Cisco Systems 8961 IP Phone User Manual


 
1-19
Cisco Unified IP Phone 8961, 9951, and 9971 Administration Guide for Cisco Unified Communications Manager 8.5 (SIP)
OL-20861-01
Chapter 1 An Overview of the Cisco Unified IP Phone
Understanding Security Features for Cisco Unified IP Phones
Understanding Security Profiles
All Cisco Unified IP Phones that support Cisco Unified Communications Manager use a security profile,
which defines whether the phone is nonsecure, authenticated, or encrypted. For information about
configuring the security profile and applying the profile to the phone, refer to Cisco Unified
Communications Manager Security Guide.
To view the security mode that is set for the phone, look at the Security Mode setting in the Security
Configuration menu. For more information, see the “Security Setup Menu” section on page 7-13.
Related Topics
Identifying Secure (Encrypted) Phone Calls, page 1-19
Security Restrictions, page 1-23
Identifying Secure (Encrypted) Phone Calls
When security is implemented for a phone, you can identify secure phone calls by icons on the phone
screen. You can also determine if the connected phone is secure and protected if a security tone plays at
the beginning of the call.
In a secure call, all call signaling and media streams are encrypted. A secure call offers a high level of
security, providing integrity and privacy to the call. When a call in progress is being encrypted, the call
progress icon to the right of the call duration timer in the phone screen changes to the following icon:
.
Note If the call is routed through non-IP call legs, for example, PSTN, the call may be nonsecure even though
it is encrypted within the IP network and has a lock icon associated with it.
In a secure call, a security tone plays at the beginning of a call to indicate that the other connected phone
is also receiving and transmitting secure audio and video (if video is involved). If your call is connected
to a non-secure phone, the security tone does not play.
Note Secure calling is supported for connections between two phones only. Some features, such as conference
calling, shared lines, and Extension Mobility are not available when secure calling is configured.
Related Topic
Understanding Security Features for Cisco Unified IP Phones, page 1-15
Security Restrictions, page 1-23
Establishing and Identifying Secure Conference Calls
You can initiate a secure conference call and monitor the security level of participants. A secure
conference call is established using this process:
1. A user initiates the conference from a secure phone.
2. Cisco Unified Communications Manager assigns a secure conference bridge to the call.
3. As participants are added, Cisco Unified Communications Manager verifies the security mode of
each phone and maintains the secure level for the conference.