This chapter provides an overview of the interaction between a
wireless-capable Cisco Unified IP Phone 9971 and other key components of a VoIP
network in a wireless local area network (WLAN) environment.
For instructions on deploying and configuring a wireless Cisco Unified
IP Phone 9971, see the
Cisco Unified IP Phone 9971 Wireless LAN Deployment Guide
at this location:
With the introduction of wireless communication, Cisco Unified IP Phones with wireless capability, such as the Cisco Unified IP Phone 9971, can provide voice communication within the corporate WLAN. The Cisco Unified IP Phone depends upon and interacts with wireless access points (AP) and key Cisco IP telephony components, including Cisco Unified Communications Manager Administration, to provide wireless voice communication. Cisco Access Points can run in standalone or unified mode. Unified mode requires the Cisco Unified Wireless LAN Controller.
The Cisco Unified IP Phone 9971 exhibits Wi-Fi capabilities which can be used with 802.11a, 802.11b, and 802.11g Wi-Fi.
The following figure shows a typical WLAN topology that enables the wireless transmission of voice for wireless IP telephony.
Figure 1. WLAN with wireless IP phones
When a Cisco Unified IP Phone powers on, it searches for and becomes associated with an AP if the phone wireless access is set to On.
The AP uses the connection to the wired network to transmit data and voice packets to and from the switches and routers. Voice signaling is transmitted to the Cisco Unified Communications Manager server for call processing and routing.
APs are critical components in a WLAN because they provide the wireless links or "hot spots" to the network. Cisco requires that APs that support voice communications use Cisco IOS Release 12.3(8)JA or later. Cisco IOS software provides features for managing voice traffic.
In some WLANs, each AP has a wired connection to an Ethernet switch, such as a Cisco Catalyst 3750, that is configured on a LAN. The switch provides access to gateways and the Cisco Unified Communications Manager server to support wireless IP telephony.
Some networks contain wired components that support wireless components. The wired components can comprise switches, routers, and bridges with special modules to enable wireless capability.
Wireless LANs must follow the Institute of Electrical and
Electronics Engineers (IEEE) 802.11 standards that define the protocols that
govern all Ethernet-based wireless traffic. The Cisco Unified IP Phone supports
the following standards:
802.11a: Uses the 5 GHz band that provides more channels and
improved data rates by using OFDM technology. Dynamic Frequency Selection (DFS)
and Transmit Power Control (TPC) support this standard.
802.11b:Specifies the radio frequency (RF) of 2.4 Ghz for both
transmitting and receiving data at lower data rates (1, 2, 5.5, 11 Mbps).
802.11d: Enables access points to advertise their currently
supported radio channels and transmit power levels. The 802.11d enabled client
then uses that information to determine the channels and powers to use. The
Cisco Unified IP Phone 9971 requires World mode (802.11d) to determine which
channels are legally allowed for any given country. For supported channels, see
the following table. Ensure that 802.11d is properly configured on the Cisco
IOS Access Points or Cisco Unified Wireless LAN Controller.
802.11e: Quality of Service (QoS)
802.11g:Uses the same unlicensed 2.4 Ghz band as 802.11b, but
extends the data rates to provide greater performance by using Orthogonal
Frequency Division Multiplexing (OFDM) technology. OFDM is a physical-layer
encoding technology for transmitting signals by using RF.
802.11h: 5 GHz spectrum and transmit power management
5 GHz channel set
2.412 – 2.484 GHz
5.180 – 5.240 GHz
5.260 – 5.320 GHz
5. 500 – 5.700 GHz
5.745 – 5.805 GHz
13 (14 in Japan)
802.11j (channels 34, 38, 42, 46) and channel 165 are not supported.
If you are using the Cisco Unified IP Phone 9971 in World
mode, you must enable World mode (802.11d). The Cisco Unified IP Phone 9971
uses 802.11d to determine which channels and transmit powers to use and
inherits the client configuration from the associated access point.
Enabling World mode (802.11d) may not be necessary if the frequency is
2.4GHz and the current access point is transmitting on a channel 1-11.
Because all countries support these frequencies, you can
attempt to scan these channels regardless of World mode (802.11d) support.
