Related Topics; Authenticated, Encrypted, And Protected Phone Calls; Secure Conference Call Identification - Cisco 7931G Manual

Unified ip phone
Hide thumbs Also See for 7931G:
Table of Contents

Advertisement

Cisco Unified IP Phone 7931G

Authenticated, Encrypted, and Protected Phone Calls

When security is implemented for a phone, you can identify authenticated or encrypted phone calls by icons
on the screen on the phone. You can also determine if the connected phone is secure and protected if a security
tone plays at the beginning of the call.
In an authenticated call, all devices participating in the establishment of the call are trusted devices and
authenticated by the Cisco Unified Communications Manager. When a call is setting up, the call is authenticated,
the call progress icon to the right of the call duration timer in the phone screen changes to this icon: .
In an encrypted call, all devices participating in the establishment of the call are trusted devices and
authenticated by the Cisco Unified Communications Manager. In addition, call signaling and media streams
are encrypted. An encrypted call offers a high level of security, providing integrity and privacy to the call.
When a call in-progress is being encrypted, the call progress icon to the right of the call duration timer in the
phone screen changes to this icon: .
If the call is routed through non-IP call legs, for example, PSTN, the call may be nonsecure even though
Note
it is encrypted within the IP network and has a lock icon associated with it.
In a protected call, a security tone plays at the beginning of a call to indicate that the other connected phone
is also receiving and transmitting encrypted audio and video (if video is involved). If your call is connected
to a non-protected phone, the security tone does not play.
Protected calling is supported for connections between two phones only. Some features, such as conference
Note
calling, shared lines, Extension Mobility, and Join Across Lines are not available when protected calling
is configured. Protected calls are not authenticated.

Related Topics

Cisco Unified IP Phone Security Features, on page 12
Security Profiles, on page 16
Secure Conference Call Identification, on page 17
Security Restrictions, on page 23

Secure Conference Call Identification

You can initiate a secure conference call and monitor the security level of participants. A secure conference
call is established using this process:
1 A user initiates the conference from a secure phone (encrypted or authenticated security mode).
2 Cisco Unified Communications Manager assigns a secure conference bridge to the call.
3 As participants are added, Cisco Unified Communications Manager verifies the security mode of each
phone (encrypted or authenticated) and maintains the secure level for the conference.
Cisco Unified IP Phone 7931G Administration Guide for Cisco Unified Communications Manager 9.0 (SCCP and SIP)
Authenticated, Encrypted, and Protected Phone Calls
17

Advertisement

Table of Contents
loading

Table of Contents