Cisco 7925G-EX Manuale di amministrazione - Pagina 14

Sfoglia online o scarica il pdf Manuale di amministrazione per Telefono IP Cisco 7925G-EX. Cisco 7925G-EX 19. Wavelink avalanche management console
Anche per Cisco 7925G-EX: Scheda tecnica (8 pagine), Note di rilascio (16 pagine), Manuale degli accessori (20 pagine), Manuale d'uso (10 pagine), Manuale d'uso (16 pagine), Manuale di amministrazione (23 pagine), Manuale di installazione (12 pagine), Manuale di installazione (21 pagine), Manuale di amministrazione (14 pagine)

Cisco 7925G-EX Manuale di amministrazione
Understanding Security Features for Cisco Unified IP Phones
To view the security mode that is set for the phone, from the phone screen, choose SETTINGS > Device
Information > Security > Security Mode. For more information, see
section on page
Related Topics
Identifying Authenticated, Encrypted, and Protected Phone Calls
When security is implemented for a phone, you can identify authenticated or encrypted phone calls by
icons on the screen on the phone. You can also determine if the connected phone is secure and protected
if a security tone plays at the beginning of the call.
In an authenticated call, all devices participating in the establishment of the call authenticate using
Cisco Unified Communications Manager. When an in-progress call is authenticated, the call progress
icon to the right of the call duration timer in the phone screen changes to this icon:
In an encrypted call, all devices participating in the establishment of the call are authenticated by
Cisco Unified Communications Manager. In addition, call signaling and media streams are encrypted.
An encrypted call offers a high level of security, providing integrity and privacy to the call. When an
in-progress call is being encrypted, the call progress icon to the right of the call duration timer in the
phone screen changes to this icon:
Note
If the call is routed through non-IP call legs (for example, the PSTN) the call may be nonsecure even
though it is encrypted within the IP network and has a lock icon associated with it.
In a protected call, a security tone plays at the beginning of a call to indicate that the other connected
phone is also receiving and transmitting encrypted audio. If your call is connected to a non-protected
phone, the security tone does not play.
Protected calling is supported for connections between two phones only. Some features, such as
Note
conference calls, shared lines, Extension Mobility, and Join Across Lines, are not available when
protected calling is configured. Protected calls are not authenticated.
Establishing and Identifying Protected Calls
A protected call is established when your phone and the phone on the other end are configured for
protected calling. The other phone can be in the same Cisco IP network or on a network outside the IP
network. Protected calls can only be made between two phones. Conference calls and other multiple-line
calls are not supported.
A protected call is established using this process:
1.
2.
Cisco Unified Wireless IP Phone 7925G, 7925G-EX, and 7926G Administration Guide
1-14
8-1.
Identifying Authenticated, Encrypted, and Protected Phone Calls, page 1-14
Viewing Device Information, page 8-4
Security Restrictions, page 1-15
A user initiates the call from a protected phone (protected security mode).
The phone displays the
is configured for secure (encrypted) calls, but the icon does not mean that the other connected phone
is also protected.
Chapter 1
Overview of the Cisco Unified Wireless IP Phone 7925G, 7925G-EX, and 7926G
icon ( encrypted) on the phone screen. This icon indicates that the phone
"Viewing Security Information"