For the countries that support 2.4GHz, see
Cisco Unified IP Phone 9971 Wireless LAN Deployment Guide at this location:
The Cisco Unified IP Phone 9971 supports the following countries:
Puerto Rico (PR)
Russian Federation (RU)
Saudi Arabia (SA)
Korea (KR / KP)
Costa Rica (CR)
South Africa (ZA)
Czech Republic (CZ)
New Zealand (NZ)
United Arab Emirates (AE)
United Kingdom (GB)
Hong Kong (HK)
United States (US)
Radio Frequency Ranges
WLAN communications use the following radio frequency (RF)
2.4 GHz: Many devices that use 2.4 GHz can potentially interfere
with the 802.11b/g connection. Interference can produce a Denial of Service
(DoS) scenario, possibly preventing successful 802.11 transmissions.
5 GHz: This range divides into several sections called Unlicensed National
Information Infrastructure (UNII) bands, each of which has four channels. The
channels are spaced at 20 MHz to provide nonoverlapping channels and more
channels than 2.4 GHz provides.
802.11 Data Rates, Transmit Power, Ranges, and Decibel Tolerances
The following table lists the transmit (Tx) power
capacities, data rates, ranges in feet and meters, and decibels that the receiver tolerates for the 801.11 standards.
Table 1 Tx power, data rates, ranges, and decibels by standard
Maximum Tx power
(See Note 1)
(See Note 2)
604 ft (184 m)
604 ft (184 m)
551 ft (168 m)
545 ft (166 m)
512 ft (156 m)
420 ft (128 m)
322 ft (98 m)
289 ft (88 m)
709 ft (216 m)
650 ft (198 m)
623 ft (190 m)
623 ft (190 m)
623 ft (190 m)
495 ft (151 m)
413 ft (126 m)
394 ft (120 m)
1,010 ft (308 m)
951 ft (290 m)
919 ft (280 m)
902 ft (275 m)
Adjusts dynamically when associating with an AP if the AP
client setting is enabled.
Advertised rates by the APs are used. If the
Restricted Data Rates functionality is enabled in the Cisco Unified
Communications Manager Administration phone configuration, then the Traffic
Stream Rate Set IE (CCX V4) is used.
For more information about supported data rates, Tx power and Rx
sensitivity for WLANs, see
the Cisco Unified IP Phone 9971 Wireless LAN Deployment Guide
at this location:
Wireless communications use the following modulation technologies for signaling:
Direct-Sequence Spread Spectrum (DSSS)
Prevents interference by spreading the signal over the frequency range or bandwidth. DSSS technology multiplexes chunks of data over several frequencies so that multiple devices can communicate without interference. Each device has a special code that identifies the data packets for the device and all other data packets are ignored. Cisco wireless 802.11b/g products use DSSS technology to support multiple devices on the WLAN.
Orthogonal Frequency Division Multiplexing (OFDM)
Transmits signals by using RF. OFDM is a physical-layer encoding technology that breaks one high-speed data carrier into several lower-speed carriers to transmit in parallel across the RF spectrum. When used with 802.11g and 802.11a, OFDM can support data rates as high as 54 Mbps.
The following table provides a comparison of data rates, number of channels, and modulation technologies by standard.
Table 2 Data Rates, Number of Channels, and Modulation Technologies by IEEE Standard
1, 2, 5.5, 11 Mbps
6, 9, 12, 18, 24, 36, 48, 54 Mbps
6, 9, 12, 18, 24, 36, 48, 54 Mbps
3 (Japan uses 4)
Up to 23
AP Channel and Domain Relationships
APs transmit and receive RF signals over channels within the
2.4 GHz or 5 GHz frequency band. To provide a stable wireless environment and
reduce channel interference, you must specify nonoverlapping channels for each
AP. The recommended channels for 802.11b and 802.11g in North America are 1, 6,
In a non-controller-based wireless network, we recommend that you
statically configure channels for each AP. If your wireless network uses a
controller, use the Auto-RF feature for minimal voice disruption.
For more information about AP channel and domain
Cisco Unified IP Phone 9971 Wireless LAN Deployment Guide at this location:
Cisco Unified IP Phone 9971 supports Cisco Centralized Key Management (CCKM), a centralized
key management protocol, and provides a cache of session credentials on the
wireless domain server (WDS). APs must register to the WDS for fast roaming to
work. CCKM is also supported on the Cisco Unified Wireless LAN Controller
Cisco Unified IP Phone 9971 supports CCKM with 802.1x+WEP or WPA(TKIP) only. CCKM is not
supported with WPA2 or WPA(AES). For details about CCKM, see the Cisco Fast
Secure Roaming Application Note at:
Bluetooth enables low-bandwidth wireless connections within a
range of 30 feet (10 meters). The best performance is in the 3- to 6-foot (1- to
2-meter) range. Bluetooth wireless technology operates in the 2.4 GHz band,
which is the same as the 802.11b/g band. Interference
issues can occur. We recommend that you:
Use 802.11a that operates in the 5 GHz band.
