Chapter 1 An Overview of the Cisco Unified IP Phone

Understanding Security Features for Cisco Unified IP Phones

Understanding Security Profiles

All Cisco Unified IP Phones that support Cisco Unified Communications Manager use a security profile, which defines whether the phone is nonsecure, authenticated, or encrypted. For information about configuring the security profile and applying the profile to the phone, refer to Cisco Unified Communications Manager Security Guide.

To view the security mode that is set for the phone, look at the Security Mode setting in the Security Configuration menu. For more information, see the “Security Setup Menu” section on page 7-13.

Related Topics

Identifying Secure (Encrypted) Phone Calls, page 1-19

Security Restrictions, page 1-23

Identifying Secure (Encrypted) Phone Calls

When security is implemented for a phone, you can identify secure phone calls by icons on the phone screen. You can also determine if the connected phone is secure and protected if a security tone plays at the beginning of the call.

In a secure call, all call signaling and media streams are encrypted. A secure call offers a high level of security, providing integrity and privacy to the call. When a call in progress is being encrypted, the call progress icon to the right of the call duration timer in the phone screen changes to the following icon:

.

Note If the call is routed through non-IP call legs, for example, PSTN, the call may be nonsecure even though it is encrypted within the IP network and has a lock icon associated with it.

In a secure call, a security tone plays at the beginning of a call to indicate that the other connected phone is also receiving and transmitting secure audio and video (if video is involved). If your call is connected to a non-secure phone, the security tone does not play.

Note Secure calling is supported for connections between two phones only. Some features, such as conference calling, shared lines, and Extension Mobility are not available when secure calling is configured.

Related Topic

Understanding Security Features for Cisco Unified IP Phones, page 1-15

Security Restrictions, page 1-23

Establishing and Identifying Secure Conference Calls

You can initiate a secure conference call and monitor the security level of participants. A secure conference call is established using this process:

1.A user initiates the conference from a secure phone.

2.Cisco Unified Communications Manager assigns a secure conference bridge to the call.

3.As participants are added, Cisco Unified Communications Manager verifies the security mode of each phone and maintains the secure level for the conference.

 

 

Cisco Unified IP Phone 8961, 9951, and 9971 Administration Guide for Cisco Unified Communications Manager 8.5 (SIP)

 

 

 

 

 

 

OL-20861-01

 

 

1-19

 

 

 

 

 

Page 33
Image 33
Cisco Systems 8961 manual Understanding Security Profiles, Identifying Secure Encrypted Phone Calls