Chapter 3
Setting Up the Cisco Unified IP Phone
Configuring Startup Network Settings
If you are not using DHCP in your network, you must configure these network settings on the
Cisco Unified IP Phone after installing the phone on the network:
•
•
•
•
You may also configure these optional settings as necessary:
•
•
Collect this information and see the instructions in
Unified IP Phone."
Configuring Security on the Cisco Unified IP Phone
The security features protect against several threats, including threats to the identity of the phone and to
data. These features establish and maintain authenticated communication streams between the phone and
the Cisco Unified Communications Manager server, and digitally sign files before they are delivered.
For more information about the security features, see the
Unified IP Phones" section on page
Guide.
A Locally Significant Certificate (LSC) installs on phones after you perform the necessary tasks that are
associated with the Certificate Authority Proxy Function (CAPF). You can use Cisco Unified
Communications Manager Administration to configure an LSC, as described in Cisco Unified
Communications Manager Security Guide.
Alternatively, you can initiate the installation of an LSC from the Security Configuration menu on the
phone. This menu also lets you update or remove an LSC.
Before you begin, make sure that the appropriate Cisco Unified Communications Manager and the
Certificate Authority Proxy Function (CAPF) security configurations are complete:
•
•
•
Refer to Cisco Unified Communications Manager Security Guide for more information.
To configure an LSC on the phone, perform the following procedure. Depending on how you have
configured the CAPF, this procedure installs an LSC, updates an existing LSC, or removes an existing
LSC.
Cisco Unified IP Phone 7975G Administration Guide for Cisco Unified Communications Manager 7.0 (SCCP and SIP)
OL-15790-01
IP address
IP subnet information
Default gateway IP address
TFTP server IP address
Domain name
DNS server IP address
The CTL file should have a CAPF certificate.
The CAPF certificate must exist in the /usr/local/cm/.security/certs folder in every server in the
cluster.
The CAPF is running and configured.
Chapter 4, "Configuring Settings on the Cisco
"Understanding Security Features for Cisco
1-8. Also, refer to Cisco Unified Communications Manager Security
Configuring Startup Network Settings
3-13