Cisco 7965G Administration Guide - Page 100

X Authentication and Status, Security Configuration > 802.1X Authentication - cp phone

Page 100 highlights

Security Configuration Menu Chapter 4 Configuring Settings on the Cisco Unified IP Phone 802.1X Authentication and Status The 802.1X Authentication and 802.1X Authentication Status menus allow you to enable 802.1X authentication and monitor its progress. These options are described in Table 4-21 and Table 4-22. You can access the 802.1X Authentication settings by pressing the Settings button and choosing Security Configuration > 802.1X Authentication and Security Configuration > 802.1X Authentication Status. Table 4-21 802.1X Authentication Settings Option Device Authentication EAP-MD5 Description To Change Determines whether 802.1X authentication is enabled: • Enabled-Phone uses 802.1X authentication to request network access. • Disabled-Default setting in which the phone uses CDP to acquire VLAN and network access. 1. Choose Settings > Security Configuration > 802.1X Authentication > Device Authentication. 2. Set the Device Authentication option to Enabled or Disabled. 3. Press the Save softkey. Specifies a password for use with 802.1X authentication using the following menu options (described in the following rows): Choose Settings > Security Configuration > 802.1X Authentication > EAP-MD5. • Device ID • Shared Secret • Realm Device ID-Derivative of the phone's model Display only-Cannot configure. number and unique MAC address displayed in this format: CP--SEP- Shared Secret-Choose a password to use on the phone and on the authentication server. The password must be between 6 and 32 characters, consisting of any combination of numbers or letters. Note If you disable 802.1X authentication or perform a factory reset of the phone, the shared secret is deleted. 1. Choose EAP-MD5 > Shared Secret. 2. Enter the shared secret. 3. Press Save. See the "Troubleshooting Cisco Unified IP Phone Security" section on page 9-9 for assistance in recovering from a deleted shared secret. Realm-Indicates the user network domain, always set as Network Display only-Cannot configure. 4-34 Cisco Unified IP Phone 7965G and 7945G Administration Guide for Cisco Unified Communications Manager 6.1 OL-14641-01

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205

4-34
Cisco Unified IP Phone 7965G and 7945G Administration Guide for Cisco Unified Communications Manager 6.1
OL-14641-01
Chapter 4
Configuring Settings on the Cisco Unified IP Phone
Security Configuration Menu
802.1X Authentication and Status
The 802.1X Authentication and 802.1X Authentication Status menus allow you to enable 802.1X
authentication and monitor its progress. These options are described in
Table 4-21
and
Table 4-22
.
You can access the 802.1X Authentication settings by pressing the
Settings
button and choosing
Security Configuration > 802.1X Authentication
and
Security Configuration > 802.1X
Authentication Status
.
Table 4-21
802.1X Authentication Settings
Option
Description
To Change
Device
Authentication
Determines whether 802.1X authentication is
enabled:
Enabled
—Phone uses 802.1X authentication
to request network access.
Disabled
—Default setting in which the phone
uses CDP to acquire VLAN and network
access.
1.
Choose
Settings > Security Configuration
> 802.1X Authentication > Device
Authentication
.
2.
Set the Device Authentication option to
Enabled or Disabled.
3.
Press the
Save
softkey.
EAP-MD5
Specifies a password for use with 802.1X
authentication using the following menu options
(described in the following rows):
Device ID
Shared Secret
Realm
Choose
Settings > Security Configuration >
802.1X Authentication > EAP-MD5
.
Device ID—Derivative of the phone’s model
number and unique MAC address displayed in this
format: CP-<model>-SEP-<MAC>
Display only—Cannot configure.
Shared Secret—Choose a password to use on the
phone and on the authentication server. The
password must be between 6 and 32 characters,
consisting of any combination of numbers or
letters.
Note
If you disable 802.1X authentication or
perform a factory reset of the phone, the
shared secret is deleted.
1.
Choose
EAP-MD5 > Shared Secret
.
2.
Enter the shared secret.
3.
Press
Save
.
See the
“Troubleshooting Cisco Unified IP
Phone Security” section on page 9-9
for
assistance in recovering from a deleted shared
secret.
Realm—Indicates the user network domain,
always set as
Network
Display only—Cannot configure.