Cisco 6941 Administration Guide - Page 84

Settings > Security Configuration > 802.1X, Security Config > 802.1X Authentication &gt - cp -

Page 84 highlights

Security Configuration Menu Chapter Table 4-5 802.1X Authentication Settings Option Device Authentication EAP-MD5 Transaction Status Description To Change Determines whether 802.1X authentication is enabled: • Enabled-Phone uses 802.1X authentication to request network access. • Disabled-Default setting in which the phone uses CDP to acquire VLAN and network access. 1. Choose Applications > Admin Settings > Security Config > 802.1X Authentication > Device Authentication. 2. Press Edit softkey. 3. Set the Device Authentication option to Enabled or Disabled. 4. Press the Save softkey. Device ID-A derivative of the phone's model number and unique MAC address displayed in this format: CP--SEP- 1. Choose Applications > Admin Settings > Security Config > 802.1X Authentication > EAP/MD5 > Device ID. 2. Press the Edit softkey. 3. Set the Device ID. 4. Press the Save softkey. Shared Secret-Choose a password to use on the phone and on the authentication server. The password must be between 6 and 32 characters, consisting of any combination of numbers or letters. Note If you disable 802.1X authentication or perform a factory reset of the phone, the shared secret is deleted. 1. Choose Applications > Admin Settings > Security Config > 802.1X Authentication > EAP-MD5 > Shared Secret. 2. Press the Edit softkey. 3. Enter the shared secret. 4. Press the Save softkey. See the "Troubleshooting Cisco Unified IP Phone Security" section on page 9-8 for assistance in recovering from a deleted shared secret. Realm-Indicates the user network domain, 1. Choose Applications > Admin Settings > always set as Network. Security Config > 802.1X Authentication > EAP-MD5 > Realm. 2. Press the Edit softkey. 3. Enter the Network. 4. Press the Save softkey. Displays the transaction status of your 802.1X Authentication. To view the transaction status of your 802.1X Authentication, choose Applications > Admin Settings > Security Configuration > 802.1X Authentication Status. 4-10 Cisco Unified IP Phone 6921, 6941, 6945, and 6961 Administration Guide for Cisco Unified Communications Manager 8.5 (SCCP and SIP) OL-23769-01

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196

4-10
Cisco Unified IP Phone 6921, 6941, 6945, and 6961 Administration Guide for Cisco Unified Communications Manager 8.5 (SCCP and SIP)
OL-23769-01
Chapter
Security Configuration Menu
Table 4-5
802.1X Authentication Settings
Option
Description
To Change
Device Authentication
Determines whether 802.1X authentication
is enabled:
Enabled
—Phone uses 802.1X
authentication to request network
access.
Disabled
—Default setting in which the
phone uses CDP to acquire VLAN and
network access.
1.
Choose
Applications > Admin Settings >
Security Config > 802.1X Authentication >
Device Authentication
.
2.
Press
Edit
softkey.
3.
Set the Device Authentication option to
Enabled or Disabled.
4.
Press the
Save
softkey.
EAP-MD5
Device ID—A derivative of the phone’s
model number and unique MAC address
displayed in this format:
CP-<
model
>-SEP-<
MAC
>
1.
Choose
Applications > Admin Settings >
Security Config > 802.1X Authentication >
EAP/MD5 > Device ID
.
2.
Press the
Edit
softkey
.
3.
Set the Device ID.
4.
Press the
Save
softkey.
Shared Secret—Choose a password to use on
the phone and on the authentication server.
The password must be between 6 and 32
characters, consisting of any combination of
numbers or letters.
Note
If you disable 802.1X authentication
or perform a factory reset of the
phone, the shared secret is deleted.
1.
Choose
Applications > Admin Settings >
Security Config > 802.1X Authentication >
EAP-MD5 > Shared Secret
.
2.
Press the
Edit
softkey
.
3.
Enter the shared secret.
4.
Press the
Save
softkey.
See the
“Troubleshooting Cisco Unified IP Phone
Security” section on page 9-8
for assistance in
recovering from a deleted shared secret.
Realm—Indicates the user network domain,
always set as
Network.
1.
Choose
Applications > Admin Settings >
Security Config > 802.1X Authentication >
EAP-MD5 > Realm
.
2.
Press the
Edit
softkey
.
3.
Enter the Network.
4.
Press the
Save
softkey.
Transaction Status
Displays the transaction status of your
802.1X Authentication.
To view the transaction status of your 802.1X
Authentication, choose
Applications > Admin
Settings > Security Configuration > 802.1X
Authentication Status
.