Cisco Systems 8.6 IP Phone User Manual


 
1-17
Cisco Unified IP Phone Administration Guide for Cisco Unified Communications Manager 8.6 (SCCP and SIP)
OL-23091-01
Chapter 1 An Overview of the Cisco Unified IP Phones
Understanding Security Features for Cisco Unified IP Phones
Establishing and Identifying Protected Calls
A protected call is established when your phone, and the phone on the other end, is configured for
protected calling. The other phone can be in the same Cisco IP network, or on a network outside the IP
network. Protected calls can only be made between two phones. Conference calls and other multiple-line
calls cannot be protected.
A protected call is established using this process:
1. A user initiates the call from a protected phone (protected security mode).
2. The phone displays the icon (encrypted) on the phone screen. This icon indicates that the phone
is configured for secure (encrypted) calls, but this does not mean that the other connected phone is
also protected.
3. A security tone plays if the call is connected to another protected phone, indicating that both ends
of the conversation are encrypted and protected. If the call is connected to a non-protected phone,
then the secure tone does not play.
Note Protected calling is supported for conversations between two phones. Some features, such as conference
calls, shared lines, Cisco Extension Mobility, and Join Across Lines, are not available when protected
calling is configured.
Call Security Interactions and Restrictions
Cisco Unified Communications Manager checks the phone security status when conferences are
established and changes the security indication for the conference or blocks the completion of the call
to maintain integrity and security in the system.
Table 1-5 provides information about changes to call
security levels when using Barge.
Table 1-6 provides information about changes to conference security levels depending on the initiator’s
phone security level, the security levels of participants, and the availability of secure conference bridges.
Ta b l e 1-5 Call Security Interactions When Using Barge
Initiator’s Phone
Security Level
Feature Used Call Security Level Results of Action
Non-secure Barge Encrypted call Call barged and identified as non-secure call
Secure (encrypted) Barge Authenticated call Call barged and identified as authenticated call
Secure
(authenticated)
Barge Encrypted call Call barged and identified as authenticated call
Non-secure Barge Authenticated call Call barged and identified as non-secure call