Cisco Unified Wireless IP Phone 7925G, 7925G-EX, and 7926G Web Pages
This chapter describes how to set up your PC to configure a Cisco Unified Wireless IP Phone 7925G, 7925G-EX, and 7926G by using a USB connector and how to remotely access a configured phone over the WLAN. It contains the following sections:
To set up new phones, use your PC and USB connection to enter the initial configuration for the wireless network settings and network profiles. To save time during initial deployment, you can create a standard network profile template and export it to several phones.
Before you can configure phones by using the USB connection, you must install drivers and set up the USB ports on the phone and PC.
Your PC must have one of the following operating systems:
To make changes to the phone by using the web page, you must use Cisco Unified Communications Manager Administration to enable Web Access and Phone Book Web Access.
To allow configuration privileges, follow these steps.
Log in to Cisco Unified Communications Manager Administration.
Search for the phone by choosing Device > Phone and enter search information such as the DN.
The administrator password for web access can also be changed using the Product Specific Configuration page of the Cisco Unified Communications Manager Administration.
Click on the DN of the phone that you want to set the privileges.
Open the Phone Configuration window, scroll down to Product Specific Configuration Layout, and enable these privileges:
In the Web Access field, select Full from the drop-down menu.
In the Phone Book Web Access field, select Allow Admin.
Click Save to make the change.
You must reset the phone to enable configuration privileges on the web pages for this phone.
Access phone configuration web page
You can access the web page for any Cisco Unified Wireless IP Phone that is connected to the WLAN. Be sure the phone is powered on, connected, and registered to a Cisco Unified Communications Manager server.
If a wireless IP phone was previously registered to Cisco Unified CallManager Administration Release 4.x, and you try to register to Cisco Unified Communications Manager Administration Release 5.0 or later, the Phone Configuration web page password might be set to Cisco.
To access the web page for the Cisco Unified Wireless IP Phone follow these steps.
Log in to the Cisco Unified Communications Manager Administration.
Go to Device > Phone.
All of the phones display. If the phone is registered with a Cisco Unified Communications Manager Administration, the IP address displays. The phone IP address is linked to the Home web page.
Click on the Description field in the Phone Configuration window of Cisco Unified Communications Manager Administration. The Device Information section displays.
Go to the Web Access field in the Product Specific Configuration Layout and change the parameter to Full. This parameter gives you full access to all of the web pages.
Choose one of the following methods:
From the Phone Configuration window, click on the linked IP address.
The Home web page displays. There are two sections displayed on the Home web page: setup menus (left) and summary information (right). Home web page menu describes the available Home web page menus, from which you can configure network profiles, USB settings, trace settings, Wavelink settings, and certificates. Home web page summary information describes the phone summary information.
Or if you already know the IP address, you can open a web browser and enter the following URL. The IP_address variable is the IP address of the Cisco Unified IP Phone:
If the Security Alert dialog box displays a notice to accept the Trust Certificate, click Yes or Always to accept the application.
Log in to the Home web page with the default username: admin and enter the default password: Cisco. You may need to log into additional windows to configure other options.
Make changes to configurable pages as needed.
Return to the Phone Configuration page in Cisco Unified Communications Manager Administration and set the Web Access field back to Read Only or Disabled.
Reset the phone from Cisco Unified Communications Manager to disable full access to the web pages.
Be sure to change the Web Access privileges and reset the phone to prevent users from making configuration changes on the phone web pages.
Home web page menu
The following table describes the menu entries in the home web page.
The summary information for your phone displays on this section of the Home web page. It also displays the network and Cisco Unified Communications Manager information. The following table describes these items.
Table 2 Summary information
DN assigned to the phone.
Active Network Profile
Name of the profile that the phone is currently using.
SSID that the phone is currently using.
Name of the access point (AP) to which the phone is associated.
MAC address of the phone.
IP address of the phone.
Subnet mask used by the phone.
IP address for the default gateway that the phone is using.
IP address for the primary TFTP server that the phone is using.
Call Manager Information
Active Unified CM
IP address for the Cisco Unified Communications Manager server to which the phone is registered.
You can configure up to four profiles for a phone to take advantage of WLAN environments. You can add names to the profiles and enable one or more of the profiles for the phone to use. The Network Profiles section of the web page displays the following information about each phone:
Displays a list of four configurable profiles.
