Cisco Systems 7970G IP Phone User Manual


 
1-15
Cisco Unified IP Phone 7970G/7971G-GE Administration Guide for Cisco Unified Communications Manager 7.0
OL-15299-01
Chapter 1 An Overview of the Cisco Unified IP Phone
Understanding Security Features for Cisco Unified IP Phones
Call Security Interactions and Restrictions
Cisco Unified Communications Manager checks the phone security status when conferences are
established and changes the security indication for the conference or blocks the completion of the call
to maintain integrity and also security in the system. Table 1-4 provides information about changes to
call security levels when using Barge.
Table 1-5 provides information about changes to conference security levels depending on the initiator’s
phone security level, the security levels of participants, and the availability of secure conference bridges.
Table 1-4 Call Security Interactions When Using Barge
Initiator’s Phone
Security Level Feature Used Call Security Level Results of Action
Non-secure Barge Encrypted call Call barged and identified as non-secure call
Secure (encrypted) Barge Authenticated call Call barged and identified as authenticated call
Secure (authenticated) Barge Encrypted call Call barged and identified as authenticated call
Non-secure Barge Authenticated call Call barged and identified as non-secure call
Table 1-5 Security Restrictions with Conference Calls
Initiator’s Phone
Security Level Feature Used Security Level of Participants Results of Action
Non-secure Conference Encrypted or authenticated Non-secure conference bridge
Non-secure conference
Secure (encrypted or
authenticated)
Conference At least one member is
non-secure
Secure conference bridge
Non-secure conference
Secure (encrypted) Conference All participants are encrypted Secure conference bridge
Secure encrypted level conference
Secure (authenticated) Conference All participants are encrypted or
authenticated
Secure conference bridge
Secure authenticated level conference
Non-secure Conference Encrypted or authenticated Only secure conference bridge is available
and used
Non-secure conference
Secure (encrypted or
authenticated)
Conference Encrypted or authenticated Only non-secure conference bridge is
available and used
Non-secure conference
Secure (encrypted or
authenticated)
Conference Encrypted or secure Conference remains secure. When one
participant tries to hold the call with MOH,
the MOH does not play.
Secure (encrypted) Join Encrypted or authenticated Secure conference bridge
Conference remains secure (encrypted or
authenticated)