Cisco 7970G Administration Guide - Page 38
Establishing and Identifying Secure Conference Calls, Related Topic
UPC - 746320926292
View all Cisco 7970G manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 38 highlights
Understanding Security Features for Cisco Unified IP Phones Chapter 1 An Overview of the Cisco Unified IP Phone Note If the call is routed through non-IP call legs, for example, PSTN, the call may be nonsecure even though it is encrypted within the IP network and has a lock icon associated with it. Related Topic • Understanding Security Features for Cisco Unified IP Phones, page 1-12 • Understanding Security Profiles, page 1-19 • Security Restrictions, page 1-25 Establishing and Identifying Secure Conference Calls You can initiate a secure conference call and monitor the security level of participants. A secure conference call is established using this process: 1. A user initiates the conference from a secure phone (encrypted or authenticated security mode). 2. Cisco Unified Communications Manager assigns a secure conference bridge to the call. 3. As participants are added, Cisco Unified Communications Manager verifies the security mode of each phone (encrypted or authenticated) and maintains the secure level for the conference. 4. The phone displays the security level of the conference call. A secure conference displays (encrypted) or (authenticated) icon to the right of "Conference" on the phone screen. If icon displays, the conference is not secure. Note There are interactions, restrictions, and limitations that affect the security level of the conference call depending on the security mode of the participant's phones and the availability of secure conference bridges. See Table 1-4 and Table 1-5 for information about these interactions. 1-20 Cisco Unified IP Phone 7970G/7971G-GE Administration Guide for Cisco Unified Communications Manager 6.1 OL-14626-01