Identifying Encrypted And Authenticated Phone Calls; Establishing And Identifying Secure Conference Calls - Cisco 7975G Administration Manual

Unified ip phone administration guide for cisco unified communications manager 6.0
Hide thumbs Also See for 7975G:
Table of Contents

Advertisement

Understanding Security Features for Cisco Unified IP Phones

Identifying Encrypted and Authenticated Phone Calls

When security is implemented for a phone, you can identify authenticated or encrypted phone calls by
icons on the screen on the phone.
In an authenticated call, all devices participating in the establishment of the call are authenticated by the
Cisco Unified Communications Manager. When a call in progress is authenticated, the call progress icon
to the right of the call duration timer in the phone screen changes to this icon:
In an encrypted call, all devices participating in the establishment of the call are authenticated by the
Cisco Unified Communications Manager. In addition, call signaling and media streams are encrypted.
An encrypted call offers the highest level of security, providing integrity and privacy to the call. When
a call in progress is being encrypted, the call progress icon to the right of the call duration timer in the
phone screen changes to this icon:
If the call is routed through non-IP call legs, for example, PSTN, the call may be nonsecure even though
Note
it is encrypted within the IP network and has a lock icon associated with it.
Related Topic

Establishing and Identifying Secure Conference Calls

You can initiate a secure conference call and monitor the security level of participants. A secure
conference call is established using this process:
1.
2.
3.
4.
Note
There are interactions, restrictions, and limitations that affect the security level of the conference call
depending on the security mode of the participant's phones and the availability of secure conference
bridges. See
Cisco Unified IP Phone 7975G Administration Guide for Cisco Unified Communications Manager 6.0
1-14
Understanding Security Features for Cisco Unified IP Phones, page 1-9
Understanding Security Profiles, page 1-13
Security Restrictions, page 1-18
A user initiates the conference from a secure phone (encrypted or authenticated security mode).
Cisco Unified Communications Manager assigns a secure conference bridge to the call.
As participants are added, Cisco Unified Communications Manager verifies the security mode of
each phone (encrypted or authenticated) and maintains the secure level for the conference.
The phone displays the security level of the conference call. A secure conference displays
(
(
encrypted) or
authenticated) icon to the right of "Conference" on the phone screen. If
displays, the conference is not secure.
Table 1-4
and
Table 1-5
Chapter 1
for information about these interactions.
An Overview of the Cisco Unified IP Phone
OL-12642-01
icon

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents