Cisco Unified Wireless IP Phone 7925G, 7925G-EX, and 7926G Administration Guide
Cisco Unified Wireless IP Phone 7925G, 7925G-EX, and 7926G Web Pages
Downloads: This chapterpdf (PDF - 1.73MB) The complete bookPDF (PDF - 5.68MB) | The complete bookePub (ePub - 1.24MB) | The complete bookMobi (Mobi - 2.14MB) | Feedback

Cisco Unified Wireless IP Phone 7925G, 7925G-EX, and 7926G Web Pages

Contents

Cisco Unified Wireless IP Phone 7925G, 7925G-EX, and 7926G Web Pages

Web Pages Overview

This chapter describes how to set up your PC to configure a Cisco Unified Wireless IP Phone 7925G, 7925G-EX, and 7926G by using a USB connector and how to remotely access a configured phone over the WLAN. It contains the following sections:

PC Setup for Phone Setup

To set up new phones, use your PC and USB connection to enter the initial configuration for the wireless network settings and network profiles. To save time during initial deployment, you can create a standard network profile template and export it to several phones.

Before you can configure phones by using the USB connection, you must install drivers and set up the USB ports on the phone and PC.

Your PC must have one of the following operating systems:

  • Windows 2000 32 bit

  • Windows XP 32 bit

  • Windows 7 32 bit

  • Windows 7 64 bit

Related References

Install USB Drivers

To install the drivers on your PC, perform the following steps.

Procedure
    Step 1   Log in to Cisco.com.
    Step 2   Download the installation package and read me file for the USB drivers from this location:

    http:/​/​www.cisco.com/​cgi-bin/​tablebuild.pl/​ip-7900ser-crypto

    Note   

    Before proceeding, review the read me file for specific instructions for your PC operating system.

    Step 3   Double-click on the USB installation file (listed in the read me file) to start the installation program.
    Step 4   Follow the prompts in the InstallShield Wizard.
    Note   

    If you receive a Hardware Installation warning message stating that the software has not passed Microsoft Windows Logo testing, click Continue.

    Step 5   When you see the Finished screen, the installation is complete. Close the wizard.
    Step 6   Plug the USB cable into the USB port on the PC and into the USB connector on the phone.

    The Found New Hardware Wizard dialog box opens.

    Step 7   To update the new software, click the button next to Yes, this time only and click Next.
    Step 8   Click the button next to Install the Software automatically (Recommended).

    After 2 to 3 minutes, the software installs and a message appears on the task bar stating Found New Hardware - Software installed and ready to use.

    Step 9   Click Finish when the installation completes.

    The phone briefly displays USB Connected on the status line.


    Set Up USB LAN on PC

    To configure the USB LAN connection on your PC, follow these steps:

    Procedure
      Step 1   To set up the USB LAN connection, access the Network Connections window on your PC.
      Step 2   Locate and double-click the new LAN connection to open the Local Area Connection Status window, and then click Properties.
      Step 3   Scroll to the Internet Protocol (TCP/IP) section and click Properties.
      Step 4   In the Internet Protocol (TCP/IP) Properties window, choose Use the following IP address.
      Step 5   In the IP address field, enter a static IP address for the PC: 192.168.1.xxx, where xxx is 1-99 or 101-254.

      Example:192.168.1.11
      Note   
      • By default, the Cisco Unified Wireless IP Phone is configured with 192.168.1.100 so you cannot use this IP address for the PC.
      • Make sure to use an IP address that is not in use on any other interface on the PC.

      Step 6   Enter the subnet mask 255.255.255.0
      Step 7   Click OK to make the changes.

      Access Phone Web Page

      After setting up the USB interface on the PC, you are ready to use the USB cable connection to the phone to access the phone web pages.

      To access the phone web pages, follow these steps:

      Procedure
        Step 1   Open a Windows browser.
        Step 2   In the address field, enter https://192.168.1.100 to locate the wireless IP phone web page.
        Note   

        When the Security Alert dialog box displays a notice to accept the Trust Certificate, click Yes or Always to accept the application.

        The Summary web page for the phone displays. See Home Web Page Summary Information for details about this web page.

        Step 3   When prompted, enter your username and password.

        Default username: admin

        Default password: Cisco

        Step 4   Use the hyperlinks in the left column of the web page to configure settings for the phones.
        Step 5   After entering the new settings, disconnect the USB cable from the phone. The settings are active immediately.
        Step 6   Check that the phone can access the network successfully.

        Related Information

        Set Up Phone Using USB Cable

        You are ready to use the USB cable to set up other phones. Before plugging the USB cable into another phone, wait approximately 12 to 15 seconds for the USB interface on the PC to shut down.

        To connect to another phone, follow these steps.

        Procedure
          Step 1   Plug the USB cable into a Cisco Unified Wireless IP Phone.

          The phone briefly displays USB Connected on the status line.

          Step 2   Access the web page for the new phone by following the steps in Access Phone Web Page.

          Remote Phone Updates

          You might have to update settings on a Cisco Unified Wireless IP Phone that is already configured and in use. You can use the wireless LAN to remotely access and configure these phones.

          Use the following sections for information about remotely updating phones.

          Set Privileges for Phone Web Page

          To make changes to the phone by using the web page, you must use Cisco Unified Communications Manager Administration to enable Web Access and Phone Book Web Access.

          To allow configuration privileges, follow these steps.

          Procedure
            Step 1   Log in to Cisco Unified Communications Manager Administration.
            Step 2   Search for the phone by choosing Device > Phone and enter search information such as the DN.
            Note   

            The administrator password for web access can also be changed using the Product Specific Configuration page of the Cisco Unified Communications Manager Administration.

            Step 3   Click on the DN of the phone that you want to set the privileges.
            Step 4   Open the Phone Configuration window, scroll down to Product Specific Configuration Layout, and enable these privileges:
            1. In the Web Access field, select Full from the drop-down menu.
            2. In the Phone Book Web Access field, select Allow Admin.
            Step 5   Click Save to make the change.
            Step 6   You must reset the phone to enable configuration privileges on the web pages for this phone.

            Access Phone Configuration Web Page

            You can access the web page for any Cisco Unified Wireless IP Phone that is connected to the WLAN. Be sure the phone is powered on, connected, and registered to a Cisco Unified Communications Manager server.


            Note


            If a wireless IP phone was previously registered to Cisco Unified CallManager Administration Release 4.x, and you try to register to Cisco Unified Communications Manager Administration Release 5.0 or later, the Phone Configuration web page password might be set to Cisco.


            To access the web page for the Cisco Unified Wireless IP Phone follow these steps.

            Procedure
              Step 1   Log in to the Cisco Unified Communications Manager Administration.
              Step 2   Go to Device > Phone.
              Step 3   Click Find.

              All of the phones display. If the phone is registered with a Cisco Unified Communications Manager Administration, the IP address displays. The phone IP address is linked to the Home web page.

              Step 4   Click on the Description field in the Phone Configuration window of Cisco Unified Communications Manager Administration. The Device Information section displays.
              Step 5   Go to the Web Access field in the Product Specific Configuration Layout and change the parameter to Full. This parameter gives you full access to all of the web pages.
              Step 6   Choose one of the following methods:
              1. From the Phone Configuration window, click on the linked IP address.

                The Home web page displays. There are two sections displayed on the Home web page: setup menus (left) and summary information (right). Home Web Page Menu describes the available Home web page menus, from which you can configure network profiles, USB settings, trace settings, Wavelink settings, and certificates. Home Web Page Summary Information describes the phone summary information.

              2. Or if you already know the IP address, you can open a web browser and enter the following URL. The IP_address variable is the IP address of the Cisco Unified IP Phone:

                https://<IP_address>/index.html

              Step 7   If the Security Alert dialog box displays a notice to accept the Trust Certificate, click Yes or Always to accept the application.
              Step 8   Log in to the Home web page with the default username: admin and enter the default password: Cisco. You may need to log into additional windows to configure other options.
              Step 9   Make changes to configurable pages as needed.
              Step 10   Return to the Phone Configuration page in Cisco Unified Communications Manager Administration and set the Web Access field back to Read Only or Disabled.
              Step 11   Reset the phone from Cisco Unified Communications Manager to disable full access to the web pages.

              Be sure to change the Web Access privileges and reset the phone to prevent users from making configuration changes on the phone web pages.


              Home Web Page Menu

              The following table describes the menu entries in the home web page.

