Cisco Unified IP Phone 6921, 6941, and 6961 Administration Guide for Cisco Unified CM 8.0 (SCCP)
An Overview of the Cisco Unified IP Phone
Downloads: This chapterpdf (PDF - 3.46MB) The complete bookPDF (PDF - 7.26MB) | Feedback

An Overview of the Cisco Unified IP Phone

Table Of Contents

An Overview of the Cisco Unified IP Phone

Understanding the Cisco Unified IP Phones 6921, 6941, and 6921

What Networking Protocols are Used?

What Features are Supported on the Cisco Unified IP Phone 6921, 6941, and 6961?

Feature Overview

Configuring Telephony Features

Configuring Network Parameters Using the Cisco Unified IP Phone

Providing Users with Feature Information

Understanding Security Features for Cisco Unified IP Phones

Overview of Supported Security Features

Understanding Security Profiles

Identifying Encrypted Phone Calls

Establishing and Identifying Secure Conference Calls

Establishing and Identifying Protected Calls

Call Security Interactions and Restrictions

Supporting 802.1X Authentication on Cisco Unified IP Phones

Overview

Required Network Components

Best Practices—Requirements and Recommendations

Security Restrictions

Overview of Configuring and Installing Cisco Unified IP Phones

Configuring Cisco Unified IP Phones in Cisco Unified CM

Checklist for Configuring the Cisco Unified IP Phones 6921, 6941, and 6961 in Cisco Unified CM

Installing Cisco Unified IP Phones

Checklist for Installing the Cisco Unified IP Phone 6921, 6941, and 6961

Terminology Differences


An Overview of the Cisco Unified IP Phone


The Cisco Unified IP Phones 6921, 6941, and 6961 provide voice communication over an IP network. The Cisco Unified IP Phone functions much like a digital business phone, allowing you to place and receive phone calls and to access features such as mute, hold, transfer, speed dial, call forward, and more. In addition, because the phone is connected to your data network, it offers enhanced IP telephony features, including access to network information and services, and customizeable features and services.

A Cisco Unified IP Phone, like other network devices, must be configured and managed. These phones encode G.711a, G.711µ, G.729, G.729a, G.729ab, and decode G.711a, G.711µ, G.729, G.729a, and G.729ab.

This chapter includes the following topics:

Understanding the Cisco Unified IP Phones 6921, 6941, and 6921

What Networking Protocols are Used?

What Features are Supported on the Cisco Unified IP Phone 6921, 6941, and 6961?

Overview of Configuring and Installing Cisco Unified IP Phones

Terminology Differences


Caution Using a cell, mobile, or GSM phone, or two-way radio in close proximity to a Cisco Unified IP Phone m ay cause interference. For more information, refer to the manufacturer's documentation of the interfering device.

Understanding the Cisco Unified IP Phones 6921, 6941, and 6921

Figure 1-1 shows the main components of the Cisco Unified IP Phone 6921.

Figure 1-1 Cisco Unified IP Phone 6921

Table 1-1 describes the buttons on the Cisco Unified IP Phone 6921.

Table 1-1 Features on the Cisco Unified IP Phone 6921 

1

Handset light strip

Indicates an incoming call (flashing red) or new voice message (steady red).

2

Phone screen

Shows information about your phone such as directory number, active call and line status, softkey options, speed dials, placed calls, and phone menu listings.

3

Softkey buttons

Enables softkey options displayed on the phone screen.

4

Transfer button

Transfers a call.

5

Conference button

Creates a conference call.

6

Hold button

Places an active call on hold.

7

Navigation bar and Select button

The Navigation bar allows you to scroll through menus and highlight items. When phone is on-hook, displays phone numbers from your Placed Call listings (up arrow) or your speed dials (down arrow).

The Select button (in the middle of the Navigation bar) allows you to select a highlighted item.

8

Line 1 and Line 2 buttons

Line 1 selects the primary phone line. Phone lines (line buttons).

Depending on the settings, Line 2 may provide access to:

Secondary phone line

Speed-dial numbers (speed-dial buttons)

Web-based services (for example, a Personal Address Book button)

Buttons illuminate to indicate status:

Green, steady—Active call

Green, flashing—Held call

Amber, flashing—Incoming call or reverting call

Red, steady—Remote line in use (shared line)

Red, flashing—Remote line on hold

9

Headset button

Toggles the headset on or off. When the headset is on, the button is lit.

10

Speakerphone button

Toggles the speakerphone on or off. When the speakerphone is on, the button is lit.

11

Keypad

Allows you to dial phone numbers, enter letters, and choose menu items.

12

Mute button

Toggles the microphone on or off. When the microphone is muted, the button is lit.

13

Volume button

Controls the handset, headset, and speakerphone volume (off-hook) and the ringer volume (on-hook).

14

Messages button

Auto-dials your voicemail (varies by system).

15

Applications button

Opens/closes the Applications menu. Use it to access call history, user preferences, phone settings, administration settings, and phone information.

16

Contacts button

Opens/closes the Directories and the Subscribed phone services menus. Use it to access personal and corporate directories.

17

Handset

Phone handset.


Figure 1-2 shows the main components of the Cisco Unified IP Phone 6941.

Figure 1-2 Cisco Unified IP Phone 6941

Table 1-2 describes the buttons on the Cisco Unified IP Phone 6941.

Table 1-2 Features on the Cisco Unified IP Phone 6941

1

Handset light strip

Indicates an incoming call (flashing red) or new voice message (steady red).

2

Phone screen

Shows information about your phone such as directory number, active call and line status, softkey options, speed dials, placed calls, and phone menu listings.

3

Programmable feature buttons

Depending on the configuration, programmable feature buttons provide access to:

Phone lines and intercom lines

Speed-dial numbers (speed-dial buttons, including the line status speed-dial features)

Web-based services (for example, a Personal Address Book button)

Call features (for example, a Privacy button)

Buttons illuminate to indicate status:

Green, steady—Active call or two-way intercom call

Green, flashing—Held call

Amber, steady—Privacy in use, one-way intercom call, DND active, or logged into Hunt Group

Amber, flashing—Incoming call or reverting call

Red, steady—Remote line in use (shared line or line status)

Red, flashing—Remote line on hold

4

Softkey buttons

Enables softkey options displayed on the phone screen.

