Negotiating Device Security Mode

The actual security mode used for a call depends on the configuration of both IP Phones participating in the call. As shown in Figure 27-9, these rules apply:

Figure 27-9. Device Security Negotiation

Generating a CAPF Report

Категории