
1-10
Cisco Unified Wireless IP Phone 7925G, 7925G-EX, and 7926G Administration Guide
Chapter 1 Overview of the Cisco Unified Wireless IP Phone 7925G, 7925G-EX, and 7926G
Understanding Security Features for Cisco Unified IP Phones
Feature Information for Users
If you are a system administrator, you are the primary source of information for Cisco Unified Wireless
IP Phone users in your network or company. To ensure that you distribute the most current feature and
procedural information, familiarize yourself with Cisco Unified Wireless IP Phone 7925G, 7925G-EX,
and 7926G documentation. Make sure you visit the Cisco Unified IP Phone web site:
http://www.cisco.com/en/US/products/hw/phones/ps379/tsd_products_support_maintain_and_operate.
html
From this site, you can view additional phone documentation.
In addition to providing documentation, it is important to inform users about available Cisco Unified IP
Phone features—including features specific to your company or network—and about how to access and
customize those features, if appropriate.
For a summary of the key information that you can provide to phone users, see Appendix A, “Providing
Information to Users By Using a Website.”
Related Topic
•Providing Information to Users By Using a Website, page A-1
Understanding Security Features for Cisco Unified IP Phones
Implementing security in a wireless network protects against data tampering to Cisco Unified
Communications Manager data, call signaling, and media stream. It also reduces the chances for identity
theft. To reduce the threats, the Cisco wireless LAN (WLAN) provides options for user authentication
with servers and for encrypting communications streams between phones and network devices.
For information about supported security options for the Cisco Unified Wireless IP Phone 7925G,
7925G-EX, and 7926G, see “Authentication Methods” section on page 2-15.
For information about security features supported by Cisco Unified Communications Manager and Cisco
Unified IP Phones, see “Overview of Supported Security Features” section on page 1-11.
Table 1-3 provides additional information about security topics.
Ta b l e 1- 3 S e c u r i t y To p i c s
Topic Reference
Detailed explanation of security, including set up,
configuration, and troubleshooting information
for Cisco Unified Communications Manager and
Cisco Unified IP Phones
See Cisco Unified Communications Manager
Security Guide
Security features supported on the Cisco Unified
IP Phone
See “Overview of Supported Security Features”
section on page 1-11
Restrictions regarding security features See “Security Restrictions” section on page 1-15
Viewing a security profile name when running
Cisco Unified Communications Manager 5.0 or
later
See “Understanding Security Profiles” section on
page 1-13
Identifying phone calls for which security is
implemented
See “Identifying Authenticated, Encrypted, and
Protected Phone Calls” section on page 1-14