5

Transfer button

Transfers a call.

6

Conference button

Creates a conference call.

7

Hold button

Places an active call on hold.

8

Navigation bar and Select button

The Navigation bar allows you to scroll through menus and highlight items. When phone is on-hook, displays phone numbers from your Placed Call listings (up arrow) or your speed dials (down arrow).

The Select button (in the middle of the Navigation bar) allows you to select a highlighted item.

9

Headset button

Toggles the headset on or off. When the headset is on, the button is lit.

10

Speakerphone button

Toggles the speakerphone on or off. When the speakerphone is on, the button is lit.

11

Keypad

Allows you to dial phone numbers, enter letters, and choose menu items (by entering the item number).

12

Mute button

Toggles the microphone on or off. When the microphone is muted, the button is lit.

13

Volume button

Controls the handset, headset, and speakerphone volume (off-hook) and the ringer volume (on-hook).

14

Messages button

Auto-dials your voice message service (varies by service).

15

Applications button

Opens/closes the Applications menu. Use it to access call history, user preferences, phone settings, administration settings, and phone information.

16

Contacts button

Opens/closes the Directories menu. Use it to access personal and corporate directories.

17

Handset

Phone handset.


Figure 1-3 shows the main components of the Cisco Unified IP Phone 6961.

Figure 1-3 Cisco Unified IP Phone 6961

Table 1-3 describes the buttons on the Cisco Unified IP Phone 6961.

Table 1-3 Features on the Cisco Unified IP Phone 6961

1

Handset light strip

Indicates an incoming call (flashing red) or new voice message (steady red).

2

Phone screen

Shows information about your phone such as directory number, active call and line status, softkey options, speed dials, placed calls, and phone menu listings.

3

Softkey buttons

Enables softkey options displayed on the phone screen.

4

Transfer button

Transfers a call.

5

Conference button

Creates a conference call.

6

Hold button

Places an active call on hold.

7

Navigation bar and select button

The Navigation bar allows you to scroll through menus and highlight items. When phone is on-hook, displays phone numbers from your Placed Call listings (up arrow) or your speed dials (down arrow).

The Select button allows you to select a highlighted item.

8

Programmable feature buttons

Depending on the configuration, programmable feature buttons provide access to:

Phone lines and intercom lines

Speed-dial numbers (speed-dial buttons, including the line status speed-dial features)

Web-based services (For example, a Personal Address Book button)

Call features (For example, a Privacy button)

Buttons illuminate to indicate status:

Green, steady—Active call or two-way intercom call

Green, flashing—Held call

Amber, steady—Privacy in use, one-way intercom call, DND active, or logged into Hunt Group

Amber, flashing—Incoming call or reverting call

Red, steady—Remote line in use (shared line or line status)

Red, flashing—Remote line on hold

9

Headset button

Toggles the headset on or off. When the headset is on, the button is lit.

10

Speakerphone button

Toggles the speakerphone on or off. When the speakerphone is on, the button is lit.

11

Keypad

Allows you to dial phone numbers, enter letters, and choose menu items (by entering the item number).

12

Mute button

Toggles the microphone on or off. When the microphone is muted, the button is lit.

13

Volume button

Controls the handset, headset, and speakerphone volume (off-hook) and the ringer volume (on-hook).

14

Messages button

Auto-dials your voice messaging system (varies by system).

15

Applications button

Opens/closes the Applications menu. Use it to access call history, user preferences, phone settings, administration settings, and phone information.

16

Contacts button

Opens/closes the Directories menu. Use it to access personal and corporate directories.

17

HandSet

Phone handset.


What Networking Protocols are Used?

Cisco Unified IP Phones support several industry-standard and Cisco networking protocols required for voice communication. Table 1-4 provides an overview of the networking protocols that the Cisco Unified IP Phones 6921, 6941, and 6961 support.

Table 1-4 Supported Networking Protocols on the Cisco Unified IP Phone 

Networking Protocol
Purpose
Usage Notes

Bootstrap Protocol (BootP)

BootP enables a network device such as the Cisco Unified IP Phone to discover certain startup information, such as its IP address.

Cisco Audio Session Tunneling (CAST)

The CAST protocol allows IP phones and associated applications behind the phone to discover and communicate with the remote endpoints without requiring changes to the traditional signaling components like Cisco Unified Communications Manager (Cisco Unified CM) and gateways. The Cast protocol allows separate hardware devices to synchronize related media and it allows PC applications to augment non Video capable phones to become video enabled by using the PC as the video resource.

Cisco Discovery Protocol (CDP)

CDP is a device-discovery protocol that runs on all Cisco-manufactured equipment.

Using CDP, a device can advertise its existence to other devices and receive information about other devices in the network.

The Cisco Unified IP Phone uses CDP to communicate information such as auxiliary VLAN ID, per port power management details, and Quality of Service (QoS) configuration information with the Cisco Catalyst switch.

Dynamic Host Configuration Protocol (DHCP)

DHCP dynamically allocates and assigns an IP address to network devices.

DHCP enables you to connect an IP phone into the network and have the phone become operational without your needing to manually assign an IP address or to configure additional network parameters.

DHCP is enabled by default. If disabled, you must manually configure the IP address, subnet mask, gateway, and a TFTP server on each phone locally.

Cisco recommends that you use DHCP custom option 150. With this method, you configure the TFTP server IP address as the option value. For additional supported DHCP configurations, go to the Dynamic Host Configuration Protocol chapter and the Cisco TFTP chapter in the Cisco Unified Communications Manager System Guide.

Note If you cannot use option 150, you may try using DHCP option 66.

Hypertext Transfer Protocol (HTTP)

HTTP is the standard way of transferring information and moving documents across the Internet and the web.

Cisco Unified IP Phones use HTTP for the XML services and for troubleshooting purposes.

