DescriptionFeature
Validates digitally signed files that the phone downloads. The phone validates the signature
to make sure that file tampering did not occur after the file creation. Files that fail authentication
are not written to Flash memory on the phone. The phone rejects such files without further
processing.
File authentication
Uses the TLS protocol to validate that no tampering has occurred to signaling packets during
transmission.
Signaling Authentication
Each Cisco Unified IP Phone contains a unique manufacturing installed certificate (MIC),
which is used for device authentication. The MIC is a permanent unique proof of identity for
the phone, and allows Cisco Unified Communications Manager to authenticate the phone.
Manufacturing installed certificate
After you configure a SRST reference for security and then reset the dependent devices in
Cisco Unified Communications Manager Administration, the TFTP server adds the SRST
certificate to the phone cnf.xml file and sends the file to the phone. A secure phone then uses
a TLS connection to interact with the SRST-enabled router.
Secure SRST reference
Uses SRTP to ensure that the media streams between supported devices proves secure and
that only the intended device receives and reads the data. Includes creating a media master
key pair for the devices, delivering the keys to the devices, and securing the delivery of the
keys while the keys are in transport.
Media encryption
Ensures that all SCCP and SIP signaling messages that are sent between the device and the
Cisco Unified Communications Manager server are encrypted.
Signaling encryption
Implements parts of the certificate generation procedure that are too processing-intensive for
the phone, and it interacts with the phone for key generation and certificate installation. The
CAPF can be configured to request certificates from customer-specified certificate authorities
on behalf of the phone, or it can be configured to generate certificates locally.
CAPF (Certificate Authority Proxy
Function)
Defines whether the phone is nonsecure, authenticated, encrypted or protected. For more
information, see Security Profiles, on page 16.
Security profiles
Lets you ensure the privacy of phone configuration files.Encrypted configuration files
You can prevent access to a phone’s web page, which displays a variety of operational statistics
for the phone.
Optional disabling of the web server
functionality for a phone
Cisco Unified IP Phone 7931G Administration Guide for Cisco Unified Communications Manager 9.0 (SCCP and SIP)
15
Cisco Unified IP Phone 7931G
Supported Security Features