Indicates whether or not the profile is enabled.
Lists the name for the profile.
Lists the SSID used by the profile.
Indicates which profiles are active or inactive.
To display the Network Profiles list, access the web page for the phone as described Access phone web page, and then click the Network Profiles hyperlink.
For more information about configuring network profiles, see the following sections.
You can configure the profile settings using this web page area. You can also modify or view configured profiles from this web page area. The following table describes the basic and advanced profile settings and provides references for more information.
To display Network Profile (1-4) Settings, access the web page for the phone as described in Access phone web page, and then click the Profile (1-4) hyperlink.
Table 3 Basic network profile settings
For more information, see …
Descriptive name for the profile.
Assigns the Service Set Identifier (SSID) to this profile. You must assign the same SSID to the phone that is also assigned to access points in the wireless network.
Determines the signal mode or priority for selecting signal modes available in the WLAN. Options are:
802.11 b/g: Use only 2.4 GHz band
802.11a: Use only 5 GHz band
Auto, 802.11b/g preferred over 802.11a (dual-band)
Auto, 802.11a preferred over 802.11b/g (dual-band)
The preferred band, if available, is used at power-on, but the phone may switch to the less-preferred 2.4 GHz band, if available, and the preferred band is lost. After the phone has connected to the less-preferred band, it does not scan for the preferred band if the current band is acceptable, and may remain connected to the less-preferred band.
Auto, signal strength (RSSI): Use strongest signal in dual-band environment
You must configure wireless settings in a profile to enable the phone to access the wireless network. To configure the wireless settings, see Network profile settings and follow these steps.
Choose the network profile that you want to configure.
To give the profile a recognizable name, in the Profile Name field, enter a name up to 63 characters and numbers in length.
To identify the SSID that the phone uses to associate with access points, in the SSID field, enter an SSID that is already configured in the WLAN.
The SSID is case sensitive; you must enter it exactly as configured in the network.
To conserve battery power, in the Call Power Save Mode, choose the type (U-APSD or PS-Poll) and option that is being used in the WLAN.
Choose the signal mode or priority of signal modes in the 802.11 Mode field that is used by your WLAN.
Wireless LAN security
The Cisco Unified Wireless IP Phone supports many types of authentication. Authentication methods might require a specific encryption method or you can choose between several encryption methods. When configuring a network profile, you can choose one of these authentication methods:
Provides access to all access points without WEP Key authentication or encryption.
Open plus WEP
Provides access to all access points and authentication through the use of one or more WEP Keys at the local access point.
Shared Key plus WEP
Provides shared key authentication through the use of WEP Keys at the local access point.
Exchanges a username and cryptographically secure password with a RADIUS server for authentication in the network. LEAP is a Cisco proprietary version of EAP.
Exchanges a username and password with a RADIUS server for authentication in the network.
Uses a dynamic session-based WEP key derived from the client adapter and RADIUS server to encrypt data and a client certificate for authentication. It uses PKI to secure communication to the RADIUS authentication server.
PEAP (EAP-MSCHAP V2)
Performs mutual authentication, but does not require a client certificate on the phone. This method uses name and password authentication based on Microsoft MSCHAP V2 authentication.
Server validation can optionally be enabled from the phone web page in the Network Profile configuration.
The server validation feature requires that the server certificate be imported to the phone from the phone web page.
Automatic authenticated key management in which the phone selects the AP and type of key management scheme, which includes WPA, WPA2, WPA-Pre-shared key (PSK), WPA2-PSK, or CCKM (which uses a wireless domain server [WDS]).
When set to AKM mode, the phone uses LEAP for 802.1x type authentication methods (non-PSK such as WPA, WPA2, or CCKM). AKM mode supports only authenticated key-management types (WPA, WPA2, WPA-PSK, WPA2-PSK, CCKM).
The type of authentication and encryption schemes that you use with your WLAN determine how you set up the authentication, security, and encryption options in the network profiles for the Cisco Unified Wireless IP Phones. The following table provides a list of supported authentication and encryption schemes that you can configure on the Cisco Unified Wireless IP Phone.
Table 4 Authentication and encryption configuration options
To select the Authentication Mode for this profile, follow these steps:
Choose the network profile that you want to configure.