IEEE 802.1X

The IEEE 802.1X standard defines a client-server-based access control and authentication protocol that restricts unauthorized clients from connecting to a LAN through publicly accessible ports.

Until the client is authenticated, 802.1X access control allows only Extensible Authentication Protocol over LAN (EAPOL) traffic through the port to which the client is connected. After authentication is successful, normal traffic can pass through the port.

The Cisco Unified IP Phone implements the IEEE 802.1X standard by providing support for the following authentication methods: EAP-FAST, EAP-TLS, and EAP-MD5.

When 802.1X authentication is enabled on the phone, you should disable the PC port and voice VLAN. Refer to the "Supporting 802.1X Authentication on Cisco Unified IP Phones" section for additional information.

Internet Protocol (IP)

IP is a messaging protocol that addresses and sends packets across the network.

To communicate using IP, network devices must have an assigned IP address, subnet, and gateway.

IP addresses, subnets, and gateways identifications are automatically assigned if you are using the Cisco Unified IP Phone with Dynamic Host Configuration Protocol (DHCP). If you are not using DHCP, you must manually assign these properties to each phone locally.

Link Layer Discovery Protocol (LLDP)

LLDP is a standardized network discovery protocol (similar to CDP) that is supported on some Cisco and third-party devices.

The Cisco Unified IP Phone supports LLDP on the PC port.

Link Layer Discovery Protocol-Media Endpoint Devices (LLDP-MED)

LLDP-MED is an extension of the LLDP standard developed for voice products.

The Cisco Unified IP Phone supports LLDP-MED on the SW port to communicate information such as:

Voice VLAN configuration

Device discovery

Power management

Inventory management

For more information about LLDP-MED support, see the LLDP-MED and Cisco Discovery Protocol white paper:
http://www.cisco.com/en/US/tech/tk652/tk701/technologies_white_paper0900aecd804cd46d.shtml

Real-Time Transport Protocol (RTP)

RTP is a standard protocol for transporting real-time data, such as interactive voice and video, over data networks.

Cisco Unified IP Phones use the RTP protocol to send and receive real-time voice traffic from other phones and gateways.

Real-Time Control Protocol (RTCP)

RTCP works in conjunction with RTP to provide QoS data (such as jitter, latency, and round trip delay) on RTP streams.

RTCP is disabled by default, but you can enable it on a per phone basis by using Cisco Unified CM.

Skinny Client Control Protocol (SCCP)

SCCP includes a messaging set that allows communications between call control servers and endpoint clients such as IP Phones. SCCP is proprietary to Cisco Systems.

Cisco Unified IP Phone 6921, 6941, and 6961 use SCCP, version 15 for call control.

Transmission Control Protocol (TCP)

TCP is a connection-oriented transport protocol.

Cisco Unified IP Phones use TCP to connect to Cisco Unified CM and to access XML services.

Transport Layer Security (TLS)

TLS is a standard protocol for securing and authenticating communications.

When security is implemented, Cisco Unified IP Phones use the TLS protocol when securely registering with Cisco Unified CM.

For more information, refer to the Cisco Unified Communications Manager Security Guide.

Trivial File Transfer Protocol (TFTP)

TFTP allows you to transfer files over the network.

On the Cisco Unified IP Phone, TFTP enables you to obtain a configuration file specific to the phone type.

TFTP requires a TFTP server in your network, which can be automatically identified from the DHCP server. If you want a phone to use a TFTP server other than the one specified by the DHCP server, you must manually assign the IP address of the TFTP server by using the Network Setup menu on the phone.

For more information, go to the Cisco TFTP chapter in the Cisco Unified Communications Manager System Guide.

User Datagram Protocol (UDP)

UDP is a connectionless messaging protocol for delivery of data packets.

Cisco Unified IP Phones transmit and receive RTP streams, which utilize UDP.


Related Topics

Understanding Interactions with Other Cisco Unified IP Telephony Products

Understanding the Phone Startup Process

Network Setup Menu

What Features are Supported on the Cisco Unified IP Phone 6921, 6941, and 6961?

Cisco Unified IP Phones function much like a digital business phone, allowing you to place and receive phone calls. In addition to traditional telephony features, the Cisco Unified IP Phone includes features that enable you to administer and monitor the phone as a network device.

This section includes the following topics:

Feature Overview

Configuring Telephony Features

Configuring Network Parameters Using the Cisco Unified IP Phone

Providing Users with Feature Information

Feature Overview

Cisco Unified IP Phones provide traditional telephony functionality, such as call forwarding and transferring, redialing, speed dialing, conference calling, and voice messaging system access. Cisco Unified IP phones also provide a variety of other features. For an overview of the telephony features that the Cisco Unified IP Phone supports and for tips on configuring them, see the "Telephony Features Available for the Cisco Unified IP Phone" section.

As with other network devices, you must configure Cisco Unified IP Phones to prepare them to access Cisco Unified CM and the rest of the IP network. By using DHCP, you have fewer settings to configure on a phone, but if your network requires it, you can manually configure an IP address, TFTP server, subnet information, and so on. For instructions on configuring the network settings on the Cisco Unified IP Phones, see Chapter 4 "Configuring Settings on the Cisco Unified IP Phone."

Cisco Unified IP Phones can interact with other services and devices on your IP network to provide enhanced functionality. For example, you can integrate Cisco Unified CM with the corporate Lightweight Directory Access Protocol 3 (LDAP3) standard directory to enable users to search for co-worker contact information directly from their IP phones. You can also use XML to enable users to access information such as weather, stocks, quote of the day, and other web-based information. For information about configuring such services, see the "Join and Direct Transfer Policy" section and the "Setting Up Services" section.

Finally, because the Cisco Unified IP Phone is a network device, you can obtain detailed status information from it directly. This information can assist you with troubleshooting any problems users might encounter when using their IP phones. See Chapter 7 "Viewing Model Information, Status, and Statistics on the Cisco Unified IP Phone," for more information.