              Table 1 Home Web Page Menus

              Menu

              Related information

              Setup

              Network Profiles

              Network Profiles

              USB Settings

              Set Up USB Settings on PC

              Trace Settings

              Set Up Trace Settings

              Wavelink Settings

              Set Up Wavelink Settings

              Certificates

              Wireless LAN Security

              Configurations

              Phone Book

              Phone Book Setup

              Information

              Network

              Home Web Page Summary Information

              Wireless LAN

              Device

              Statistics

              Wireless LAN

              Displays Rx and Tx statistics.

              Network

              Displays IP, TCP, and UDP statistics.

              Stream Statistics

              Stream 1

              Displays RTP statistics and voice quality metrics.

              Stream 2

              System

              Trace Logs

              System Settings

              Backup Settings

              Phone Upgrade

              Change Password

              Site Survey

              Date and Time

              Phone Restart

              Home Web Page Summary Information

              The summary information for your phone displays on this section of the Home web page. It also displays the network and Cisco Unified Communications Manager information. The following table describes these items.

              Table 2 Summary Information

              Item

              Description

              Phone DN

              DN assigned to the phone.

              Home: Summary

              Wireless Information

              Active Network Profile

              Name of the profile that the phone is currently using.

              SSID

              SSID that the phone is currently using.

              Access Point

              Name of the access point (AP) to which the phone is associated.

              MAC Address

              MAC address of the phone.

              Network Information

              IP Address

              IP address of the phone.

              Subnet Mask

              Subnet mask used by the phone.

              Default Router

              IP address for the default gateway that the phone is using.

              TFTP Server

              IP address for the primary TFTP server that the phone is using.

              Call Manager Information

              Active Unified CM

              IP address for the Cisco Unified Communications Manager server to which the phone is registered.

              Phone Directory Number

              Primary DN for the phone.

              Network Profiles

              You can configure up to four profiles for a phone to take advantage of WLAN environments. You can add names to the profiles and enable one or more of the profiles for the phone to use. The Network Profiles section of the web page displays the following information about each phone:

              Profile

              Displays a list of four configurable profiles.

              Enabled

              Indicates whether or not the profile is enabled.

              Name

              Lists the name for the profile.

              SSID

              Lists the SSID used by the profile.

              Status

              Indicates which profiles are active or inactive.

              To display the Network Profiles list, access the web page for the phone as described Access Phone Web Page, and then click the Network Profiles hyperlink.

              For more information about configuring network profiles, see the following sections.

              Network Profile Settings

              You can configure the profile settings using this web page area. You can also modify or view configured profiles from this web page area. The following table describes the basic and advanced profile settings and provides references for more information.

              To display Network Profile (1-4) Settings, access the web page for the phone as described in Access Phone Web Page, and then click the Profile (1-4) hyperlink.

              Table 3 Basic Network Profile Settings

              Item

              Description

              For more information, see …

              Wireless

              Profile Name

              Descriptive name for the profile.

              SSID

              Assigns the Service Set Identifier (SSID) to this profile. You must assign the same SSID to the phone that is also assigned to access points in the wireless network.

              AP Association

              Edit Profile

              Enables editing of the profile.

              Call Power Save Mode

              Set for the type of power saving mode used in the WLAN. Options are:

              • U-APSD/PS-Poll
              • None

              802.11 Standards for WLAN Communications

              802.11 Mode

              Determines the signal mode or priority for selecting signal modes available in the WLAN. Options are:

              • 802.11 b/g: Use only 2.4 GHz band

              • 802.11a: Use only 5 GHz band

              • Auto, 802.11b/g preferred over 802.11a (dual-band)

              • Auto, 802.11a preferred over 802.11b/g (dual-band)

                Note   

                The preferred band, if available, is used at power-on, but the phone may switch to the less-preferred 2.4 GHz band, if available, and the preferred band is lost. After the phone has connected to the less-preferred band, it does not scan for the preferred band if the current band is acceptable, and may remain connected to the less-preferred band.

              • Auto, signal strength (RSSI): Use strongest signal in dual-band environment

              802.11 Standards for WLAN Communications

              Scan Mode

              Note   

              Scan Mode is set in the Cisco Unified Communications Manager Administration, and cannot be set from the phone. The phone displays the current setting.

              Auto: Always scans when on a call. If idle and signal strength is sufficient, the phone does not scan.

              Continuous: Always scans.

              Single AP: Only scans at power-on or if the AP connection to the network is lost.

              AP Association

              Restricted Data Rate

              Note   

              Restricted Data Rate is set in the Cisco Unified Communications Manager Administration, and cannot be set from the phone. The phone displays the current setting.

              Enables or disables the restriction of the upstream and downstream PHY rates according to Cisco Compatible Extension (CCX) V4 Traffic Stream Rate Set IE (S54.2.6). The default is disabled.

              WLAN Security

              Security Mode

              Assigns the security mode

              Set Up Advanced Profile Settings

              Export Security Credentials

              Controls whether the wireless security credential data can be exported in the configuration file.

              • True: Allows exporting the data
              • False: Blocks exporting the data

              Wireless Security Credentials

              Username

              Assigns the network authentication username for this profile

              Set Up Username and Password

              Password

              Assigns the network authentication password for this profile

              Prompt Mode

              Note   

              Available only for Network Profile 1.

              If enabled, then the user must enter the password when powering on the phone.

              If disabled, the password is saved to the phone memory, and the user does not need to enter the password when powering on the phone.

              WPA Pre-shared Key Credentials

              Pre-shared Key Type

              Determines the key type: Hex or ASCII

              Pre-Shared Key Setup

              Pre-shared Key

              Identifies the key

              Wireless Encryption

              Key Type

              Determines the encryption key type: Hex or ASCII

              Wireless Encryption

              Encryption Key 1-4

              Identifies the Transmit Key:

              • Encryption Key character string
              • Key Size of 40 or 128 characters

              Certificate Options

              Client EAP-TLS Certificate

              Determines the certificate used for authentication:

              • Manufacturing issued
              • User installed

              EAP-TLS Authentication Certificates

              Validate Server Certificate

              Enables the phone to use the server certificate. Two options: true or false.

              Note   

              Applies to PEAP only.

              IP Network Configuration

              Obtain IP address and DNS servers automatically

              Gets the IP address and DNS servers automatically.

              IP Network Settings

              Use the following IP address and DNS servers

              Disables DHCP and uses these static settings:

              • IP Address
              • Subnet Mask
              • Default Router
              • Primary DNS
              • Secondary DNS
              • Domain Name

              TFTP

              Obtain TFTP Servers Automatically

              Enables automatic assignment of TFTP servers

              Set Up Alternate TFTP Server

              Use the following TFTP servers

              Assigns static TFTP server IP addresses to:

              • TFTP Server 1
              • TFTP Server 2

              TSPEC Settings

              Minimum PHY Rate

              Minimum data rate that outbound traffic uses. Modify this setting when Call Admission Control (CAC) is enabled.

              Note   

              Cisco APs support only PHY rates of 6, 11, 12, or 24. The default is 12. If you use an access point that uses 802.11b, the PHY rate must be configured to the supported rate.

              Set Up Advanced Profile Settings

              Surplus Bandwidth

              Excess bandwidth beyond application requirements

              802.11G Power Settings

              Channel

              Assigns the channels

              Set Up Advanced Profile Settings

              Status

              Enabled: Identifies enabled channels in WLAN to improve scanning for the phone.

              MaxTxPower

              Sets the maximum transmit power for the phone

              802.11A Power Settings

              Channel

              Assigns the channels

              Set Up Advanced Profile Settings

              Status

              Enabled: Identifies enabled channels in WLAN to improve scanning for the phone

              Max Tx Power

              Sets the maximum transmit power for the phone


              Note


              If you uncheck all channels in the 802.11g Power Settings window or 802.11a Power Settings window, the phone cannot access the WLAN.


              Related Tasks
              Related References

              Set Up Wireless Settings in Network Profile

              You must configure wireless settings in a profile to enable the phone to access the wireless network. To configure the wireless settings, see Network Profile Settings and follow these steps.

              Procedure
                Step 1   Choose the network profile that you want to configure.
                Step 2   To give the profile a recognizable name, in the Profile Name field, enter a name up to 63 characters and numbers in length.
                Step 3   To identify the SSID that the phone uses to associate with access points, in the SSID field, enter an SSID that is already configured in the WLAN.
                Note   

                The SSID is case sensitive; you must enter it exactly as configured in the network.