Choose the authentication mode.
Depending on what you selected, you must configure additional options in Wireless Security or Wireless Encryption. See Wireless LAN security for more information.
Click Save to make the change.
Wireless Security Credentials
When your network uses EAP-FAST, LEAP, EAP-TLS, PEAP, or Auto (AKM) with WPA, WPA2, CCKM for user authentication, you must configure both the username and a password on the Access Control Server (ACS) and the phone.
If you use domains within your network, you must enter the username with the domain name, in the format: domain\username.
The following sections provide information about setting security credentials.
To enter or change the username or password for the network profile, you must use the same username and the same password string that are configured in the RADIUS server. The maximum length of the username or password entry is 32 characters.
To set up the username and password in Wireless Security Credentials, follow these steps:
Choose the network profile.
In the Username field, enter the network username for this profile.
In the Password field, enter the network password string for this profile.
Click Save to make the change.
Pre-shared key setup
When using Auto (AKM) for WPA Pre-shared key or WPA2 Pre-shared key authentication, you must configure a Passphrase/Pre-shared key in the Wireless Security Credentials area.
EAP-TLS is a certificate-based authentication that requires a trust relationship between two or more entities. Each entity has a certificate proving its identity and is signed by a trusted authority. These certificates are exchanged and verified during EAP-TLS authentication.
The EAP-TLS certificate-based authentication requires that the internal clock on the Cisco Unified Wireless IP Phone be set correctly. Use the phone web page to set the clock on the phone before using EAP-TLS authentication.
To use EAP-TLS, both the Cisco Unified Wireless IP Phone and the Cisco Secure Access Control Server (ACS) must have certificates installed and configured properly. If your wireless network uses EAP-TLS for authentication, you can use the Manufacturing Installed Certificate (MIC) or a user installed certificate for authentication on the phone.
Cisco has included a Manufacturing Installed Certificate (MIC) in the phone at the factory.
During EAP-TLS authentication, the ACS server needs to verify the trust of the phone and the phone needs to verify the trust of the ACS server.
To verify the MIC, the Manufacturing Root Certificate and Manufacturing Certificate Authority (CA) Certificate must be exported from a Cisco Unified Wireless IP Phone and installed on the Cisco ACS server. These two certificates are part of the trusted certificate chain used to verify the MIC by the Cisco ACS server.
To verify the Cisco ACS certificate, a trusted subordinate certificate (if any) and root certificate (created from a CA) on the Cisco ACS server must be exported and installed on the phone. These certificates are part of the trusted certificate chain used to verify the trust of the certificate from the ACS server.
To use a user-installed certificate, a Certificate Signing Request (CSR) is generated on the phone, sent to the CA for approval, and the approved certificate installed on the Cisco Unified Wireless IP Phone.
During EAP-TLS authentication, the ACS server verifies the trust of the phone and the phone verifies the trust of the ACS server.
To verify the authenticity of the user-installed certificate, you must install a trusted subordinate certificate (if any) and root certificate from the CA that approved the user certificate on the Cisco ACS server. These certificates are part of the trusted certificate chain used to verify the trust of the user installed certificate.
To verify the Cisco ACS certificate, you export a trusted subordinate certificate (if any) and root certificate (created from a CA) on the Cisco ACS server and the exported certificates are installed on the phone. These certificates are part of the trusted certificate chain used to verify the trust of the certificate from the ACS server.
Install EAP-TLS authentication certificates
To install authentication certificates for EAP-TLS, perform the following steps.
From the phone web page, set the Cisco Unified Communications Manager date and time on the phone. For more information, see Set date and time.
If using the Manufacturing Installed Certificate (MIC):
From the phone web page, export the CA root certificate and manufacturing CA certificate.
From Internet Explorer, install certificates on the Cisco ACS server and edit the trust list.
From Microsoft Certificate Services, export the CA certificate from the ACS server and import it to the phone.
EAP-TLS uses certificate-based authentication that requires the internal clock on the Cisco Unified Wireless IP Phone to be set correctly. The date and time on the phone might change when it is registered to Cisco Unified Communications Manager.
If a new server authentication certificate is being requested and the local time is behind the Greenwich Mean Time (GMT), the authentication certificate validation might fail. Cisco recommends that you set the local date and time ahead of the GMT.
