Cisco 7925G Administration Guide - Page 46

Security for Voice Communications in WLANs, Authentication Methods

Page 46 highlights

Security for Voice Communications in WLANs Chapter 2 Overview of the VoIP Wireless Network Table 2-6 Static IP Addresses When DHCP is Disabled (continued) Static Setting DNS Server 1 DNS Server 2 TFTP Server 1 TFTP Server 2 Description If the system is configured to use host names for servers instead of IP addresses, identifies the primary and secondary DNS server to resolve host names. Identifies the TFTP servers that the phone uses to obtain configuration files. Security for Voice Communications in WLANs Because all WLAN devices that are within range can receive all other WLAN traffic, securing voice communications is critical in WLANs. To ensure that voice traffic is not manipulated or intercepted by intruders, the Cisco Unified Wireless IP Phone 7925G and Cisco Aironet APs are supported in the Cisco SAFE Security architecture. For more information about security in networks, refer to http://www.cisco.com/en/US/netsol/ns744/networking_solutions_program_home.html. This section contains the following items: • Authentication Methods, page 2-16 • Authenticated Key Management, page 2-18 • Encryption Methods, page 2-18 • Choosing AP Authentication and Encryption Methods, page 2-18 Authentication Methods The Cisco Wireless IP telephony solution provides wireless network security that prevents unauthorized logins and compromised communications by using the following authentication methods. • Open Authentication-Any wireless device can request authentication in an open system. The AP that receives the request may grant authentication to any requestor or only to requestors on a list of users. Communication between the wireless device and AP could be non-encrypted or devices can use Wired Equivalent Privacy (WEP) keys to provide security. Devices that are using WEP only attempt to authenticate with an AP that is using WEP. • Shared Key Authentication-The AP sends an unencrypted challenge text string to any device attempting to communicate with the AP. The device that is requesting authentication uses a pre-configured WEP key to encrypt the challenge text and sends it back to the AP. If the challenge text is encrypted correctly, the AP allows the requesting device to authenticate. A device can authenticate only if its WEP key matches the WEP key on the APs. Shared key authentication can be less secure than open authentication with WEP because someone can monitor the challenges. An intruder can calculate the WEP key by comparing the unencrypted and encrypted challenge text strings. • Wireless Protected Access (WPA) Pre-Shared Key (PSK) Authentication-The AP and the phone are configured with the same authentication key. The pre-shared key is used to create unique pair-wise keys that are exchanged between each phone and the AP. You can configure the pre-shared key as a hexadecimal or ASCII character string. Because the pre-shared key is stored on the phone, it might be compromised if the phone is lost or stolen. 2-16 Cisco Unified Wireless IP Phone 7925G Administration Guide for Cisco Unified Communications Manager 7.0(1) OL-15984-01

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244

2-16
Cisco Unified Wireless IP Phone 7925G Administration Guide for Cisco Unified Communications Manager 7.0(1)
OL-15984-01
Chapter 2
Overview of the VoIP Wireless Network
Security for Voice Communications in WLANs
Security for Voice Communications in WLANs
Because all WLAN devices that are within range can receive all other WLAN traffic, securing voice
communications is critical in WLANs. To ensure that voice traffic is not manipulated or intercepted by
intruders, the Cisco Unified Wireless IP Phone 7925G and Cisco Aironet APs are supported in the Cisco
SAFE Security architecture. For more information about security in networks, refer to
.
This section contains the following items:
Authentication Methods, page 2-16
Authenticated Key Management, page 2-18
Encryption Methods, page 2-18
Choosing AP Authentication and Encryption Methods, page 2-18
Authentication Methods
The Cisco Wireless IP telephony solution provides wireless network security that prevents unauthorized
logins and compromised communications by using the following authentication methods.
Open Authentication—Any wireless device can request authentication in an open system. The AP
that receives the request may grant authentication to any requestor or only to requestors on a list of
users. Communication between the wireless device and AP could be non-encrypted or devices can
use Wired Equivalent Privacy (WEP) keys to provide security. Devices that are using WEP only
attempt to authenticate with an AP that is using WEP.
Shared Key Authentication—The AP sends an unencrypted challenge text string to any device
attempting to communicate with the AP. The device that is requesting authentication uses a
pre-configured WEP key to encrypt the challenge text and sends it back to the AP. If the challenge
text is encrypted correctly, the AP allows the requesting device to authenticate. A device can
authenticate only if its WEP key matches the WEP key on the APs.
Shared key authentication can be less secure than open authentication with WEP because someone
can monitor the challenges. An intruder can calculate the WEP key by comparing the unencrypted
and encrypted challenge text strings.
Wireless Protected Access (WPA) Pre-Shared Key (PSK) Authentication—The AP and the phone
are configured with the same authentication key. The pre-shared key is used to create unique
pair-wise keys that are exchanged between each phone and the AP. You can configure the pre-shared
key as a hexadecimal or ASCII character string. Because the pre-shared key is stored on the phone,
it might be compromised if the phone is lost or stolen.
DNS Server 1
DNS Server 2
If the system is configured to use host names for servers instead of IP
addresses, identifies the primary and secondary DNS server to resolve
host names.
TFTP Server 1
TFTP Server 2
Identifies the TFTP servers that the phone uses to obtain
configuration files.
Table 2-6
Static IP Addresses When DHCP is Disabled (continued)
Static Setting
Description