Cisco 7975G Administration Guide - Page 29

Supporting 802.1X Authentication on Cisco Unified IP Phones, Initiator's Phone, Security Level

Page 29 highlights

Chapter 1 An Overview of the Cisco Unified IP Phone Understanding Security Features for Cisco Unified IP Phones Table 1-5 Security Restrictions with Conference Calls (continued) Initiator's Phone Security Level Secure (encrypted) Feature Used Conference Secure (authenticated) Conference Non-secure Conference Secure (encrypted or Conference authenticated) Secure (encrypted or authenticated) Secure (encrypted) Conference Join Non-secure cBarge Non-secure Secure (encrypted) MeetMe MeetMe Secure (encrypted) MeetMe Security Level of Participants Results of Action All participants are encrypted Secure conference bridge Secure encrypted level conference All participants are encrypted or Secure conference bridge authenticated Secure authenticated level conference Encrypted or authenticated Only secure conference bridge is available and used Non-secure conference Encrypted or authenticated Only non-secure conference bridge is available and used Non-secure conference Member puts call on Hold with No music-on-hold is played MOH Conference remains secure Encrypted or authenticated Secure conference bridge Conference remains secure (encrypted or authenticated) All participants are encrypted Secure conference bridge Conference changes to non-secure Minimum security level is encrypted Initiator receives message "Does not meet Security Level", call rejected. Minimum security level is authenticated Secure conference bridge Conference accepts encrypted and authenticated calls Minimum security level is non-secure Only secure conference bridge available and used Conference accepts all calls Supporting 802.1X Authentication on Cisco Unified IP Phones These sections provide information about 802.1X support on the Cisco Unified IP Phones: • Overview, page 1-16 • Required Network Components, page 1-16 • Best Practices-Requirements and Recommendations, page 1-16 OL-14640-01 Cisco Unified IP Phone 7975G Administration Guide for Cisco Unified Communications Manager 6.1 1-15

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205

1-15
Cisco Unified IP Phone 7975G Administration Guide for Cisco Unified Communications Manager 6.1
OL-14640-01
Chapter 1
An Overview of the Cisco Unified IP Phone
Understanding Security Features for Cisco Unified IP Phones
Supporting 802.1X Authentication on Cisco Unified IP Phones
These sections provide information about 802.1X support on the Cisco Unified IP Phones:
Overview, page 1-16
Required Network Components, page 1-16
Best Practices—Requirements and Recommendations, page 1-16
Secure (encrypted)
Conference
All participants are encrypted
Secure conference bridge
Secure encrypted level conference
Secure (authenticated)
Conference
All participants are encrypted or
authenticated
Secure conference bridge
Secure authenticated level conference
Non-secure
Conference
Encrypted or authenticated
Only secure conference bridge is available and
used
Non-secure conference
Secure (encrypted or
authenticated)
Conference
Encrypted or authenticated
Only non-secure conference bridge is
available and used
Non-secure conference
Secure (encrypted or
authenticated)
Conference
Member puts call on Hold with
MOH
No music-on-hold is played
Conference remains secure
Secure (encrypted)
Join
Encrypted or authenticated
Secure conference bridge
Conference remains secure (encrypted or
authenticated)
Non-secure
cBarge
All participants are encrypted
Secure conference bridge
Conference changes to non-secure
Non-secure
MeetMe
Minimum security level is
encrypted
Initiator receives message “Does not meet
Security Level”, call rejected.
Secure (encrypted)
MeetMe
Minimum security level is
authenticated
Secure conference bridge
Conference accepts encrypted and
authenticated calls
Secure (encrypted)
MeetMe
Minimum security level is
non-secure
Only secure conference bridge available and
used
Conference accepts all calls
Table 1-5
Security Restrictions with Conference Calls (continued)
Initiator’s Phone
Security Level
Feature Used
Security Level of Participants
Results of Action