Related Topics

Configuring Settings on the Cisco Unified IP Phone

Configuring Features, Templates, Services, and Users

Troubleshooting and Maintenance

Configuring Telephony Features

You can modify additional settings for the Cisco Unified IP Phone from Cisco Unified CM Administration. Use Cisco Unified CM Administration to set up phone registration criteria and calling search spaces, to configure corporate directories and services, and to modify phone button templates, among other tasks. See the "Telephony Features Available for the Cisco Unified IP Phone" section and the Cisco Unified CM documentation for additional information.

For more information about Cisco Unified CM Administration, refer to Cisco Unified CM documentation, including Cisco Unified Communications Manager Administration Guide. You can also use the context-sensitive help available within the application for guidance.

You can access Cisco Unified CM documentation at this location:

http://www.cisco.com/en/US/products/sw/voicesw/ps556/tsd_products_support_series_home.html

You can access Cisco Unified Communications Manager Business Edition documentation at this location:

http://www.cisco.com/en/US/products/ps7273/tsd_products_support_series_home.html

Related Topic

Telephony Features Available for the Cisco Unified IP Phone

Configuring Network Parameters Using the Cisco Unified IP Phone

You can configure parameters such as DHCP, TFTP, and IP settings on the phone itself. You can also obtain statistics about a current call or firmware versions on the phone.

For more information about configuring features and viewing statistics from the phone, see Chapter 4 "Configuring Settings on the Cisco Unified IP Phone" and see Chapter 7 "Viewing Model Information, Status, and Statistics on the Cisco Unified IP Phone."

Providing Users with Feature Information

If you are a system administrator, you are likely the primary source of information for Cisco Unified IP Phone users in your network or company. To ensure that you distribute the most current feature and procedural information, familiarize yourself with Cisco Unified IP Phone documentation on the Cisco Unified IP Phone web site:

http://www.cisco.com/en/US/products/ps10326/tsd_products_support_series_home.html

From this site, you can view various user documentation.

In addition to providing documentation, it is important to inform users of available Cisco Unified IP Phone features—including those specific to your company or network—and of how to access and customize those features, if appropriate.

For a summary of some of the key information that phone users need their system administrators to provide, see "Providing Information to Users Via a Website."

Understanding Security Features for Cisco Unified IP Phones

Implementing security in the Cisco Unified CM system prevents identity theft of the phone and Cisco Unified CM server, prevents data tampering, and prevents call signaling and media stream tampering.

To alleviate these threats, the Cisco IP telephony network establishes and maintains secure communication streams between a phone and the server, digitally signs files before they are transferred to a phone, and encrypts media streams and call signaling between Cisco Unified IP phones.

The Cisco Unified IP Phone 6921, 6941, and 6961 use the Phone security profile, which defines whether the device is nonsecure or encrypted. For information on applying the security profile to the phone, refer to the Cisco Unified Communications Manager Security Guide.

If you configure security-related settings in Cisco Unified CM Administration, the phone configuration file will contain sensitive information. To ensure the privacy of a configuration file, you must configure it for encryption. For detailed information, refer to the "Configuring Encrypted Phone Configuration Files" chapter in Cisco Unified Communications Manager Security Guide.

Table 1-5 shows where you can find additional information about security in this and other documents.

Table 1-5 Cisco Unified IP Phone and Cisco Unified CM Security Topics 

Topic
Reference

Detailed explanation of security, including set up, configuration, and troubleshooting information for Cisco Unified CM and Cisco Unified IP Phones

Refer to the Troubleshooting Guide for Cisco Unified Communications Manager

Security features supported on the Cisco Unified IP Phone

See the "Overview of Supported Security Features" section

Restrictions regarding security features

See the "Security Restrictions" section

Viewing a security profile name

See the "Understanding Security Profiles" section

Identifying phone calls for which security is implemented

See the "Identifying Encrypted Phone Calls" section

TLS connection

See the "What Networking Protocols are Used?" section

See the "Adding Phones to the Cisco Unified CM Database" section

Security and the phone startup process

See the "Understanding the Phone Startup Process" section

Security and phone configuration files

See the "Adding Phones to the Cisco Unified CM Database" section

Changing the TFTP Server 1 or TFTP Server 2 option on the phone when security is implemented.

See Table 4-2, in the "Network Setup Menu" section

Items on the Security Configuration menu that you access from the Device Configuration menu on the phone

See the "Security Configuration Menu" section

Items on the Security Configuration menu that you access from the Settings menu on the phone

See the "Security Configuration Menu" section

Unlocking the CTL file

See the "Unlocking and Locking Options" section

Disabling access to a phone's web pages

See the "Disabling and Enabling Web Page Access" section

Troubleshooting

See the "Troubleshooting Cisco Unified IP Phone Security" section

Refer to the Troubleshooting Guide for Cisco Unified Communications Manager

Deleting the CTL file from the phone

See the "Resetting or Restoring the Cisco Unified IP Phone" section

Resetting or restoring the phone

See the "Resetting or Restoring the Cisco Unified IP Phone" section

802.1X Authentication for Cisco Unified IP Phones

See these sections:

"Supporting 802.1X Authentication on Cisco Unified IP Phones" section

"Security Configuration Menu" section

"Status Menu" section

"Troubleshooting Cisco Unified IP Phone Security" section


All Cisco Unified IP Phones that support Cisco Unified CM use a security profile, which defines whether the phone is nonsecure or secure.

For information about configuring the security profile and applying the profile to the phone, refer to Cisco Unified Communications Manager Security Guide.

Overview of Supported Security Features

Table 1-6 provides an overview of the security features that the Cisco Unified IP Phone 6921, 6941, and 6961 support. For more information about these features and about Cisco Unified CM and Cisco Unified IP Phone security, refer to Cisco Unified Communications Manager Security Guide.

For information about current security settings on a phone, choose Applications > Admin Settings > Security Setup > Security Configuration. For more information, see the "Security Configuration Menu" section.


Note Most security features are available only if a certificate trust list (CTL) is installed on the phone. For more information about the CTL, refer to "Configuring the Cisco CTL Client" chapter in Cisco Unified Communications Manager Security Guide.