To set the phone to the correct local date and time, follow these steps.
Select Date & Time from the left navigation pane.
If the setting in the Current Phone Date & Time field is different from the Local Date & Time field, click Set Phone to Local Date & Time.
Click Phone Restart, and then click OK.
Export and install certificates on ACS
To use the MIC, export the Manufacturing Root Certificate and Manufacturing CA Certificate and install it on the Cisco ACS server.
To export the manufacturing root certificate and manufacturing CA certificate to the ACS server, follow these steps.
From the phone web page, choose Certificates.
Click Export next to the Manufacturing Root Certificate.
Save the certificate and copy it to the ACS server.
Repeat Steps 1 and 2 for the Manufacturing CA certificate.
From the ACS Server System Configuration page, enter the file path for each certificate and install the certificates.
For more information about using the ACS configuration tool, see the ACS online help or the User Guide for Cisco Secure ACS for Windows.
Use the Edit the Certificate Trust List (CTL) page to add the certificates to be trusted by ACS.
ACS Certificate Export Methods
Depending on the type of certificate you export from the ACS, use one of the following methods:
On the System Configuration page, in the EAP-TLS section, enable these fields:
Certificate CN comparison
On the ACS Certification Authority Setup page, add the Manufacturing Root Certificate and Manufacturing CA Certificate to the ACS server.
Enable both the Manufacturing Root Certificate and Manufacturing CA Certificate in the ACS Certificate Trust List.
Protected Extensible Authentication Protocol (PEAP) uses server-side public key certificates to authenticate clients by creating an encrypted SSL/TLS tunnel between the client and the authentication server.
The authentication server validation can be enabled by importing the authentication server certificate.
The Cisco Unified IP Phones enable DHCP, by default, to automatically assign IP addresses to devices when you connect them to the network. If you do not use DHCP in your network, then you must disable DHCP and manually enter network configuration information.
When DHCP is disabled in the network, you must configure the following settings in the Static Settings menu:
DNS server 1 and 2
TFTP server 1
Use these guidelines when manually configuring the IP settings:
Ensure the TFTP server has an IP address.
Ensure the default router IP address is on the same subnet as the host IP address.
The Network Profiles in the Settings menu enable the settings for QoS, bandwidth, and power. The Traffic Specification (TSPEC) parameters are used to advertise information about generated traffic for Call Admission Control (CAC) to the AP. The parameters are:
Minimum PHY rate
Lowest rate that outbound traffic is expected to use before the phone roams to another AP.
Surplus Bandwidth Allowance
Fractional number that specifies the excess allocation of time and bandwidth above application rates required to transport a MAC service data unit (MSDU) in a TSPEC frame.
If your wireless LAN has access points that use 802.11b and you plan to use Call Admission Control (CAC) with TSPEC, then you need to modify the PHY rate to a supported rate for your 802.11b access points.
To make changes to the advanced settings, follow these steps:
Choose the network profile that you want to configure.
Click the Advanced Profile link at the top of the page.
In the TSPEC Setting area, Cisco recommends that you keep the minimum PHY rate at 12 Mbps.
If you are using 802.11b APs and plan to use Call Admission Control (CAC) with TSPEC, then set the PHY Rate to a rate that the APs support such as 11 Mbps.
In the Surplus Bandwidth field, enter the appropriate values.
In the 802.11G Power Settings area, check only the channels that are used in your WLAN, so that the phone scans for only those channels.
In the Max Tx Power field, keep the default value.
In the 802.11A Power Settings area, check only the channels that are used in your WLAN, so that the phone scans for only those channels.
In the Max Tx Power field, keep the default value.
You must check at least one channel after using Clear All, to enable the phone to access the WLAN.
To use the USB cable from your PC to a phone, you must configure the USB settings to work with the USB port on the PC. The phone has a default USB IP address of 192.168.1.100. You can change the USB port configuration on the phone in these ways:
To obtain the IP address automatically, by getting an IP address from the PC that has DHCP set up.
To use the IP address and subnet mask assigned in this area.
To display the USB Settings area, access the web page for the phone as described in Access phone web page, and then click the USB Settings hyperlink.
To change the USB port settings for the phone, follow these steps:
On the phone web page, choose the USB Settings hyperlink.
