Cisco 7920 Administration Guide - Page 137

Choosing Authentication and Encryption Settings, Network Setting, Description, Usage Notes

Page 137 highlights

Chapter 5 Configuring Network Profiles on the Cisco Wireless IP Phone 7920 Configuring Wireless Settings for the Profile Table 5-3 Wireless Network Settings (continued) Network Setting WPA Pre-shared Key WEP Key Description Usage Notes Authentication scheme that uses a key configured on both the access point and the phone. The password phrase format options are hexadecimal or ASCII. Selecting the Wireless Protected Access (WPA) Pre-Shared Key Type, page 5-19 An encryption scheme for securing wireless communications by using an encryption key. You can set up to four WEP Keys using 40-bit or 128-bit character strings. "Setting Up the Wired Equivalent Privacy (WEP) Keys" section on page 5-19 Choosing Authentication and Encryption Settings The type of authentication and encryption schemes that you are using with your WLAN determine how you set up the authentication and encryption options in the network profiles for the Cisco Wireless IP Phones. Table 5-4 provides a list of supported authentication and encryption schemes that you can configure on the Cisco Wireless IP Phone 7920. Table 5-4 Authentication and Encryption Configuration Options Authentication Open Shared Key LEAP (Requires Username and Password) AKM with CCKM (Requires Username and Password) AKM with WPA AKM with WPA Pre-Shared Key (Requires WPA-PSK password) Encryption Static WEP (If used, requires WEP Key) Static WEP (mandatory) (requires WEP Key) WEP TKIP or WEP (requires WEP Key) TKIP TKIP OL-7104-01 Cisco Wireless IP Phone 7920 Administration Guide for Cisco CallManager Release 4.0 and 4.1 5-13

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238

5-13
Cisco Wireless IP Phone 7920 Administration Guide for Cisco CallManager Release 4.0 and 4.1
OL-7104-01
Chapter 5
Configuring Network Profiles on the Cisco Wireless IP Phone 7920
Configuring Wireless Settings for the Profile
Choosing Authentication and Encryption Settings
The type of authentication and encryption schemes that you are using with your
WLAN determine how you set up the authentication and encryption options in the
network profiles for the Cisco Wireless IP Phones.
Table 5-4
provides a list of
supported authentication and encryption schemes that you can configure on the
Cisco Wireless IP Phone 7920.
WPA Pre-shared Key
Authentication scheme that uses a key
configured on both the access point and the
phone. The password phrase format options
are hexadecimal or ASCII.
Selecting the Wireless
Protected Access (WPA)
Pre-Shared Key Type,
page 5-19
WEP Key
An encryption scheme for securing wireless
communications by using an encryption key.
You can set up to four WEP Keys using 40-bit
or 128-bit character strings.
“Setting Up the Wired
Equivalent Privacy (WEP)
Keys” section on page 5-19
Table 5-3
Wireless Network Settings (continued)
Network Setting
Description
Usage Notes
Table 5-4
Authentication and Encryption Configuration Options
Authentication
Encryption
Open
Static WEP
(If used, requires WEP Key)
Shared Key
Static WEP (mandatory)
(requires WEP Key)
LEAP
(Requires Username and Password)
WEP
AKM with CCKM
(Requires Username and Password)
TKIP or
WEP (requires WEP Key)
AKM with WPA
TKIP
AKM with WPA Pre-Shared Key
(Requires WPA-PSK password)
TKIP