Cisco CP-7942G Administration Guide - Page 27

Identifying Authenticated, Encrypted, and Protected Phone Calls

Page 27 highlights

Chapter 1 An Overview of the Cisco Unified IP Phone Understanding Security Features for Cisco Unified IP Phones • Device Configuration Menu, page 4-11 Identifying Authenticated, Encrypted, and Protected Phone Calls When security is implemented for a phone, you can identify authenticated or encrypted phone calls by icons on the screen on the phone. You can also determine if the connected phone is secure and protected if a security tone plays at the beginning of the call. In an authenticated call, all devices participating in the establishment of the call are authenticated by Cisco Unified Communications Manager. When a call in progress is authenticated, the call progress icon to the right of the call duration timer in the phone LCD screen changes to this icon . In an encrypted call, all devices participating in the establishment of the call are authenticated by Cisco Unified Communications Manager. In addition, call signaling and media streams are encrypted. An encrypted call offers a high level of security, providing integrity and privacy to the call. When a call in progress is being encrypted, the call progress icon to the right of the call duration timer in the phone LCD screen changes to the following icon: . Note If the call is routed through non-IP call legs, for example, PSTN, the call may be nonsecure even though it is encrypted within the IP network and has a lock icon associated with it. In a protected call, a security tone plays at the beginning of a call to indicate that the other connected phone is also receiving and transmitting encrypted audio. If your call is connected to a non-protected phone, the security tone does not play. Note Protected calling is supported for connections between two phones only. Some features, such as conference calling, shared lines, Extension Mobility, and Join Across Lines are not available when protected calling is configured. Protected calls are not authenticated. Related Topic • Understanding Security Profiles, page 1-12 • Understanding Security Features for Cisco Unified IP Phones, page 1-9 • Security Restrictions, page 1-17 Establishing and Identifying Secure Conference Calls You can initiate a secure conference call and monitor the security level of participants. A secure conference call is established using this process: 1. A user initiates the conference from a secure phone (encrypted or authenticated security mode). 2. Cisco Unified Communications Manager assigns a secure conference bridge to the call. 3. As participants are added, Cisco Unified Communications Manager verifies the security mode of each phone (encrypted or authenticated) and maintains the secure level for the conference. 4. The phone displays the security level of the conference call. A secure conference displays (encrypted) or (authenticated) icon to the right of "Conference" on the phone screen. If icon displays, the conference is not secure. OL-15483-01 Cisco Unified IP Phone 7962G and 7942G Administration Guide for Cisco Unified Communications Manager 7.0 1-13

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210

1-13
Cisco Unified IP Phone 7962G and 7942G Administration Guide for Cisco Unified Communications Manager 7.0
OL-15483-01
Chapter 1
An Overview of the Cisco Unified IP Phone
Understanding Security Features for Cisco Unified IP Phones
Device Configuration Menu, page 4-11
Identifying Authenticated, Encrypted, and Protected Phone Calls
When security is implemented for a phone, you can identify authenticated or encrypted phone calls by
icons on the screen on the phone. You can also determine if the connected phone is secure and protected
if a security tone plays at the beginning of the call.
In an authenticated call, all devices participating in the establishment of the call are authenticated by
Cisco Unified Communications Manager. When a call in progress is authenticated, the call progress icon
to the right of the call duration timer in the phone LCD screen changes to this icon
.
In an encrypted call, all devices participating in the establishment of the call are authenticated by
Cisco Unified Communications Manager. In addition, call signaling and media streams are encrypted.
An encrypted call offers a high level of security, providing integrity and privacy to the call. When a call
in progress is being encrypted, the call progress icon to the right of the call duration timer in the phone
LCD screen changes to the following icon:
.
Note
If the call is routed through non-IP call legs, for example, PSTN, the call may be nonsecure even though
it is encrypted within the IP network and has a lock icon associated with it.
In a protected call, a security tone plays at the beginning of a call to indicate that the other connected
phone is also receiving and transmitting encrypted audio. If your call is connected to a non-protected
phone, the security tone does not play.
Note
Protected calling is supported for connections between two phones only. Some features, such as
conference calling, shared lines, Extension Mobility, and Join Across Lines are not available when
protected calling is configured. Protected calls are not authenticated.
Related Topic
Understanding Security Profiles, page 1-12
Understanding Security Features for Cisco Unified IP Phones, page 1-9
Security Restrictions, page 1-17
Establishing and Identifying Secure Conference Calls
You can initiate a secure conference call and monitor the security level of participants. A secure
conference call is established using this process:
1.
A user initiates the conference from a secure phone (encrypted or authenticated security mode).
2.
Cisco Unified Communications Manager assigns a secure conference bridge to the call.
3.
As participants are added, Cisco Unified Communications Manager verifies the security mode of
each phone (encrypted or authenticated) and maintains the secure level for the conference.
4.
The phone displays the security level of the conference call. A secure conference displays
(
encrypted) or
(
authenticated) icon to the right of “Conference” on the phone screen. If
icon
displays, the conference is not secure.