Cisco 7925G Administration Guide - Page 89

Configuring Wireless LAN Security, Authentication Mode, Wireless Encryption

Page 89 highlights

Chapter 4 Using the Cisco Unified Wireless IP Phone 7925G Web Pages Configuring Network Profiles Configuring Wireless LAN Security The Cisco Unified Wireless IP Phone 7925G supports many types of authentication. Authentication methods might require a specific encryption method or you can choose between several encryption methods. When configuring a network profile, you can choose one of these authentication methods: • Open-Provides access to all access points without WEP Key authentication/encryption. • Open plus WEP-Provides access to all access points and authentication through the use of one or more WEP Keys at the local access point. • Shared Key plus WEP-Provides shared key authentication through the use of WEP Keys at the local access point. • LEAP- Exchanges a username and cryptographically secure password with a RADIUS server for authentication in the network. LEAP is a Cisco proprietary version of EAP. • EAP-FAST-Exchanges a username and password and with a RADIUS server for authentication in the network. • EAP-TLS-Uses a dynamic session-based WEP key derived from the client adapter and RADIUS server to encrypt data and a client certificate for authentication. It uses PKI to secure communication to the RADIUS authentication server. • PEAP (EAP-MSCHAP V2)-Performs mutual authentication, but does not require a client certificate on the phone. This method uses name and password authentication based on Microsoft MSCHAP V2 authentication. • PEAP with Server Certificate Authentication-The Cisco Unified Wireless IP Phone 7925G can validate the server certificate during the authentication handshakes over an 802.11 wireless link. This functionality is disabled by default and is enabled in Cisco Unified Communications Manager Administration. • Auto (AKM)-Automatic authenticated key management in which the phone selects the AP and type of key management scheme, which includes WPA, WPA2, WPA-Pre-shared key, WPA2-Pre-shared key, or CCKM (which uses a wireless domain server (WDS)). Note When set to AKM mode, the phone uses LEAP for 802.1x type authentication methods (non-Pre-shared key such as WPA, WPA2, or CCKM). AKM mode supports only authenticated key-management types (WPA, WPA2, WPA-PSK, WPA2-PSK, CCKM). The type of authentication and encryption schemes that you are using with your WLAN determine how you set up the authentication, security, and encryption options in the network profiles for the Cisco Unified Wireless IP Phones. Table 4-5 provides a list of supported authentication and encryption schemes that you can configure on the Cisco Unified Wireless IP Phone 7925G. Table 4-5 Authentication and Encryption Configuration Options Authentication Mode Open Open plus WEP Shared Key plus WEP Wireless Encryption None Static WEP Requires WEP Key Static WEP Requires WEP Key Wireless Security Credentials None-access to all APs None-access to all APs Uses shared-key with AP OL-15984-01 Cisco Unified Wireless IP Phone 7925G Administration Guide for Cisco Unified Communications Manager 7.0(1) 4-13

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244

4-13
Cisco Unified Wireless IP Phone 7925G Administration Guide for Cisco Unified Communications Manager 7.0(1)
OL-15984-01
Chapter 4
Using the Cisco Unified Wireless IP Phone 7925G Web Pages
Configuring Network Profiles
Configuring Wireless LAN Security
The Cisco Unified Wireless IP Phone 7925G supports many types of authentication. Authentication
methods might require a specific encryption method or you can choose between several encryption
methods. When configuring a network profile, you can choose one of these authentication methods:
Open—Provides access to all access points without WEP Key authentication/encryption.
Open plus WEP—Provides access to all access points and authentication through the use of one or
more WEP Keys at the local access point.
Shared Key plus WEP—Provides shared key authentication through the use of WEP Keys at the
local access point.
LEAP— Exchanges a username and cryptographically secure password with a RADIUS server for
authentication in the network. LEAP is a Cisco proprietary version of EAP.
EAP-FAST—Exchanges a username and password and with a RADIUS server for authentication in
the network.
EAP-TLS—Uses a dynamic session-based WEP key derived from the client adapter and RADIUS
server to encrypt data and a client certificate for authentication. It uses PKI to secure communication
to the RADIUS authentication server.
PEAP (EAP-MSCHAP V2)—Performs mutual authentication, but does not require a client
certificate on the phone. This method uses name and password authentication based on Microsoft
MSCHAP V2 authentication.
PEAP with Server Certificate Authentication—The Cisco Unified Wireless IP Phone 7925G can
validate the server certificate during the authentication handshakes over an 802.11 wireless link.
This functionality is disabled by default and is enabled in Cisco Unified Communications Manager
Administration.
Auto (AKM)—Automatic authenticated key management in which the phone selects the AP and
type of key management scheme, which includes WPA, WPA2, WPA-Pre-shared key,
WPA2-Pre-shared key, or CCKM (which uses a wireless domain server (WDS)).
Note
When set to AKM mode, the phone uses LEAP for 802.1x type authentication methods (non-Pre-shared
key such as WPA, WPA2, or CCKM). AKM mode supports only authenticated key-management types
(WPA, WPA2, WPA-PSK, WPA2-PSK, CCKM).
The type of authentication and encryption schemes that you are using with your WLAN determine how
you set up the authentication, security, and encryption options in the network profiles for the Cisco
Unified Wireless IP Phones.
Table 4-5
provides a list of supported authentication and encryption
schemes that you can configure on the Cisco Unified Wireless IP Phone 7925G.
Table 4-5
Authentication and Encryption Configuration Options
Authentication Mode
Wireless Encryption
Wireless Security Credentials
Open
None
None—access to all APs
Open plus WEP
Static WEP
Requires WEP Key
None—access to all APs
Shared Key plus WEP
Static WEP
Requires WEP Key
Uses shared-key with AP