Table 1-6 Overview of Security Features 

Feature
Description

Image authentication

Signed binary files (with the extension .sgn) prevent tampering with the firmware image before it is loaded on a phone. Tampering with the image causes a phone to fail the authentication process and reject the new image.

Customer-site certificate installation

Each Cisco Unified IP Phone requires a unique certificate for device authentication. Phones include a manufacturing installed certificate (MIC), but for additional security, you can specify in Cisco Unified CM Administration that a certificate be installed by using the Certificate Authority Proxy Function (CAPF). Alternatively, you can install a Locally Significant Certificate (LSC) from the Security Configuration menu on the phone. See the "Configuring Security on the Cisco Unified IP Phone" section for more information.

Device authentication

Occurs between the Cisco Unified CM server and the phone when each entity accepts the certificate of the other entity. Determines whether a secure connection between the phone and a Cisco Unified CM should occur; and, if necessary, creates a secure signaling path between the entities by using TLS protocol. Cisco Unified CM will not register phones unless they can be authenticated by the Cisco Unified CM.

File authentication

Validates digitally signed files that the phone downloads. The phone validates the signature to make sure that file tampering did not occur after the file creation. Files that fail authentication are not written to Flash memory on the phone. The phone rejects such files without further processing.

Signaling Authentication

Uses the TLS protocol to validate that no tampering has occurred to signaling packets during transmission.

Manufacturing installed certificate

Each Cisco Unified IP Phone contains a unique manufacturing installed certificate (MIC), which is used for device authentication. The MIC is a permanent unique proof of identity for the phone, and allows Cisco Unified CM to authenticate the phone.

Secure SRST reference

After you configure a SRST reference for security and then reset the dependent devices in Cisco Unified CM Administration, the TFTP server adds the SRST certificate to the phone cnf.xml file and sends the file to the phone. A secure phone then uses a TLS connection to interact with the SRST-enabled router.

Media encryption

Uses SRTP to ensure that the media streams between supported devices proves secure and that only the intended device receives and reads the data. Includes creating a media master key pair for the devices, delivering the keys to the devices, and securing the delivery of the keys while the keys are in transport.

Signaling encryption

Ensures that all SCCP signaling messages that are sent between the device and the Cisco Unified CM server are encrypted.

CAPF (Certificate Authority Proxy Function)

Implements parts of the certificate generation procedure that are too processing-intensive for the phone, and interacts with the phone for key generation and certificate installation. The CAPF can be configured to request certificates from customer-specified certificate authorities on behalf of the phone, or it can be configured to generate certificates locally.

Security profiles

Defines whether the phone is nonsecure or encrypted. See the "Understanding Security Profiles" section for more information.

Encrypted configuration files

Lets you ensure the privacy of phone configuration files.

Optional disabling of the web server functionality for a phone

You can prevent access to a phone's web page, which displays a variety of operational statistics for the phone. See the "Disabling and Enabling Web Page Access" section.

Phone hardening

Additional security options, which you control from Cisco Unified CM Administration:

Disabling PC port

Disabling PC Voice VLAN access

Disabling access to web pages for a phone

Note You can view current settings for the PC Port Disabled, GARP Enabled, and Voice VLAN enabled options by looking at the phone's Security Configuration menu. For more information, see the "Security Configuration Menu" section.

802.1X Authentication

The Cisco Unified IP Phone can use 802.1X authentication to request and gain access to the network. See the "Supporting 802.1X Authentication on Cisco Unified IP Phones" section for more information.


Related Topics

Understanding Security Profiles

Identifying Encrypted Phone Calls

Security Restrictions

Understanding Security Profiles

All Cisco Unified IP Phones that support Cisco Unified CM use a security profile, which defines whether the phone is nonsecure or encrypted. For information about configuring the security profile and applying the profile to the phone, refer to Cisco Unified Communications Manager Security Guide.

To view the security mode that is set for the phone, look at the Security Mode setting in the Security Configuration menu. For more information, see the "Security Configuration Menu" section.

Related Topics

Identifying Encrypted Phone Calls

Security Restrictions

Identifying Encrypted Phone Calls

When security is implemented for a phone, you can identify encrypted phone calls by icons on the screen on the phone. You can also determine if the connected phone is secure and protected if a security tone plays at the beginning of the call.

In a secure call, all call signaling and media streams are encrypted. An encrypted call offers a high level of security, providing integrity and privacy to the call. When a call in progress is being encrypted, the call progress icon to the right of the call duration timer in the phone LCD screen changes to the lock icon:


Note If the call is routed through non-IP call legs, for example, PSTN, the call may be nonsecure even though it is encrypted within the IP network and has a lock icon associated with it.


In a secure call, a security tone plays at the beginning of a call to indicate that the other connected phone is also receiving and transmitting encrypted audio and video (if video is involved). If your call is connected to a non-protected phone, the security tone does not play.


Note Secured calling is supported for connections between two phones only. Some features, such as conference calling, shared lines, Cisco Extension Mobility, and Join Across Lines are not available when secured calling is configured.


Related Topic

Understanding Security Profiles

Understanding Security Features for Cisco Unified IP Phones

Security Restrictions

Establishing and Identifying Secure Conference Calls

You can initiate a secure conference call and monitor the security level of participants. A secure conference call is established using this process:

1. A user initiates the conference from a secure phone.

2. Cisco Unified CM assigns a secure conference bridge to the call.

3. As participants are added, Cisco Unified CM verifies the security mode of each phone and maintains the secure level for the conference.

4. The phone displays the security level of the conference call. A secure conference displays the to the right of "Conference" on the phone screen.


Note There are interactions, restrictions, and limitations that affect the security level of the conference call depending on the security mode of the participant's phones and the availability of secure conference bridges. See Table 1-7 and Table 1-8 for information about these interactions.


Establishing and Identifying Protected Calls

A protected call is established when your phone, and the phone on the other end, is configured for protected calling. The other phone can be in the same Cisco IP network, or on a network outside the IP network. Protected calls can only be made between two phones. Conference calls and other multiple-line calls are not supported.

