I want to secure the IP phone by giving the password so that the ip phone will prompt for the password when ever the user want to make the cal.Please let me know what are the setting for the password security.
There is no simple way to do this, but here are two methods that will "Lock down" the IP Phone.Have a look;
The Cisco CallManager Extension Mobility feature allows users to configure any Cisco IP Phone 7940 or Cisco IP Phone 7960 as their own, on a temporary basis, by logging in to that phone. After a user logs in, the phone adopts the user individual user default device profile information, including line numbers,Long distance access, speed dials, services links, and other user-specific properties of a phone. For example, when user A occupies a desk and logs in to the phone, that user's directory number(s), services, speed dials, and other properties appear on that phone; but when user B uses the same desk at a different time, user B's information appears. The Cisco CallManager Extension Mobility feature dynamically configures a phone according to the current user.
Or you could use Forced Authorization Codes (FAC);
The Forced Authorization Codes (FAC) feature, which allows you to regulate the types of calls that certain users can place, forces the user to enter a valid authorization code on the phone before the call completes.
SIP traces provide key information in troubleshooting SIP Trunks, SIP
endpoints and other SIP related issues. Even though these traces are in
clear text, these texts can be gibberish unless you understand fully
what they mean. This document attempts to br...
Please find the attached HTML document, download and open it on your PC.
This provides an easy to use form where you simply answer a few
questions and it will render the proper jabber-config.xml file for you
to copy/paste. There is built in logic to verif...
CUCM Database Replication is an area in which Cisco customers and
partners have asked for more in-depth training in being able to properly
assess a replication problem and potentially resolve an issue without
involving TAC. This document discusses the bas...