                Step 4   To conserve battery power, in the Call Power Save Mode, choose the type (U-APSD or PS-Poll) and option that is being used in the WLAN.
                Step 5   Choose the signal mode or priority of signal modes in the 802.11 Mode field that is used by your WLAN.

                Wireless LAN Security

                The Cisco Unified Wireless IP Phone supports many types of authentication. Authentication methods might require a specific encryption method or you can choose between several encryption methods. When configuring a network profile, you can choose one of these authentication methods:

                Open

                Provides access to all access points without WEP Key authentication or encryption.

                Open plus WEP

                Provides access to all access points and authentication through the use of one or more WEP Keys at the local access point.

                Shared Key plus WEP

                Provides shared key authentication through the use of WEP Keys at the local access point.

                LEAP

                Exchanges a username and cryptographically secure password with a RADIUS server for authentication in the network. LEAP is a Cisco proprietary version of EAP.

                EAP-FAST

                Exchanges a username and password with a RADIUS server for authentication in the network.

                EAP-TLS

                Uses a dynamic session-based WEP key derived from the client adapter and RADIUS server to encrypt data and a client certificate for authentication. It uses PKI to secure communication to the RADIUS authentication server.

                PEAP (EAP-MSCHAP V2)

                Performs mutual authentication, but does not require a client certificate on the phone. This method uses name and password authentication based on Microsoft MSCHAP V2 authentication.

                Server validation can optionally be enabled from the phone web page in the Network Profile configuration.

                The server validation feature requires that the server certificate be imported to the phone from the phone web page.

                Auto (AKM)

                Automatic authenticated key management in which the phone selects the AP and type of key management scheme, which includes WPA, WPA2, WPA-Pre-shared key (PSK), WPA2-PSK, or CCKM (which uses a wireless domain server [WDS]).


                Note


                When set to AKM mode, the phone uses LEAP for 802.1x type authentication methods (non-PSK such as WPA, WPA2, or CCKM). AKM mode supports only authenticated key-management types (WPA, WPA2, WPA-PSK, WPA2-PSK, CCKM).


                The type of authentication and encryption schemes that you use with your WLAN determine how you set up the authentication, security, and encryption options in the network profiles for the Cisco Unified Wireless IP Phones. The following table provides a list of supported authentication and encryption schemes that you can configure on the Cisco Unified Wireless IP Phone.

                Table 4 Authentication and encryption configuration options

                Authentication mode

                Wireless encryption

                Wireless security credentials

                Open

                None

                None: access to all APs

                Open plus WEP

                Static WEP

                Requires WEP Key

                Requires a WEP key

                Shared Key plus WEP

                Static WEP

                Requires WEP Key

                Requires a WEP key

                LEAP (with optional CCKM)

                Uses WEP, TKIP or AES

                Requires Username and Password

                EAP-FAST (with optional CCKM)

                Uses WEP, TKIP or AES

                Requires Username and Password

                EAP-TLS (with optional CCKM)

                Uses WEP, TKIP, or AES

                Requires Username and Password

                Requires server and client certificates

                PEAP (with optional CCKM)

                Uses WEP, TKIP, or AES

                Requires Username and Password

                Requires server side certificate

                Auto (AKM) with CCKM

                Uses TKIP or AES

                Requires Username and Password

                Auto (AKM) with WPA (with optional CCKM)

                Uses TKIP

                Requires Username and Password

                Auto (AKM) with WPA2 (with optional CCKM)

                Uses AES

                Requires Username and Password

                Auto (AKM) with WPA Pre-Shared Key

                Uses TKIP

                Requires Passphrase

                Auto (AKM) with WPA2 Pre-Shared Key

                Uses AES

                Requires Passphrase

                Set Up Authentication Mode

                To select the Authentication Mode for this profile, follow these steps:

                Procedure
                  Step 1   Choose the network profile that you want to configure.
                  Step 2   Choose the authentication mode.
                  Note   

                  Depending on what you selected, you must configure additional options in Wireless Security or Wireless Encryption. See Wireless LAN Security for more information.

                  Step 3   Click Save to make the change.

                  Wireless Security Credentials

                  When your network uses EAP-FAST, LEAP, EAP-TLS, PEAP, or Auto (AKM) with WPA, WPA2, CCKM for user authentication, you must configure both the username and a password on the Access Control Server (ACS) and the phone.


                  Note


                  If you use domains within your network, you must enter the username with the domain name, in the format: domain\username.


                  The following sections provide information about setting security credentials.

                  Set Up Username and Password

                  To enter or change the username or password for the network profile, you must use the same username and the same password string that are configured in the RADIUS server. The maximum length of the username or password entry is 32 characters.

                  To set up the username and password in Wireless Security Credentials, follow these steps:

                  Procedure
                    Step 1   Choose the network profile.
                    Step 2   In the Username field, enter the network username for this profile.
                    Step 3   In the Password field, enter the network password string for this profile.
                    Step 4   Click Save to make the change.

                    Pre-Shared Key Setup

                    When using Auto (AKM) for WPA Pre-shared key or WPA2 Pre-shared key authentication, you must configure a Passphrase/Pre-shared key in the Wireless Security Credentials area.

                    Pre-Shared Key Formats

                    The Cisco Unified Wireless IP Phone supports ASCII and hexadecimal formats. You must use one of these formats when setting up a WPA Pre-shared key:

                    Hexadecimal

                    For hexadecimal keys, you enter 64 hex digits (0-9 and A-F); for example, AB123456789CD01234567890EFAB123456789CD01234567890EF3456789C

                    ASCII

                    For ASCII keys, you enter a character string that uses 0-9, A-Z (upper and lower case), including symbols and is from 8 to 63 characters in length; for example, GREG12356789ZXYW

                    Set Up PSK

                    To set up a PSK in the Wireless Credentials area, follow these steps:

                    Procedure
                      Step 1   Choose the network profile that uses Auto (AKM) to enable the WPA Pre-shared key or WPA2 Pre-shared key.
                      Step 2   In the Key Type area, choose one of these character formats:
                      • Hex

                      • ASCII

                      Step 3   Enter an ASCII string or hexadecimal digits in the Passphrase/Pre-shared key field. See Pre-Shared Key Formats.
                      Step 4   Click Save to make the change.

                      Wireless Encryption

                      If your wireless network uses WEP encryption, and you set the Authentication Mode as Open + WEP or Shared Key + WEP, you must enter an ASCII or hexadecimal WEP Key.

                      The WEP Keys for the phone must match the WEP Keys assigned to the access point. Cisco Unified Wireless IP Phone and Cisco Aironet Access Points support both 40-bit and 128-bit encryption keys.

                      WEP Key Formats

                      You must use one of these formats when setting up a WEP key:

                      Hexadecimal

                      For hexadecimal keys, you use one of the following key sizes:

                      40-bit

                      You enter a 10-digit encryption key string that uses the hex digits (0-9 and A-F); for example, ABCD123456.

                      128-bit

                      You enter a 26-digit encryption key string that uses the hex digits (0-9 and A-F); for example, AB123456789CD01234567890EF.

                      ASCII

                      For ASCII keys, you enter a character string that uses 0-9, A-Z (upper and lower case), and all symbols, with one of the following key sizes:

                      40-bit

                      You enter a 5-character string; for example, GREG5.

                      128-bit

                      You enter a 13-character string; for example, GREGSSECRET13.

                      Set Up WEP Keys

                      To set up WEP keys, follow these steps.

                      Procedure
                        Step 1   Choose the network profile that uses Open+WEP or Shared+WEP.
                        Step 2   In the Key Type area, choose one of these character formats:
                        • Hex

                        • ASCII

                        Step 3   For Encryption Key 1, click Transmit Key.
                        Step 4   In the Key Size area, choose one of these character string lengths:
                        • 40

                        • 128

                        Step 5   In the Encryption Key field, enter the appropriate key string based on the selected Key Type and Key Size. See WEP Key Formats.
                        Step 6   Click Save to make the change.

                        Related Information

                        EAP-TLS Authentication Certificates

                        EAP-TLS is a certificate-based authentication that requires a trust relationship between two or more entities. Each entity has a certificate proving its identity and is signed by a trusted authority. These certificates are exchanged and verified during EAP-TLS authentication.


                        Note


                        The EAP-TLS certificate-based authentication requires that the internal clock on the Cisco Unified Wireless IP Phone be set correctly. Use the phone web page to set the clock on the phone before using EAP-TLS authentication.


                        To use EAP-TLS, both the Cisco Unified Wireless IP Phone and the Cisco Secure Access Control Server (ACS) must have certificates installed and configured properly. If your wireless network uses EAP-TLS for authentication, you can use the Manufacturing Installed Certificate (MIC) or a user installed certificate for authentication on the phone.