A protected call is established using this process:

1. A user initiates the call from a protected phone (protected security mode).

2. The phone displays the icon (encrypted) on the phone screen. This icon indicates that the phone is configured for secure (encrypted) calls, but this does not mean that the other connected phone is also protected.

3. A security tone plays if the call is connected to another protected phone, indicating that both ends of the conversation are encrypted and protected. If the call is connected to a non-protected phone, then the secure tone is not played.


Note Protected calling is supported for conversations between two phones. Some features, such as conference calling, shared lines, Cisco Extension Mobility, and Join Across Lines are not available when protected calling is configured.


Call Security Interactions and Restrictions

Cisco Unified CM checks the phone security status when conferences are established and changes the security indication for the conference or blocks the completion of the call to maintain integrity and also security in the system. Table 1-7 provides information about changes to call security levels when using Barge.

Table 1-7 Call Security Interactions When Using Barge 

Initiator's Phone Security Level
Feature Used
Call Security Level
Results of Action

Non-secure

Barge

Encrypted call

Call barged and identified as nonsecure call

Secure

Barge

Secure call

Call barged and identified as Secure call


Table 1-8 provides information about changes to conference security levels depending on the initiator's phone security level, the security levels of participants, and the availability of secure conference bridges.

Table 1-8 Security Restrictions with Conference Calls 

Initiator's Phone Security Level
Feature Used
Security Level of Participants
Results of Action

Non-secure

Conference

Encrypted

Nonsecure conference bridge

Nonsecure conference

Secure

Conference

At least one member is non-secure

Secure conference bridge

Nonsecure conference

Secure

Conference

All participants are encrypted

Secure conference bridge

Secure encrypted level conference

Secure

Join

Encrypted

Secure conference bridge

Conference remains secure

Non-secure

cBarge

All participants are encrypted

Secure conference bridge

Conference changes to non-secure

Non-secure

MeetMe

Minimum security level is encrypted

Initiator receives message "Does not meet Security Level, call rejected."

Secure

MeetMe

Minimum security level is nonsecure

Only secure conference bridge available and used

Conference accepts all calls


Supporting 802.1X Authentication on Cisco Unified IP Phones

These sections provide information about 802.1X support on the Cisco Unified IP Phones:

Overview

Required Network Components

Best Practices—Requirements and Recommendations

Overview

Cisco Unified IP phones and Cisco Catalyst switches have traditionally used Cisco Discovery Protocol (CDP) to identify each other and determine parameters such as VLAN allocation and inline power requirements. However, CDP is not used to identify any locally attached PCs; therefore, Cisco Unified IP Phones provide an EAPOL pass-through mechanism, whereby a PC locally attached to the IP phone, may pass through EAPOL messages to the 802.1X authenticator in the LAN switch. This prevents the IP phone from having to act as the authenticator, yet allows the LAN switch to authenticate a data end point prior to accessing the network.

In conjunction with the EAPOL pass-through mechanism, Cisco Unified IP Phones provide a proxy EAPOL-Logoff mechanism. In the event that the locally attached PC is disconnected from the IP phone, the LAN switch would not see the physical link fail, because the link between the LAN switch and the IP phone is maintained. To avoid compromising network integrity, the IP phone sends an EAPOL-Logoff message to the switch, on behalf of the downstream PC, which triggers the LAN switch to clear the authentication entry for the downstream PC.

The Cisco Unified IP phones also contain an 802.1X supplicant, in addition to the EAPOL pass-through mechanism. This supplicant allows network administrators to control the connectivity of IP phones to the LAN switch ports. The current release of the phone 802.1X supplicant uses the EAP-FAST, EAP-TLS, and EAP-MD5 options for network authentication.

Required Network Components

Support for 802.1X authentication on Cisco Unified IP Phones requires several components, including:

Cisco Unified IP Phone—The phone acts as the 802.1X supplicant, which initiates the request to access the network.

Cisco Secure Access Control Server (ACS) (or other third-party authentication server)—The authentication server and the phone must both be configured with a shared secret that is used to authenticate the phone.

Cisco Catalyst Switch (or other third-party switch)—The switch must support 802.1X, so it can act as the authenticator and pass the messages between the phone and the authentication server. When the exchange is completed, the switch then grants or denies the phone access to the network.

Best Practices—Requirements and Recommendations

Enable 802.1X Authentication—If you want to use the 802.1X standard to authenticate Cisco Unified IP Phones, be sure that you have properly configured the other components before enabling it on the phone. See the "802.1X Authentication and Status" section for more information.

Configure PC Port—The 802.1X standard does not take into account the use of VLANs and thus recommends that only a single device should be authenticated to a specific switch port. However, some switches (including Cisco Catalyst switches) support multi-domain authentication. The switch configuration determines whether you can connect a PC to the phone's PC port.

Enabled—If you are using a switch that supports multi-domain authentication, you can enable the PC port and connect a PC to it. In this case, Cisco Unified IP Phones support proxy EAPOL-Logoff to monitor the authentication exchanges between the switch and the attached PC. For more information about IEEE 802.1X support on the Cisco Catalyst switches, refer to the Cisco Catalyst switch configuration guides at:

http://www.cisco.com/en/US/products/hw/switches/ps708/tsd_products_support_series_home.html

Disabled—If the switch does not support multiple 802.1X-compliant devices on the same port, you should disable the PC Port when 802.1X authentication is enabled. See the "Security Configuration Menu" section for more information. If you do not disable this port and subsequently attempt to attach a PC to it, the switch will deny network access to both the phone and the PC.

Configure Voice VLAN—Because the 802.1X standard does not account for VLANs, you should configure this setting based on the switch support.

Enabled—If you are using a switch that supports multi-domain authentication, you can continue to use the voice VLAN.

Disabled—If the switch does not support multi-domain authentication, disable the Voice VLAN and consider assigning the port to the native VLAN. See the "Security Configuration Menu" section for more information.

Enter MD5 Shared Secret—If you disable 802.1X authentication or perform a factory reset on the phone, the previously configured MD5 shared secret is deleted. See the "802.1X Authentication and Status" section for more information.

