Cisco 7920 Administration Guide - Page 38

Securing Voice Communications - wpa configuration

Page 38 highlights

Understanding the Wireless LAN Chapter 2 An Overview of the Wireless Network broadcasts on a specific channel within the available channel range. To provide a stable wireless environment and reduce channel interference, you must specify non-overlapping channels for each access point. The recommended channels are 1, 6, and 11 in North America. The access point has a transmission range or coverage area that depends on its type of antenna and transmission power. The access point coverage range is from 500 to 1000 feet with effective isotropic radiated power (EIRP) output that scales at 1, 5, 20, 50, and 100mW. To provide effective coverage, access points need a range overlap of approximately 20 percent to allow uninterrupted connections as phone users roam from one access point to another. Wireless network devices use a service set identifier (SSID). The SSID provides a way to group a set of user devices that can associate with a set of access points. Each wireless device that can use the access point is configured with the same SSID as the access point. For more information about configuring the access points, refer to the Cisco Wireless IP Phone 7920 Design and Deployment Guide. Securing Voice Communications Because all WLAN devices that are within range can receive all other wireless LAN traffic, securing voice communications is critical. To ensure that voice traffic is not manipulated or intercepted by intruders, the Cisco Wireless IP Phone 7920 and Cisco Aironet Access Points are supported in the overall Cisco SAFE Security architecture. To secure voice communications, wireless networks use authentication and encryption methods. Wired Equivalent Privacy (WEP) is the method that was first introduced for wireless security, but this method is easily compromised. To address the security problems and weaknesses of WEP, the WiFi Alliance defined Wireless Protected Access (WPA.) Wi-Fi Protected Access is a standards-based, interoperable security enhancement that increases the level of data protection and access control for existing and future wireless LAN systems. It is derived from and will be forward-compatible with the upcoming IEEE 802.11i standard. WPA leverages Temporal Key Integrity Protocol (TKIP) for data protection and 802.1X for authenticated key management. Cisco Wireless IP Phone 7920 Administration Guide for Cisco CallManager Release 4.0 and 4.1 2-4 OL-7104-01

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238

Chapter 2
An Overview of the Wireless Network
Understanding the Wireless LAN
2-4
Cisco Wireless IP Phone 7920 Administration Guide for Cisco CallManager Release 4.0 and 4.1
OL-7104-01
broadcasts on a specific channel within the available channel range. To provide a
stable wireless environment and reduce channel interference, you must specify
non-overlapping channels for each access point. The recommended channels are
1, 6, and 11 in North America.
The access point has a transmission range or coverage area that depends on its
type of antenna and transmission power. The access point coverage range is from
500 to 1000 feet with effective isotropic radiated power (EIRP) output that scales
at 1, 5, 20, 50, and 100mW. To provide effective coverage, access points need a
range overlap of approximately 20 percent to allow uninterrupted connections as
phone users roam from one access point to another.
Wireless network devices use a service set identifier (SSID). The SSID provides
a way to group a set of user devices that can associate with a set of access points.
Each wireless device that can use the access point is configured with the same
SSID as the access point. For more information about configuring the access
points, refer to the
Cisco Wireless IP Phone 7920 Design and Deployment Guide
.
Securing Voice Communications
Because all WLAN devices that are within range can receive all other wireless
LAN traffic, securing voice communications is critical. To ensure that voice
traffic is not manipulated or intercepted by intruders, the Cisco Wireless
IP Phone 7920 and Cisco Aironet Access Points are supported in the overall
Cisco SAFE Security architecture.
To secure voice communications, wireless networks use authentication and
encryption methods. Wired Equivalent Privacy (WEP) is the method that was first
introduced for wireless security, but this method is easily compromised. To
address the security problems and weaknesses of WEP, the WiFi Alliance defined
Wireless Protected Access (WPA.)
Wi-Fi Protected Access is a standards-based, interoperable security enhancement
that increases the level of data protection and access control for existing and
future wireless LAN systems. It is derived from and will be forward-compatible
with the upcoming IEEE 802.11i standard. WPA leverages Temporal Key
Integrity Protocol (TKIP) for data protection and 802.1X for authenticated key
management.