Choose one of the following options:
Obtain IP address automatically
Use the following IP address
To change the static IP address, in the IP Address field, enter a new IP address that is not assigned on the subnet.
To change the subnet for the new IP address, in the Subnet Mask field, enter the appropriate subnet mask.
You can use the Trace Settings area on the web page to configure how the phone creates and saves trace files (often used in troubleshooting). Because trace files are stored in the memory of the phone, you can control the number of files and the data that you want to collect. Trace Settings fields describes these configurable items.
When preserving trace logs, choose only the logs that need to be saved after the phone is powered off and powered on to avoid using up phone memory.
To display the Trace Settings area, access the web page for the phone as described in the Access phone web page, and then click the Trace Settings hyperlink under Setup. For information about the fields, see Trace Settings fields.
When set to False, the trace logs are lost when the phone is powered off.
When the phone is powered off, then powered back on, the Preserve Logs field is reset to False, the default value.
There are various levels of tracing available that provide different levels of messaging:
To change the trace settings for the phone, follow these steps:
On the phone web page, choose the Trace Settings hyperlink.
In the Number of Files field, choose the number of trace files to save, from 2 to 10.
In the Remote Syslog Server area, check the box to enable a server to collect the trace files.
If you enabled the syslog server, you must complete these fields:
Enter server IP address.
Enter a port number (514, 1024-65535).
In the Module Trace Level area, check only the modules for which you want data:
Wireless LAN Driver
Wireless LAN Manager
In the Advanced Trace Settings area, in the Preserve Logs field, choose one of the following:
Save the trace logs to flash memory on the phone.
Save the trace logs to RAM.
Click Save to make the changes.
Trace Settings fields
Table 6 Trace Settings fields
Number of Files
Choose the number of trace files that the phone saves, from 2 to 10 files.
Choose the File size for the trace file that is saved. The file size range is 50K to 250K.
The Cisco Unified Wireless IP Phone supports the use of the Wavelink Avalanche server to configure the phone, which can be set up as a Wavelink Avalanche client device. Configuration Utility for Wavelink Avalanche can be installed on the Wavelink Avalanche server to configure a single phone or multiple phones with common settings. For more information, see Wavelink Avalanche Server.
You can use the phone web page to assign attributes to the phone that can be used to distinguish it from other mobile devices connected to the Wavelink server. These attributes can be used as search criteria for locating phones on the Wavelink server. For example, the predefined ModelName parameter with a value of CP7925G identifies a device as a Cisco Unified Wireless IP Phone 7925G or Cisco Unified Wireless IP Phone 7925G-EX, while CP7926 identifies a device as a Cisco Unified Wireless IP Phone 7926G.
By default, the parameters are configured as follows:
To import contact information from a file, follow these steps.
From the phone web page, choose Phone Book > Import/Export from the left pane.
At the Phone Book Import & Export page, do one of the following:
To import a file, browse to it on your PC. Choose one of the following options, and click Import:
Delete all current contacts before importing
Delete only the current contacts that have the same IDs
Merge current contacts with imported data
To export a file, click Export. A file with your contact information displays. Save this file to your PC or another storage device.
Import and export CSV phone contacts
When you export or import phone contact records using the Comma Separated Values (CSV) format, you can view, edit, or create records with third-party software such as Microsoft Excel and Microsoft Outlook. After editing or creating records, you can transfer them to the Cisco Unified Wireless IP Phone.
The Cisco Unified Wireless IP Phone 7920G CSV files can be imported into the Cisco Unified Wireless IP Phone 7925G, 7925G-EX, and 7926G.
Each records contains fields separated by commas. The supported field names are as follows:
Business Postal Code
Home Speed Dial
Business Speed Dial
Mobile Speed Dial
Fax Speed Dial
Other Speed Dial (Speed Dial for Other/FAX Phone)
Primary Phone (must match one of above phone numbers)
The following field names generated by the Cisco Unified Wireless IP Phone do not map to Microsoft Outlook by default:
Unique Identifier (UUID)
Because the importing file may not have the UUID field generated by the Cisco Unified Wireless IP Phone, the import procedure includes the option for the user to use name fields as a way to match the importing record with the existing phone book records on the phone. Deleting or merging matching records is supported.
The First-name and Last-name fields must be matched with the following criteria:
Use the First-Name and Last-Name to match if one of them is valid.
