Authenticated, Encrypted, and Protected Phone Calls
When security is implemented for a phone, you can identify authenticated or encrypted phone calls by icons
on the phone screen. You can also determine whether the connected phone is secure and protected if a security
tone plays at the beginning of the call.
In an authenticated call, all devices that participate in the establishment of the call are trusted devices that
Cisco Unified Communications Manager authenticates. When a call in progress is authenticated, the call
progress icon to the right of the call duration timer in the phone screen changes to this icon:
.
In an encrypted call, all devices that participate in the establishment of the call are trusted devices that
Cisco Unified Communications Manager authenticates. In addition, call signaling and media streams are
encrypted. An encrypted call offers a high level of security and provides integrity and privacy to the call.
When a call in progress is encrypted, the call progress icon to the right of the call duration timer in the phone
screen changes to this icon:
.
If the call routes through non-IP call legs, for example, PSTN (public switched telephone network), the
call may be nonsecure even though it is encrypted within the IP network and has a lock icon associated
with it.
Note
In a protected call, a security tone plays at the beginning of a call to indicate that the other connected phone
is also receiving and transmitting encrypted audio and video (if video is involved). If your call connects to a
non-protected phone, the security tone does not play.
Protected calling is supported for connections between two phones only. Some features, such as conference
calling, shared lines, Extension Mobility, and Join Across Lines are not available when protected calling
is configured. Protected calls are not authenticated.
Note
Related Topics
Cisco Unified IP Phone Security Features, on page 13
Security Profiles, on page 17
Security Restrictions, on page 23
Secure Conference Call Identification
You can initiate a secure conference call and monitor the security level of participants. Establishment of a
secure conference call follows this process:
1
A user initiates the conference from a secure phone (encrypted or authenticated security mode).
2
Cisco Unified Communications Manager assigns a secure conference bridge to the call.
3
As participants are added, Cisco Unified Communications Manager verifies the security mode of each
phone (encrypted or authenticated) and maintains the secure level for the conference.
Cisco Unified IP Phone 7975G, 7971G-GE, 7970G, 7965G, and 7945G Administration Guide for Cisco Unified
Communications Manager 9.0 (SCCP and SIP)
18
Cisco Unified IP Phone
Authenticated, Encrypted, and Protected Phone Calls