Solved

Cisco 7936 device not trusted

Posted on 2014-10-08
2
1,806 Views
Last Modified: 2014-10-09
Hi, I am trying to setup a Cisco 7936 phone. Users can call this phone but no outgoing calls seems to be possible. Also in the Cisco Unified Communications Manager, it says ' Device not Trusted'. Could someone throw some light on this issue please?

Thanks
0
Comment
Question by:jameshfd21
2 Comments
 
LVL 62

Accepted Solution

by:
btan earned 500 total points
ID: 40370047
If I may find this useful. Pls do note the system determines whether the device is trusted, based on the device type. You cannot configure whether the device is trusted.
A Trusted Device represents a Cisco device or a third-party device that has passed Cisco security criteria for trusted connections. This includes, but is not limited to, signaling/media encryption, platform hardening, and assurance. If a device is trusted, a Security icon displays, and a secure tone plays on supported devices. Also, the device may provide other features or indicators that are related to secure calls. Cisco Unified Communications Manager determines whether a device is trusted when you add it to your system. The security icon displays for information purposes only, and the administrator cannot configure it directly.

https://supportforums.cisco.com/discussion/10809676/vg248-device-not-trusted
0
 

Author Closing Comment

by:jameshfd21
ID: 40370366
Thanks for the information.
0

Featured Post

Efficient way to get backups off site to Azure

This user guide provides instructions on how to deploy and configure both a StoneFly Scale Out NAS Enterprise Cloud Drive virtual machine and Veeam Cloud Connect in the Microsoft Azure Cloud.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

System overheating may become a serious problem if not taken care of at the proper time. I am writing this article because I faced a similar problem. Intro All electronic devices produce heat, but computers are a special case - the processors bo…
Every server (virtual or physical) needs a console: and the console can be provided through hardware directly connected, software for remote connections, local connections, through a KVM, etc. This document explains the different types of consol…
Along with being a a promotional video for my three-day Annielytics Dashboard Seminor, this Micro Tutorial is an intro to Google Analytics API data.
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …

813 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

17 Experts available now in Live!

Get 1:1 Help Now