Cisco 7925G Administration Guide - Page 98

Configuring PEAP, Configuring the ACS Server Setup, Before You Begin - cp

Page 98 highlights

Configuring Network Profiles Chapter 4 Using the Cisco Unified Wireless IP Phone 7925G Web Pages Step 1 Step 2 Step 3 Step 4 Export the Authentication Server Root Certificate from the ACS. See Exporting Certificates from the ACS, page 4-20. Go to the phone web page and choose Certificates. Click Import next to the Authentication Server Root certificate. Restart the phone. Configuring the ACS Server Setup To set up the user account name and install the MIC root certificate for the phone on the ACS, follow these steps: Note For more information about using the ACS configuration tool, see the ACS online help or the User Guide for Cisco Secure ACS for Windows. Procedure Step 1 From the ACS configuration tool User Setup page, create a phone user account name if it is not already set up. Typically, the user name includes the phone MAC address at the end (for example, CP-7925G-SEPxxxxxxxxxxxx). No password is necessary for EAP-TLS. Note Make sure the user name matches the Common Name field in the User Certificate Installation page. See "Requesting and Importing the User Installed Certificate" section on page 4-21. Step 2 Step 3 Step 4 On the System Configuration page, in the EAP-TLS section, enable these fields: • Allow EAP-TLS • Certificate CN comparison. On the ACS Certification Authority Setup page, add the Manufacturing Root Certificate and Manufacturing CA Certificate to the ACS server. Enable both the Manufacturing Root Certificate and Manufacturing CA Certificate in the ACS Certificate Trust List. Configuring PEAP Protected Extensible Authentication Protocol (PEAP) uses server-side public key certificates to authenticate clients by creating an encrypted SSL/TLS tunnel between the client and the authentication server. Note The authentication server validation can be enabled by importing the authentication server certificate. Before You Begin Before you configure PEAP authentication for the phone, make sure these Cisco Secure ACS requirements are met: 4-22 Cisco Unified Wireless IP Phone 7925G Administration Guide for Cisco Unified Communications Manager 7.0(1) OL-15984-01

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244

4-22
Cisco Unified Wireless IP Phone 7925G Administration Guide for Cisco Unified Communications Manager 7.0(1)
OL-15984-01
Chapter 4
Using the Cisco Unified Wireless IP Phone 7925G Web Pages
Configuring Network Profiles
Step 1
Export the Authentication Server Root Certificate from the ACS. See
Exporting Certificates from the
ACS, page 4-20
.
Step 2
Go to the phone web page and choose
Certificates
.
Step 3
Click
Import
next to the Authentication Server Root certificate.
Step 4
Restart the phone.
Configuring the ACS Server Setup
To set up the user account name and install the MIC root certificate for the phone on the ACS, follow
these steps:
Note
For more information about using the ACS configuration tool, see the ACS online help or the
User Guide
for Cisco Secure ACS for Windows
.
Procedure
Step 1
From the ACS configuration tool User Setup page, create a phone user account name if it is not already
set up. Typically, the user name includes the phone MAC address at the end (for example,
CP-7925G-SEPxxxxxxxxxxxx). No password is necessary for EAP-TLS.
Note
Make sure the user name matches the Common Name field in the User Certificate Installation
page. See
“Requesting and Importing the User Installed Certificate” section on page 4-21
.
Step 2
On the System Configuration page, in the EAP-TLS section, enable these fields:
Allow EAP-TLS
Certificate CN comparison.
Step 3
On the ACS Certification Authority Setup page, add the Manufacturing Root Certificate and
Manufacturing CA Certificate to the ACS server.
Step 4
Enable both the Manufacturing Root Certificate and Manufacturing CA Certificate in the ACS
Certificate Trust List.
Configuring PEAP
Protected Extensible Authentication Protocol (PEAP) uses server-side public key certificates to
authenticate clients by creating an encrypted SSL/TLS tunnel between the client and the authentication
server.
Note
The authentication server validation can be enabled by importing the authentication server certificate.
Before You Begin
Before you configure PEAP authentication for the phone, make sure these Cisco Secure ACS
requirements are met: