2-23
Cisco Wireless IP Phone 7920 Administration Guide for Cisco CallManager Release 4.0 and 4.1
OL-7104-01
Chapter 2 An Overview of the Wireless Network
Understanding the Phone Startup Process
3.
Authenticating with
access point
The Cisco Wireless IP Phone 7920 begins the
authenticating process.
•
If set for
Open
, then any device can
authenticate to the access point. For added
security, static WEP encryption might
optionally be used.
•
If set to
Shared Key
, the phone encrypts the
challenge text using the WEP key and the
access point must verify that the WEP key
was used to encrypt the challenge text
before network access is available.
•
If set for
LEAP
, then the LEAP user name
and password are authenticated by the
RADIUS server before network access is
available.
•
If set for
AKM
, the phone looks for an
access point with one of the following key
management options enabled:
–
WPA or CCKM—The phone
authenticates with the RADIUS server.
–
WPA-PSK—The phone authenticates
with the access point using the
pre-shared key password.
Security Mechanisms in
the Wireless Network,
page 2-13
Table 2-5
Cisco IP Phone Startup Process (continued)
Step
Description
Related Topics
Содержание 7920 - Unified Wireless IP Phone VoIP
Страница 4: ......