                        Manufacturing Installed Certificate

                        Cisco has included a Manufacturing Installed Certificate (MIC) in the phone at the factory.

                        During EAP-TLS authentication, the ACS server needs to verify the trust of the phone and the phone needs to verify the trust of the ACS server.

                        To verify the MIC, the Manufacturing Root Certificate and Manufacturing Certificate Authority (CA) Certificate must be exported from a Cisco Unified Wireless IP Phone and installed on the Cisco ACS server. These two certificates are part of the trusted certificate chain used to verify the MIC by the Cisco ACS server.

                        To verify the Cisco ACS certificate, a trusted subordinate certificate (if any) and root certificate (created from a CA) on the Cisco ACS server must be exported and installed on the phone. These certificates are part of the trusted certificate chain used to verify the trust of the certificate from the ACS server.

                        User-Installed Certificate

                        To use a user-installed certificate, a Certificate Signing Request (CSR) is generated on the phone, sent to the CA for approval, and the approved certificate installed on the Cisco Unified Wireless IP Phone.

                        During EAP-TLS authentication, the ACS server verifies the trust of the phone and the phone verifies the trust of the ACS server.

                        To verify the authenticity of the user-installed certificate, you must install a trusted subordinate certificate (if any) and root certificate from the CA that approved the user certificate on the Cisco ACS server. These certificates are part of the trusted certificate chain used to verify the trust of the user installed certificate.

                        To verify the Cisco ACS certificate, you export a trusted subordinate certificate (if any) and root certificate (created from a CA) on the Cisco ACS server and the exported certificates are installed on the phone. These certificates are part of the trusted certificate chain used to verify the trust of the certificate from the ACS server.

                        Install EAP-TLS Authentication Certificates

                        To install authentication certificates for EAP-TLS, perform the following steps.

                        Procedure
                          Step 1   From the phone web page, set the Cisco Unified Communications Manager date and time on the phone. For more information, see Set Date and Time.
                          Step 2   If using the Manufacturing Installed Certificate (MIC):
                          1. From the phone web page, export the CA root certificate and manufacturing CA certificate.
                          2. From Internet Explorer, install certificates on the Cisco ACS server and edit the trust list.
                          3. From Microsoft Certificate Services, export the CA certificate from the ACS server and import it to the phone.

                            For more information, see:

                          Step 3   If using a user installed certificate, from phone web page:
                          1. Generate the Certificate Signing Request (CSR).
                          2. Send the CSR to CA to sign.
                          3. Import the certificate.
                          4. Install certificate on the Cisco ACS server and edit the trust list.
                          5. Download the CA certificate from the ACS server and import it into the phone.

                            For more information, see Request and Import User-Installed Certificate.

                          Step 4   Using the ACS configuration tool, set up the user account.

                          For more information, see:


                          Set Date and Time

                          EAP-TLS uses certificate-based authentication that requires the internal clock on the Cisco Unified Wireless IP Phone to be set correctly. The date and time on the phone might change when it is registered to Cisco Unified Communications Manager.


                          Note


                          If a new server authentication certificate is being requested and the local time is behind the Greenwich Mean Time (GMT), the authentication certificate validation might fail. Cisco recommends that you set the local date and time ahead of the GMT.


                          To set the phone to the correct local date and time, follow these steps.

                          Procedure
                            Step 1   Select Date & Time from the left navigation pane.
                            Step 2   If the setting in the Current Phone Date & Time field is different from the Local Date & Time field, click Set Phone to Local Date & Time.
                            Step 3   Click Phone Restart, and then click OK.

                            Export and Install Certificates on ACS

                            To use the MIC, export the Manufacturing Root Certificate and Manufacturing CA Certificate and install it on the Cisco ACS server.

                            To export the manufacturing root certificate and manufacturing CA certificate to the ACS server, follow these steps.

                            Procedure
                              Step 1   From the phone web page, choose Certificates.
                              Step 2   Click Export next to the Manufacturing Root Certificate.
                              Step 3   Save the certificate and copy it to the ACS server.
                              Step 4   Repeat Steps 1 and 2 for the Manufacturing CA certificate.
                              Step 5   From the ACS Server System Configuration page, enter the file path for each certificate and install the certificates.
                              Note   

                              For more information about using the ACS configuration tool, see the ACS online help or the User Guide for Cisco Secure ACS for Windows.

                              Step 6   Use the Edit the Certificate Trust List (CTL) page to add the certificates to be trusted by ACS.

                              ACS Certificate Export Methods

                              Depending on the type of certificate you export from the ACS, use one of the following methods:

                              Export CA certificate from ACS using Microsoft Certificate Services

                              Use this method to export the CA certificate from the ACS server that signed the user-installed certificate or ACS certificate.

                              To export the CA certificate using the Microsoft Certificate Services web page, follow these steps.

                              Procedure
                                Step 1   From the Microsoft Certificate Services web page, select Download a CA certificate, certificate chain or CRL.
                                Step 2   At the next page, highlight the current CA certificate in the text box, choose DER under Encoding Method, then click Download CA certificate.
                                Step 3   Save the CA certificate.

                                Export CA Certificate from ACS Using Internet Explorer

                                Use this method to export the CA certificate from the ACS server that uses a self-signed certificate.

                                To export certificates from the ACS server using Internet Explorer, follow these steps.

                                Procedure
                                  Step 1   From Internet Explorer, choose Tools > Internet Options, then click the Content tab.
                                  Step 2   Under Certificates, click Certificates, then click the Trusted Root Certification Authorities tab.
                                  Step 3   Highlight the root certificate and click Export. The Certificate Export Wizard appears.
                                  Step 4   Click Next.
                                  Step 5   At the next window, select DER encoded binary X.509 (.CER), and click Next.
                                  Step 6   Specify a name for the certificate and click Next.
                                  Step 7   Save the CA certificate to be installed on the phone.

                                  Request and Import User-Installed Certificate

                                  To request and install the certificate on the phone, follow these steps.

                                  Procedure
                                    Step 1   From the phone web page, choose the network profile using EAP-TLS, and select User Installed in the EAP-TLS Certificate field.
                                    Step 2   Click Certificates.

                                    On the User Certificate Installation page, the Common Name field should match the user name in the ACS server.

                                    Note   

                                    You can edit the Common Name field if you wish. Make sure that it matches the username in the ACS server. See Set Up ACS User Account and Install Certificate.

                                    Step 3   Enter the information to be displayed on the certificate, and click Submit to generate the Certificate Signing Request (CSR).
                                    Step 4   In the next screen, select and copy the entire contents of the text box (the encoded CSR text). Send this data to the CA administrator for signing.

                                    Send the CSR text by e-mail or another method determined by your CA administrator. The following steps describe the basic CSR approval process on the CA web page.

                                    Step 5   From the Microsoft Certificate Services Request a Certificate page, select Advanced certificate request to initiate the signing request.
                                    Step 6   At the Advanced Certificate Request page, select Submit a certificate request by using a base-64-encoded PKCS CMC.
                                    Step 7   Copy the certificate data from the Cisco Unified Wireless IP Phone and paste it in the Saved Request text box, then click Submit.
                                    Step 8   After the CSR is approved, the certificate must be exported in a DER encoded format and sent to the original requestor.
                                    Step 9   Return to the phone web page and choose Certificates to import the signed certificate.
                                    Step 10   On the Certificates page, locate the User Installed certificate line, and click Import.
                                    Step 11   Browse to the certificate on your PC to import to the phone.

                                    Install Authentication Server Root Certificate

                                    To install the Authentication Server Root Certificate on the phone, follow these steps.

                                    Procedure
                                      Step 1   Export the Authentication Server Root Certificate from the ACS. See ACS Certificate Export Methods.
                                      Step 2   Go to the phone web page and choose Certificates.
                                      Step 3   Click Import next to the Authentication Server Root certificate.
                                      Step 4   Restart the phone.

                                      Set Up ACS User Account and Install Certificate

                                      To set up the user account name and install the MIC root certificate for the phone on the ACS, follow these steps.


                                      Note


                                      For more information about using the ACS configuration tool, see the ACS online help or the User Guide for Cisco Secure ACS for Windows.


                                      Procedure
                                        Step 1   From the ACS configuration tool User Setup page, create a phone user account name if it is not already set up.

