Cisco 7961G Administration Guide - Page 49

Understanding Security Profiles, Identifying Encrypted and Authenticated Phone Calls

Page 49 highlights

Chapter 1 An Overview of the Cisco Unified IP Phone Understanding Security Features for Cisco Unified IP Phones Understanding Security Profiles All Cisco Unified IP Phones that support Cisco Unified CallManager 5.1 use a security profile, which defines whether the phone is nonsecure, authenticated, or encrypted. For information about configuring the security profile and applying the profile to the phone, refer to Cisco Unified CallManager Security Guide, Release 5.1(1). To view the security mode that is set for the phone, look at the Security Mode setting in the Security Configuration menu. For more information, see the "Security Configuration Menu" section on page 4-25. Related Topics • Identifying Encrypted and Authenticated Phone Calls, page 1-17 • Security Restrictions, page 1-18 • Device Configuration Menu, page 4-15 Identifying Encrypted and Authenticated Phone Calls When security is implemented for a phone, you can identify authenticated or encrypted phone calls by icons on the screen on the phone. In an authenticated call, all devices participating in the establishment of the call are authenticated by the Cisco Unified CallManager. When a call in progress is authenticated, the call progress icon to the right of the call duration timer in the phone LCD screen changes to this icon . In an encrypted call, all devices participating in the establishment of the call are authenticated by the Cisco Unified CallManager. In addition, call signaling and media streams are encrypted. An encrypted call offers the highest level of security, providing integrity and privacy to the call. When a call in progress is being encrypted, the call progress icon to the right of the call duration timer in the phone LCD screen changes to the following icon: . Note If the call is routed through non-IP call legs, for example, PSTN, the call may be nonsecure even though it is encrypted within the IP network and has a lock icon associated with it. Cisco Unified IP Phone 7961G/7961G-GE and 7941G/7941G-GE Administration Guide for Cisco Unified CallManager OL-11528-01 1-17

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260

1-17
Cisco Unified IP Phone 7961G/7961G-GE and 7941G/7941G-GE Administration Guide for Cisco Unified CallManager
OL-11528-01
Chapter 1
An Overview of the Cisco Unified IP Phone
Understanding Security Features for Cisco Unified IP Phones
Understanding Security Profiles
All Cisco Unified IP Phones that support Cisco Unified CallManager 5.1 use a
security profile, which defines whether the phone is nonsecure, authenticated, or
encrypted. For information about configuring the security profile and applying
the profile to the phone, refer to
Cisco Unified CallManager Security Guide,
Release 5.1(1)
.
To view the security mode that is set for the phone, look at the Security Mode
setting in the Security Configuration menu. For more information, see the
“Security Configuration Menu” section on page 4-25
.
Related Topics
Identifying Encrypted and Authenticated Phone Calls, page 1-17
Security Restrictions, page 1-18
Device Configuration Menu, page 4-15
Identifying Encrypted and Authenticated Phone Calls
When security is implemented for a phone, you can identify authenticated or
encrypted phone calls by icons on the screen on the phone.
In an authenticated call, all devices participating in the establishment of the call
are authenticated by the Cisco Unified CallManager. When a call in progress is
authenticated, the call progress icon to the right of the call duration timer in the
phone LCD screen changes to this icon
.
In an encrypted call, all devices participating in the establishment of the call are
authenticated by the Cisco Unified CallManager. In addition, call signaling and
media streams are encrypted. An encrypted call offers the highest level of
security, providing integrity and privacy to the call. When a call in progress is
being encrypted, the call progress icon to the right of the call duration timer in the
phone LCD screen changes to the following icon:
.
Note
If the call is routed through non-IP call legs, for example, PSTN, the call may be
nonsecure even though it is encrypted within the IP network and has a lock icon
associated with it.