Chapter 1 An Overview of the Cisco Unified IP Phone

Understanding Security Features for Cisco Unified IP Phones

Related Topics

Identifying Encrypted and Authenticated Phone Calls, page 1-17

Device Configuration Menu, page 4-15

Security Restrictions, page 1-21

Understanding Security Profiles

All Cisco Unified IP Phones that support Cisco Unified CallManager 5.1 use a security profile, which defines whether the phone is nonsecure, authenticated, or encrypted. For information about configuring the security profile and applying the profile to the phone, refer to the Cisco Unified CallManager Security Guide.

To view the security profile name on the phone, perform these steps:

Procedure

Step 1 Select Settings.

Step 2 Select Security Configuration.

Related Topics

Identifying Encrypted and Authenticated Phone Calls, page 1-17

Security Restrictions, page 1-21

Device Configuration Menu, page 4-15

Identifying Encrypted and Authenticated Phone Calls

When security is implemented for a phone, you can identify authenticated or encrypted phone calls by icons on the LCD screen on the phone.

In an authenticated call, all devices participating in the establishment of the call are authenticated by the Cisco Unified CallManager. When a call in progress is authenticated end-to-end, the call progress icon to the right of the call duration timer in the phone LCD screen changes to the following icon:

Cisco Unified IP Phone Administration Guide for Cisco Unified CallManager 5.1 (SIP), Cisco Unified IP Phones

 

OL-11524-01

1-17

 

Page 51
Image 51
Cisco Systems 7970G manual Understanding Security Profiles, Identifying Encrypted and Authenticated Phone Calls, Procedure