                                        Typically, the user name includes the phone MAC address at the end (for example, CP-7925G-SEPxxxxxxxxxxxx). No password is necessary for EAP-TLS.

                                        Note   

                                        Make sure the user name matches the Common Name field in the User Certificate Installation page. See Request and Import User-Installed Certificate.

                                        Step 2   On the System Configuration page, in the EAP-TLS section, enable these fields:
                                        • Allow EAP-TLS

                                        • Certificate CN comparison

                                        Step 3   On the ACS Certification Authority Setup page, add the Manufacturing Root Certificate and Manufacturing CA Certificate to the ACS server.
                                        Step 4   Enable both the Manufacturing Root Certificate and Manufacturing CA Certificate in the ACS Certificate Trust List.

                                        PEAP Setup

                                        Protected Extensible Authentication Protocol (PEAP) uses server-side public key certificates to authenticate clients by creating an encrypted SSL/TLS tunnel between the client and the authentication server.


                                        Note


                                        The authentication server validation can be enabled by importing the authentication server certificate.


                                        Before You Begin

                                        Before you configure PEAP authentication for the phone, make sure these Cisco Secure ACS requirements are met:

                                        • The ACS root certificate must be installed.

                                        • The Allow EAP-MSCHAPv2 setting must be enabled.

                                        • User account and password must be configured.

                                        • For password authentication, you can use the local ACS database or an external one (such as Windows or LDAP).

                                        Enable PEAP Authentication

                                        To enable PEAP authentication on the phone, follow these steps.

                                        Procedure
                                          Step 1   From the phone configuration web page, choose PEAP as the authentication mode. See Set Up Authentication Mode.
                                          Step 2   Enter a user name and password.

                                          IP Network Settings

                                          The Cisco Unified IP Phones enable DHCP, by default, to automatically assign IP addresses to devices when you connect them to the network. If you do not use DHCP in your network, then you must disable DHCP and manually enter network configuration information.

                                          When DHCP is disabled in the network, you must configure the following settings in the Static Settings menu:

                                          • IP address

                                          • Subnet mask

                                          • Default Router

                                          • DNS server 1 and 2

                                          • TFTP server 1

                                          Use these guidelines when manually configuring the IP settings:

                                          • Ensure the TFTP server has an IP address.

                                          • Ensure the default router IP address is on the same subnet as the host IP address.

                                          Enable DHCP

                                          To enable the use of DHCP in the Network Profile, follow these steps:

                                          Procedure
                                            Step 1   Choose the network profile that you want to configure.
                                            Step 2   Under the IP Network Configuration area, choose the option Obtain IP address and DNS servers automatically.
                                            Step 3   Click Save to make the change.

                                            Disable DHCP

                                            To disable the use of DHCP in the Network Profile, follow these steps:

                                            Procedure
                                              Step 1   Choose the network profile that you want to configure.
                                              Step 2   Under the IP Network Configuration area, choose Use the following IP addresses and DNS servers.
                                              Step 3   Enter the required IP addresses. See Network Configuration Fields When DHCP Not in Use for descriptions of these fields.
                                              Step 4   Click Save to make the change.

                                              Network Configuration Fields When DHCP Not in Use

                                              When DHCP is not in use, the fields listed in the following table need to be statically configured.

                                              Table 5 Network Configuration fields

                                              Static setting

                                              Description

                                              IP Address

                                              IP address of the phone

                                              Subnet Mask

                                              Subnet mask used by the phone

                                              Default Router 1

                                              Primary gateway used by the phone

                                              DNS Server 1

                                              DNS Server 2

                                              Primary DNS server used by the phone

                                              Optional backup DNS server used by the phone

                                              TFTP Server 1

                                              TFTP Server 2

                                              Primary TFTP server used by the phone

                                              Optional backup TFTP server used by the phone

                                              Domain Name

                                              Name of the DNS in which the phone resides

                                              Set Up Alternate TFTP Server

                                              If you use DHCP to direct the phones to a TFTP server, you can also assign an alternative TFTP server to some phones instead of the one assigned by DHCP.


                                              Note


                                              If you disable DHCP, then you must use these steps to set up the TFTP server for the phone.


                                              To assign an alternate TFTP server to a phone, follow these steps:

                                              Procedure
                                                Step 1   Choose the network profile that you want to configure.
                                                Step 2   In the TFTP area, choose the option Use the following TFTP servers.
                                                Step 3   You must enter the required IP addresses. See Network Configuration Fields When DHCP Not in Use for descriptions of these fields.
                                                Step 4   Click Save to make the change.

                                                Set Up Advanced Profile Settings

                                                The Network Profiles in the Settings menu enable the settings for QoS, bandwidth, and power. The Traffic Specification (TSPEC) parameters are used to advertise information about generated traffic for Call Admission Control (CAC) to the AP. The parameters are:

                                                Minimum PHY rate

                                                Lowest rate that outbound traffic is expected to use before the phone roams to another AP.

                                                Surplus Bandwidth Allowance

                                                Fractional number that specifies the excess allocation of time and bandwidth above application rates required to transport a MAC service data unit (MSDU) in a TSPEC frame.


                                                Note


                                                If your wireless LAN has access points that use 802.11b and you plan to use Call Admission Control (CAC) with TSPEC, then you need to modify the PHY rate to a supported rate for your 802.11b access points.


                                                To make changes to the advanced settings, follow these steps:

                                                Procedure
                                                  Step 1   Choose the network profile that you want to configure.
                                                  Step 2   Click the Advanced Profile link at the top of the page.
                                                  Step 3   In the TSPEC Setting area, Cisco recommends that you keep the minimum PHY rate at 12 Mbps.
                                                  Note   

                                                  If you are using 802.11b APs and plan to use Call Admission Control (CAC) with TSPEC, then set the PHY Rate to a rate that the APs support such as 11 Mbps.

                                                  Step 4   In the Surplus Bandwidth field, enter the appropriate values.
                                                  Step 5   In the 802.11G Power Settings area, check only the channels that are used in your WLAN, so that the phone scans for only those channels.

                                                  In the Max Tx Power field, keep the default value.

                                                  Step 6   In the 802.11A Power Settings area, check only the channels that are used in your WLAN, so that the phone scans for only those channels.

                                                  In the Max Tx Power field, keep the default value.

                                                  Caution   

                                                  You must check at least one channel after using Clear All, to enable the phone to access the WLAN.

                                                  Step 7   Click Save to make the change.

                                                  Set Up USB Settings on PC

                                                  To use the USB cable from your PC to a phone, you must configure the USB settings to work with the USB port on the PC. The phone has a default USB IP address of 192.168.1.100. You can change the USB port configuration on the phone in these ways:

                                                  • To obtain the IP address automatically, by getting an IP address from the PC that has DHCP set up.
                                                  • To use the IP address and subnet mask assigned in this area.

                                                  To display the USB Settings area, access the web page for the phone as described in Access Phone Web Page, and then click the USB Settings hyperlink.

                                                  To change the USB port settings for the phone, follow these steps:

                                                  Procedure
                                                    Step 1   On the phone web page, choose the USB Settings hyperlink.
                                                    Step 2   Choose one of the following options:
                                                    • Obtain IP address automatically

                                                    • Use the following IP address

                                                    Step 3   To change the static IP address, in the IP Address field, enter a new IP address that is not assigned on the subnet.
                                                    Step 4   To change the subnet for the new IP address, in the Subnet Mask field, enter the appropriate subnet mask.
                                                    Step 5   Click Save to make the change.

                                                    Related Information

                                                    Set Up Trace Settings

                                                    You can use the Trace Settings area on the web page to configure how the phone creates and saves trace files (often used in troubleshooting). Because trace files are stored in the memory of the phone, you can control the number of files and the data that you want to collect. Trace Settings Fields describes these configurable items.


                                                    Note


                                                    When preserving trace logs, choose only the logs that need to be saved after the phone is powered off and powered on to avoid using up phone memory.


                                                    To display the Trace Settings area, access the web page for the phone as described in the Access Phone Web Page, and then click the Trace Settings hyperlink under Setup. For information about the fields, see Trace Settings Fields.


                                                    Note


                                                    • When set to False, the trace logs are lost when the phone is powered off.
                                                    • When the phone is powered off, then powered back on, the Preserve Logs field is reset to False, the default value.

