Cisco 7920 Administration Guide - Page 57

Shared Key, The Cisco Wireless IP Phone 7920 begins

Page 57 highlights

Chapter 2 An Overview of the Wireless Network Understanding the Phone Startup Process Table 2-5 Cisco IP Phone Startup Process (continued) Step Description Related Topics 3. Authenticating with The Cisco Wireless IP Phone 7920 begins the access point authenticating process. • If set for Open, then any device can authenticate to the access point. For added security, static WEP encryption might optionally be used. Security Mechanisms in the Wireless Network, page 2-13 • If set to Shared Key, the phone encrypts the challenge text using the WEP key and the access point must verify that the WEP key was used to encrypt the challenge text before network access is available. • If set for LEAP, then the LEAP user name and password are authenticated by the RADIUS server before network access is available. • If set for AKM, the phone looks for an access point with one of the following key management options enabled: - WPA or CCKM-The phone authenticates with the RADIUS server. - WPA-PSK-The phone authenticates with the access point using the pre-shared key password. OL-7104-01 Cisco Wireless IP Phone 7920 Administration Guide for Cisco CallManager Release 4.0 and 4.1 2-23

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238

2-23
Cisco Wireless IP Phone 7920 Administration Guide for Cisco CallManager Release 4.0 and 4.1
OL-7104-01
Chapter 2
An Overview of the Wireless Network
Understanding the Phone Startup Process
3.
Authenticating with
access point
The Cisco Wireless IP Phone 7920 begins the
authenticating process.
If set for
Open
, then any device can
authenticate to the access point. For added
security, static WEP encryption might
optionally be used.
If set to
Shared Key
, the phone encrypts the
challenge text using the WEP key and the
access point must verify that the WEP key
was used to encrypt the challenge text
before network access is available.
If set for
LEAP
, then the LEAP user name
and password are authenticated by the
RADIUS server before network access is
available.
If set for
AKM
, the phone looks for an
access point with one of the following key
management options enabled:
WPA or CCKM—The phone
authenticates with the RADIUS server.
WPA-PSK—The phone authenticates
with the access point using the
pre-shared key password.
Security Mechanisms in
the Wireless Network,
page 2-13
Table 2-5
Cisco IP Phone Startup Process (continued)
Step
Description
Related Topics