Use the Company-Name field if other name fields are empty.
Microsoft Outlook 2003 does not support exporting or importing of Unicode characters. Because Microsoft Outlook 2003 uses the native international language characters when displaying the contacts list, it does not export these characters in the CSV file format. The Cisco Unified Wireless IP Phone uses the UTF-8 to encode the international character sets and Microsoft Outlook 2003 can import or export these characters; however, Microsoft Outlook 2003 may not properly display these characters.
Perform the following steps to import or export the phone book records into a file using CSV format.
Access the web page of the Cisco Unified Wireless IP Phone.
Select the PHONE BOOK menu.
To import, click the Import option.
Specify how old and duplicated contact records are processed.
Click Create File of Type.
Click Comma Separated Values (CSV) format.
To export, click the Export option.
If a Security Alert window displays, click Yes.
Click Open, Save, or Cancel.
Click Save and specify the filename and location.
Click Save again.
Click Import after all options are specified.
Check the Status web page because it displays the number of valid records that were processed. Because the import function duplicates UUIDs and names, the total number of created contacts on the phone may be less than the total number of records processed.
Search Phone Book
You can search for contacts in the Phone Book by first name, last name, nickname, or company name.
To perform a search, follow these steps:
From the phone web page, choose Phone Book from the left pane.
At the Phone Book page, enter a search string in the text box and click Search.
The contact records containing a match will be displayed.
Phone Book Actions
You can update the information for Phone Book from the phone web page.
When you enter phone numbers, the web page stores and displays only numeric characters and the symbols # and *.
At the Phone Book (Edit Contact) page or the Phone Book (New Contact) page, click the speed dial icon next to the phone number you wish to assign.
At the Phone Book (Speed Dial List) window, click an unassigned speed dial. The speed dial you selected is assigned to the contact number, and the speed dial code number appears next to the contact number.
To change a speed dial assignment, click the speed dial icon again and repeat Step 3.
In addition to phone settings, the phone web page includes areas for system management.
You can use the Backup Settings area on the web page to export the phone configuration. You must set up an encryption key that encrypts the phone settings to keep them secure. When you export a configuration, all the settings in the network profiles, phone settings, USB settings, and trace are copied. None of the statistics or information fields are copied from the web pages.
To import a file to a phone, you must enter the same encryption key that was used to export the file.
To display the Backup Settings area, access the web page for the phone as described in the Access phone configuration web page, and click the Backup Settings hyperlink. The following table describes the items in this area.
Table 7 Backup Settings area items
Enter the alphanumeric string from 8 to 20 characters long for encrypting the phone settings.
Enter the path and filename or use the Browse button to locate the file.
Click the button to import the phone settings file into the phone.
Enter the alphanumeric string from 8 to 20 characters long for encrypting the phone settings.
Click the button to export the phone settings file to a location on your PC or other location.
Network Profile Templates
At initial phone deployment, you can create a typical network profile and export the phone settings to a location that you specify, such as a folder on your PC or your network. Then, you can import the network profile template to several phones to save time.
Administration Passwords and Cisco Unified CallManager Release 4.x
If you are running Cisco Unified CallManager Release 4.x, you can use the Change Password area on the web page to change the administration password for the phone web pages.
To change the password on the web page, you must first enter the old password. Enter the new password and then reenter the new password to confirm the change.
To display the Change Password area, access the web page for the phone as described in the Access phone configuration web page, and click the Change Password hyperlink in the System submenu.
Administration Passwords and Cisco Unified Communications Manager Release 5.0 or Later
If you are running Cisco Unified Communications Manager Release 5.0 or later, you must set the password in Cisco Unified Communications Manager Administration on the Phone Configuration page. The password that you set in Cisco Unified Communications Manager takes precedence over the password that you set on the web pages.
When setting the Administration Password in the Product Specific Configuration section in Cisco Unified Communications Manager Release 5.0 Administration, you must enable TFTP encryption. Otherwise, the password appears in readable text in the phone configuration file and can be viewed from any host that has access to TFTP server.
Before the Site Survey Report is generated for viewing from the phone web page, you must first run the Site Survey utility from the phone. For more information, see Perform Site Survey.
To view the report, go to the phone web page and choose Site Survey from the left pane. An HTML report in the form of a neighbor table of Access Points (AP) displays.
