Руководство По Обслуживанию для Cisco Cisco TelePresence MX700
About the phone security profile
Security profiles must be defined when using secure
(encrypted) communication, else you will use the default non-
secure phone security profile for your product.
Note the following:
• CUCM must operate in mixed mode (cluster security
mode) to enable secure communication.
• You must define one device security profile for each
endpoint type.
• If you want to allow several authentication modes for the
same endpoint type, you must define one profile for each
mode.
• See the CUCM Security Guide for further information:
About non-secure and secure profiles
A profile's security mode is defined by the Device Security
Mode parameter (see next page). TelePresence endpoints
support
Non-secure and Encrypted modes; they do not
support Authenticated mode. Endpoints connected to CUCM
via Expressway support only
Non-secure mode.
Non-secure profile
The non-secure endpoints will use the
The non-secure endpoints will use the
predefined non-
secure profile. If this is your option you can proceed to:
Secure (Encrypted) profile
When configuring a secure device for the first time, you can
When configuring a secure device for the first time, you can
copy a predefined non-secure profile to use as a template.
This is the method used in this section.
You may also choose Add New, and then choose the type of
TelePresence endpoint for the phone security profile.
The page content will be the same using one or another
method, but the default values may vary.
Navigate to: System > Security > Phone Security Profile.
Editing a security profile
The non-secure endpoints
The non-secure endpoints
will use the predefined
non-secure profile. No
action required.
Creating a security profile
When registering a
When registering a
secure
device for the first time,
copy the predefined non-
secure profile to use as a
template.
Cisco TelePresence Endpoints and Cisco Unified Communications Manager
Quick Reference Guide
D14996.09 Administering TC7.2 Endpoints on CUCM 10.5.1, NOVEMBER 2014.
www.cisco.com — Copyright © 2014 Cisco Systems, Inc. All rights reserved.
11
Mandatory Optional
Click
Add New on the Find and List Phone Security Profiles page.
Contents
Introduction
CUCM configuration
Endpoint configuration
About passwords
Appendices
CUCM configuration