Cisco 7965G Administration Guide - Page 27

Understanding Security Profiles, Identifying Encrypted and Authenticated Phone Calls

Page 27 highlights

Chapter 1 An Overview of the Cisco Unified IP Phone Understanding Security Features for Cisco Unified IP Phones Understanding Security Profiles Cisco Unified IP Phones that support Cisco Unified Communications Manager 6.0 or later use a security profile, which defines whether the phone is nonsecure, authenticated, or encrypted. For information about configuring the security profile and applying the profile to the phone, refer to Cisco Unified Communications Manager Security Guide. To view the security mode that is set for the phone, look at the Security Mode setting in the Security Configuration menu. For more information, see the "Security Configuration Menu" section on page 4-25. Related Topics • Identifying Encrypted and Authenticated Phone Calls, page 1-13 • Device Configuration Menu, page 4-11 • Security Restrictions, page 1-17 Identifying Encrypted and Authenticated Phone Calls When security is implemented for a phone, you can identify authenticated or encrypted phone calls by icons on the screen on the phone. In an authenticated call, all devices participating in the establishment of the call are authenticated by Cisco Unified Communications Manager. When a call in progress is authenticated, the call progress icon to the right of the call duration timer in the phone LCD screen changes to this icon: In an encrypted call, all devices participating in the establishment of the call are authenticated by Cisco Unified Communications Manager. In addition, call signaling and media streams are encrypted. An encrypted call offers the highest level of security, providing integrity and privacy to the call. When a call in progress is being encrypted, the call progress icon to the right of the call duration timer in the phone LCD screen changes to the following icon: Note If the call is routed through non-IP call legs, for example, PSTN, the call may be nonsecure even though it is encrypted within the IP network and has a lock icon associated with it. Related Topic • Understanding Security Features for Cisco Unified IP Phones, page 1-9 • Understanding Security Profiles, page 1-13 • Security Restrictions, page 1-17 OL-14641-01 Cisco Unified IP Phone 7965G and 7945G Administration Guide for Cisco Unified Communications Manager 6.1 1-13

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205

1-13
Cisco Unified IP Phone 7965G and 7945G Administration Guide for Cisco Unified Communications Manager 6.1
OL-14641-01
Chapter 1
An Overview of the Cisco Unified IP Phone
Understanding Security Features for Cisco Unified IP Phones
Understanding Security Profiles
Cisco Unified IP Phones that support Cisco Unified Communications Manager 6.0 or later use a security
profile, which defines whether the phone is nonsecure, authenticated, or encrypted. For information
about configuring the security profile and applying the profile to the phone, refer to
Cisco Unified
Communications Manager Security Guide
.
To view the security mode that is set for the phone, look at the Security Mode setting in the Security
Configuration menu. For more information, see the
“Security Configuration Menu” section on
page 4-25
.
Related Topics
Identifying Encrypted and Authenticated Phone Calls, page 1-13
Device Configuration Menu, page 4-11
Security Restrictions, page 1-17
Identifying Encrypted and Authenticated Phone Calls
When security is implemented for a phone, you can identify authenticated or encrypted phone calls by
icons on the screen on the phone.
In an authenticated call, all devices participating in the establishment of the call are authenticated by
Cisco Unified Communications Manager. When a call in progress is authenticated, the call progress icon
to the right of the call duration timer in the phone LCD screen changes to this icon:
In an encrypted call, all devices participating in the establishment of the call are authenticated by
Cisco Unified Communications Manager. In addition, call signaling and media streams are encrypted.
An encrypted call offers the highest level of security, providing integrity and privacy to the call. When
a call in progress is being encrypted, the call progress icon to the right of the call duration timer in the
phone LCD screen changes to the following icon:
Note
If the call is routed through non-IP call legs, for example, PSTN, the call may be nonsecure even though
it is encrypted within the IP network and has a lock icon associated with it.
Related Topic
Understanding Security Features for Cisco Unified IP Phones, page 1-9
Understanding Security Profiles, page 1-13
Security Restrictions, page 1-17