Cisco 7921G Administration Guide - Page 25

Identifying Encrypted and Authenticated Phone Calls, Security Restrictions - settings locked

Page 25 highlights

Chapter 1 Overview of the Cisco Unified Wireless IP Phone 7921G Overview of Configuring and Installing the Cisco Unified Wireless IP Phone 7921G Identifying Encrypted and Authenticated Phone Calls When security is implemented for a phone, you can identify authenticated or encrypted phone calls by icons on the screen on the phone. In an authenticated call, all devices participating in the establishment of the call are authenticated by the Cisco Unified Communications Manager. When a call in progress is authenticated, the call progress icon to the right of the call duration timer in the phone screen changes to this icon: In an encrypted call, all devices participating in the establishment of the call are authenticated by the Cisco Unified Communications Manager. In addition, call signaling and media streams are encrypted. An encrypted call offers the highest level of security, providing integrity and privacy to the call. When a call in progress is being encrypted, the call progress icon to the right of the call duration timer in the phone screen changes to this icon: Note If the call is routed through non-IP call legs, such as the PSTN, the call might be non-secure even though it is encrypted within the IP network and has a lock icon associated with it. Related Topics • Understanding Security Features for Cisco Unified IP Phones, page 1-7 • Understanding Security Profiles, page 1-10 • Security Restrictions, page 1-11 Security Restrictions When using a phone that is not configured for encryption, the user cannot barge into an encrypted call. When barge fails in this case, a reorder tone (fast busy tone) plays on the barge initiator's phone. If the phone is configured for encryption, the user can barge into an authenticated or non-secure call from the encrypted phone. After the barge occurs, Cisco Unified Communications Manager classifies the call as non-secure. If the phone is configured for encryption, the user can barge into an encrypted call, and the phone indicates that the call is encrypted. A user can barge into an authenticated call, even if the phone that is used to barge is non-secure. The authentication icon continues to display on the authenticated phones in the call, even if the initiator's phone does not support security. Overview of Configuring and Installing the Cisco Unified Wireless IP Phone 7921G When deploying a new IP telephony system, system administrators and network administrators must complete several initial configuration tasks to prepare the network for IP telephony service. For information and a checklist for setting up and configuring a complete Cisco IP telephony network, refer to the "System Configuration Overview" chapter in the Cisco Unified Communications Manager System Guide. OL-15985-01 Cisco Unified Wireless IP Phone 7921G Administration Guide for Cisco Unified Communications Manager Release 7.0 1-11

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234

1-11
Cisco Unified Wireless IP Phone 7921G Administration Guide for Cisco Unified Communications Manager Release 7.0
OL-15985-01
Chapter 1
Overview of the Cisco Unified Wireless IP Phone 7921G
Overview of Configuring and Installing the Cisco Unified Wireless IP Phone 7921G
Identifying Encrypted and Authenticated Phone Calls
When security is implemented for a phone, you can identify authenticated or encrypted phone calls by
icons on the screen on the phone.
In an authenticated call, all devices participating in the establishment of the call are authenticated by the
Cisco Unified Communications Manager. When a call in progress is authenticated, the call progress icon
to the right of the call duration timer in the phone screen changes to this icon:
In an encrypted call, all devices participating in the establishment of the call are authenticated by the
Cisco Unified Communications Manager. In addition, call signaling and media streams are encrypted.
An encrypted call offers the highest level of security, providing integrity and privacy to the call. When
a call in progress is being encrypted, the call progress icon to the right of the call duration timer in the
phone screen changes to this icon:
Note
If the call is routed through non-IP call legs, such as the PSTN, the call might be non-secure even though
it is encrypted within the IP network and has a lock icon associated with it.
Related Topics
Understanding Security Features for Cisco Unified IP Phones, page 1-7
Understanding Security Profiles, page 1-10
Security Restrictions, page 1-11
Security Restrictions
When using a phone that is not configured for encryption, the user cannot barge into an encrypted call.
When barge fails in this case, a reorder tone (fast busy tone) plays on the barge initiator’s phone.
If the phone is configured for encryption, the user can barge into an authenticated or non-secure call from
the encrypted phone. After the barge occurs, Cisco Unified Communications Manager classifies the call
as non-secure.
If the phone is configured for encryption, the user can barge into an encrypted call, and the phone
indicates that the call is encrypted.
A user can barge into an authenticated call, even if the phone that is used to barge is non-secure. The
authentication icon continues to display on the authenticated phones in the call, even if the initiator’s
phone does not support security.
Overview of Configuring and Installing the Cisco Unified
Wireless IP Phone 7921G
When deploying a new IP telephony system, system administrators and network administrators must
complete several initial configuration tasks to prepare the network for IP telephony service. For
information and a checklist for setting up and configuring a complete Cisco IP telephony network, refer
to the “System Configuration Overview” chapter in the
Cisco Unified Communications Manager System
Guide
.