Cisco 7925G Administration Guide - Page 26

Understanding Security Profiles, Identifying Authenticated, Encrypted, and Protected Phone Calls

Page 26 highlights

Understanding Security Features for Cisco Unified IP Phones Chapter 1 Overview of the Cisco Unified Wireless IP Phone 7925G Related Topics • Understanding Security Profiles, page 1-12 • Identifying Authenticated, Encrypted, and Protected Phone Calls, page 1-12 • Viewing Device Information, page 8-4 • Security Restrictions, page 1-13 Understanding Security Profiles A security profile, which defines whether the phone is non-secure, authenticated, encrypted, or protected is associated with every Cisco Unified IP Phone that is supported by Cisco Unified Communications Manager Administration. For information about configuring the security profile and applying the profile to the phone, refer to Cisco Unified Communications Manager Security Guide. Note For Cisco Unified IP Phones using Cisco Unified CallManager 4.1 and later, security is configured on each phone. For more information about configuring security, refer to Cisco Unified CallManager Security Guide at http://www.cisco.com/en/US/products/sw/voicesw/ps556/prod_maintenance_guides_list.html. To view the security mode that is set for the phone, from the phone screen, choose SETTINGS > Device Information > Security > Security Mode. For more information, see the "Viewing Security Information" section on page 8-1. Related Topics • Identifying Authenticated, Encrypted, and Protected Phone Calls, page 1-12 • Viewing Device Information, page 8-4 • Security Restrictions, page 1-13 Identifying Authenticated, Encrypted, and Protected Phone Calls When security is implemented for a phone, you can identify authenticated or encrypted phone calls by icons on the screen on the phone. You can also determine if the connected phone is secure and protected if a security tone plays at the beginning of the call. In an authenticated call, all devices participating in the establishment of the call are authenticated by Cisco Unified Communications Manager. When a call in progress is authenticated, the call progress icon to the right of the call duration timer in the phone screen changes to this icon: In an encrypted call, all devices participating in the establishment of the call are authenticated by Cisco Unified Communications Manager. In addition, call signaling and media streams are encrypted. An encrypted call offers a high level of security, providing integrity and privacy to the call. When a call in progress is being encrypted, the call progress icon to the right of the call duration timer in the phone screen changes to this icon: 1-12 Cisco Unified Wireless IP Phone 7925G Administration Guide for Cisco Unified Communications Manager 7.0(1) OL-15984-01

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244

1-12
Cisco Unified Wireless IP Phone 7925G Administration Guide for Cisco Unified Communications Manager 7.0(1)
OL-15984-01
Chapter 1
Overview of the Cisco Unified Wireless IP Phone 7925G
Understanding Security Features for Cisco Unified IP Phones
Related Topics
Understanding Security Profiles, page 1-12
Identifying Authenticated, Encrypted, and Protected Phone Calls, page 1-12
Viewing Device Information, page 8-4
Security Restrictions, page 1-13
Understanding Security Profiles
A security profile, which defines whether the phone is non-secure, authenticated, encrypted, or protected
is associated with every Cisco Unified IP Phone that is supported by Cisco Unified Communications
Manager Administration. For information about configuring the security profile and applying the profile
to the phone, refer to
Cisco Unified Communications Manager Security Guide
.
Note
For Cisco Unified IP Phones using Cisco Unified CallManager 4.1 and later, security is configured on
each phone. For more information about configuring security, refer to
Cisco Unified CallManager
Security Guide
at
To view the security mode that is set for the phone, from the phone screen, choose
SETTINGS > Device
Information > Security > Security Mode
. For more information, see the
“Viewing Security
Information” section on page 8-1
.
Related Topics
Identifying Authenticated, Encrypted, and Protected Phone Calls, page 1-12
Viewing Device Information, page 8-4
Security Restrictions, page 1-13
Identifying Authenticated, Encrypted, and Protected Phone Calls
When security is implemented for a phone, you can identify authenticated or encrypted phone calls by
icons on the screen on the phone. You can also determine if the connected phone is secure and protected
if a security tone plays at the beginning of the call.
In an authenticated call, all devices participating in the establishment of the call are authenticated by
Cisco Unified Communications Manager. When a call in progress is authenticated, the call progress icon
to the right of the call duration timer in the phone screen changes to this icon:
In an encrypted call, all devices participating in the establishment of the call are authenticated by
Cisco Unified Communications Manager. In addition, call signaling and media streams are encrypted.
An encrypted call offers a high
level of security, providing integrity and privacy to the call. When a call
in progress is being encrypted, the call progress icon to the right of the call duration timer in the phone
screen changes to this icon: