Specifications
Table Of Contents
- Cisco Unified Wireless IP Phone 7921G Administration Guide for Cisco Unified CallManager Release 4.1, 4.2, 5.0 and Later
- Contents
- Preface
- An Overview of the Cisco Unified Wireless IP Phone 7921G
- An Overview of the Voice Over IP Wireless Network
- Understanding the Wireless LAN
- Components of the VoIP Wireless Network
- Voice Over IP Wireless Network Configuration
- Site Survey Verification
- Setting Up the Cisco Unified Wireless IP Phone 7921G
- Before You Begin
- Installing the Cisco Unified Wireless IP Phone 7921G
- Powering On the Cisco Unified Wireless IP Phone 7921G
- Understanding the Phone Startup Process
- Using the Cisco Unified Wireless IP Phone 7921G Web Pages
- Using the USB Connection for Initial Phone Configuration
- Updating Phones Remotely
- Configuring Network Profiles
- Configuring USB Settings
- Configuring Trace Settings
- Using System Settings
- Configuring Settings on the Cisco Unified Wireless IP Phone 7921G
- Accessing Network and Phone Settings
- Configuring Network Profile Settings
- Changing Phone Settings
- Configuring the Security Certificate on the Phone
- Changing the USB Configuration
- Configuring Features, Templates, Services, and Users
- Configuring Cisco Unified Wireless IP Phones in Cisco Unified CallManager
- Telephony Features Available for the Phone
- Specific Configuration Options for the Cisco Unified Wireless IP Phone 7921G
- Configuring Softkey Templates
- Modifying Phone Button Templates
- Setting Up Services
- Configuring Corporate and Personal Directories
- Adding Users to Cisco Unified CallManager
- Managing the User Options Web Pages
- Creating Custom Phone Rings
- Viewing Security, Device, Model, and Status Information on the Phone
- Monitoring the Cisco Unified Wireless IP Phone Remotely
- Troubleshooting the Cisco Unified Wireless IP Phone 7921G
- Resolving Startup and Connectivity Problems
- Resolving Voice Quality and Roaming Problems
- General Troubleshooting Information
- Erasing the Local Configuration
- Providing Information to Users By Using a Website
- Supporting International Users
- Physical and Operating Environment Specifications
- Checklist for Deploying the Cisco Unified Wireless IP Phone 7921G
- Index

2-19
Cisco Unified Wireless IP Phone 7921G Administration Guide for Cisco Unified CallManager Release 4.1, 4.2, 5.0
OL-10802-02
Chapter 2 An Overview of the Voice Over IP Wireless Network
Components of the VoIP Wireless Network
Related Topics
• Authentication Mechanisms in the Wireless Network, page 2-19
• Interacting with Cisco Unified CallManager, page 2-24
• Voice Over IP Wireless Network Configuration, page 2-27
Authentication Mechanisms in the Wireless Network
Before a wireless device can communicate on the network, it must authenticate
with the access point or the network by using an authentication method. The
wireless
IP phone can use these authentication methods in the WLAN:
• Open Authentication—Any wireless device can request authentication in an
open system. The access point that receives the request may grant
authentication to any requestor or only to requestors on a list of users.
Communication between the wireless device and access point could be
non-encrypted or devices can use WEP keys to provide security. Devices that
are using WEP only attempt to authenticate with an access point that is using
WEP.
• Shared Key Authentication—The access point sends an unencrypted
challenge text string to any device attempting to communicate with the access
point. The device that is requesting authentication uses a pre-configured WEP
key to encrypt the challenge text and sends it back to the access point. If the
challenge text is encrypted correctly, the access point allows the requesting
device to authenticate. A device can authenticate only if its WEP key matches
the WEP key on the access points.
Shared key authentication can be less secure than open authentication with
WEP because someone can monitor the challenges. An intruder can calculate
the WEP key by comparing the unencrypted and encrypted challenge text
strings.
• WPA Pre-Shared Key (PSK) Authentication—The access point and the phone
are configured with the same authentication key. The pre-shared key is used
to create unique pair-wise keys that are exchanged between each phone and
the access point. You can configure the pre-shared key as a hexadecimal or
ASCII character string. Because the pre-shared key is stored on the phone, it
might be compromised if the phone is lost or stolen.