Chapter 1 An Overview of the Cisco Unified IP Phone
Understanding Security Features for Cisco Unified IP Phones
1-20
Cisco Unified IP Phone 7906G and 7911G for Cisco Unified Communications Manager 6.0
OL11954-01
Note
If the call is routed through a non-IP call leg, for example, PSTN, the call will be
nonsecure even though it is encrypted within the IP network and has a lock icon
associated with it.
Related Topic
•
Understanding Security Features for Cisco Unified IP Phones, page 1-12
•
Supporting 802.1X Authentication on Cisco Unified IP Phones, page 1-23
•
Security Restrictions, page 1-25
Establishing and Identifying Secure Conference Calls
You can initiate a secure conference call and monitor the security level of
participants. A secure conference call is established using this process:
1.
A user initiates the conference from a secure phone (encrypted or
authenticated security mode).
2.
Cisco Unified Communications Manager assigns a secure conference bridge
to the call.
3.
As participants are added, Cisco Unified Communications Manager verifies
the security mode of each phone (encrypted or authenticated) and maintains
the secure level for the conference.
4.
The phone displays the security level of the conference call. A secure
conference displays
(
encrypted) or
(
authenticated) icon to the
right of “Conference” on the phone screen. If
icon displays, the
conference is not secure.
Note
There are interactions, restrictions, and limitations that affect the security level of
the conference call depending on the security mode of the participant’s phones
and the availability of secure conference bridges. See
Table 1-4
and
Table 1-5
for
information about these interactions.
Summary of Contents for 7906G - Unified IP Phone VoIP
Page 4: ......