Specifications

Table Of Contents
2-7
Cisco Unified Wireless IP Phone 7921G Administration Guide for Cisco Unified CallManager Release 4.1, 4.2, 5.0
OL-10802-02
Chapter 2 An Overview of the Voice Over IP Wireless Network
Understanding the Wireless LAN
To secure voice communications, wireless networks use authentication and
encryption methods. Wired Equivalent Privacy (WEP) is the method that was first
introduced for wireless security, but this method is easily compromised. To
address the security problems and weaknesses of WEP, the Wi-Fi Alliance defined
Wireless Protected Access (WPA.)
Wi-Fi Protected Access is a standards-based, interoperable security enhancement
that increases the level of data protection and access control for existing and
future wireless LAN systems. It is derived from and will be forward-compatible
with the upcoming IEEE 802.11i standard. WPA leverages Temporal Key
Integrity Protocol (TKIP) for data protection and 802.1x for authenticated key
management.
Through stronger encryption algorithms, stronger authentication, and rapid key
updates, WPA has significantly improved security compared to WEP. Wireless
clients, such as wireless IP phones, can authenticate at either the access point or
with the network by using a centralized remote authentication dial-in user service
(RADIUS) server.
The Cisco Wireless IP telephony solution provides wireless network security that
prevents unauthorized logins and compromised communications by using these
features:
Encryption and authentication with Wired Equivalent Privacy (WEP)
Wireless Protected Access (WPA and WPA2)
Extensible Authentication Protocol (EAP)
Extensible Authentication Protocol-Flexible Authentication via Secure
Tunneling (EAP-FAST)
For additional information about Cisco Wireless LAN Security, refer to
http://www.cisco.com/en/US/products/hw/wireless/ps430/prod_brochure09186a
00801f7d0b.html
Related Topics
Networking Protocols Used with Cisco Unified Wireless IP Phones, page 2-8
Authentication Mechanisms in the Wireless Network, page 2-19