Cisco Systems 8961 IP Phone User Manual


 
1-20
Cisco Unified IP Phone 8961, 9951, and 9971 Administration Guide for Cisco Unified Communications Manager 8.5 (SIP)
OL-20861-01
Chapter 1 An Overview of the Cisco Unified IP Phone
Understanding Security Features for Cisco Unified IP Phones
4. The phone displays the security level of the conference call. A secure conference displays icon
to the right of “Conference” on the phone screen.
Note There are interactions, restrictions, and limitations that affect the security level of the conference call
depending on the security mode of the participant’s phones and the availability of secure conference
bridges. See Table 1-7 and Table 1-8 for information about these interactions.
Establishing and Identifying Secure Calls
A secure call is established when your phone, and the phone on the other end, is configured for secure
calling. The other phone can be in the same Cisco IP network, or on a network outside the IP network.
Secured calls can only be made between two phones. Conference calls and other multiple-line calls are
not supported.
A secured call is established using this process:
1. A user initiates the call from a secured phone (secured security mode).
2. The phone displays the icon (secure) on the phone screen. This icon indicates that the phone is
configured for secure calls, but this does not mean that the other connected phone is also secured.
3. A security tone plays if the call is connected to another secured phone, indicating that both ends of
the conversation are encrypted and secured. If the call is connected to a non-secured phone, then the
secure tone is not played.
Note Secured calling is supported for conversations between two phones. Some features, such as conference
calling, shared lines, and Cisco Extension Mobility are not available when secured calling is configured.
Call Security Interactions and Restrictions
Cisco Unified Communications Manager checks the phone security status when conferences are
established and changes the security indication for the conference or blocks the completion of the call
to maintain integrity and also security in the system.
Table 1-7 provides information about changes to
call security levels when using Barge.
Table 1-8 provides information about changes to conference security levels depending on the initiator’s
phone security level, the security levels of participants, and the availability of secure conference bridges.
Table 1-7 Call Security Interactions When Using Barge
Initiator’s Phone
Security Level Feature Used Call Security Level Results of Action
Non-secure Barge Encrypted call Call barged and identified as non-secure call
Secure Barge Encrypted call Call barged and identified as secure call