Cisco 7971G-GE Administration Guide - Page 29

Call Security Interactions and Restrictions, Initiator's Phone, Security Level, Feature Used

Page 29 highlights

Chapter 1 An Overview of the Cisco Unified IP Phone Understanding Security Features for Cisco Unified IP Phones Call Security Interactions and Restrictions Cisco Unified Communications Manager checks the phone security status when conferences are established and changes the security indication for the conference or blocks the completion of the call to maintain integrity and also security in the system. Table 1-4 provides information about changes to call security levels when using Barge. Table 1-4 Call Security Interactions When Using Barge Initiator's Phone Security Level Non-secure Secure (encrypted) Secure (authenticated) Non-secure Feature Used Barge Barge Barge Barge Call Security Level Encrypted call Authenticated call Encrypted call Authenticated call Results of Action Call barged and identified as non-secure call Call barged and identified as authenticated call Call barged and identified as authenticated call Call barged and identified as non-secure call Table 1-5 provides information about changes to conference security levels depending on the initiator's phone security level, the security levels of participants, and the availability of secure conference bridges. Table 1-5 Security Restrictions with Conference Calls Initiator's Phone Security Level Non-secure Feature Used Conference Secure (encrypted or authenticated) Secure (encrypted) Conference Conference Secure (authenticated) Conference Non-secure Conference Secure (encrypted or Conference authenticated) Secure (encrypted or Conference authenticated) Secure (encrypted) Join Security Level of Participants Results of Action Encrypted or authenticated Non-secure conference bridge Non-secure conference At least one member is non-secure Secure conference bridge Non-secure conference All participants are encrypted Secure conference bridge Secure encrypted level conference All participants are encrypted or Secure conference bridge authenticated Secure authenticated level conference Encrypted or authenticated Only secure conference bridge is available and used Non-secure conference Encrypted or authenticated Only non-secure conference bridge is available and used Non-secure conference Encrypted or secure Conference remains secure. When one participant tries to hold the call with MOH, the MOH does not play. Encrypted or authenticated Secure conference bridge Conference remains secure (encrypted or authenticated) OL-15299-01 Cisco Unified IP Phone 7970G/7971G-GE Administration Guide for Cisco Unified Communications Manager 7.0 1-15

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219

1-15
Cisco Unified IP Phone 7970G/7971G-GE Administration Guide for Cisco Unified Communications Manager 7.0
OL-15299-01
Chapter 1
An Overview of the Cisco Unified IP Phone
Understanding Security Features for Cisco Unified IP Phones
Call Security Interactions and Restrictions
Cisco Unified Communications Manager checks the phone security status when conferences are
established and changes the security indication for the conference or blocks the completion of the call
to maintain integrity and also security in the system.
Table 1-4
provides information about changes to
call security levels when using Barge.
Table 1-5
provides information about changes to conference security levels depending on the initiator’s
phone security level, the security levels of participants, and the availability of secure conference bridges.
Table 1-4
Call Security Interactions When Using Barge
Initiator’s Phone
Security Level
Feature Used
Call Security Level
Results of Action
Non-secure
Barge
Encrypted call
Call barged and identified as non-secure call
Secure (encrypted)
Barge
Authenticated call
Call barged and identified as authenticated call
Secure (authenticated)
Barge
Encrypted call
Call barged and identified as authenticated call
Non-secure
Barge
Authenticated call
Call barged and identified as non-secure call
Table 1-5
Security Restrictions with Conference Calls
Initiator’s Phone
Security Level
Feature Used
Security Level of Participants
Results of Action
Non-secure
Conference
Encrypted or authenticated
Non-secure conference bridge
Non-secure conference
Secure (encrypted or
authenticated)
Conference
At least one member is
non-secure
Secure conference bridge
Non-secure conference
Secure (encrypted)
Conference
All participants are encrypted
Secure conference bridge
Secure encrypted level conference
Secure (authenticated)
Conference
All participants are encrypted or
authenticated
Secure conference bridge
Secure authenticated level conference
Non-secure
Conference
Encrypted or authenticated
Only secure conference bridge is available
and used
Non-secure conference
Secure (encrypted or
authenticated)
Conference
Encrypted or authenticated
Only non-secure conference bridge is
available and used
Non-secure conference
Secure (encrypted or
authenticated)
Conference
Encrypted or secure
Conference remains secure. When one
participant tries to hold the call with MOH,
the MOH does not play.
Secure (encrypted)
Join
Encrypted or authenticated
Secure conference bridge
Conference remains secure (encrypted or
authenticated)