Cisco 7920 Administration Guide - Page 153

Performing a Site Survey Verification

Page 153 highlights

Chapter 6 Verifying the Wireless Network Configuration on the Cisco Wireless IP Phone Performing a Site Survey Verification Table 6-2 802.11b Configuration Network Settings (continued) Network Setting Description References Current User Profile Name of the user profile that the phone is See the "Configuring User currently using. Profiles" section on page 4-29. Current Network Profile Name of the network profile that the phone is currently using. See the "Configuring a Network Profile" section on page 4-18. Key Management Used Type of authentication key management See the "Choosing that the phone is using. Available options Authentication and Encryption include the following: Methods" section on page 2-15. • WPA • CCKM • WPA Pre-shared Key (WPA-PSK) • None Cipher Used Type of cipher used for encryption. Available options include the following: • Unicast: WEP 40, WEP 128, TKIP, None See the "Choosing Authentication and Encryption Methods" section on page 2-15. • Multicast: WEP 40, WEP 128, TKIP, None Related Topics • Verifying Wireless Settings, page 6-6 • Configuring Network Profile Settings, page 5-3 • Configuring Wireless Settings for the Profile, page 5-10 Performing a Site Survey Verification After the initial deployment of wireless phones in the WLAN, it is a good practice to perform site surveys at regular intervals to verify that the APs are providing adequate coverage and that wireless phones can roam from one AP to another with no audio problems. Cisco Wireless IP Phone 7920 Administration Guide for Cisco CallManager Release 4.0 and 4.1 OL-7104-01 6-7

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238

6-7
Cisco Wireless IP Phone 7920 Administration Guide for Cisco CallManager Release 4.0 and 4.1
OL-7104-01
Chapter 6
Verifying the Wireless Network Configuration on the Cisco Wireless IP Phone
Performing a Site Survey Verification
Related Topics
Verifying Wireless Settings, page 6-6
Configuring Network Profile Settings, page 5-3
Configuring Wireless Settings for the Profile, page 5-10
Performing a Site Survey Verification
After the initial deployment of wireless phones in the WLAN, it is a good practice
to perform site surveys at regular intervals to verify that the APs are providing
adequate coverage and that wireless phones can roam from one AP to another with
no audio problems.
Current User Profile
Name of the user profile that the phone is
currently using.
See the
“Configuring User
Profiles” section on page 4-29
.
Current Network Profile
Name of the network profile that the
phone is currently using.
See the
“Configuring a Network
Profile” section on page 4-18
.
Key Management Used
Type of authentication key management
that the phone is using. Available options
include the following:
WPA
CCKM
WPA Pre-shared Key (WPA-PSK)
None
See the
“Choosing
Authentication and Encryption
Methods” section on page 2-15
.
Cipher Used
Type of cipher used for encryption.
Available options include the following:
Unicast: WEP 40, WEP 128, TKIP,
None
Multicast: WEP 40, WEP 128, TKIP,
None
See the
“Choosing
Authentication and Encryption
Methods” section on page 2-15
.
Table 6-2
802.11b Configuration Network Settings (continued)
Network Setting
Description
References