unified IP Phone 7970G/7971G-GE Administration Guide for Cisco Unified Communications Manager 7.0
1-13
Understanding Security Features for Cisco Unified IP Phones
Establishing and Identifying Secure Conference Calls
You can initiate a secure conference call and monitor the security level of participants. A secure
conference call is established using this process:
1. A user initiates the conference from a secure phone (encrypted or authenticated security mode).
2. Cisco Unified Communications Manager assigns a secure conference bridge to the call.
3. As participants are added, Cisco Unified Communications Manager verifies the security mode of
each phone (encrypted or authenticated) and maintains the secure level for the conference.
4. The phone displays the security level of the conference call. A secure conference displays
(
encrypted) or (authenticated) icon to the right of “Conference” on the phone screen. If icon
displays, the conference is not secure.
NoteThere are interactions, restrictions, and limitations that affect the security level of the conference call
depending on the security mode of the participant’s phones and the availability of secure conference
bridges. See Tabl e 1 - 4 and Table 1- 5 for information about these interactions.
Chapter 1 An Overview of the Cisco Unified IP Phone
Establishing and Identifying Protected Calls
A protected call is established when your phone, and the phone on the other end, is configured for
protected calling. The other phone can be in the same Cisco Unified IP network, or on a network outside
the IP network. Protected calls can only be made between two phones. Conference calls and other
multiple-line calls are not supported.
A protected call is established using this process:
1. A user initiates the call from a protected phone (protected security mode).
2. The phone displays the icon (encrypted) on the phone screen. This icon indicates that the phone
is configured for secure (encrypted) calls, but this does not mean that the other connected phone is
also protected.
3. A security tone plays if the call is connected to another protected phone, indicating that both ends
of the conversation are encrypted and protected. If the call is connected to a non-protected phone,
then the secure tone is not played.
NoteProtected calling is supported for conversations between two phones. Some features, such as conference
calling, shared lines, Extension Mobility, and Join Across Lines are not available when protected calling
is configured.
1-14
Cisco Unified IP Phone 7970G/7971G-GE Administration Guide for Cisco Unified Communications Manager 7.0
OL-15299-01
Chapter 1 An Overview of the Cisco Unified IP Phone
Understanding Security Features for Cisco Unified IP Phones
Call Security Interactions and Restrictions
Cisco Unified Communications Manager checks the phone security status when conferences are
established and changes the security indication for the conference or blocks the completion of the call
to maintain integrity and also security in the system. Table 1-4 provides information about changes to
call security levels when using Barge.
Table 1-4Call Security Interactions When Using Barge
Initiator’s Phone
Security LevelFeature UsedCall Security LevelResults of Action
Non-secure BargeEncrypted callCall barged and identified as non-secure call
Secure (encrypted) BargeAuthenticated callCall barged and identified as authenticated call
Secure (authenticated)BargeEncrypted callCall barged and identified as authenticated call
Non-secure BargeAuthenticated callCall barged and identified as non-secure call
Table 1-5 provides information about changes to conference security levels depending on the initiator’s
phone security level, the security levels of participants, and the availability of secure conference bridges.
Table 1-5Security Restrictions with Conference Calls
Initiator’s Phone
Security LevelFeature UsedSecurity Level of ParticipantsResults of Action
Non-secure ConferenceEncrypted or authenticatedNon-secure conference bridge
Non-secure conference
Secure (encrypted or
authenticated)
ConferenceAt least one member is
non-secure
Secure conference bridge
Non-secure conference
Secure (encrypted) ConferenceAll participants are encryptedSecure conference bridge
Secure encrypted level conference
Secure (authenticated) ConferenceAll participants are encrypted or
authenticated
Secure conference bridge
Secure authenticated level conference
Non-secure ConferenceEncrypted or authenticatedOnly secure conference bridge is available
and used
Non-secure conference
Secure (encrypted or
authenticated)
ConferenceEncrypted or authenticatedOnly non-secure conference bridge is
available and used
Non-secure conference
Secure (encrypted or
authenticated)
ConferenceEncrypted or secureConference remains secure. When one
participant tries to hold the call with MOH,
the MOH does not play.
Secure (encrypted) JoinEncrypted or authenticatedSecure conference bridge
OL-15299-01
Conference remains secure (encrypted or
authenticated)
Cisco Unified IP Phone 7970G/7971G-GE Administration Guide for Cisco Unified Communications Manager 7.0
1-15
Chapter 1 An Overview of the Cisco Unified IP Phone
Understanding Security Features for Cisco Unified IP Phones
Table 1-5Security Restrictions with Conference Calls (continued)
Initiator’s Phone
Security LevelFeature UsedSecurity Level of ParticipantsResults of Action
Non-secure cBargeAll participants are encryptedSecure conference bridge
Conference changes to non-secure
Non-secure MeetMeMinimum security level is
encrypted
Secure (encrypted)MeetMeMinimum security level is
authenticated
Secure (encrypted)MeetMeMinimum security level is
non-secure
Initiator receives message “Does not meet
Security Level”, call rejected.
Secure conference bridge
Conference accepts encrypted and
authenticated calls
Only secure conference bridge available and
used
Conference accepts all calls
Supporting 802.1X Authentication on Cisco Unified IP Phones
Overview
These sections provide information about 802.1X support on the Cisco Unified IP Phones:
• Overview, page 1-16
• Required Network Components, page 1-16
• Best Practices—Requirements and Recommendations, page 1-17
Cisco Unified IP phones and Cisco Catalyst switches have traditionally used Cisco Discovery Protocol
(CDP) to identify each other and to determine parameters such as VLAN allocation and inline power
requirements. However, CDP is not used to identify any locally attached PCs. Therefore, Cisco Unified
IP Phones provide an EAPOL pass-through mechanism, whereby a PC locally attached to the IP phone
may pass through EAPOL messages to the 802.1X authenticator in the LAN switch. This capability
prevents the IP phone from having to act as the authenticator, yet allows the LAN switch to authenticate
a data end point prior to accessing the network.
In conjunction with the EAPOL pass-through mechanism, Cisco Unified IP Phones provide a proxy
EAPOL-Logoff mechanism. If the locally attached PC is disconnected from the IP phone, the LAN
switch would not see the physical link fail, because the link between the LAN switch and the IP phone
is maintained. To avoid compromising network integrity, the IP phone sends an EAPOL-Logoff message
to the switch on behalf of the downstream PC, which triggers the LAN switch to clear the authentication
entry for the downstream PC.
The Cisco Unified IP phones contain an 802.1X supplicant in addition to the EAPOL pass-through
mechanism. This supplicant allows network administrators to control the connectivity of IP phones to
the LAN switch ports. The IP phone 802.1X supplicant implements the EAP-MD5 option for 802.1X
authentication.
Required Network Components
Support for 802.1X authentication on Cisco Unified IP Phones requires several components, including:
Cisco Unified IP Phone 7970G/7971G-GE Administration Guide for Cisco Unified Communications Manager 7.0
1-16
OL-15299-01
Loading...
+ 189 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.