Security Restrictions

A user cannot barge into an encrypted call if the phone that is used to barge is not configured for encryption. When barge fails in this case, a reorder tone (fast busy tone) plays on the phone on which the user initiated the barge.

If the initiator phone is configured for encryption, the barge initiator can barge into a nonsecure call from the encrypted phone. After the barge occurs, Cisco Unified CM classifies the call as nonsecure.

If the initiator phone is configured for encryption, the barge initiator can barge into an encrypted call, and the phone indicates that the call is encrypted.

Overview of Configuring and Installing Cisco Unified IP Phones

When deploying a new IP telephony system, system administrators and network administrators must complete several initial configuration tasks to prepare the network for IP telephony service. For information and a checklist for setting up and configuring a Cisco IP telephony network, go to the System Configuration Overview chapter in Cisco Unified Communications Manager System Guide.

After you have set up the IP telephony system and configured system-wide features in Cisco Unified CM, you can add IP phones to the system.

The following topics provide an overview of procedures for adding Cisco Unified IP Phones to your network:

Configuring Cisco Unified IP Phones in Cisco Unified CM

Installing Cisco Unified IP Phones

Configuring Cisco Unified IP Phones in Cisco Unified CM

To add phones to the Cisco Unified CM database, you can use:

Auto-registration

Cisco Unified CM Administration

Bulk Administration Tool (BAT)

BAT and the Tool for Auto-Registered Phones Support (TAPS)

For more information about these choices, see the "Adding Phones to the Cisco Unified CM Database" section.

For general information about configuring phones in Cisco Unified CM, refer to the following documentation:

Cisco Unified IP Phones, Cisco Unified Communications Manager System Guide

Cisco Unified IP Phone Configuration, Cisco Unified Communications Manager Administration Guide

Autoregistration Configuration, Cisco Unified Communications Manager Administration Guide

Checklist for Configuring the Cisco Unified IP Phones 6921, 6941, and 6961 in Cisco Unified CM

Table 1-9 provides an overview and checklist of configuration tasks for the Cisc Unified IP Phones 6921, 6941, and 6961 in Cisco Unified CM Administration. The list presents a suggested order to guide you through the phone configuration process. Some tasks are optional, depending on your system and user needs. For detailed procedures and information, refer to the sources in the list.

Table 1-9 Checklist for Configuring the Cisco Unified IP Phones 6921, 6941, and 6961 in Cisco Unified C

Task
Purpose
For More Information

1.

Gather the following information about the phone:

Phone Model

MAC address

Physical location of the phone

Name or user ID of phone user

Device pool

Partition, calling search space, and location information

Number of lines and associated directory numbers (DNs) to assign to the phone

Cisco Unified CM user to associate with the phone

Phone usage information that affects phone button template, softkey template, phone features, IP Phone services, or phone applications

Provides list of configuration requirements for setting up phones.

Identifies preliminary configuration that you need to perform before configuring individual phones, such as phone button templates or softkey templates.

For more information, go to the "Cisco Unified IP Phones chapter in the Cisco Unified Communications Manager System Guide.

See the "Telephony Features Available for the Cisco Unified IP Phone" section.

2.

Verify that you have sufficient unit licenses for your phone.

For more information, go to the License Unit Report chapter in the Cisco Communications Manager Administration Guide.

3.

Customize phone button templates (if required).

Changes the number of line buttons, speed-dial buttons, Service URL buttons or adds a Privacy button to meet user needs.

For more information, go to the Phone Button Template Configuration chapter in the Cisco Communications Manager Administration Guide.

See the "Modifying Phone Button Templates" section.

4.

Add and configure the phone by completing the required fields in the Phone Configuration window. Required fields are indicated by an asterisk (*) next to the field name; for example, MAC address and device pool.

The device with its default settings gets added to the Cisco Unified CM database.

For more information, go to the Cisco Unified IP Phone Configuration chapter in the Cisco Communications Manager Administration Guide.

For information about Product Specific Configuration fields, refer to "?" Button Help in the Phone Configuration window.

Note If you want to add both the phone and user to the Cisco Unified CM database at the same time, go to the User/Phone Add Configuration chapter in the Cisco Communications Manager Administration Guide.

5.

Add and configure directory numbers (lines) on the phone by completing the required fields in the Directory Number Configuration window. Required fields are indicated by an asterisk (*) next to the field name; for example, directory number and presence group.

Adds primary and secondary directory numbers and features associated with directory numbers to the phone.

For more information, go to the "Directory Number Configuration" chapter in the Cisco Unified Communications Manager Administration Guide.

See the "Telephony Features Available for the Cisco Unified IP Phone" section.

6.

Customize softkey templates.

Adds, deletes, or changes order of softkey features that display on the user's phone to meet feature usage needs.

For more information, see the Cisco Unified Communications Manager Administration Guide, Softkey Template Configuration.

For more information, see the Cisco Unified Communications Manager Administration Guide, Cisco Unified IP Phone Configuration.

7.

Configure speed-dial buttons and assign speed-dial numbers (optional).

Adds speed-dial buttons and numbers.

Users can change speed-dial settings on their phones by using Cisco Unified CM User Options.

For more information, see the Cisco Unified Communications Manager Administration Guid, Cisco Unified IP Phone Configuration.

8.

Configure Cisco Unified IP Phone services and assign services (optional).

Provides IP Phone services.

Note Users can add or change services on their phones by using the Cisco Unified CM User Options.

For more information, see the Cisco Communications Manager Administration Guide, IP Phone Services Configuration.

9.

Assign services to programmable buttons (optional).

Provides access to an IP phone service or URL.

For more information, see the Cisco Unified Communications Manager Administration Guide, Cisco Unified IP Phone Configuration.

10.

Add user information by configuring required fields. Required fields are indicated by an asterisk (*); for example, User ID and last name.

Note Assign a password (for User Options web pages) and PIN (for Cisco Extension Mobility and Personal Directory).

Adds user information to the global directory for Cisco Unified CM.