                                                    There are various levels of tracing available that provide different levels of messaging:

                                                    • Emergency

                                                    • Alert

                                                    • Critical

                                                    • Error

                                                    • Warning

                                                    • Notice

                                                    • Info

                                                    • Debug

                                                    To change the trace settings for the phone, follow these steps:

                                                    Procedure
                                                      Step 1   On the phone web page, choose the Trace Settings hyperlink.
                                                      Step 2   In the Number of Files field, choose the number of trace files to save, from 2 to 10.
                                                      Step 3   In the Remote Syslog Server area, check the box to enable a server to collect the trace files.
                                                      Step 4   If you enabled the syslog server, you must complete these fields:
                                                      IP Address

                                                      Enter server IP address.

                                                      Port

                                                      Enter a port number (514, 1024-65535).

                                                      Step 5   In the Module Trace Level area, check only the modules for which you want data:
                                                      • Kernel

                                                      • Wireless LAN Driver

                                                      • Wireless LAN Manager

                                                      • Configuration

                                                      • Call Control

                                                      • Network Services

                                                      • Security Subsystem

                                                      • User Interface

                                                      • Audio System

                                                      • System

                                                      • Java

                                                      • Bluetooth

                                                      Step 6   In the Advanced Trace Settings area, in the Preserve Logs field, choose one of the following:
                                                      True

                                                      Save the trace logs to flash memory on the phone.

                                                      False

                                                      Save the trace logs to RAM.

                                                      Step 7   Click Save to make the changes.

                                                      Trace Settings Fields

                                                      Table 6 Trace Settings fields

                                                      Item

                                                      Description

                                                      General

                                                      Number of Files

                                                      Choose the number of trace files that the phone saves, from 2 to 10 files.

                                                      File Size

                                                      Choose the File size for the trace file that is saved. The file size range is 50K to 250K.

                                                      Remote Syslog Server

                                                      Enable Remote Syslog

                                                      Set up a remote server to store trace logs

                                                      IP Address: Enter server IP address

                                                      Port: Enter a port number (514, 1024 to 65535)

                                                      Module Trace Level

                                                      Kernel

                                                      Operating System data

                                                      Wireless LAN Driver

                                                      Channel scanning, roaming, and authentication

                                                      Wireless LAN Manager

                                                      WLAN Management, QoS

                                                      Configuration

                                                      Phone configuration, firmware upgrade

                                                      Call Control

                                                      Cisco Unified Communications Manager messaging (SCCP)

                                                      Network Services

                                                      DHCP, TFTP, CDP, WWW, Syslog

                                                      Security Subsystem

                                                      Application level security data

                                                      User Interface

                                                      Key strokes, softkeys, MMI data

                                                      Audio System

                                                      RTP, SRTP, RTCP, DSP data

                                                      System

                                                      Event Manager

                                                      Java

                                                      Java MIDP

                                                      Bluetooth

                                                      Bluetooth

                                                      Advanced Trace Settings

                                                      Preserve Logs

                                                      True: Save trace logs after powering off the phone

                                                      False: Delete trace logs

                                                      Reset Trace Settings upon Reboot

                                                      You can enable debugging by configuring various settings on the Trace Configuration. These options determine how trace settings are handled when you reboot:

                                                      • Yes: Default value. Settings will be reset to the default values upon reboot.
                                                      • No: Trace settings will not reset upon reboot.
                                                      Related Information

                                                      Set Up Wavelink Settings

                                                      The Cisco Unified Wireless IP Phone supports the use of the Wavelink Avalanche server to configure the phone, which can be set up as a Wavelink Avalanche client device. Configuration Utility for Wavelink Avalanche can be installed on the Wavelink Avalanche server to configure a single phone or multiple phones with common settings. For more information, see Wavelink Avalanche Server.

                                                      You can use the phone web page to assign attributes to the phone that can be used to distinguish it from other mobile devices connected to the Wavelink server. These attributes can be used as search criteria for locating phones on the Wavelink server. For example, the predefined ModelName parameter with a value of CP7925G identifies a device as a Cisco Unified Wireless IP Phone 7925G or Cisco Unified Wireless IP Phone 7925G-EX, while CP7926 identifies a device as a Cisco Unified Wireless IP Phone 7926G.

                                                      By default, the parameters are configured as follows:

                                                      • ModelName = CP7925 or CP7926
                                                      • EnablerVer = 3.11-01

                                                      Note


                                                      For more information about using the Wavelink Avalanche server, see Wavelink Server IP Address Setup.


                                                      To configure Wavelink parameters using the phone web page, follow these steps:

                                                      Procedure
                                                        Step 1   From the phone web page, choose Wavelink Settings.
                                                        Step 2   In the Wavelink Custom Parameters section, enter values for each parameter in the Name and Value fields. You can define up to four pairs of custom parameters.
                                                        Note   

                                                        Do not use spaces in the Name field.


                                                        Phone Book Setup

                                                        Cisco Unified Wireless IP Phone users can store up to 100 contacts in the Phone Book on the phone. As the administrator, you can configure the Phone Book for these phones from the phone web page.


                                                        Note


                                                        Before you can access the Phone Book from the phone web page, you must enable the Phone Book Web Access privilege in Cisco Unified Communications Manager Administration.


                                                        Import and Export Contacts

                                                        To import contact information from a file, follow these steps.

                                                        Procedure
                                                          Step 1   From the phone web page, choose Phone Book > Import/Export from the left pane.
                                                          Step 2   At the Phone Book Import & Export page, do one of the following:
                                                          • To import a file, browse to it on your PC. Choose one of the following options, and click Import:

                                                            • Delete all current contacts before importing

                                                            • Delete only the current contacts that have the same IDs

                                                            • Merge current contacts with imported data

                                                          • To export a file, click Export. A file with your contact information displays. Save this file to your PC or another storage device.


                                                          Import and Export CSV Phone Contacts

                                                          When you export or import phone contact records using the Comma Separated Values (CSV) format, you can view, edit, or create records with third-party software such as Microsoft Excel and Microsoft Outlook. After editing or creating records, you can transfer them to the Cisco Unified Wireless IP Phone.


                                                          Note


                                                          The Cisco Unified Wireless IP Phone 7920G CSV files can be imported into the Cisco Unified Wireless IP Phone 7925G, 7925G-EX, and 7926G.


                                                          Each records contains fields separated by commas. The supported field names are as follows:

                                                          • First Name

                                                          • Last Name

                                                          • Company

                                                          • Business Street

                                                          • Business City

                                                          • Business State

                                                          • Business Postal Code

                                                          • Business Country

                                                          • Home Phone

                                                          • Home Speed Dial

                                                          • Business Phone

                                                          • Business Speed Dial

                                                          • Mobile Phone

                                                          • Mobile Speed Dial

                                                          • Business Fax

                                                          • Fax Speed Dial

                                                          • Other Phone

                                                          • Other Speed Dial (Speed Dial for Other/FAX Phone)

                                                          • Primary Phone (must match one of above phone numbers)

                                                          • E-mail Address

                                                          The following field names generated by the Cisco Unified Wireless IP Phone do not map to Microsoft Outlook by default:

                                                          • Nickname

                                                          • IM Address

                                                          • Unique Identifier (UUID)

                                                          Because the importing file may not have the UUID field generated by the Cisco Unified Wireless IP Phone, the import procedure includes the option for the user to use name fields as a way to match the importing record with the existing phone book records on the phone. Deleting or merging matching records is supported.

                                                          The First-name and Last-name fields must be matched with the following criteria:

                                                          • Use the First-Name and Last-Name to match if one of them is valid.
                                                          • Use the Company-Name field if other name fields are empty.

                                                          Microsoft Outlook 2003 does not support exporting or importing of Unicode characters. Because Microsoft Outlook 2003 uses the native international language characters when displaying the contacts list, it does not export these characters in the CSV file format. The Cisco Unified Wireless IP Phone uses the UTF-8 to encode the international character sets and Microsoft Outlook 2003 can import or export these characters; however, Microsoft Outlook 2003 may not properly display these characters.

                                                          Perform the following steps to import or export the phone book records into a file using CSV format.

                                                          Procedure
                                                            Step 1   Access the web page of the Cisco Unified Wireless IP Phone.
                                                            Step 2   Select the PHONE BOOK menu.
                                                            Step 3   To import, click the Import option.
                                                            Step 4   Specify how old and duplicated contact records are processed.
                                                            Step 5   Click Create File of Type.
                                                            Step 6   Click Comma Separated Values (CSV) format.
                                                            Step 7   To export, click the Export option.
                                                            Note   

                                                            If a Security Alert window displays, click Yes.

