Cisco Systems WRP400 Manual Do Utilizador
Configuring Voice Services
Secure Call Implementation
ATA Administration Guide
72
4
Secure Call Implementation
This section describes secure call implementation with the ATA device . It includes
the following topics:
the following topics:
•
•
•
•
NOTE
This is an advanced topic meant for experience installers. See also the
LVS
Provisioning Guide
.
Enabling Secure Calls
A secure call is established in two stages. The first stage is no different from
normal call setup. The second stage starts after the call is established in the
normal way with both sides ready to stream RTP packets.
normal call setup. The second stage starts after the call is established in the
normal way with both sides ready to stream RTP packets.
In the second stage, the two parties exchange information to determine if the
current call can switch over to the secure mode. The information is transported by
base64 encoding embedded in the message body of SIP INFO requests, and
responses using a proprietary format. If the second stage is successful, the ATA
device plays a special Secure Call Indication Tone for a short time to indicate to
both parties that the call is secured and that RTP traffic in both directions is being
encrypted.
current call can switch over to the secure mode. The information is transported by
base64 encoding embedded in the message body of SIP INFO requests, and
responses using a proprietary format. If the second stage is successful, the ATA
device plays a special Secure Call Indication Tone for a short time to indicate to
both parties that the call is secured and that RTP traffic in both directions is being
encrypted.
If the user has a phone that supports call waiting caller ID (CIDCW) and that
service is enabled, the CID will be updated with the information extracted from the
Mini-Certificate received from the remote party. The Name field of the CID will be
prepended with a ‘$’ symbol. Both parties can verify the name and number to
ensure the identity of the remote party.
service is enabled, the CID will be updated with the information extracted from the
Mini-Certificate received from the remote party. The Name field of the CID will be
prepended with a ‘$’ symbol. Both parties can verify the name and number to
ensure the identity of the remote party.