Authenticated, Encrypted, and Protected Phone Calls

Authenticated, Encrypted, and Protected Phone Calls

Authenticated, Encrypted, and Protected Phone Calls

 

When security is implemented for a phone, you can identify authenticated or encrypted phone calls by icons on the screen on the phone. You can also determine if the connected phone is secure and protected if a security tone plays at the beginning of the call.

 

In an authenticated call, all devices participating in the establishment of the call are trusted devices, and authenticated by Cisco Unified Communications Manager. When an in-progress call is authenticated, the call progress icon to the right of the call duration timer in the phone LCD screen changes to this icon: 

 

In an encrypted call, all devices participating in the establishment of the call are trusted devices, and authenticated by Cisco Unified Communications Manager. In addition, call signaling and media streams are encrypted. An encrypted call offers a high level of security, providing integrity and privacy to the call. When an in-progress call is being encrypted, the call progress icon to the right of the call duration timer in the phone LCD screen changes to this icon:  

 

Note

If the call is routed through non-IP call legs, for example, PSTN, the call may be nonsecure even though it is encrypted within the IP network and has a lock icon associated with it.

 

In a protected call, a security tone plays at the beginning of a call to indicate that the other connected phone is also receiving and transmitting encrypted audio and video (if video is involved). If your call is connected to a nonprotected phone, the security tone does not play.

 

Note

Protected calling is supported for connections between two phones only. Some features, such as conference calls, shared lines, Extension Mobility, and Join Across Lines are not available when protected calling is configured. Protected calls are not authenticated.  

 

Related Topics

Security Profiles

Security Restrictions

Cisco Unified IP Phone Security Features

 

Secure Conference Call Identification

You can initiate a secure conference call and monitor the security level of participants. A secure conference call is established using this process:

  1. A user initiates the conference from a secure phone (encrypted or authenticated security mode).
  2. Cisco Unified Communications Manager assigns a secure conference bridge to the call.
  3. As participants are added, Cisco Unified Communications Manager verifies the security mode of each phone (encrypted or authenticated) and maintains the secure level for the conference.
  4. The phone displays the security level of the conference call. A secure conference displays (encrypted) or (authenticated) icon to the right of Conferenceon the phone screen. If icon displays, the conference is not secure.

 

Note

There are interactions, restrictions, and limitations that affect the security level of the conference call depending on the security mode of the participants' phones and the availability of secure conference bridges.  

 

Related Topics

Call Security Interactions and Restrictions

 

Protected Call Identification

A protected call is established when a user phone and the phone on the other end are configured for protected calling. The other phone can be in the same Cisco IP network, or on a network outside the IP network. Protected calls can only be made between two phones. Conference calls and other multiple-line calls are not supported.

 

Establishment of a protected call follows this process:

 

  1. A user initiates the call from a protected phone (protected security mode).
  2. The phone displays the icon (encrypted) on the phone screen. This icon indicates that the phone is configured for secure (encrypted) calls, but this does not mean that the other connected phone is also protected.
  3. A security tone plays if the call connects to another protected phone; the tone indicates that both ends of the conversation are encrypted and protected. If the call is connected to a nonprotected phone, the secure tone does not play.

 

Note

Protected calling is supported for conversations between two phones. Some features, such as conference, shared lines, Cisco Extension Mobility, and Join Across Lines are not available when protected calling is configured. 

    • Related Articles

    • Cisco Unified IP Phone Security Features

      Cisco Unified IP Phone Security Features   Implementing security in the Cisco Unified Communications Manager system prevents identity theft of the phone and Cisco Unified Communications Manager server, prevents data tampering, and prevents call ...
    • How Your Phone Handles Calls

      How Your Phone Handles Calls Your phone can handle multiple calls at a time. However, only one active call—the call that has audio associated with it—can be in progress at any given time. In addition to the active call, your phone may have multiple ...
    • Answering Calls

      Answering Calls All incoming calls display in an Incoming Call window, as shown next. To answer the call, do one of the following: To use the handset, pick up the handset. To use the speakerphone, pressor press Answer. To use your headset, press . If ...
    • Telephony Features Available for Cisco Unified IP Phone

      Telephony Features Available for Cisco Unified IP Phone  After you add Cisco Unified IP Phones to Cisco Unified Communications Manager, you can add functionality  to the phones. The following table includes a list of supported telephony features, ...
    • Phone Startup Process

      Phone Startup Process    When connecting to the VoIP network, the Cisco Unified IP Phones go through a standard startup process,  described in the following steps. Depending on your specific network configuration, not all of these steps  may occur on ...