Reduce the proximity of other 802.11b/g devices, Bluetooth devices,
microwave ovens, and large metal objects.
Cisco Unified IP Phones use the same APs as wireless data
devices. However, voice traffic over a WLAN requires different equipment
configurations and layouts than a WLAN that is used exclusively for data
traffic. Data transmission can tolerate a higher level of RF noise, packet
loss, and channel contention than voice transmission. Packet loss during voice
transmission can cause choppy or broken audio and can make the phone call
inaudible. Packet errors can also cause blocky or frozen video.
Cisco Unified IP Phone 9971 is a desktop (not mobile) phone, changes in the local
environment can cause phones to roam between access points and can affect the
voice and video performance. In contrast, data users remain in one place or
occasionally move to another location. The ability to roam while maintaining a
call is one of the advantages of wireless voice, so RF coverage needs to
include stairwells, elevators, quiet corners outside conference rooms, and
To ensure good voice quality and optimal RF signal coverage,
you must perform a site survey. The site survey determines settings that are suitable to
wireless voice and assists in the design and layout of the WLAN; for example AP
placement, power levels, and channel assignments.
After deploying and using wireless voice, you should continue
to perform postinstallation site surveys. When you add a group of new users,
install more equipment, or stack large amounts of inventory, you are changing
the wireless environment. A postinstallation survey verifies that the AP
coverage is still adequate for optimal voice communications.
Packet loss occurs during roaming; however, the security mode and
the presence of fast roaming determines how many packets are lost during
For more information about Voice QoS in a wireless network,
Cisco Unified IP Phone 9971 Wireless LAN Deployment Guide at:
At startup, the Cisco Unified IP Phone scans for APs with
SSIDs and encryption types that it recognizes. The phone builds and maintains a
list of eligible APs and uses the following variables to determine the best AP:
Received Signal Strength Indicator (RSSI):Signal strength of
available APs within the RF coverage area. The phone attempts to associate with
the AP with the highest RSSI value.
Traffic Specification (TSpec): Calculation of call limits and WLAN
load balancing. The TSpec value of each voice stream allows the system to
allocate bandwidth to voice devices on a first-come, first-served basis.
The Cisco Unified IP Phone associates with the AP that has the
highest RSSI and lowest channel usage values (QBSS) that posses matching SSID
and encryption types. To ensure that voice traffic is handled properly, you
must configure the correct QoS in the AP.
Voice traffic on the wireless LAN, like data traffic, is
susceptible to delay, jitter, and packet loss. These issues do not impact the
data end user, but can seriously impact a voice call. To ensure that voice
traffic receives timely and reliable treatment with low delay and low jitter,
you must use Quality of Service (QoS) and use separate virtual LANs (VLANs)
for voice and data. By isolating the voice traffic onto a separate VLAN, you
can use QoS to provide priority treatment for voice packets as they travel
across the network. Also, use a separate VLAN for data traffic, not the default
native VLAN that is typically used for all network devices.
You need the following VLANs on the network switches and the
APs that support voice connections on the WLAN:
Voice VLAN: Voice traffic to and from the wireless IP Phone
Native VLAN: Data traffic to and from other wireless devices
Assign separate SSIDs to the voice and to the data VLANs. If
you configure a separate management VLAN in the WLAN, do not associate an SSID
with the management VLAN.
By separating the phones into a voice VLAN and marking voice
packets with higher QoS, you can ensure that voice traffic gets priority
treatment over data traffic, which results in lower packet delay and fewer lost
Unlike wired networks with dedicated bandwidths, wireless LANs
consider traffic direction when implementing QoS. Traffic is classified as
upstream or downstream from the point of view of the AP as shown in the
Figure 2. Voice Traffic in a Wireless Network
Beginning with Cisco IOS release 12.2(11)JA, Cisco Aironet APs
support the contention-based channel access mechanism called Enhanced
Distributed Coordination Function (EDCF). The EDCF type of QoS has up to eight
queues for downstream (toward the 802.11b/g clients) QoS. You can allocate the
queues based on these options:
QoS or Differentiated Services Code Point (DSCP) settings for the
Layer 2 or Layer 3 access lists
VLANs for specific traffic
Dynamic registration of devices
Although up to eight queues on the AP can be set up, you
should use only two queues for voice traffic so as to ensure the best possible voice
QoS. Place voice (RTP) and signaling (SCCP) traffic in the highest priority
queue, and place data traffic in a best-effort queue. Although 802.11b/g EDCF
does not guarantee that voice traffic is protected from data traffic, you
should get the best statistical results by using this queuing model.
