Cisco 7921G Administration Guide - Page 44

Authenticated Key Management, Encryption Methods, AP Authentication and Encryption Methods - setup

Page 44 highlights

Security for Voice Communications in WLANs Chapter 2 Overview of the VoIP Wireless Network Authenticated Key Management The following authentication schemes use the RADIUS server to manage authentication keys: • WPA-Uses information on a RADIUS server to generate unique keys for authentication. Because these keys are generated at the centralized RADIUS server, WPA provides more security than WPA pre-shared keys that are stored on the AP and phone. • Cisco Centralized Key Management (CCKM)-Uses information on a RADIUS server and a wireless domain server (WDS) to manage and authenticate keys. The WDS creates a cache of security credentials for CCKM-enabled client devices for fast and secure reauthentication. With WPA and CCKM, encryption keys are not entered on the phone, but are automatically derived between the AP and phone. But the EAP username and password that are used for authentication must be entered on each phone. Encryption Methods To ensure that voice traffic is secure, the Cisco Unified Wireless IP Phone 7921G supports WEP, TKIP, and Advanced Encryption Standards (AES) for encryption. When using these mechanisms for encryption, both the signaling Skinny Client Control Protocol (SCCP) packets and voice Real-Time Transport Protocol (RTP) packets are encrypted between the AP and the wireless IP phone. • WEP-When using WEP in the wireless network, authentication happens at the AP by using open or shared-key authentication. The WEP key that is setup on the phone must match the WEP key that is configured at the AP for successful connections. The Cisco Unified Wireless IP Phone 7921G supports WEP keys that use 40-bit encryption or a 128-bit encryption and remain static on the phone and AP. EAP and CCKM authentication can use WEP keys for encryption. The RADIUS server manages the WEP key and passes a unique key to the AP after authentication for encrypting all voice packets; consequently, these WEP keys can change with each authentication. • TKIP-WPA and CCKM use TKIP encryption that has several improvements over WEP. TKIP provides per-packet key ciphering and longer initialization vectors (IVs) that strengthen encryption. In addition, a message integrity check (MIC) ensures that encrypted packets are not being altered. TKIP removes the predictability of WEP that helps intruders decipher the WEP key. • AES-An encryption method used for WPA2 authentication. This national standard for encryption uses a symmetrical algorithm that has the same key for encryption and decryption. AES uses Cipher Blocking Chain (CBC) encryption of 128 bits in size, supporting key sizes of 128, 192 and 256 bits, as a minimum. Note The Cisco Unified Wireless IP Phone 7921G does not support Cisco Key Integrity Protocol (CKIP) with CMIC. AP Authentication and Encryption Methods Authentication and encryption schemes are setup within the wireless LAN. VLANS are configured in the network and on the APs and specify different combinations of authentication and encryption. An SSID is associated with a VLAN and its particular authentication and encryption scheme. To enable wireless client devices to authenticate successfully, you must configure the same SSIDs with their authentication and encryption schemes on the APs and on the unified IP phone. 2-16 Cisco Unified Wireless IP Phone 7921G Administration Guide for Cisco Unified Communications Manager Release 7.0 OL-15985-01

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234

2-16
Cisco Unified Wireless IP Phone 7921G Administration Guide for Cisco Unified Communications Manager Release 7.0
OL-15985-01
Chapter 2
Overview of the VoIP Wireless Network
Security for Voice Communications in WLANs
Authenticated Key Management
The following authentication schemes use the RADIUS server to manage authentication keys:
WPA—Uses information on a RADIUS server to generate unique keys for authentication. Because
these keys are generated at the centralized RADIUS server, WPA provides more security than WPA
pre-shared keys that are stored on the AP and phone.
Cisco Centralized Key Management (CCKM
)
—Uses information on a RADIUS server and a
wireless domain server (WDS) to manage and authenticate keys. The WDS creates a cache of
security credentials for CCKM-enabled client devices for fast and secure reauthentication.
With WPA and CCKM, encryption keys are not entered on the phone, but are automatically derived
between the AP and phone. But the EAP username and password that are used for authentication must
be entered on each phone.
Encryption Methods
To ensure that voice traffic is secure, the Cisco Unified Wireless IP Phone 7921G supports WEP, TKIP,
and Advanced Encryption Standards (AES) for encryption. When using these mechanisms for
encryption, both the signaling Skinny Client Control Protocol (SCCP) packets and voice Real-Time
Transport Protocol (RTP) packets are encrypted between the AP and the wireless IP phone.
WEP—When using WEP in the wireless network, authentication happens at the AP by using open
or shared-key authentication. The WEP key that is setup on the phone must match the WEP key that
is configured at the AP for successful connections. The Cisco Unified Wireless IP Phone 7921G
supports WEP keys that use 40-bit encryption or a 128-bit encryption and remain static on the phone
and AP.
EAP and CCKM authentication can use WEP keys for encryption. The RADIUS server manages the
WEP key and passes a unique key to the AP after authentication for encrypting all voice packets;
consequently, these WEP keys can change with each authentication.
TKIP—WPA and CCKM use TKIP encryption that has several improvements over WEP. TKIP
provides per-packet key ciphering and longer initialization vectors (IVs) that strengthen encryption.
In addition, a message integrity check (MIC) ensures that encrypted packets are not being altered.
TKIP removes the predictability of WEP that helps intruders decipher the WEP key.
AES—An encryption method used for WPA2 authentication. This national standard for encryption
uses a symmetrical algorithm that has the same key for encryption and decryption. AES uses Cipher
Blocking Chain (CBC) encryption of 128 bits in size, supporting key sizes of 128, 192 and 256 bits,
as a minimum.
Note
The Cisco Unified Wireless IP Phone 7921G does not support Cisco Key Integrity Protocol
(CKIP) with CMIC.
AP Authentication and Encryption Methods
Authentication and encryption schemes are setup within the wireless LAN. VLANS are configured in
the network and on the APs and specify different combinations of authentication and encryption. An
SSID is associated with a VLAN and its particular authentication and encryption scheme. To enable
wireless client devices to authenticate successfully, you must configure the same SSIDs with their
authentication and encryption schemes on the APs and on the unified IP phone.