Cisco 7931G Administration Guide - Page 40

Initiator's Phone, Security Level, Feature Used, Participants, Results of Action

Page 40 highlights

Understanding Security Features for Cisco Unified IP Phones Chapter 1 An Overview of the Cisco Unified IP Phone Table 1-5 Security Restrictions with Conference Calls (continued) Initiator's Phone Security Level Secure (authenticated) Feature Used Conference Non-secure Conference Secure (encrypted Conference or authenticated) Secure (encrypted Conference or authenticated) Secure (encrypted) Join Non-secure cBarge Non-secure MeetMe Secure (encrypted) MeetMe Secure (encrypted) MeetMe Security Level of Participants Results of Action All participants are Secure conference bridge encrypted or authenticated Secure authenticated level conference Encrypted or authenticated Only secure conference bridge is available and used Non-secure conference Encrypted or authenticated Only non-secure conference bridge is available and used Non-secure conference Member puts call No music-on-hold is played on Hold with MOH Conference remains secure Encrypted or authenticated Secure conference bridge Conference remains secure (encrypted or authenticated) All participants are Secure conference bridge encrypted Conference changes to non-secure Minimum security Initiator receives message "Device Not level is encrypted Authorized", call rejected. Minimum security Secure conference bridge level is authenticated Conference accepts encrypted and authenticated calls Minimum security Only secure conference bridge available level is non-secure and used Conference accepts all calls 1-22 Cisco Unified IP Phone 7931G Administration Guide for Cisco Unified Communications Manager 6.0 OL-12457-01

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260

Chapter 1
An Overview of the Cisco Unified IP Phone
Understanding Security Features for Cisco Unified IP Phones
1-22
Cisco Unified IP Phone 7931G Administration Guide for Cisco Unified Communications Manager 6.0
OL-12457-01
Secure
(authenticated)
Conference
All participants are
encrypted or
authenticated
Secure conference bridge
Secure authenticated level conference
Non-secure
Conference
Encrypted or
authenticated
Only secure conference bridge is
available and used
Non-secure conference
Secure (encrypted
or authenticated)
Conference
Encrypted or
authenticated
Only non-secure conference bridge is
available and used
Non-secure conference
Secure (encrypted
or authenticated)
Conference
Member puts call
on Hold with
MOH
No music-on-hold is played
Conference remains secure
Secure (encrypted)
Join
Encrypted or
authenticated
Secure conference bridge
Conference remains secure (encrypted
or authenticated)
Non-secure
cBarge
All participants are
encrypted
Secure conference bridge
Conference changes to non-secure
Non-secure
MeetMe
Minimum security
level is encrypted
Initiator receives message “Device Not
Authorized”, call rejected.
Secure (encrypted)
MeetMe
Minimum security
level is
authenticated
Secure conference bridge
Conference accepts encrypted and
authenticated calls
Secure (encrypted)
MeetMe
Minimum security
level is non-secure
Only secure conference bridge available
and used
Conference accepts all calls
Table 1-5
Security Restrictions with Conference Calls (continued)
Initiator’s Phone
Security Level
Feature Used
Security Level of
Participants
Results of Action