Configuring Cisco IP Telephony Authentication and Encryption

This chapter covers the following topics:

  • Identifying the steps to configure a Cisco CallManager system for authentication and encryption
  • Activating the Cisco CTL Provider service and the CAPF service in Cisco CallManager Serviceability
  • Installing the Cisco CTL client on a Windows 2000 server or workstation with a USB port
  • Configuring the Cisco CTL client to create a CTL file and setting the cluster security mode
  • Using the CAPF settings in the Phone Configuration window to install, upgrade, delete, and troubleshoot LSCs
  • Configuring the default security mode for supported IP Phone models and the device security mode for a single device
  • Generating a CAPF report in Cisco CallManager Administration to view authentication strings and authentication modes
  • Finding IP Phones in the network that support authentication, support encryption, or use CAPF for LSC operations

Cisco IP telephony systems are subject to several threats, including eavesdropping, identity spoofing, and denial of service (DoS) attacks. In Cisco CallManager Release 4.0 and later, you can secure the Cisco IP telephony solution against these threats by enabling authentication and encryption features. This chapter explains how to configure the authentication and encryption that you can apply in a Cisco IP telephony environment.

Категории