PDF(554.7 KB) View with Adobe Reader on a variety of devices
ePub(72.3 KB) View in various apps on iPhone, iPad, Android, Sony Reader, or Windows Phone
Mobi (Kindle)(73.1 KB) View on Kindle device or Kindle app on multiple devices
Updated:April 10, 2015
The documentation set for this product strives to use bias-free language. For the purposes of this documentation set, bias-free is defined as language that does not imply discrimination based on age, disability, gender, racial identity, ethnic identity, sexual orientation, socioeconomic status, and intersectionality. Exceptions may be present in the documentation due to language that is hardcoded in the user interfaces of the product software, language used based on RFP documentation, or language that is used by a referenced third-party product. Learn more about how Cisco is using Inclusive Language.
A new parameter, Cisco XML EXE Enable, is added to enable or disable the Cisco XML exe feature. The default value is No. If this feature is disabled, the phone will not execute the http://ip/CGI/Execute URL.
The default value of the parameter, Cisco XML EXE Auth Mode, changes from Trusted to Local Credential.
This release contains no Installation information.
The SPA 30x/50x phone do not support font size 12, for Hebrew language.
For SPA phones, option to add “+” sign is missing in the numeric inputs for PAB number entry.
The SPA phones do not support Xuser and Xpassword.
The SPA5x5 phone, displays the CFWD softkey for other call states (dialing), even if the CFWD service is disabled.
For SPA5x5/51x phone, the string, “Blind transfer number” is missing in XML Dictionary.
The following caveat is resolved in release 7.5.7s.
SPA300 and SPA500 IP Phones Unauthenticated Remote Dial Vulnerability
Behavior During Times of Network Congestion
Anything that degrades network performance can affect voice and video quality, and in some cases, can cause a call to drop. Sources of network degradation can include, but are not limited to, the following activities:
Administrative tasks, such as an internal port scan or security scan
Attacks that occur on your network, such as a Denial of Service attack
To reduce or eliminate any adverse effects to the devices, schedule administrative network tasks during a time when the devices are not being used or exclude the devices from testing.
Documentation, Service Requests, and Additional Information
Subscribe to What’s New in Cisco Product Documentation, which lists all new and revised Cisco technical documentation as an RSS feed and delivers content directly to your desktop using a reader application. The RSS feeds are a free service.
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (1110R)
Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and phone numbers. Any examples, command display output, network topology diagrams, and other figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses or phone numbers in illustrative content is unintentional and coincidental.