Cisco CP-7975G Administration Guide - Page 33

Supporting 802.1X Authentication on Cisco Unified IP Phones, Initiator's Phone, Security Level

Page 33 highlights

Chapter 1 An Overview of the Cisco Unified IP Phone Understanding Security Features for Cisco Unified IP Phones Table 1-6 Security Restrictions with Conference Calls Initiator's Phone Security Level Non-secure Feature Used Conference Secure (encrypted or authenticated) Secure (encrypted) Conference Conference Secure (authenticated) Conference Non-secure Conference Secure (encrypted or Conference authenticated) Secure (encrypted or Conference authenticated) Secure (encrypted) Join Non-secure cBarge Non-secure Secure (encrypted) MeetMe MeetMe Secure (encrypted) MeetMe Security Level of Participants Results of Action Encrypted or authenticated Non-secure conference bridge Non-secure conference At least one member is non-secure Secure conference bridge Non-secure conference All participants are encrypted Secure conference bridge Secure encrypted level conference All participants are encrypted or Secure conference bridge authenticated Secure authenticated level conference Encrypted or authenticated Only secure conference bridge is available and used Non-secure conference Encrypted or authenticated Only non-secure conference bridge is available and used Non-secure conference Encrypted or secure Conference remains secure. When one participant tries to hold the call with MOH, the MOH does not play. Encrypted or authenticated Secure conference bridge Conference remains secure (encrypted or authenticated) All participants are encrypted Secure conference bridge Conference changes to non-secure Minimum security level is encrypted Initiator receives message "Does not meet Security Level", call rejected. Minimum security level is authenticated Secure conference bridge Conference accepts encrypted and authenticated calls Minimum security level is non-secure Only secure conference bridge available and used Conference accepts all calls Supporting 802.1X Authentication on Cisco Unified IP Phones These sections provide information about 802.1X support on the Cisco Unified IP Phones: • Overview, page 1-20 • Required Network Components, page 1-20 • Best Practices-Requirements and Recommendations, page 1-20 OL-23092-01 Cisco Unified IP Phone Administration Guide for Cisco Unified Communications Manager 8.5 1-19

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266

1-19
Cisco Unified IP Phone Administration Guide for Cisco Unified Communications Manager 8.5
OL-23092-01
Chapter 1
An Overview of the Cisco Unified IP Phone
Understanding Security Features for Cisco Unified IP Phones
Supporting 802.1X Authentication on Cisco Unified IP Phones
These sections provide information about 802.1X support on the Cisco Unified IP Phones:
Overview, page 1-20
Required Network Components, page 1-20
Best Practices—Requirements and Recommendations, page 1-20
Table 1-6
Security Restrictions with Conference Calls
Initiator’s Phone
Security Level
Feature Used
Security Level of Participants
Results of Action
Non-secure
Conference
Encrypted or authenticated
Non-secure conference bridge
Non-secure conference
Secure (encrypted or
authenticated)
Conference
At least one member is
non-secure
Secure conference bridge
Non-secure conference
Secure (encrypted)
Conference
All participants are encrypted
Secure conference bridge
Secure encrypted level conference
Secure (authenticated)
Conference
All participants are encrypted or
authenticated
Secure conference bridge
Secure authenticated level conference
Non-secure
Conference
Encrypted or authenticated
Only secure conference bridge is available
and used
Non-secure conference
Secure (encrypted or
authenticated)
Conference
Encrypted or authenticated
Only non-secure conference bridge is
available and used
Non-secure conference
Secure (encrypted or
authenticated)
Conference
Encrypted or secure
Conference remains secure. When one
participant tries to hold the call with MOH,
the MOH does not play.
Secure (encrypted)
Join
Encrypted or authenticated
Secure conference bridge
Conference remains secure (encrypted or
authenticated)
Non-secure
cBarge
All participants are encrypted
Secure conference bridge
Conference changes to non-secure
Non-secure
MeetMe
Minimum security level is
encrypted
Initiator receives message “Does not meet
Security Level”, call rejected.
Secure (encrypted)
MeetMe
Minimum security level is
authenticated
Secure conference bridge
Conference accepts encrypted and
authenticated calls
Secure (encrypted)
MeetMe
Minimum security level is
non-secure
Only secure conference bridge available and
used
Conference accepts all calls