1-7
Cisco Unified IP Conference Station 7937G Administration Guide for Cisco Unified Communications Manager 6.0
OL-11560-01 Rev. B0
Chapter 1 An Overview of the Conference Station
Understanding Security Features for Conference Stations
Providing Users with Feature Information
If you are a system administrator, you are likely the primary source of information for conference station
users in your network or company. To ensure that you distribute the most current feature and procedural
information, familiarize yourself with conference station documentation. Make sure to visit the
Cisco Unified IP Conference Station web site:
http://www.cisco.com/en/US/products/hw/phones/ps379/tsd_products_support_series_home.html
From this site, you can access various user guides.
In addition to providing users with documentation, it is important to inform them about available
conference station features—including features specific to your company or network—and about how to
access and customize those features, if appropriate.
For a summary of some of the key information that conference station users need their system
administrators to provide, see
Appendix A, “Providing Information to Users Via a Website.”
Understanding Security Features for Conference Stations
Implementing security in the Cisco Unified Communications Manager system prevents identity theft of
the conference station and Cisco Unified Communications Manager server and prevents data tampering.
Table 1-2
shows where you can find additional information about security in this and other documents.
Table 1-2
Conference Station and Cisco Unified Communications Manager
Security Topics
Topic
Reference
Detailed explanation of security, including set up,
configuration, and troubleshooting information
for Cisco Unified Communications Manager and
conference stations
Refer to
Cisco Unified Communications Manager
Security Guide
Security features supported on the conference
station
See the
“Overview of Supported Security
Features” section on page 1-8
Viewing a security profile name
See the
“Understanding Security Profiles” section
on page 1-9
Security and the conference station startup process See the
“Understanding the Conference Station
Startup Process” section on page 2-5
Security and conference station configuration files See the
“Understanding Conference Station
Configuration Files” section on page 2-4
Changing the TFTP Server 1 or TFTP Server 2
option on the conference station when security is
implemented
See
Table 4-3 on page 4-5
Understanding security icons in the
CallManager 1 through CallManager 5 options in
the CallManager Configuration menu on the
conference station
See the
“CallManager Configuration Menu”
section on page 4-9
Items on the Security Configuration menu on the
conference station
See the
“Security Configuration Menu” section on
page 4-11
and the
“Security Configuration Menu”
section on page 4-12