Cisco 7920 Administration Guide - Page 47

Security Mechanisms in the Wireless Network - remote control

Page 47 highlights

Chapter 2 An Overview of the Wireless Network Components of the VoIP Wireless Network Security Mechanisms in the Wireless Network Before a wireless device can communicate on the network, it must authenticate with the access point or the network by using an authentication method. The Cisco Wireless IP Phone 7920 can use these authentication methods in the WLAN: • Open Authentication-In an Open system, any wireless device can request authentication. The access point that receives the request may grant authentication to any requestor or only to requestors on a list of users. Communication between the wireless device and access point could be non-encrypted or devices can use WEP keys to provide security. Devices that are using WEP only attempt to authenticate with an access point that is using WEP. • Shared Key Authentication-During shared key authentication, the access point sends an unencrypted challenge text string to any device attempting to communicate with the access point. The device that is requesting authentication encrypts the challenge text using a pre-configured WEP key and sends it back to the access point. If the challenge text is encrypted correctly, the access point allows the requesting device to authenticate. A device can authenticate only if its WEP keys match the WEP keys on the access points. Shared key authentication can be less secure than open authentication with WEP because someone can monitor the challenges. An intruder can calculate the WEP key by comparing the unencrypted and encrypted challenge text strings. • WPA Pre-Shared Key (PSK) Authentication-The access point and the phone are configured with the same authentication key. The pre-shared key (or password phrase) is used to create unique pair-wise keys that are exchanged between each phone and the access point. You can configure the password phrase as a 64-character hexadecimal string or as an ASCII password of from 8 to 63 characters in length. Because the pre-shared key password is stored on the phone, it can be compromised if the phone is lost or stolen. • LEAP Authentication-For maximum security, client devices can authenticate to the network by using a Remote Authentication Dial-in User Service (RADIUS) server such as the Cisco Access Control Server (ACS). OL-7104-01 Cisco Wireless IP Phone 7920 Administration Guide for Cisco CallManager Release 4.0 and 4.1 2-13

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238

2-13
Cisco Wireless IP Phone 7920 Administration Guide for Cisco CallManager Release 4.0 and 4.1
OL-7104-01
Chapter 2
An Overview of the Wireless Network
Components of the VoIP Wireless Network
Security Mechanisms in the Wireless Network
Before a wireless device can communicate on the network, it must authenticate
with the access point or the network by using an authentication method. The
Cisco Wireless IP Phone 7920 can use these authentication methods in the
WLAN:
Open Authentication—In an Open system, any wireless device can request
authentication. The access point that receives the request may grant
authentication to any requestor or only to requestors on a list of users.
Communication between the wireless device and access point could be
non-encrypted or devices can use WEP keys to provide security. Devices that
are using WEP only attempt to authenticate with an access point that is using
WEP.
Shared Key Authentication—During shared key authentication, the access
point sends an unencrypted challenge text string to any device attempting to
communicate with the access point. The device that is requesting
authentication encrypts the challenge text using a pre-configured WEP key
and sends it back to the access point. If the challenge text is encrypted
correctly, the access point allows the requesting device to authenticate. A
device can authenticate only if its WEP keys match the WEP keys on the
access points.
Shared key authentication can be less secure than open authentication with
WEP because someone can monitor the challenges. An intruder can calculate
the WEP key by comparing the unencrypted and encrypted challenge text
strings.
WPA Pre-Shared Key (PSK) Authentication—The access point and the phone
are configured with the same authentication key. The pre-shared key (or
password phrase) is used to create unique pair-wise keys that are exchanged
between each phone and the access point. You can configure the password
phrase as a 64-character hexadecimal string or as an ASCII password of from
8 to 63 characters in length. Because the pre-shared key password is stored
on the phone, it can be compromised if the phone is lost or stolen.
LEAP Authentication—For maximum security, client devices can
authenticate to the network by using a Remote Authentication Dial-in User
Service (RADIUS) server such as the Cisco Access Control Server (ACS).