Supporting 802.1X Authentication On Cisco Unified Ip Phones; Required Network Components; Best Practices—Requirements And Recommendations; Security Restrictions - Cisco 7945G Administration Manual

For cisco unified communications manager 6.1(3)
Hide thumbs Also See for 7945G:
Table of Contents

Advertisement

Chapter 1
An Overview of the Cisco Unified IP Phone
Table 1-5
Security Restrictions with Conference Calls (continued)
Initiator's Phone
Security Level
Feature Used
Secure (encrypted)
Conference
Secure
Conference
(authenticated)
Non-secure
Conference
Secure (encrypted
Conference
or authenticated)
Secure (encrypted
Conference
or authenticated)
Secure (encrypted)
Join
Non-secure
cBarge
Non-secure
MeetMe
Secure (encrypted)
MeetMe
Secure (encrypted)
MeetMe

Supporting 802.1X Authentication on Cisco Unified IP Phones

These sections provide information about 802.1X support on the Cisco Unified IP Phones:
Overview
Cisco Unified IP phones and Cisco Catalyst switches have traditionally used Cisco Discovery Protocol
(CDP) to identify each other and to determine parameters such as VLAN allocation and inline power
requirements. However, CDP is not used to identify any locally attached PCs. Therefore, Cisco Unified
Cisco Unified IP Phone 7965G and 7945G Administration Guide for Cisco Unified Communications Manager 6.1(3)
OL-17755-01
Security Level of Participants
All participants are encrypted
All participants are encrypted or
authenticated
Encrypted or authenticated
Encrypted or authenticated
Secure or encrypted.
Encrypted or authenticated
All participants are encrypted
Minimum security level is encrypted
Minimum security level is
authenticated
Minimum security level is non-secure Only secure conference bridge available and
Overview, page 1-15
Required Network Components, page 1-16
Best Practices—Requirements and Recommendations, page 1-16
Understanding Security Features for Cisco Unified IP Phones
Results of Action
Secure conference bridge
Secure encrypted level conference
Secure conference bridge
Secure authenticated level conference
Only secure conference bridge is available
and used
Non-secure conference
Only non-secure conference bridge is
available and used
Non-secure conference
Conference remains secure
When one participant tries to Hold the call
with MOH, the MOH does not play.
Secure conference bridge
Conference remains secure (encrypted or
authenticated)
Secure conference bridge
Conference changes to non-secure
Initiator receives message "Does not meet
Security Level", call rejected.
Secure conference bridge
Conference accepts encrypted and
authenticated calls
used
Conference accepts all calls
1-15

Advertisement

Table of Contents
loading

This manual is also suitable for:

7965g

Table of Contents