For more information, see the Cisco Unified Communications Manager Administration Guide, End User Configuration.

Note If your company uses a a Lightweight Directory Access Protocol (LDAP) directory to store information on users, you can install and configure Cisco Unified Communications to use your existing LDAP directory, refer to the"Configuring Corporate Directories" section. Once the Enable Synchronization from the LDAP Server field is enabled, you will not be able to add additional users from Cisco Unified CM Administration.

Note If you want to add both the phone and user to the Cisco Unified CM database at the same time, see User/Phone Add Configurations in the Cisco Unified Communications Manager Administration Guide.

11.

Associate a user to a user group.

Assigns users a common list of roles and permissions that apply to all users in a user group. Administrators can manage user groups, roles, and permissions to control the level of access (and, therefore, the level of security) for system users.

Note In order for end users to access Cisco Unified CM User Options, you must add users to the standard Cisco CCM End Users group.

Refer to the following sections in the Cisco Unified Communications Manager Administration Guide, End User Configuration and User Group Configuration.

12.

Associate a user with a phone (optional).

Provides users with control over their phone such a forwarding calls or adding speed-dial numbers or services.

Note Some phones, such as those in conference rooms, do not have an associated user.

For more information, see the Cisco Unified Communications Manager Administration Guide, End User Configuration.


Installing Cisco Unified IP Phones

After you have added the phones to the Cisco Unified CM database, you can complete the phone installation. You (or the phone users) can install the phone at the users's location. The Cisco Unified IP Phone Installation Guide, which is provided on the cisco.com web site, provides directions for connecting the phone handset, cables, and other accessories.


Note Before you install a phone, even if it is new, upgrade the phone to the current firmware image. For information about upgrading, refer to the Readme file for your phone, which is located at:

http://www.cisco.com/kobayashi/sw-center/index.shtml


After the phone is connected to the network, the phone startup process begins, and the phone registers with Cisco Unified CM. To finish installing the phone, configure the network settings on the phone depending on whether you enable or disable DHCP service.

If you used auto-registration, you need to update the specific configuration information for the phone such as associating the phone with a user, changing the button table, or directory number.

Checklist for Installing the Cisco Unified IP Phone 6921, 6941, and 6961

Table 1-10 provides an overview and checklist of installation tasks for the Cisco Unified IP Phone 6921, 6941, and 6961. The list presents a suggested order to guide you through the phone installation. Some tasks are optional, depending on your system and user needs. For detailed procedures and information, refer to the sources in the list.

Table 1-10 Installation Checklist for the Cisco Unified IP Phone 6921, 6941, and 6961 

Task
Purpose
For More Information

1.

Choose the power source for the phone:

Power over Ethernet (PoE)

External power supply

Determines how the phone receives power.

See the "Providing Power to the Cisco Unified IP Phone" section.

2.

Assemble the phone, adjust phone placement, and connect the network cable.

Locates and installs the phone in the network.

See the "Installing the Cisco Unified IP Phone" section.

See the "Footstand" section.

3.

Monitor the phone startup process.

Adds primary and secondary directory numbers and features associated with directory numbers to the phone.

Verifies that phone is configured properly.

See the "Verifying the Phone Startup Process" section.

4.

If you are configuring the network settings on the phone, you can set up an IP address for the phone by either using DHCP or manually entering an IP address.

Using DHCP—To enable DHCP and allow the DHCP server to automatically assign an IP address to the Cisco Unified IP Phone and direct the phone to a TFTP server, choose Applications > Administrator Settings > Network Setup > IPv4 Setup and:

To enable DHCP, set DHCP Enabled to Yes. DHCP is enabled by default.

To use an alternate TFTP server, set Alternate TFTP Server to Yes, and enter the IP address for the TFTP Server.

Note Consult with the network administrator to determine whether you need to assign an alternative TFTP server instead of using the TFTP server assigned by DHCP.

Without DHCP—You must configure the IP address, subnet mask, TFTP server, and default router locally on the phone, choose Applications > Administrator Settings > Network Setup > IPv4 Setup:

To disable DHCP and manually set an IP address:

a. To disable DHCP, set DHCP Enabled to No.

b. Enter the static IP address for phone.

c. Enter the subnet mask.

d. Enter the default router IP addresses.

e. Set Alternate TFTP Server to Yes, and enter the IP address for TFTP Server 1.

You must also enter the domain name where the phone resides by choosing Applications > Administrator Settings > Network Setup.

See the "Configuring Startup Network Settings" section.

See the "Network Setup Menu" section.

5.

Set up security on the phone.

Provides protection against data tampering threats and identity theft of phones.

See the "Configuring Security on the Cisco Unified IP Phone" section.

6.

Make calls with the Cisco Unified IP Phone.

Verifies that the phone and features work correctly.

Refer to Cisco Unified IP Phone 6921, 6941, and 6961 User Guide for Cisco Unified Communications Manager 8.0.

7.

Provide information to end users about how to use their phones and how to configure their phone options.

Ensures that users have adequate information to successfully use their Cisco Unified IP Phones.

See "Providing Information to Users Via a Website."


Terminology Differences

Table 1-11 highlights some of the important differences in terminology that is used in these documents:

Cisco Unified IP Phone 6921, 6941, and 6961 User Guide for Cisco Unified Communications Manager 8.0 (SCCP)

Cisco Unified IP Phone 6921, 6941, and 6961 Administration Guide for Cisco Unified Communications Manager 8.0 (SCCP)

Cisco Unified Communications Manager Administration Guide

Cisco Unified Communications Manager System Guide

Table 1-11 Terminology Differences

User Guide
Administration and System Guides

Speed-Dialing (Placing a call with a speed-dial code)

Abbreviated Dialing

Conference across Lines

Join Across Lines

Conference

Join or Conference

Line Status

Busy Lamp Field (BLF)

Message Indicators

Message Waiting Indicator (MWI) or Message Waiting Lamp

Programmable Feature Button

Programmable Line Button or Programmable Line Key (PLK)

Voicemail System

Voice Messaging System