Cisco 7921G Administration Guide - Page 89

Installing Authentication Certificates for EAP-TLS Authentication, Manufacturing Installed Certificate

Page 89 highlights

Chapter 4 Using the Cisco Unified Wireless IP Phone 7921G Web Pages Configuring Network Profiles Related Topics • Configuring IP Network Settings, page 4-25 • Configuring the Alternate TFTP Server, page 4-26 • Configuring Advanced Network Profile Settings, page 4-27 Installing Authentication Certificates for EAP-TLS Authentication EAP-TLS is a certificate based authentication that requires a trust relationship between two or more entities. Each entity has a certificate proving its identity and is signed by a trusted authority. These certificates are exchanged and verified during EAP-TLS authentication. Note The EAP-TLS certificate based authentication requires that the internal clock on the Cisco Unified Wireless IP Phone 7921G be set correctly. Use the phone web page to set the clock on the phone before using EAP-TLS authentication. To use EAP-TLS, both the Cisco Unified Wireless IP Phone 7921G and the Cisco Secure Access Control Server (ACS) must have certificates installed and configured properly. If your wireless network uses EAP-TLS for authentication, you can use the Manufacturing Installed Certificate (MIC) or a user installed certificate for authentication on the phone. Manufacturing Installed Certificate Cisco has included a Manufacturing Installed Certificate (MIC) in the phone at the factory. During EAP-TLS authentication the ACS server needs to verify the trust of the phone and the phone needs to verify the trust of the ACS server. To verify the MIC, the Manufacturing Root Certificate and Manufacturing Certificate Authority (CA) Certificate must be exported from a Cisco Unified Wireless IP Phone 7921G and installed on the Cisco ACS server. These two certificates are part of the trusted certificate chain used to verify the MIC by the Cisco ACS server. To verify the Cisco ACS certificate, a trusted subordinate certificate (if any) and root certificate (created from a CA) on the Cisco ACS server must be exported and installed on the phone. These certificate(s) are part of the trusted certificate chain used to verify the trust of the certificate from the ACS server. User Installed Certificate To use a user installed certificate, a Certificate Signing Request (CSR) must be generated on the phone, sent to the CA for approval, and the approved certificate installed on the Cisco Unified Wireless IP Phone 7921G. During EAP-TLS authentication, the ACS server needs to verify the trust of the phone and the phone needs to verify the trust of the ACS server. To verify the authenticity of the user installed certificate, a trusted subordinate certificate (if any) and root certificate from the CA that approved the user certificate must be installed on the Cisco ACS server. These certificate(s) are part of the trusted certificate chain used to verify the trust of the user installed certificate. To verify the Cisco ACS certificate, a trusted subordinate certificate (if any) and root certificate (created from a CA) on the Cisco ACS server must be exported and installed on the phone. These certificate(s) are part of the trusted certificate chain used to verify the trust of the certificate from the ACS server. OL-15985-01 Cisco Unified Wireless IP Phone 7921G Administration Guide for Cisco Unified Communications Manager Release 7.0 4-19

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234

4-19
Cisco Unified Wireless IP Phone 7921G Administration Guide for Cisco Unified Communications Manager Release 7.0
OL-15985-01
Chapter 4
Using the Cisco Unified Wireless IP Phone 7921G Web Pages
Configuring Network Profiles
Related Topics
Configuring IP Network Settings, page 4-25
Configuring the Alternate TFTP Server, page 4-26
Configuring Advanced Network Profile Settings, page 4-27
Installing Authentication Certificates for EAP-TLS Authentication
EAP-TLS is a certificate based authentication that requires a trust relationship between two or more
entities. Each entity has a certificate proving its identity and is signed by a trusted authority. These
certificates are exchanged and verified during EAP-TLS authentication.
Note
The EAP-TLS certificate based authentication requires that the internal clock on the Cisco Unified
Wireless IP Phone 7921G be set correctly. Use the phone web page to set the clock on the phone before
using EAP-TLS authentication.
To use EAP-TLS, both the Cisco Unified Wireless IP Phone 7921G and the Cisco Secure Access Control
Server (ACS) must have certificates installed and configured properly. If your wireless network uses
EAP-TLS for authentication, you can use the Manufacturing Installed Certificate (MIC) or a user
installed certificate for authentication on the phone.
Manufacturing Installed Certificate
Cisco has included a Manufacturing Installed Certificate (MIC) in the phone at the factory.
During EAP-TLS authentication the ACS server needs to verify the trust of the phone and the phone
needs to verify the trust of the ACS server.
To verify the MIC, the Manufacturing Root Certificate and Manufacturing Certificate Authority (CA)
Certificate must be exported from a Cisco Unified Wireless IP Phone 7921G and installed on the Cisco
ACS server. These two certificates are part of the trusted certificate chain used to verify the MIC by the
Cisco ACS server.
To verify the Cisco ACS certificate, a trusted subordinate certificate (if any) and root certificate (created
from a CA) on the Cisco ACS server must be exported and installed on the phone. These certificate(s)
are part of the trusted certificate chain used to verify the trust of the certificate from the ACS server.
User Installed Certificate
To use a user installed certificate, a Certificate Signing Request (CSR) must be generated on the phone,
sent to the CA for approval, and the approved certificate installed on the Cisco Unified Wireless IP
Phone 7921G.
During EAP-TLS authentication, the ACS server needs to verify the trust of the phone and the phone
needs to verify the trust of the ACS server.
To verify the authenticity of the user installed certificate, a trusted subordinate certificate (if any) and
root certificate from the CA that approved the user certificate must be installed on the Cisco ACS server.
These certificate(s) are part of the trusted certificate chain used to verify the trust of the user installed
certificate.
To verify the Cisco ACS certificate, a trusted subordinate certificate (if any) and root certificate (created
from a CA) on the Cisco ACS server must be exported and installed on the phone. These certificate(s)
are part of the trusted certificate chain used to verify the trust of the certificate from the ACS server.