Cisco 7965G Administration Guide - Page 29

Supporting 802.1X Authentication on Cisco Unified IP Phones, Overview - power requirements

Page 29 highlights

Chapter 1 An Overview of the Cisco Unified IP Phone Understanding Security Features for Cisco Unified IP Phones Table 1-5 Security Restrictions with Conference Calls (continued) Initiator's Phone Security Level Secure (encrypted) Feature Used Conference Secure (authenticated) Non-secure Conference Conference Secure (encrypted Conference or authenticated) Secure (encrypted Conference or authenticated) Secure (encrypted) Join Non-secure cBarge Non-secure MeetMe Secure (encrypted) MeetMe Secure (encrypted) MeetMe Security Level of Participants Results of Action All participants are encrypted Secure conference bridge Secure encrypted level conference All participants are encrypted or authenticated Secure conference bridge Secure authenticated level conference Encrypted or authenticated Only secure conference bridge is available and used Non-secure conference Encrypted or authenticated Only non-secure conference bridge is available and used Non-secure conference Secure or encrypted. Conference remains secure When one participant tries to Hold the call with MOH, the MOH does not play. Encrypted or authenticated Secure conference bridge Conference remains secure (encrypted or authenticated) All participants are encrypted Secure conference bridge Conference changes to non-secure Minimum security level is encrypted Initiator receives message "Does not meet Security Level", call rejected. Minimum security level is authenticated Secure conference bridge Conference accepts encrypted and authenticated calls Minimum security level is non-secure Only secure conference bridge available and used Conference accepts all calls Supporting 802.1X Authentication on Cisco Unified IP Phones These sections provide information about 802.1X support on the Cisco Unified IP Phones: • Overview, page 1-15 • Required Network Components, page 1-16 • Best Practices-Requirements and Recommendations, page 1-16 Overview Cisco Unified IP phones and Cisco Catalyst switches have traditionally used Cisco Discovery Protocol (CDP) to identify each other and to determine parameters such as VLAN allocation and inline power requirements. However, CDP is not used to identify any locally attached PCs. Therefore, Cisco Unified OL-14641-01 Cisco Unified IP Phone 7965G and 7945G Administration Guide for Cisco Unified Communications Manager 6.1 1-15

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205

1-15
Cisco Unified IP Phone 7965G and 7945G Administration Guide for Cisco Unified Communications Manager 6.1
OL-14641-01
Chapter 1
An Overview of the Cisco Unified IP Phone
Understanding Security Features for Cisco Unified IP Phones
Supporting 802.1X Authentication on Cisco Unified IP Phones
These sections provide information about 802.1X support on the Cisco Unified IP Phones:
Overview, page 1-15
Required Network Components, page 1-16
Best Practices—Requirements and Recommendations, page 1-16
Overview
Cisco Unified IP phones and Cisco Catalyst switches have traditionally used Cisco Discovery Protocol
(CDP) to identify each other and to determine parameters such as VLAN allocation and inline power
requirements. However, CDP is not used to identify any locally attached PCs. Therefore, Cisco Unified
Secure (encrypted)
Conference
All participants are encrypted
Secure conference bridge
Secure encrypted level conference
Secure
(authenticated)
Conference
All participants are encrypted or
authenticated
Secure conference bridge
Secure authenticated level conference
Non-secure
Conference
Encrypted or authenticated
Only secure conference bridge is available
and used
Non-secure conference
Secure (encrypted
or authenticated)
Conference
Encrypted or authenticated
Only non-secure conference bridge is
available and used
Non-secure conference
Secure (encrypted
or authenticated)
Conference
Secure or encrypted.
Conference remains secure
When one participant tries to Hold the call
with MOH, the MOH does not play.
Secure (encrypted)
Join
Encrypted or authenticated
Secure conference bridge
Conference remains secure (encrypted or
authenticated)
Non-secure
cBarge
All participants are encrypted
Secure conference bridge
Conference changes to non-secure
Non-secure
MeetMe
Minimum security level is encrypted
Initiator receives message “Does not meet
Security Level”, call rejected.
Secure (encrypted)
MeetMe
Minimum security level is
authenticated
Secure conference bridge
Conference accepts encrypted and
authenticated calls
Secure (encrypted)
MeetMe
Minimum security level is non-secure
Only secure conference bridge available and
used
Conference accepts all calls
Table 1-5
Security Restrictions with Conference Calls (continued)
Initiator’s Phone
Security Level
Feature Used
Security Level of Participants
Results of Action