1-15
Cisco IP Phone Administration Guide for Cisco CallManager, Cisco IP Phone 7961G/7961G-GE and 7941G/7941G-GE
OL-6966-01
Chapter 1 An Overview of the Cisco IP Phone
Understanding Security Features for Cisco IP Phones
Related Topics
• Identifying Encrypted and Authenticated Phone Calls, page 1-15
• Device Configuration Menu, page 4-15
• Security Restrictions, page 1-15
Identifying Encrypted and Authenticated Phone Calls
When security is implemented for a phone, you can identify authenticated or
encrypted phone calls by icons on the phone LCD screen.
In an authenticated call, all devices participating in the establishment of the call
are authenticated by the Cisco CallManager. When a call in progress is
authenticated end-to-end, the call progress icon to the right of the call duration
timer in the phone LCD screen changes to this icon .
In an encrypted call, all devices participating in the establishment of the call are
authenticated by the Cisco CallManager. In addition, call signaling and media
streams are encrypted. An encrypted call offers the highest level of security,
providing integrity and privacy to the call. When a call in progress is being
encrypted, the call progress icon to the right of the call duration timer in the phone
LCD screen changes to the following icon: .
Note If the call is routed through non-IP call legs, for example, H.323 or PSTN, the call
will be nonsecure even though it is encrypted within the IP network and has a lock
icon associated with it.
Related Topic
• Understanding Security Features for Cisco IP Phones, page 1-11
• Security Restrictions, page 1-15
Security Restrictions
A user cannot barge into an encrypted call if the phone that is used to barge is not
configured for encryption. When barge fails in this case, a reorder tone (fast busy
tone) plays on the phone on which the user initiated the barge.