Chapter 1 An Overview of the Cisco Unified IP Phone

Understanding Security Features for Cisco Unified IP Phones

4.The phone displays the security level of the conference call. A secure conference displays icon to the right of “Conference” on the phone screen.

Note There are interactions, restrictions, and limitations that affect the security level of the conference call depending on the security mode of the participant’s phones and the availability of secure conference bridges. See Table 1-7and Table 1-8for information about these interactions.

Establishing and Identifying Secure Calls

A secure call is established when your phone, and the phone on the other end, is configured for secure calling. The other phone can be in the same Cisco IP network, or on a network outside the IP network. Secured calls can only be made between two phones. Conference calls and other multiple-line calls are not supported.

A secured call is established using this process:

1.A user initiates the call from a secured phone (secured security mode).

2. The phone displays the icon (secure) on the phone screen. This icon indicates that the phone is configured for secure calls, but this does not mean that the other connected phone is also secured.

3.A security tone plays if the call is connected to another secured phone, indicating that both ends of the conversation are encrypted and secured. If the call is connected to a non-secured phone, then the secure tone is not played.

Note Secured calling is supported for conversations between two phones. Some features, such as conference calling, shared lines, and Cisco Extension Mobility are not available when secured calling is configured.

Call Security Interactions and Restrictions

Cisco Unified Communications Manager checks the phone security status when conferences are established and changes the security indication for the conference or blocks the completion of the call to maintain integrity and also security in the system. Table 1-7provides information about changes to call security levels when using Barge.

Table 1-7

Call Security Interactions When Using Barge

 

 

 

 

 

 

Initiator’s Phone

 

 

 

 

Security Level

 

Feature Used

Call Security Level

Results of Action

 

 

 

 

 

Non-secure

 

Barge

Encrypted call

Call barged and identified as non-secure call

 

 

 

 

 

Secure

 

Barge

Encrypted call

Call barged and identified as secure call

 

 

 

 

 

Table 1-8provides information about changes to conference security levels depending on the initiator’s phone security level, the security levels of participants, and the availability of secure conference bridges.

 

Cisco Unified IP Phone 8961, 9951, and 9971 Administration Guide for Cisco Unified Communications Manager 8.5 (SIP)

1-20

OL-20861-01

Page 34
Image 34
Cisco Systems 8961 manual Establishing and Identifying Secure Calls