Cisco CP-7962G Administration Guide - Page 32

Supporting 802.1X Authentication on Cisco Unified IP Phones, Overview

Page 32 highlights

Understanding Security Features for Cisco Unified IP Phones Chapter 1 An Overview of the Cisco Unified IP Phone Table 1-6 Security Restrictions with Conference Calls (continued) Initiator's Phone Security Level Feature Used Secure (encrypted Conference or authenticated) Secure (encrypted) Join Non-secure cBarge Non-secure MeetMe Secure (encrypted) MeetMe Secure (encrypted) MeetMe Security Level of Participants For Cisco Unified IP Phones 7962G and 7942G: Encrypted or secure For Cisco Unified IP Phones 7961G and 7941G: Member puts call on Hold with MOH Encrypted or authenticated All participants are encrypted Minimum security level is encrypted Minimum security level is authenticated Minimum security level is non-secure Results of Action For Cisco Unified IP Phones 7962G and 7942G: Conference remains secure. When one participant tries to hold the call with MOH, the MOH does not play. For Cisco Unified IP Phones 7961G and 7941G: No music on hold is played Conference remains secure. Secure conference bridge Conference remains secure (encrypted or authenticated) Secure conference bridge Conference changes to non-secure Initiator receives message "Does not meet Security Level", call rejected. Secure conference bridge Conference accepts encrypted and authenticated calls Only secure conference bridge available and used Conference accepts all calls Supporting 802.1X Authentication on Cisco Unified IP Phones These sections provide information about 802.1X support on the Cisco Unified IP Phones: • Overview, page 1-18 • Required Network Components, page 1-19 • Best Practices-Requirements and Recommendations, page 1-19 Overview Cisco Unified IP phones and Cisco Catalyst switches have traditionally used Cisco Discovery Protocol (CDP) to identify each other and determine parameters such as VLAN allocation and inline power requirements. However, CDP is not used to identify any locally attached PCs; therefore, Cisco Unified IP Phones provide an EAPOL pass-through mechanism, whereby a PC locally attached to the IP phone, may pass through EAPOL messages to the 802.1X authenticator in the LAN switch. This prevents the IP phone from having to act as the authenticator, yet allows the LAN switch to authenticate a data end point prior to accessing the network. In conjunction with the EAPOL pass-through mechanism, Cisco Unified IP Phones provide a proxy EAPOL-Logoff mechanism. In the event that the locally attached PC is disconnected from the IP phone, the LAN switch would not see the physical link fail, because the link between the LAN switch and the 1-18 Cisco Unified IP Phone Administration Guide for Cisco Unified Communications Manager 8.0 (SCCP and SIP) OL-21011-01

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241

1-18
Cisco Unified IP Phone Administration Guide for Cisco Unified Communications Manager 8.0 (SCCP and SIP)
OL-21011-01
Chapter 1
An Overview of the Cisco Unified IP Phone
Understanding Security Features for Cisco Unified IP Phones
Supporting 802.1X Authentication on Cisco Unified IP Phones
These sections provide information about 802.1X support on the Cisco Unified IP Phones:
Overview, page 1-18
Required Network Components, page 1-19
Best Practices—Requirements and Recommendations, page 1-19
Overview
Cisco Unified IP phones and Cisco Catalyst switches have traditionally used Cisco Discovery Protocol
(CDP) to identify each other and determine parameters such as VLAN allocation and inline power
requirements. However, CDP is not used to identify any locally attached PCs; therefore, Cisco Unified
IP Phones provide an EAPOL pass-through mechanism, whereby a PC locally attached to the IP phone,
may pass through EAPOL messages to the 802.1X authenticator in the LAN switch. This prevents the
IP phone from having to act as the authenticator, yet allows the LAN switch to authenticate a data end
point prior to accessing the network.
In conjunction with the EAPOL pass-through mechanism, Cisco Unified IP Phones provide a proxy
EAPOL-Logoff mechanism. In the event that the locally attached PC is disconnected from the IP phone,
the LAN switch would not see the physical link fail, because the link between the LAN switch and the
Secure (encrypted
or authenticated)
Conference
For Cisco Unified IP Phones
7962G and 7942G:
Encrypted or secure
For Cisco Unified IP Phones
7961G and 7941G:
Member puts call on Hold with
MOH
For Cisco Unified IP Phones 7962G and 7942G:
Conference remains secure. When one participant
tries to hold the call with MOH, the MOH does not
play.
For Cisco Unified IP Phones 7961G and 7941G:
No music on hold is played
Conference remains secure.
Secure (encrypted)
Join
Encrypted or authenticated
Secure conference bridge
Conference remains secure (encrypted or
authenticated)
Non-secure
cBarge
All participants are encrypted
Secure conference bridge
Conference changes to non-secure
Non-secure
MeetMe
Minimum security level is
encrypted
Initiator receives message “Does not meet Security
Level”, call rejected.
Secure (encrypted)
MeetMe
Minimum security level is
authenticated
Secure conference bridge
Conference accepts encrypted and authenticated
calls
Secure (encrypted)
MeetMe
Minimum security level is
non-secure
Only secure conference bridge available and used
Conference accepts all calls
Table 1-6
Security Restrictions with Conference Calls (continued)
Initiator’s Phone
Security Level
Feature Used
Security Level of Participants
Results of Action