Cisco 7925G Administration Guide - Page 48

Authenticated Key Management, Encryption Methods, Choosing AP Authentication and Encryption Methods - setup

Page 48 highlights

Security for Voice Communications in WLANs Chapter 2 Overview of the VoIP Wireless Network Authenticated Key Management The following authentication schemes use the RADIUS server to manage authentication keys: • WPA-Uses information on a RADIUS server to generate unique keys for authentication. Because these keys are generated at the centralized RADIUS server, WPA provides more security than WPA pre-shared keys that are stored on the AP and phone. • Cisco Centralized Key Management (CCKM)-Uses information on a RADIUS server and a wireless domain server (WDS) to manage and authenticate keys. The WDS creates a cache of security credentials for CCKM-enabled client devices for fast and secure reauthentication. With WPA and CCKM, encryption keys are not entered on the phone, but are automatically derived between the AP and phone. But the EAP username and password that are used for authentication must be entered on each phone. Encryption Methods To ensure that voice traffic is secure, the Cisco Unified Wireless IP Phone 7925G supports WEP, TKIP, and Advanced Encryption Standards (AES) for encryption. When using these mechanisms for encryption, both the signaling Skinny Client Control Protocol (SCCP) packets and voice Real-Time Transport Protocol (RTP) packets are encrypted between the AP and the wireless IP phone. • WEP-When using WEP in the wireless network, authentication happens at the AP by using open or shared-key authentication. The WEP key that is setup on the phone must match the WEP key that is configured at the AP for successful connections. The Cisco Unified Wireless IP Phone 7925G supports WEP keys that use 40-bit encryption or a 128-bit encryption and remain static on the phone and AP. EAP and CCKM authentication can use WEP keys for encryption. The RADIUS server manages the WEP key and passes a unique key to the AP after authentication for encrypting all voice packets; consequently, these WEP keys can change with each authentication. • TKIP-WPA and CCKM use TKIP encryption that has several improvements over WEP. TKIP provides per-packet key ciphering and longer initialization vectors (IVs) that strengthen encryption. In addition, a message integrity check (MIC) ensures that encrypted packets are not being altered. TKIP removes the predictability of WEP that helps intruders decipher the WEP key. • AES-An encryption method used for WPA2 authentication. This national standard for encryption uses a symmetrical algorithm that has the same key for encryption and decryption. AES uses Cipher Blocking Chain (CBC) encryption of 128 bits in size, supporting key sizes of 128, 192 and 256 bits, as a minimum. Note The Cisco Unified Wireless IP Phone 7925G does not support Cisco Key Integrity Protocol (CKIP) with CMIC. Choosing AP Authentication and Encryption Methods Authentication and encryption schemes are setup within the wireless LAN. VLANS are configured in the network and on the APs and specify different combinations of authentication and encryption. An SSID is associated with a VLAN and its particular authentication and encryption scheme. In order for wireless client devices to authenticate successfully, you must configure the same SSIDs with their authentication and encryption schemes on the APs and on the wireless IP phone. 2-18 Cisco Unified Wireless IP Phone 7925G Administration Guide for Cisco Unified Communications Manager 7.0(1) OL-15984-01

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244

2-18
Cisco Unified Wireless IP Phone 7925G Administration Guide for Cisco Unified Communications Manager 7.0(1)
OL-15984-01
Chapter 2
Overview of the VoIP Wireless Network
Security for Voice Communications in WLANs
Authenticated Key Management
The following authentication schemes use the RADIUS server to manage authentication keys:
WPA—Uses information on a RADIUS server to generate unique keys for authentication. Because
these keys are generated at the centralized RADIUS server, WPA provides more security than WPA
pre-shared keys that are stored on the AP and phone.
Cisco Centralized Key Management (CCKM
)
—Uses information on a RADIUS server and a
wireless domain server (WDS) to manage and authenticate keys. The WDS creates a cache of
security credentials for CCKM-enabled client devices for fast and secure reauthentication.
With WPA and CCKM, encryption keys are not entered on the phone, but are automatically derived
between the AP and phone. But the EAP username and password that are used for authentication must
be entered on each phone.
Encryption Methods
To ensure that voice traffic is secure, the Cisco Unified Wireless IP Phone 7925G supports WEP, TKIP,
and Advanced Encryption Standards (AES) for encryption. When using these mechanisms for
encryption, both the signaling Skinny Client Control Protocol (SCCP) packets and voice Real-Time
Transport Protocol (RTP) packets are encrypted between the AP and the wireless IP phone.
WEP—When using WEP in the wireless network, authentication happens at the AP by using open
or shared-key authentication. The WEP key that is setup on the phone must match the WEP key that
is configured at the AP for successful connections. The Cisco Unified Wireless IP Phone 7925G
supports WEP keys that use 40-bit encryption or a 128-bit encryption and remain static on the phone
and AP.
EAP and CCKM authentication can use WEP keys for encryption. The RADIUS server manages the
WEP key and passes a unique key to the AP after authentication for encrypting all voice packets;
consequently, these WEP keys can change with each authentication.
TKIP—WPA and CCKM use TKIP encryption that has several improvements over WEP. TKIP
provides per-packet key ciphering and longer initialization vectors (IVs) that strengthen encryption.
In addition, a message integrity check (MIC) ensures that encrypted packets are not being altered.
TKIP removes the predictability of WEP that helps intruders decipher the WEP key.
AES—An encryption method used for WPA2 authentication. This national standard for encryption
uses a symmetrical algorithm that has the same key for encryption and decryption. AES uses Cipher
Blocking Chain (CBC) encryption of 128 bits in size, supporting key sizes of 128, 192 and 256 bits,
as a minimum.
Note
The Cisco Unified Wireless IP Phone 7925G does not support Cisco Key Integrity Protocol
(CKIP) with CMIC.
Choosing AP Authentication and Encryption Methods
Authentication and encryption schemes are setup within the wireless LAN. VLANS are configured in
the network and on the APs and specify different combinations of authentication and encryption. An
SSID is associated with a VLAN and its particular authentication and encryption scheme. In order for
wireless client devices to authenticate successfully, you must configure the same SSIDs with their
authentication and encryption schemes on the APs and on the wireless IP phone.