The Cisco Unified IP Phone marks the SCCP signaling packets with a
DSCP value of 24 (CS3) and RTP packets with DSCP value of 46 (EF).
To improve reliability of voice transmissions in a
nondeterministic environment, the Cisco Unified IP Phone supports the IEEE
802.11e industry standard and is Wi-Fi Multimedia (WMM) capable. WMM enables
differentiated services for voice, video, best effort data and other traffic.
However, in order for these differentiated services to provide sufficient QoS
for voice packets, only a certain amount of voice bandwidth can be serviced or
admitted on a channel at one time. If the network can handle
"N" voice calls with reserved bandwidth, when the amount of voice
traffic is increased beyond this limit (to N+1 calls), the quality of all calls
To help address the problems of VoIP stability and roaming, an
initial Call Admission Control (CAC) scheme is required. With CAC, QoS is
maintained in a network overload scenario by ensuring that the number of active
voice calls does not exceed the configured limits on the AP. The Cisco Unified
IP Phone can integrate layer 2 TSpec admission control with layer 3 Cisco
Unified Communications Manager admission control (RSVP). During times of
network congestion, calling or called parties receive a fast busy indication.
The system maintains a small bandwidth reserve so wireless phone clients can
roam into a neighboring AP, even when the AP is at full capacity. After
reaching the voice bandwidth limit, the next call is load-balanced to a
neighboring AP without affecting the quality of the existing calls on the
Implementing QoS in the connected Ethernet switch is highly
desirable to maintain good voice quality. The COS and DSCP values that the
Cisco Unified IP Phone sets do not need to be modified.
Cisco Unified IP Phone 9971 does not support Video CAC; however, Voice CAC is
supported for WLANs.
Cisco Unified Communications Manager is the call control
component in the network that handles and routes calls for the wireless IP
phones. Cisco Unified Communications Manager manages the components of the IP
telephony system (the phones, access gateways, and the resources) for such
features as call conferencing and route planning. When you deploy a Cisco
Unified IP Phone on a wireless LAN, you must use Cisco Unified Communications
Manager Release 7.1(3) or later and the SIP protocol.
Before Cisco Unified Communications Manager can recognize a
phone, the phone must register with Cisco Unified Communications Manager and be
configured in the database.
You can find more information about configuring Cisco Unified
Communications Manager to work with the IP phones and IP devices in the
Cisco Unified Communications Manager Administration Guide
Cisco Unified Communications Manager System Guide.
Because all WLAN devices that are within range can receive all other WLAN traffic, securing voice communications is critical in WLANs. To ensure that intruders do not manipulate nor intercept voice traffic, the Cisco SAFE Security architecture supports the Cisco Unified IP Phone and Cisco Aironet APs. For more information about security in networks, see http://www.cisco.com/en/US/netsol/ns744/networking_solutions_program_home.html.
The Cisco Wireless IP telephony solution provides wireless
network security that prevents unauthorized sign-ins and compromised
communications by using the following authentication methods that the
wireless Cisco Unified IP Phone 9971 supports:
Open Authentication: Any wireless device can request authentication
in an open system. The AP that receives the request may grant authentication to
any requestor or only to requestors that are found on a list of users. Communication between
the wireless device and AP could be nonencrypted or devices can use Wired
Equivalent Privacy (WEP) keys to provide security. Devices that use WEP
only attempt to authenticate with an AP that is using WEP.
Shared Key Authentication: The AP sends an unencrypted challenge
text string to any device that attempts to communicate with the AP. The device
that is requesting authentication uses a preconfigured WEP key to encrypt the
challenge text and sends it back to the AP. If the challenge text is encrypted
correctly, the AP allows the requesting device to authenticate. A device can
authenticate only if the device WEP key matches the WEP key on the APs.
Shared key authentication can be less secure than open
authentication with WEP because someone can monitor the challenges. An intruder
can calculate the WEP key by comparing the unencrypted and encrypted challenge
Extensible Authentication Protocol-Flexible Authentication via
Secure Tunneling (EAP-FAST) Authentication: This client server security
architecture encrypts EAP transactions within a Transport Level Security (TLS)
tunnel between the AP and the RADIUS server, such as the Cisco Access Control
The TLS tunnel uses Protected Access Credentials (PACs) for
authentication between the client (phone) and the RADIUS server. The server
sends an Authority ID (AID) to the client (phone), which in turn selects the
appropriate PAC. The client (phone) returns a PAC-Opaque to the RADIUS server.
