Cisco 7925G Administration Guide - Page 93

Installing Authentication Certificates for EAP-TLS Authentication, Entering Wireless Encryption Keys

Page 93 highlights

Chapter 4 Using the Cisco Unified Wireless IP Phone 7925G Web Pages Configuring Network Profiles Entering Wireless Encryption Keys To set up WEP keys, follow these steps: Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Choose the network profile that uses Open+WEP or Shared+WEP. In the Key Type area, choose one of these character formats: • Hex • ASCII For Encryption Key 1, click Transmit Key. In the Key Size area, choose one of these character string lengths: • 40 • 128 In the Encryption Key field, enter the appropriate key string based on the selected Key Type and Key Size. See the "WEP Key Formats" section on page 4-16. Click Save to make the change. Related Topics • Configuring IP Network Settings, page 4-23 • Configuring the Alternate TFTP Server, page 4-24 • Configuring Advanced Network Profile Settings, page 4-25 Installing Authentication Certificates for EAP-TLS Authentication EAP-TLS is a certificate based authentication that requires a trust relationship between two or more entities. Each entity has a certificate proving its identity and is signed by a trusted authority. These certificates are exchanged and verified during EAP-TLS authentication. Note The EAP-TLS certificate based authentication requires that the internal clock on the Cisco Unified Wireless IP Phone 7925G be set correctly. Use the phone web page to set the clock on the phone before using EAP-TLS authentication. To use EAP-TLS, both the Cisco Unified Wireless IP Phone 7925G and the Cisco Secure Access Control Server (ACS) must have certificates installed and configured properly. If your wireless network uses EAP-TLS for authentication, you can use the Manufacturing Installed Certificate (MIC) or a user installed certificate for authentication on the phone. Manufacturing Installed Certificate Cisco has included a Manufacturing Installed Certificate (MIC) in the phone at the factory. During EAP-TLS authentication the ACS server needs to verify the trust of the phone and the phone needs to verify the trust of the ACS server. OL-15984-01 Cisco Unified Wireless IP Phone 7925G Administration Guide for Cisco Unified Communications Manager 7.0(1) 4-17

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244

4-17
Cisco Unified Wireless IP Phone 7925G Administration Guide for Cisco Unified Communications Manager 7.0(1)
OL-15984-01
Chapter 4
Using the Cisco Unified Wireless IP Phone 7925G Web Pages
Configuring Network Profiles
Entering Wireless Encryption Keys
To set up WEP keys, follow these steps:
Procedure
Step 1
Choose the network profile that uses Open+WEP or Shared+WEP.
Step 2
In the Key Type area, choose one of these character formats:
Hex
ASCII
Step 3
For Encryption Key 1, click
Transmit Key
.
Step 4
In the Key Size area, choose one of these character string lengths:
40
128
Step 5
In the Encryption Key field, enter the appropriate key string based on the selected Key Type and Key
Size. See the
“WEP Key Formats” section on page 4-16
.
Step 6
Click
Save
to make the change.
Related Topics
Configuring IP Network Settings, page 4-23
Configuring the Alternate TFTP Server, page 4-24
Configuring Advanced Network Profile Settings, page 4-25
Installing Authentication Certificates for EAP-TLS Authentication
EAP-TLS is a certificate based authentication that requires a trust relationship between two or more
entities. Each entity has a certificate proving its identity and is signed by a trusted authority. These
certificates are exchanged and verified during EAP-TLS authentication.
Note
The EAP-TLS certificate based authentication requires that the internal clock on the Cisco Unified
Wireless IP Phone 7925G be set correctly. Use the phone web page to set the clock on the phone before
using EAP-TLS authentication.
To use EAP-TLS, both the Cisco Unified Wireless IP Phone 7925G and the Cisco Secure Access Control
Server (ACS) must have certificates installed and configured properly. If your wireless network uses
EAP-TLS for authentication, you can use the Manufacturing Installed Certificate (MIC) or a user
installed certificate for authentication on the phone.
Manufacturing Installed Certificate
Cisco has included a Manufacturing Installed Certificate (MIC) in the phone at the factory.
During EAP-TLS authentication the ACS server needs to verify the trust of the phone and the phone
needs to verify the trust of the ACS server.