                                                            Step 8   Click Open, Save, or Cancel.
                                                            Step 9   Click Save and specify the filename and location.
                                                            Step 10   Click Save again.
                                                            Step 11   Click Import after all options are specified.
                                                            Step 12   Check the Status web page because it displays the number of valid records that were processed. Because the import function duplicates UUIDs and names, the total number of created contacts on the phone may be less than the total number of records processed.

                                                            Search Phone Book

                                                            You can search for contacts in the Phone Book by first name, last name, nickname, or company name.

                                                            To perform a search, follow these steps:

                                                            Procedure
                                                              Step 1   From the phone web page, choose Phone Book from the left pane.
                                                              Step 2   At the Phone Book page, enter a search string in the text box and click Search.

                                                              The contact records containing a match will be displayed.


                                                              Phone Book Actions

                                                              You can update the information for Phone Book from the phone web page.


                                                              Note


                                                              When you enter phone numbers, the web page stores and displays only numeric characters and the symbols # and *.


                                                              Add Contact

                                                              To add a contact to the Phone Book, follow these steps.

                                                              Procedure
                                                                Step 1   From the phone web page, choose Phone Book from the left pane.
                                                                Step 2   At the Phone Book page, click New. The Phone Book (New Contact) page appears.
                                                                Step 3   Enter information for this contact. If you wish to assign speed dials, see Assign Speed-Dial Hot Key to Contact Number.
                                                                Step 4   When finished, click Save.

                                                                Delete Contacts

                                                                To delete contacts from the Phone Book, follow these steps.

                                                                Procedure
                                                                  Step 1   From the phone web page, choose Phone Book from the left pane.
                                                                  Step 2   At the Phone Book page, select the contacts to delete, and click Delete.
                                                                  Step 3   To delete all contacts, click DeleteAll.

                                                                  Edit Contact Information

                                                                  To edit information for a contact, follow these steps:

                                                                  Procedure
                                                                    Step 1   From the phone web page, choose Phone Book from the left pane.
                                                                    Step 2   At the Phone Book page, select a contact. The Phone Book (Edit Contact) page appears.
                                                                    Step 3   Change or enter information for this contact. If you wish to assign speed dials, see Assign Speed-Dial Hot Key to Contact Number.
                                                                    Step 4   When finished, click Save.

                                                                    Assign Speed-Dial Hot Key to Contact Number

                                                                    You can assign a speed-dial hot key to any contact phone number in the Phone Book.

                                                                    To assign a speed-dial hot key to a contact number, follow these steps.

                                                                    Procedure
                                                                      Step 1   From the phone web page, add a new contact or select a contact record to edit. For more information, see Add Contact or Edit Contact Information.
                                                                      Step 2   At the Phone Book (Edit Contact) page or the Phone Book (New Contact) page, click the speed dial icon next to the phone number you wish to assign.
                                                                      Step 3   At the Phone Book (Speed Dial List) window, click an unassigned speed dial. The speed dial you selected is assigned to the contact number, and the speed dial code number appears next to the contact number.
                                                                      Step 4   Click Save.
                                                                      Step 5   To change a speed dial assignment, click the speed dial icon again and repeat Step 3.

                                                                      System Settings

                                                                      In addition to phone settings, the phone web page includes areas for system management.

                                                                      Related Tasks
                                                                      Related Information

                                                                      Trace Logs

                                                                      You can use the Trace Logs area on the web page to view and manage trace files. System trace logs appear in a list on this page. You define how many messages are saved in the Trace Settings area.

                                                                      To view a trace log, click on the Message.<n> link. The trace log appears in ASCII text. You can save the text file in a directory or on a disk to send to Cisco TAC for troubleshooting purposes.

                                                                      To download a trace log, click Download. All the trace logs on the phone are then collected into a file named SEP<MAC-ADDRESS-OF-PHONE>_LOGS.tar.gz for a downloading and saving.


                                                                      Note


                                                                      Trace logs are erased when the phone is powered off.


                                                                      To display the Trace Logs area, access the web page for the phone as described in the PC Setup for Phone Setup, and click the Trace Logs hyperlink.

                                                                      Related References

                                                                      Backup Settings Area

                                                                      You can use the Backup Settings area on the web page to export the phone configuration. You must set up an encryption key that encrypts the phone settings to keep them secure. When you export a configuration, all the settings in the network profiles, phone settings, USB settings, and trace are copied. None of the statistics or information fields are copied from the web pages.


                                                                      Note


                                                                      To import a file to a phone, you must enter the same encryption key that was used to export the file.


                                                                      To display the Backup Settings area, access the web page for the phone as described in the Access Phone Configuration Web Page, and click the Backup Settings hyperlink. The following table describes the items in this area.

                                                                      Table 7 Backup Settings area items

                                                                      Item

                                                                      Description

                                                                      Import Configuration

                                                                      Encryption Key

                                                                      Enter the alphanumeric string from 8 to 20 characters long for encrypting the phone settings.

                                                                      Import File

                                                                      Enter the path and filename or use the Browse button to locate the file.

                                                                      Import button

                                                                      Click the button to import the phone settings file into the phone.

                                                                      Export Configuration

                                                                      Encryption Key

                                                                      Enter the alphanumeric string from 8 to 20 characters long for encrypting the phone settings.

                                                                      Export button

                                                                      Click the button to export the phone settings file to a location on your PC or other location.

                                                                      Network Profile Templates

                                                                      At initial phone deployment, you can create a typical network profile and export the phone settings to a location that you specify, such as a folder on your PC or your network. Then, you can import the network profile template to several phones to save time.

                                                                      Create Phone Configuration Template

                                                                      To create a phone configuration template, follow these steps.

                                                                      Procedure
                                                                        Step 1   Connect the USB cable to the phone and access the phone web page using the instructions on Access Phone Web Page.
                                                                        Step 2   On the phone web page, choose the Network Profiles hyperlink and configure the Network Profile settings for your template configuration.
                                                                        Note   

                                                                        You can leave the Username and Password fields blank so they can be configured individually.

                                                                        Step 3   Next, configure the USB Settings and Trace Settings for your template configuration.
                                                                        Step 4   Choose the Backup Settings hyperlink to access the export and import settings.
                                                                        Step 5   In the Export Configuration area, enter an encryption key from 8 to 20 characters long.

                                                                        Record this key because you must enter this key to import the configuration template on other phones.

                                                                        Step 6   Click Export. The File Download dialog box appears.
                                                                        Step 7   Click Save.
                                                                        Step 8   Give your configuration a new file name, such as 7925template.cfg.
                                                                        Step 9   Choose a location on your PC or on the network for the file and click Save.

                                                                        Encrypted Configuration File Contents

                                                                        The encrypted configuration file contains these settings:

                                                                        • Profile Name

                                                                        • SSID

                                                                        • Single Access Point

                                                                        • Call Power Save Mode

                                                                        • 802.11 Mode

                                                                        • WLAN Security

                                                                        • Authentication Method

                                                                        • User name

                                                                        • Password

                                                                        • Passphrase

                                                                        • Encryption keys

                                                                        • Use DHCP to get IP address and DNS servers

                                                                        • Static Settings (if configured)

                                                                          • IP Address

                                                                          • Subnet Mask

                                                                          • Default Router

                                                                          • Primary DNS Server

                                                                          • Secondary DNS Server

                                                                        • Use DHCP to get TFTP Server

                                                                        • Static TFTP Settings (if configured)

                                                                          • TFTP Server 1

                                                                          • TFTP Server 2

                                                                        Advanced Network Profile Settings

                                                                        • Minimum PHY rate

                                                                        • Surplus Bandwidth

                                                                        • 802.11G Power Settings (checked ones)

                                                                        • 802.11A Power Settings (checked ones)

                                                                        USB Settings (use one of these)

                                                                        • Obtain IP address from server

                                                                        • Static settings (if configured)

                                                                          • IP address

                                                                          • Subnet Mask

                                                                        Trace Settings

                                                                        • Number of Files

                                                                        • Syslog Server (enabled/disabled)

                                                                          • IP address

                                                                          • Port

                                                                        • Modules and error level for collection

                                                                        • Preserving Logs (true/false)

                                                                        Import Configuration Template

                                                                        To import a phone configuration template, follow these steps.

                                                                        Procedure
                                                                          Step 1   Connect the USB cable to an unconfigured phone and access the phone web page using the instructions on Access Phone Web Page.
                                                                          Step 2   On the phone web page, choose the Backup Settings hyperlink.
                                                                          Step 3   In the Import Configuration area of the page, enter the Encryption Key.
                                                                          Note   

                                                                          You must enter the same key that you used to export the configuration template.

