Cisco 7925G Administration Guide - Page 90

Configuring the Authentication Mode

Page 90 highlights

Configuring Network Profiles Chapter 4 Using the Cisco Unified Wireless IP Phone 7925G Web Pages Table 4-5 Authentication and Encryption Configuration Options (continued) Authentication Mode Wireless Encryption Wireless Security Credentials LEAP (with optional CCKM) Uses WEP Requires Username and Password EAP-FAST (with optional CCKM) Uses WEP or TKIP Requires Username and Password EAP-TLS Uses WEP, TKIP, or AES Requires Username and Password Requires server and client certificates. PEAP Uses WEP, TKIP, or AES Requires Username and Password Requires server side certificate. Auto (AKM) with CCKM Uses TKIP or AES Requires Username and Password Auto (AKM) with WPA (with optional CCKM) Uses TKIP Requires Username and Password Auto (AKM) with WPA2 (with optional CCKM) Uses AES Requires Username and Password Auto (AKM) with WPA Pre-Shared Uses TKIP Key Requires Passphrase Auto (AKM) with WPA2 Pre-Shared Key Uses AES Requires Passphrase Note Beginning with Cisco Wireless IP Phone 7925G firmware release 1.1, CCKM is operational with the WPA authentication mode using AES encryption. Configuring the Authentication Mode To select the Authentication Mode for this profile, follow these steps: Procedure Step 1 Choose the network profile that you want to configure. Step 2 Choose the authentication mode. Note Depending on what you selected, you must configure additional options in Wireless Security or Wireless Encryption. See Table 4-5 for more information. Step 3 Click Save to make the change. 4-14 Cisco Unified Wireless IP Phone 7925G Administration Guide for Cisco Unified Communications Manager 7.0(1) OL-15984-01

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244

4-14
Cisco Unified Wireless IP Phone 7925G Administration Guide for Cisco Unified Communications Manager 7.0(1)
OL-15984-01
Chapter 4
Using the Cisco Unified Wireless IP Phone 7925G Web Pages
Configuring Network Profiles
Note
Beginning with Cisco Wireless IP Phone 7925G firmware release 1.1, CCKM is operational with the
WPA authentication mode using AES encryption.
Configuring the Authentication Mode
To select the Authentication Mode for this profile, follow these steps:
Procedure
Step 1
Choose the network profile that you want to configure.
Step 2
Choose the authentication mode.
Note
Depending on what you selected, you must configure additional options in Wireless Security or
Wireless Encryption. See
Table 4-5
for more information.
Step 3
Click
Save
to make the change.
LEAP (with optional CCKM)
Uses WEP
Requires Username and Password
EAP-FAST (with optional CCKM)
Uses WEP or TKIP
Requires Username and Password
EAP-TLS
Uses WEP, TKIP, or AES
Requires Username and Password
Requires server and client
certificates.
PEAP
Uses WEP, TKIP, or AES
Requires Username and Password
Requires server side certificate.
Auto (AKM) with CCKM
Uses TKIP or AES
Requires Username and Password
Auto (AKM) with WPA (with
optional CCKM)
Uses TKIP
Requires Username and Password
Auto (AKM) with WPA2 (with
optional CCKM)
Uses AES
Requires Username and Password
Auto (AKM) with WPA Pre-Shared
Key
Uses TKIP
Requires Passphrase
Auto (AKM) with WPA2
Pre-Shared Key
Uses AES
Requires Passphrase
Table 4-5
Authentication and Encryption Configuration Options (continued)
Authentication Mode
Wireless Encryption
Wireless Security Credentials