cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
2473
Views
0
Helpful
3
Replies

Encryption of webex calls

Mujeeb Shaik
Level 1
Level 1

Hi Team,

 

Trust you are doing great,

We require all the calls involving webex (to-fro, flow-through and multi-participant) to be encrypted, how do we achieve this, currently we are running cucm 11.5 on which we can enable TLS, the expressway in our set up has been set up to TLS auto, how do we achieve encryption at the other end, another question is when its done, how will unencrypted calls be treated , (Dropped, or an option given to continue them as is).

 

Kindly advise

 

Best Regards

Mujeeb

3 Replies 3

Ratheesh Kumar
VIP Alumni
VIP Alumni

Hi there

 

WebEx meetings provide these encryption mechanisms:

  • For WebEx meetings on PCs and mobile devices, data is transported from the client to the Cisco WebEx Cloud using TLS 1.0, TLS 1.1, or TLS 1.2.
  • End-to-end (E2E) encryption is an option provided with Cisco WebEx Meeting Center. This method encrypts all meeting content, end-to-end, between meeting participants using the Advanced Encryption Standard (AES) with a 256-bit key randomly generated on the Host’s computer and distributed to Attendees with a public-key-based mechanism. Unlike SSL encryption that is terminated at Cisco WebEx Cloud side, E2E encryption encrypts all meeting contents within the Cisco WebEx Cloud infrastructure. Clear-text meeting content data is presented only in the meeting participants’ computer memory.
  • If a user chooses the related “Remember me” option, that user’s login ID and password for WebEx meetings saved on PCs and mobile devices are encrypted using 128-bit AES.

For more security information for Cisco WebEx Meeting Center, Cisco WebEx Training Center, Cisco WebEx Support Center, and Cisco WebEx Event Center. See: Web Conferencing: Unleash the Power of Secure, Real-Time Collaboration

 

 

Hope this helps

Cheers

Rath!

 

***Please rate helpful posts***

Thats right, however it says in the same article that telepresence endpoints are excluded as well as sharing.