1-12
Cisco Unified IP Phone Administration Guide for Cisco Unified Communications Manager  7.1
OL-18913-01
Chapter 1      An Overview of the Cisco Unified IP Phone
  Understanding Security Features for Cisco Unified IP Phones
If you configure security-related settings in Cisco Unified Communications Manager Administration, 
the phone configuration file will contain sensitive information. To ensure the privacy of a configuration 
file, you must configure it for encryption. For detailed information, refer to the “Configuring Encrypted 
Phone Configuration Files” chapter in Cisco Unified Communications Manager Security Guide.
Table 1-3 shows where you can find additional information about security in this and other documents.
Table 1-3 Cisco Unified IP Phone and Cisco Unified Communications Manager Security
 
Topics 
Topic Reference
Detailed explanation of security, including set 
up, configuration, and troubleshooting 
information for Cisco Unified Communications 
Manager and Cisco Unified IP Phones
Refer to the Troubleshooting Guide for Cisco 
Unified Communications Manager
Security features supported on the Cisco 
Unified IP Phone
See the “Overview of Supported Security Features” 
section on page 1-13
Restrictions regarding security features See the “Security Restrictions” section on page 1-20
Viewing a security profile name See the “Understanding Security Profiles” section on 
page 1-15
Identifying phone calls for which security is 
implemented
See the “Identifying Authenticated, Encrypted, and 
Protected Phone Calls” section on page 1-16
TLS connection
 • See the “What Networking Protocols are Used?” 
section on page 1-5 
 • See the “Adding Phones to the Cisco Unified 
Communications Manager Database” section on 
page 2-8
Security and the phone startup process See the “Understanding the Phone Startup Process” 
section on page 2-7
Security and phone configuration files See the “Adding Phones to the Cisco Unified 
Communications Manager Database” section on 
page 2-8
Changing the TFTP Server 1 or TFTP Server 2 
option on the phone when security is 
implemented. 
See Table 4-2, in the “Network Configuration Menu” 
section on page 4-5
Understanding security icons in the Unified 
CM1 through Unified CM5 options in the 
Device Configuration Menu on the phone
See the “Unified CM Configuration Menu” section 
on page 4-17
Items on the Security Configuration menu that 
you access from the Device Configuration menu 
on the phone
See the “Security Configuration Menu” section on 
page 4-29
Items on the Security Configuration menu that 
you access from the Settings menu on the phone
See the “Security Configuration Menu” section on 
page 4-36
Unlocking the CTL file See the “CTL File Screen” section on page 4-37
Disabling access to a phone’s web pages See the “Disabling and Enabling Web Page Access” 
section on page 8-3