You can also run the Neighbor List utility from the phone to display a list of current APs on the phone. However, this utility will not generate the Site Survey Report that you can access from the phone web page. See also Display Neighbor List.
The neighbor table provides a matrix of APs observed during the site survey. Depending on the extent of the survey, not all observed APs will be considered a best AP or an immediate neighbor.
The Site Survey Report stores information about each AP until it reaches a limit of 256 APs. For each AP, up to ten neighbors are tracked.
The following table shows the information shown in the site survey report.
Table 8 Site Survey Report neighbor table
Description or indicator
The Service Set Identifier (SSID) used during Site Survey is displayed in the report title.
Information displayed in cell with yellow background and where the row heading matches the column heading (for example, 64%-60/-43):
Percentage of time it is the best AP.
Received Signal Strength Indicator (RSSI) range during the time it is the best AP.
A low number (below -65) may indicate insufficient overlap between the best AP and its neighbors.
Information may be displayed in the following way:
Pink background: If AP is on the same channel as the best AP.
Being on the same channel as the best AP might indicate a problem with the channel re-use pattern, particularly if the percentage of time the AP is an immediate neighbor is relatively high compared with other immediate neighbors.
Asterisk (*): Not an immediate neighbor.
Information displayed in cell (for example, 27%-61/-39):
Percentage of time the AP is the immediate neighbor of the best AP.
RSSI range during the time the AP is the immediate neighbor.
The following table lists the information that is provided in the AP details report.
Table 9 AP details report
Name of the AP if it is CCX-compliant; otherwise, the MAC address is displayed here.
MAC address of the AP.
Number of sweeps where this AP has been observed.
Channel - Frequency
The last channel and frequency where this AP was observed.
A two-digit country code. Country information might not be displayed if the country information element (IE) is not present in the beacon.
Number of time units between beacons. A time unit is 1.024 ms.
Every nth beacon is a delivery traffic indication message (DTIM) period. After each DTIM beacon, the AP sends any broadcast or multicast packets that may have been queued for power-save devices.
RSSI Range [Lo Hi]
The entire RSSI range in which this AP has been observed.
BSS Lost Count
The Basic Service Set (BSS) Lost Count increments when the phone passes a threshold number of missed beacons. Missed beacons identify synchronization problems.
The percentage of time, normalized to 255, in which the AP sensed the medium was busy, as indicated by the physical or virtual carrier sense (CS) mechanism.
Total number of spanning tree algorithms (STAs) currently associated with this BSS.
Available Admission Capacity
An unsigned integer that specifies the remaining amount of medium time available through explicit admission control, in units of 32 microseconds per second.
Data rates required by the AP at which the station must be capable of operating.
Data rates supported by the AP that are optional for the station to operate at.
Multicast Cipher and Unicast Cipher
For Multicast Cipher, one of the following; for Unicast Cipher, one or more of the following:
One or more of the following:
Proxy ARP Supported
CCX-compliant AP supports responding to IP ARP requests on behalf of the associated station. This feature is critical to standby time on the wireless IP phone.
Support for Wi-Fi Multimedia Extensions.
CCX Version Number
Version of CCX if the AP is CCX compliant.
Unscheduled Automatic Power Save Delivery is supported by the AP. May only be available if WMM is supported. This feature is critical to talk time and achieving maximum call density on the wireless IP phone.
Access Category information for each AC:
Admission Control Required: If yes, admission control must be used prior to transmission using the access parameters specific for this AC.
AIFSN: Number of slots after an SIFS duration a non-AP STA should defer before invoking a backoff or starting a transmission.
ECWMIN: Encodes value of CWmin in an exponent form to provide the minimum amount of time in a random backoff.
ECWMAX: Encodes value of CWmax in an exponent form to provide the maximum amount of time in a random backoff.
TXOpLimit: Interval of time in which a particular quality of service (QoS) station has the right to initiate frame exchange sequences onto the wireless medium.
Best Effort AC
A list of supported channels (from the country IE).
Maximum transmit power in dBm permitted for that channel.
Warning messages (in red at the bottom)
The first AP in the list (reference AP) is compared with the values recommended by Cisco, the differences are reported as warnings, and warning messages appear at the bottom of this report. All other APs are compared with the reference AP for consistency.