                                                                          Step 4   Use the Browse button to locate the configuration template and click Open.

                                                                          The configuration file downloads to the phone.

                                                                          Step 5   You can use the web pages to add missing configuration items such as the username and password or make other changes at this time.

                                                                          Related Tasks

                                                                          Upgrade Phone Firmware

                                                                          You can use the Phone Upgrade area on the web page to upgrade firmware files on the phones by using the USB connection or by using the WLAN.

                                                                          Procedure
                                                                            Step 1   To display the Phone Upgrade area, access the web page for the phone as described in the Access Phone Configuration Web Page, and click the Phone Upgrade hyperlink.
                                                                            Step 2   To upgrade the phone software, enter the phone software TAR (firmware filename) or use the Browse button to locate the firmware file on the network.

                                                                            Related References

                                                                            Administration Password Changes

                                                                            The method you use to change an administration password depends on the communications server being used in your system.

                                                                            Administration Passwords and Cisco Unified CallManager Release 4.x

                                                                            If you are running Cisco Unified CallManager Release 4.x, you can use the Change Password area on the web page to change the administration password for the phone web pages.

                                                                            To change the password on the web page, you must first enter the old password. Enter the new password and then reenter the new password to confirm the change.

                                                                            To display the Change Password area, access the web page for the phone as described in the Access Phone Configuration Web Page, and click the Change Password hyperlink in the System submenu.

                                                                            Administration Passwords and Cisco Unified Communications Manager Release 5.0 or Later

                                                                            If you are running Cisco Unified Communications Manager Release 5.0 or later, you must set the password in Cisco Unified Communications Manager Administration on the Phone Configuration page. The password that you set in Cisco Unified Communications Manager takes precedence over the password that you set on the web pages.


                                                                            Caution


                                                                            When setting the Administration Password in the Product Specific Configuration section in Cisco Unified Communications Manager Release 5.0 Administration, you must enable TFTP encryption. Otherwise, the password appears in readable text in the phone configuration file and can be viewed from any host that has access to TFTP server.


                                                                            Related Tasks
                                                                            Related References
                                                                            Related Information

                                                                            Site Survey Report

                                                                            Before the Site Survey Report is generated for viewing from the phone web page, you must first run the Site Survey utility from the phone. For more information, see Perform Site Survey.

                                                                            To view the report, go to the phone web page and choose Site Survey from the left pane. An HTML report in the form of a neighbor table of Access Points (AP) displays.


                                                                            Note


                                                                            You can also run the Neighbor List utility from the phone to display a list of current APs on the phone. However, this utility will not generate the Site Survey Report that you can access from the phone web page. See also Display Neighbor List.


                                                                            The neighbor table provides a matrix of APs observed during the site survey. Depending on the extent of the survey, not all observed APs will be considered a best AP or an immediate neighbor.

                                                                            The Site Survey Report stores information about each AP until it reaches a limit of 256 APs. For each AP, up to ten neighbors are tracked.

                                                                            The following table shows the information shown in the site survey report.

                                                                            Table 8 Site Survey Report Neighbor Table

                                                                            Information

                                                                            Description or indicator

                                                                            Report title

                                                                            The Service Set Identifier (SSID) used during Site Survey is displayed in the report title.

                                                                            Best AP

                                                                            Information displayed in cell with yellow background and where the row heading matches the column heading (for example, 64%-60/-43):

                                                                            • Percentage of time it is the best AP.
                                                                            • Received Signal Strength Indicator (RSSI) range during the time it is the best AP.
                                                                            Note   

                                                                            A low number (below -65) may indicate insufficient overlap between the best AP and its neighbors.

                                                                            Immediate Neighbor

                                                                            Information may be displayed in the following way:

                                                                            • Pink background: If AP is on the same channel as the best AP.

                                                                              Note   

                                                                              Being on the same channel as the best AP might indicate a problem with the channel re-use pattern, particularly if the percentage of time the AP is an immediate neighbor is relatively high compared with other immediate neighbors.

                                                                            • Asterisk (*): Not an immediate neighbor.

                                                                            Information displayed in cell (for example, 27%-61/-39):

                                                                            • Percentage of time the AP is the immediate neighbor of the best AP.
                                                                            • RSSI range during the time the AP is the immediate neighbor.

                                                                            The following table lists the information that is provided in the AP details report.

                                                                            Table 9 AP Details Report

                                                                            Field

                                                                            Description

                                                                            AP

                                                                            Name of the AP if it is CCX-compliant; otherwise, the MAC address is displayed here.

                                                                            MAC

                                                                            MAC address of the AP.

                                                                            Observation Count

                                                                            Number of sweeps where this AP has been observed.

                                                                            Channel - Frequency

                                                                            The last channel and frequency where this AP was observed.

                                                                            Country

                                                                            A two-digit country code. Country information might not be displayed if the country information element (IE) is not present in the beacon.

                                                                            Beacon Interval

                                                                            Number of time units between beacons. A time unit is 1.024 ms.

                                                                            DTIM Period

                                                                            Every nth beacon is a delivery traffic indication message (DTIM) period. After each DTIM beacon, the AP sends any broadcast or multicast packets that may have been queued for power-save devices.

                                                                            RSSI Range [Lo Hi]

                                                                            The entire RSSI range in which this AP has been observed.

                                                                            BSS Lost Count

                                                                            The Basic Service Set (BSS) Lost Count increments when the phone passes a threshold number of missed beacons. Missed beacons identify synchronization problems.

                                                                            Channel Utilization

                                                                            The percentage of time, normalized to 255, in which the AP sensed the medium was busy, as indicated by the physical or virtual carrier sense (CS) mechanism.

                                                                            Station Count

                                                                            Total number of spanning tree algorithms (STAs) currently associated with this BSS.

                                                                            Available Admission Capacity

                                                                            An unsigned integer that specifies the remaining amount of medium time available through explicit admission control, in units of 32 microseconds per second.

                                                                            Basic Rates

                                                                            Data rates required by the AP at which the station must be capable of operating.

                                                                            Optional Rates

                                                                            Data rates supported by the AP that are optional for the station to operate at.

                                                                            Multicast Cipher and Unicast Cipher

                                                                            For Multicast Cipher, one of the following; for Unicast Cipher, one or more of the following:

                                                                            • None
                                                                            • WEP40
                                                                            • WEP104
                                                                            • TKIP
                                                                            • CCMP
                                                                            • CKIP CMIC
                                                                            • CKIP
                                                                            • CMIC

                                                                            AKM

                                                                            One or more of the following:

                                                                            • WPA1_1X
                                                                            • WPA_PSK
                                                                            • WPA2_1X
                                                                            • WPA2_PSK
                                                                            • WPA1_CCKM
                                                                            • WPA2_CCKM

                                                                            Proxy ARP Supported

                                                                            CCX-compliant AP supports responding to IP ARP requests on behalf of the associated station. This feature is critical to standby time on the wireless IP phone.

                                                                            WMM Supported

                                                                            Support for Wi-Fi Multimedia Extensions.

                                                                            CCX Version Number

                                                                            Version of CCX if the AP is CCX compliant.

                                                                            U-APSD Supported

                                                                            Unscheduled Automatic Power Save Delivery is supported by the AP. May only be available if WMM is supported. This feature is critical to talk time and achieving maximum call density on the wireless IP phone.

                                                                            Background AC

                                                                            Access Category information for each AC:

                                                                            • Admission Control Required: If yes, admission control must be used prior to transmission using the access parameters specific for this AC.
                                                                            • AIFSN: Number of slots after an SIFS duration a non-AP STA should defer before invoking a backoff or starting a transmission.
                                                                            • ECWMIN: Encodes value of CWmin in an exponent form to provide the minimum amount of time in a random backoff.
                                                                            • ECWMAX: Encodes value of CWmax in an exponent form to provide the maximum amount of time in a random backoff.
                                                                            • TXOpLimit: Interval of time in which a particular quality of service (QoS) station has the right to initiate frame exchange sequences onto the wireless medium.

                                                                            Best Effort AC

                                                                            Video AC

                                                                            Voice AC

                                                                            Channels

                                                                            A list of supported channels (from the country IE).

                                                                            Power

                                                                            Maximum transmit power in dBm permitted for that channel.

                                                                            Warning messages (in red at the bottom)

                                                                            The first AP in the list (reference AP) is compared with the values recommended by Cisco, the differences are reported as warnings, and warning messages appear at the bottom of this report. All other APs are compared with the reference AP for consistency.