Secure Phone Call Identification
A secure call is established when your Cisco DX650 and a phone on the other end are configured for secure
calling. They can be in the same Cisco IP network, or on a network outside the IP network. A secure conference
call is established by using this process:
1
A user initiates the call from a secured Cisco DX650 (Encrypted security mode).
2
Cisco DX650 indicates the Encrypted status on the Enterprise security menu. This status indicates that
Cisco DX650 is configured for secure calls, but does not mean that the other connected phone is also
secured.
3
A security tone plays if the call is connected to another secured device, indicating that both ends of the
conversation are encrypted and secured. Otherwise, nonsecure tone will be played.
Secure tone is played only when it is enabled on Cisco Unified Communications Manager. If secure tone
is disabled on Cisco Unified Communications Manager, no secure tone will be played even the call is
secure. For more information, see the
“
Configuring Secure and Nonsecure Indication Tones
”
chapter of
the
Cisco Unified Communications Manager Security Guide
.
Note
Call Security Interactions and Restrictions
Cisco Unified Communications Manager checks the phone security status when conferences are established
and changes the security indication for the conference or blocks the completion of the call to maintain integrity
and security in the system. The following table provides information about changes to call security levels with
the Barge feature.
Table 10: Call Security Interactions When Using Barge
Results of Action
Call Security Level
Feature Used
Initiator Phone
Security Level
The call is barged and identified as nonsecure
call
Encrypted call
Barge
Nonsecure
The call is barged and identified as secure call
Encrypted call
Barge
Secure
The following table provides information about changes to conference security levels depending on the initiator
phone security level, the security levels of participants, and the availability of secure conference bridges.
Table 11: Security Restrictions with Conference Calls
Results of Action
Security Level of
Participants
Feature
Used
Initiator Phone
Security Level
Nonsecure conference bridge
Nonsecure conference
Secure
Conference
Nonsecure
Cisco Desktop Collaboration Experience DX650 Administration Guide, Release 10.1(1)
23
Security Features