Configuring Cisco IP Telephony Authentication and Encryption
This chapter covers the following topics:
Identifying the steps to configure a Cisco CallManager system for authentication and encryption
Activating the Cisco CTL Provider service and the CAPF service in Cisco CallManager Serviceability
Installing the Cisco CTL client on a Windows 2000 server or workstation with a USB port
Configuring the Cisco CTL client to create a CTL file and setting the cluster security mode
Using the CAPF settings in the Phone Configuration window to install, upgrade, delete, and troubleshoot LSCs
Configuring the default security mode for supported IP Phone models and the device security mode for a single device
Generating a CAPF report in Cisco CallManager Administration to view authentication strings and authentication modes
Finding IP Phones in the network that support authentication, support encryption, or use CAPF for LSC operations
Cisco IP telephony systems are subject to several threats, including eavesdropping, identity spoofing, and denial of service (DoS) attacks. In Cisco CallManager Release 4.0 and later, you can secure the Cisco IP telephony solution against these threats by enabling authentication and encryption features. This chapter explains how to configure the authentication and encryption that you can apply in a Cisco IP telephony environment.