
Description
Feature
Each conference phone requires a unique certificate for device authentication.
Conference phones include a manufacturing installed certificate (MIC), but
for additional security, you can specify in Cisco Unified Communications
Manager Administration that a certificate be installed by using the Certificate
Authority Proxy Function (CAPF). Alternatively, you can install a Locally
Significant Certificate (LSC) from the Security Configuration menu on the
phone.
Customer-site certificate
installation
Occurs between the Cisco Unified Communications Manager server and the
conference phone when each entity accepts the certificate of the other entity.
Determines whether a secure connection between the conference phone and
a Cisco Unified Communications Manager should occur; and, if necessary,
creates a secure signaling path between the entities by using TLS protocol.
Cisco Unified Communications Manager will not register conference phone
unless they can be authenticated by the Cisco Unified Communications
Manager.
Device authentication
Validates digitally signed files that the conference phone downloads. The
conference phone validates the signature to make sure that file tampering
did not occur after the file creation. Files that fail authentication are not
written to Flash memory on the conference phone. The conference phone
rejects such files without further processing.
File authentication
Uses the TLS protocol to validate that no tampering has occurred to signalling
packets during transmission.
Signalling Authentication
Each conference phone contains a unique manufacturing installed certificate
(MIC), which is used for device authentication. The MIC is a permanent
unique proof of identity for the conference phone, and allows Cisco Unified
Communications Manager to authenticate the phone.
Manufacturing installed
certificate
After you configure a SRST reference for security and then reset the
dependent devices in Cisco Unified Communications Manager
Administration, the TFTP server adds the SRST certificate to the
cnf.xml
file and sends the file to the phone. A secure phone then uses a TLS
connection to interact with the SRST-enabled router.
Secure SRST reference
Uses SRTP to ensure that the media streams between supported devices
proves secure and that only the intended device receives and reads the data.
Includes creating a media master key pair for the devices, delivering the keys
to the devices, and securing the delivery of the keys while the keys are in
transport.
Media encryption
Implements parts of the certificate generation procedure that are too
processing-intensive for the conference phone, and interacts with the
conference phone for key generation and certificate installation. The CAPF
can be configured to request certificates from customer-specified certificate
authorities on behalf of the conference phone, or it can be configured to
generate certificates locally.
CAPF (Certificate Authority
Proxy Function)
Cisco Unified IP Conference Phone 8831 Administration Guide for Cisco Unified Communications Manager 9.0
23
Cisco Unified IP Conference Phone 8831
Supported security features