EasyManuals Logo

Cisco 7925G Administration Guide

Cisco 7925G
274 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #59 background imageLoading...
Page #59 background image
DescriptionStatic Setting
Identifies the gateway that provides connectivity to the IP network beyond
the subnet to which the phone belongs.
Default Router 1
If the system is configured to use hostnames for servers instead of IP
addresses, identifies the primary and secondary DNS server to resolve
hostnames.
DNS Server 1
DNS Server 2
Identifies the TFTP servers that the phone uses to obtain configuration files.TFTP Server 1
TFTP Server 2
Voice Communication Security in WLANs
Because all WLAN devices that are within range can receive all other WLAN traffic, securing voice
communications is critical in WLANs. To ensure that voice traffic is not manipulated or intercepted by
intruders, the Cisco Unified Wireless IP Phone and Cisco Aironet APs are supported in the Cisco SAFE
Security architecture. For more information about security in networks, see http://www.cisco.com/en/US/
netsol/ns744/networking_solutions_program_home.html.
Authentication Methods
The Cisco Wireless IP telephony solution provides wireless network security that prevents unauthorized logins
and compromised communications by using the following authentication methods:
Open Authentication
Any wireless device can request authentication in an open system. The AP that receives the request
may grant authentication to any requestor or only to requestors on a list of users. Communication
between the wireless device and AP could be nonencrypted.
Open Authentication with WEP
This is similar to Open Authentication in the preceding bullet, except with improved security.
Communication between the wireless device and AP use Wired Equivalent Privacy (WEP) keys to
provide security.
Shared Key Authentication
The AP sends an unencrypted challenge text string to any device attempting to communicate with the
AP. The device that requests authentication uses a preconfigured WEP key to encrypt the challenge
text and sends the encrypted challenge text back to the AP. If the challenge text is encrypted correctly,
the AP allows the requesting device to authenticate. A device can authenticate only if its WEP key
matches the WEP key on the APs.
Shared key authentication can be less secure than open authentication with WEP because someone can
monitor the challenges. An intruder can calculate the WEP key by comparing the unencrypted and
encrypted challenge text strings.
Cisco Unified Wireless IP Phone 7925G, 7925G-EX, and 7926G Administration Guide
39
VoIP Wireless Network
Voice Communication Security in WLANs

Table of Contents

Other manuals for Cisco 7925G

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Cisco 7925G and is the answer not in the manual?

Cisco 7925G Specifications

General IconGeneral
Keypad number of keys12
Display diagonal2 \
Display resolution176 x 220 pixels
Call waitingYes
Lines quantity6 lines
Voice codecsG.711a, G.722, G.729a, iLBC
Security algorithms128-bit WEP, SSL/TLS, WPA
Supported network protocolsDHCP, TFTP, DNS, SCCP, SRST
Input voltage100 - 240 V
Dimensions (WxDxH)52 x 20 x 127 mm
Minimum system requirementsCisco Unified Communications Manager 4.1, 4.2, 4.3, 5.1, 6.0, 6.1, 7.0 + Cisco Unified Communications Manager Express 4.3 +
Input frequency50/60 Hz
Storage temperature (T-T)-30 - 60 °C
Operating temperature (T-T)0 - 40 °C
Operating relative humidity (H-H)10 - 95 %
Product typeIP Phone
Product colorGray
SafetyUL 60950, CSA 22.2 No.60950, EN 60950, IEC 60950, AS/NZS 60950, IEC 60529 (IP 54)
Certification47 CFR 15 B ICES-003 B EN 55022 B AS/NZS CISPR 22 B CISPR 22 B VCCI B EN 61000-3-2 EN 61000-3-3 KN 22 EN 55024 EN 50082-1 EN 61000-6-1 EN 300386 EN 60601-1-2 KN
Compliance industry standardsIEEE 802.11a, IEEE 802.11b, IEEE 802.11g, IEEE 802.1X, IEEE 802.11e
Weight and Dimensions IconWeight and Dimensions
Weight138 g

Related product manuals