Supporting 802.1X Authentication On Cisco Unified Ip Phones; Overview; Required Network Components; Best Practices—Requirements And Recommendations - Cisco 7975G Software Manual

Administration guide for cisco unified communications manager 7.0 (sccp and sip)
Hide thumbs Also See for 7975G:
Table of Contents

Advertisement

Chapter 1
An Overview of the Cisco Unified IP Phone
Table 1-5
Security Restrictions with Conference Calls
Initiator's Phone
Security Level
Feature Used
Non-secure
Conference
Secure (encrypted or
Conference
authenticated)
Secure (encrypted)
Conference
Secure (authenticated)
Conference
Non-secure
Conference
Secure (encrypted or
Conference
authenticated)
Secure (encrypted or
Conference
authenticated)
Secure (encrypted)
Join
Non-secure
cBarge
Non-secure
MeetMe
Secure (encrypted)
MeetMe
Secure (encrypted)
MeetMe

Supporting 802.1X Authentication on Cisco Unified IP Phones

These sections provide information about 802.1X support on the Cisco Unified IP Phones:
Cisco Unified IP Phone 7975G Administration Guide for Cisco Unified Communications Manager 7.0 (SCCP and SIP)
OL-15790-01
Security Level of Participants
Encrypted or authenticated
At least one member is
non-secure
All participants are encrypted
All participants are encrypted or
authenticated
Encrypted or authenticated
Encrypted or authenticated
Member puts call on Hold with
MOH
Encrypted or authenticated
All participants are encrypted
Minimum security level is
encrypted
Minimum security level is
authenticated
Minimum security level is
non-secure
Overview, page 1-16
Required Network Components, page 1-16
Best Practices—Requirements and Recommendations, page 1-16
Understanding Security Features for Cisco Unified IP Phones
Results of Action
Non-secure conference bridge
Non-secure conference
Secure conference bridge
Non-secure conference
Secure conference bridge
Secure encrypted level conference
Secure conference bridge
Secure authenticated level conference
Only secure conference bridge is available and
used
Non-secure conference
Only non-secure conference bridge is
available and used
Non-secure conference
No music-on-hold is played
Conference remains secure
Secure conference bridge
Conference remains secure (encrypted or
authenticated)
Secure conference bridge
Conference changes to non-secure
Initiator receives message "Does not meet
Security Level", call rejected.
Secure conference bridge
Conference accepts encrypted and
authenticated calls
Only secure conference bridge available and
used
Conference accepts all calls
1-15

Advertisement

Table of Contents
loading

Table of Contents