The server decrypts the PAC with the master key. Both endpoints now contain the
PAC key and a TLS tunnel is created. EAP-FAST supports automatic PAC
provisioning, but you must enable it on the RADIUS server.
In the Cisco ACS, by default, the PAC expires in one week. If the
phone has an expired PAC, authentication with the RADIUS server takes longer
while the phone gets a new PAC. To avoid PAC provisioning delays, set the
PAC expiration period to 90 days or longer on the ACS or RADIUS server.
Light Extensible Authentication Protocol (LEAP): Cisco proprietary
password-based mutual authentication scheme between the client (phone) and a
RADIUS server. Cisco Unified IP Phone can use LEAP for authentication with the
Auto (AKM): Selects the 802.11 Authentication mechanism
automatically from the configuration information that the AP, WPA-PSK,
or WPA exhibits.
Authenticated Key Management
The following authentication schemes use the RADIUS server to
manage authentication keys:
WPA/WPA2: Uses RADIUS server information to generate unique keys
for authentication. Because these keys are generated at the centralized RADIUS
server, WPA/WPA2 provides more security than WPA preshared keys that are
stored on the AP and phone.
Cisco Centralized Key Management (CCKM): Uses RADIUS server and a
wireless domain server (WDS) information to manage and authenticate keys. The
WDS creates a cache of security credentials for CCKM-enabled client devices for
fast and secure reauthentication.
With WPA/WPA2 and CCKM, encryption keys are not entered on the
phone, but are automatically derived between the AP and phone. But the EAP
username and password that are used for authentication must be entered on each
Only WPA(TKIP) and 802.1x(WEP) support CCKM.
To ensure that voice traffic is secure, the Cisco Unified IP
Phone supports WEP, TKIP, and Advanced Encryption Standards (AES) for
encryption. When these mechanisms are used for encryption, both the signalling
Skinny Client Control Protocol (SCCP) packets and voice Real-Time Transport
Protocol (RTP) packets are encrypted between the AP and the Cisco Unified IP
With WEP use in the wireless network, authentication happens
at the AP by using open or shared-key authentication. The WEP key that is setup
on the phone must match the WEP key that is configured at the AP for successful
connections. The Cisco Unified IP Phone supports WEP keys that use 40-bit
encryption or a 128-bit encryption and remain static on the phone and AP.
EAP and CCKM authentication can use WEP keys for encryption. The
RADIUS server manages the WEP key and passes a unique key to the AP after
authentication for encrypting all voice packets; consequently, these WEP keys
can change with each authentication.
WPA and CCKM use TKIP encryption that has several
improvements over WEP. TKIP provides per-packet key ciphering and longer
initialization vectors (IVs) that strengthen encryption. In addition, a message
integrity check (MIC) ensures that encrypted packets are not being altered.
TKIP removes the predictability of WEP that helps intruders decipher the WEP
An encryption method used for WPA2 authentication. This
national standard for encryption uses a symmetrical algorithm that has the same
key for encryption and decryption. AES uses Cipher Blocking Chain (CBC)
encryption of 128 bits in size, which supports key sizes of 128, 192 and 256 bits,
as a minimum. The Cisco Unified IP Phone supports a key size of 256 bits.
The Cisco Unified IP Phone does not support Cisco Key Integrity
Protocol (CKIP) with CMIC.
AP Authentication and Encryption Options
Authentication and encryption schemes are set up within the
wireless LAN. VLANs are configured in the network and on the APs and specify
different combinations of authentication and encryption. An SSID associates
with a VLAN and the particular authentication and encryption scheme. In order
for wireless client devices to authenticate successfully, you must configure
the same SSIDs with their authentication and encryption schemes on the APs and
on the Cisco Unified IP Phone.
Some authentication schemes require specific types of
encryption. With Open authentication, you can use static WEP for encryption for
added security. But if you are using Shared Key authentication, you must set
static WEP for encryption, and you must configure a WEP key on the phone.
When you use Authenticated Key Management (AKM) for the Cisco
Unified IP Phone, several choices for both authentication and encryption can be
set up on the APs with different SSIDs. When the phone attempts to
authenticate, it chooses the AP that advertises the authentication and
encryption scheme that the phone can support. Auto (AKM) mode can authenticate
by using WPA, WPA2, WPA Pre-shared key, or CCKM.
