Руководство По Обслуживанию для Cisco Cisco TelePresence MX700

Скачать
Страница из 39
Creating a phone security profile
Only applicable for secure (encrypted) profiles; not applicable 
for endpoints connected to CUCM by Expressway.
1.  Navigate to 
System > Security > Phone Security Profile
.
2. 
Copy
 an existing profile or click 
Add New
 on the 
Find 
and List Phone Security Profiles
 page.
Then continue to set up the profile. When done with the 
profile, click 
Save
 to confirm the changes.
Phone security profile information
Navigate to the 
Phone Security Profile Information
 section 
and fill in the applicable information:
Name: 
Enter the profile name. 
Description: 
Enter the profile description. 
Device Security Mode: 
Set to Encrypted.
Transport Type: 
Set to TLS. 
TFTP Encrypted Config: 
Check this check box to enable TFTP encrypted 
configuration.
Phone security profile CAPF information
Navigate to the 
Phone Security Profile CAPF Information
 
section and fill in the applicable information:
Authentication Mode: 
Choose the appropriate value from the drop-down.
By Null String:
 The Certificate Authority Proxy 
Function (CAPF) process starts automatically.
By Authentication String:
 The CAPF process 
commences when the correct authentication code 
is received from the endpoint. 
NOTE:
 The combination of encrypted configuration 
file and CAPF authentication mode "authenticating 
string" is not supported on the TelePresence 
endpoint side in software version 
TC6.2/TC6.3.
By Existing Certificate (precedence to LSC/MIC):
 
This option can only be used when a Locally 
Significant Certificate (LSC) is already stored on the 
endpoint. In other words, it cannot be used the first 
time the CAPF process runs.
Key-size: 
Choose the appropriate value from the drop-down. The 
recommended key size is 1024.
Cisco TelePresence Endpoints and Cisco Unified Communications Manager 
Deployment Guide
D15336.01 Deployment gude for TelePresence Endpoints on CUCM, DECEMBER 2015.
www.cisco.com — Copyright © 2015 Cisco Systems, Inc. All rights reserved. 
12
Contents
Introduction
CUCM configuration
Endpoint configuration
Appendices
Contact
CUCM configuration