Establishing And Identifying Secure Conference Calls; Call Security Interactions And Restrictions; Overview - Cisco 7945G Administration Manual

For cisco unified communications manager 6.1(3)
Hide thumbs Also See for 7945G:
Table of Contents

Advertisement

Understanding Security Features for Cisco Unified IP Phones

Establishing and Identifying Secure Conference Calls

You can initiate a secure conference call and monitor the security level of participants. A secure
conference call is established using this process:
1.
2.
3.
4.
There are interactions, restrictions, and limitations that affect the security level of the conference call
Note
depending on the security mode of the participant's phones and the availability of secure conference
bridges. See

Call Security Interactions and Restrictions

Cisco Unified Communications Manager checks the phone security status when conferences are
established and changes the security indication for the conference or blocks the completion of the call
to maintain integrity and also security in the system.
call security levels when using Barge.
Table 1-4
Call Security Interactions When Using Barge
Initiator's Phone
Security Level
Feature Used
Non-secure
Barge
Secure (encrypted)
Barge
Secure
Barge
(authenticated)
Non-secure
Barge
Table 1-5
phone security level, the security levels of participants, and the availability of secure conference bridges.
Table 1-5
Security Restrictions with Conference Calls
Initiator's Phone
Security Level
Feature Used
Non-secure
Conference
Secure (encrypted
Conference
or authenticated)
Cisco Unified IP Phone 7965G and 7945G Administration Guide for Cisco Unified Communications Manager 6.1(3)
1-14
A user initiates the conference from a secure phone (encrypted or authenticated security mode).
Cisco Unified Communications Manager assigns a secure conference bridge to the call.
As participants are added, Cisco Unified Communications Manager verifies the security mode of
each phone (encrypted or authenticated) and maintains the secure level for the conference.
The phone displays the security level of the conference call. A secure conference displays
(
encrypted) or
(
authenticated) icon to the right of "Conference" on the phone screen. If
displays, the conference is not secure.
Table 1-4
and
Table 1-5
Call Security Level
Encrypted call
Authenticated call
Encrypted call
Authenticated call
provides information about changes to conference security levels depending on the initiator's
Security Level of Participants
Encrypted or authenticated
At least one member is non-secure
Chapter 1
for information about these interactions.
Table 1-4
provides information about changes to
Results of Action
Call barged and identified as non-secure call
Call barged and identified as authenticated call
Call barged and identified as authenticated call
Call barged and identified as non-secure call
Results of Action
Non-secure conference bridge
Non-secure conference
Secure conference bridge
Non-secure conference
An Overview of the Cisco Unified IP Phone
OL-17755-01
icon

Advertisement

Table of Contents
loading

This manual is also suitable for:

7965g

Table of Contents