Establishing And Identifying Secure Conference Calls - Cisco 7931G - Unified IP Phone VoIP Administration Manual

For cisco unified communications manager 6.0
Hide thumbs Also See for 7931G - Unified IP Phone VoIP:
Table of Contents

Advertisement

Understanding Security Features for Cisco Unified IP Phones
Note

Establishing and Identifying Secure Conference Calls

Note
Cisco Unified IP Phone 7931G Administration Guide for Cisco Unified Communications Manager 6.0
1-20
If the call is routed through non-IP call legs, for example, PSTN, the call may be
nonsecure even though it is encrypted within the IP network and has a lock icon
associated with it.
Related Topic
Understanding Security Features for Cisco Unified IP Phones, page 1-13
Understanding Security Profiles, page 1-19
Establishing and Identifying Secure Conference Calls, page 1-20
Security Restrictions, page 1-25
You can initiate a secure conference call and monitor the security level of
participants. A secure conference call is established using this process:
1.
A user initiates the conference from a secure phone (encrypted or
authenticated security mode).
Cisco Unified Communications Manager assigns a secure conference bridge
2.
to the call.
As participants are added, Cisco Unified Communications Manager verifies
3.
the security mode of each phone (encrypted or authenticated) and maintains
the secure level for the conference.
The phone displays the security level of the conference call. A secure
4.
conference displays
of "Conference" on the phone. If the
secure.
There are interactions, restrictions, and limitations that affect the security level of
the conference call depending on the security mode of the participants' phones
and the availability of secure conference bridges. See
information about these interactions.
Chapter 1
An Overview of the Cisco Unified IP Phone
(
(encrypted) or
authenticated) icon to the right
icon displays, the conference is not
Table 1-4
and
Table 1-5
OL-12457-01
for

Advertisement

Table of Contents
loading

Table of Contents