When you use WPA
pre-shared key or WPA2 pre-shared key, the pre-shared key must be statically
set on the phone. These keys must match the keys that are on the AP.
When you use Auto (AKM), encryption options are automatically
configured for WPA, WPA2, WPA Pre-shared key, WPA2 Pre-shared key, or CCKM.
In AKM mode, the phone authenticates with LEAP if the phone is
configured with WPA, WPA2, or CCKM key management, or if 802.1x is used.
The Cisco Unified IP Phone does not support auto EAP
negotiation; to use EAP-FAST mode, you must specify it.
The following table provides a list of authentication and
encryption schemes that are configured on the Cisco Aironet APs that the Cisco
Unified IP Phone supports. The table shows the network configuration option for
the phone that corresponds to the AP configuration.
The wireless Cisco Unified IP Phone 9971 is supported on both the Cisco autonomous and unified solutions. Minimum and recommended versions are:
Cisco IOS Access Points (Autonomous)
Minimum = 12.3(8)JEA2 or later
Recommended = 12.4(10b)JA3 or later (Does not apply to Cisco Aironet Series 1100, 1140, 1200, or 1230).
Cisco Unified Wireless LAN Controller
Minimum = 126.96.36.199 or later
Recommended = 188.8.131.52 or later
Supported APs and Modes
The following table lists the modes that each Cisco Access Point supports.
Table 4 Supported APs and Modes
Cisco Aironet 500 Series
Cisco Aironet 1100 Series
Cisco Aironet 1130 AG Series
Cisco Aironet 1140 Series
Cisco Aironet 1200 Series
Cisco Aironet 1230 AG Series
Cisco Aironet 1240 AG Series
Cisco Aironet 1250 Series
Cisco Aironet 1300 Series
The Cisco Unified IP Phone 9971 does not support Voice over the Wireless LAN (VoWLAN) via Outdoor MESH technology (Cisco 1500 series).
No support exists for third-party access points because no interoperability testing occurs with these access points. However, if the access point supports the key features and follows the standards, the Cisco Unified Wireless IP Phone is compliant.
Wi-Fi compliant APs that are manufactured by third-party vendors support the Cisco Unified Wireless IP Phone 9971, but might not support key features such as Wi-Fi MultiMedia (WMM), Unscheduled Auto Power Save Delivery (U-APSD), Traffic Specification (TSPEC), QoS Basic Service Set (QBSS), Dynamic Transmit Power Control (DTPC), or proxy ARP.
Some Cisco access points require or allow external antennas. See the following URL for the list of supported antennas and how these external antennas should be mounted:
Cisco Unified IP Phone 9971 Wireless LAN Deployment Guide
includes the following configuration information:
Wireless network configuration
Wireless network configuration in Cisco Unified Communications Manager Administration
Wireless network configuration on the Cisco Unified IP Phone 9971
Set Up Wireless LAN in Cisco Unified Communications Manager Administration
In Cisco Unified Communications Manager Administration, you
must enable a parameter called
"Wi-Fi" for the wireless Cisco Unified IP Phone 9971. This can be
done in one of the following locations in Cisco Unified Communications Manager
To enable wireless LAN on
a specific phone, select the enable setting for the Wi-Fi parameter in the
Product Specific Configuration Layout section
(Device > Phone) for the specific phone,
and check the Override Common Settings check box.
To enable wireless LAN for
a group of phones, select the enable setting for the Wi-Fi parameter in a
Common Phone Profile Configuration window
(Device > Device
Settings > Common Phone Profile),
check the Override Common Settings check box, then associate the phone (Device > Phone) with that common phone profile.
To enable wireless LAN for
all WLAN-capable phones in your network, select the enable setting for the
Wi-Fi parameter in the Enterprise Phone Configuration window
(System > Enterprise Phone
Configuration), and check the Override Common
Settings check box.
In the Phone Configuration window in Cisco Unified Communications
(Device > Phone), use the wired-line MAC address when you configure the MAC address. Cisco Unified Communications Manager
registration does not use the wireless MAC address.
Wireless LAN on Cisco Unified IP Phone Setup
Before the phone can connect to the WLAN, you must configure
the network profile for the phone with the appropriate WLAN settings. You can
use the Network Setup menu on the phone to access the WLAN Setup submenu and
set up the WLAN configuration.