Table Of Contents
Cisco Unified Wireless IP Phone 7920 Configuration
Cisco Aironet 1200 Access Point Configuration File
Cisco Access Control Server for LEAP Configuration
Wireless Configuration
This chapter provides an overview of how the Cisco Aironet Access Point (AP) 1200, the Cisco Unified Wireless IP Phone 7920, and the Cisco Secure Access Control Server (ACS) were configured for Cisco Unified Communications Release 5.0 for IP telephony. These devices were set up for wireless operation between IP phone devices registered to Cisco Unified CallManager or to Cisco Unified CallManager Express.
The tested configuration was designed to provides wireless interoperability with other devices in a deployment, including Cisco Unified IP Phone models 7911G, 7941G, 7961G, 7970G, and 7971G, and video endpoints. This configuration supports:
•
Calls between Cisco Unified Wireless IP Phone 7920 devices
•
Calls between the Cisco Unified Wireless IP Phone 7920 and other Cisco Unified IP Phone 79xx models
•
Intercluster and intracluster Cisco Unified CallManager, Cisco Unified CallManager Express, SRST, and Cisco CRS sites.
This chapter does not include detailed installation and configuration instructions. Rather, it is intended to provide you with guidance as you set up wireless devices in your IP telephony solution.
This chapter includes the following sections:
•
Cisco Unified Wireless IP Phone 7920 Configuration
•
Cisco Aironet 1200 Access Point Configuration File
•
Cisco Access Control Server for LEAP Configuration
Overview
The wireless portion of the testing for Cisco Unified Communications Release 5.0 for IP telephony was configured based on the recommendations and configurations that are described in Table 10-1.
Table 10-1 Wireless Configuration Related Documentation
Document ReferenceCisco Unified Wireless IP Phone 7920 Design and Deployment Guide
Cisco AVVID Wireless LAN Design
http://www.cisco.com/application/pdf/en/us/
guest/netsol/ns178/c649/ccmigration
_09186a00800d67eb.pdfCisco IOS Software Configuration Guide for Cisco Aironet Access Points
Cisco IOS Software Configuration Guide for Cisco Aironet Access Points, 12.2(15)JA
Cisco Unified Wireless IP Phone 7920 Administration Guide
Cisco Unified Wireless IP Phone 7920 Deployment Recommendations
http://www.cisco.com/en/US/products/hw/
phones/ps379/products_white
_paper0900aecd800f6d97.shtmlCisco Unified Wireless IP Phone 7920 for Cisco Unified CallManager
http://www.cisco.com/en/US/products/hw/
phones/ps379/products_user_guide
_book09186a00802358c6.htmlConfiguring the Cisco Unified Wireless IP Phone 7920 with WEP Keys, VLANs, and LEAP
Wireless Virtual LAN Deployment Guide
http://www.cisco.com/en/US/products/hw/
wireless/ps430/prod_technical
_reference09186a00801444a1.html
The Cisco Unified Communications Release 5.0 testing for IP telephony used a centralized Cisco Secure ACS with LEAP-compliant RADUIS authentication for all users of the Cisco Unified Wireless IP Phone 7920 and the Cisco Aironet AP 1200. In addition, a Cisco Aironet AP 1200 was configured as the backup LEAP authentication local RADIUS server to be used if the WAN connection to the ACS becomes lost.
LEAP allows devices such as the Cisco Aironet AP 1200 and the Cisco Unified Wireless IP Phone 7920 to be mutually authenticated based on username and password. Upon authentication, a dynamic key is used between the Cisco Unified Wireless IP Phone 7920 and the Cisco Aironet AP 1200 to encrypt signaling (SCCP) and media (RTP) streams between these devices. The Cisco Unified Wireless IP Phone 7920 supports static WEP and EAP-Cisco (LEAP) for data encryption and authentication. 802.1x/LEAP was used with a central Cisco Secure ACS.
The wireless configuration followed these guidelines:
•
To ensure the best voice quality, VAD was disabled for the Cisco Unified Wireless IP Phone 7920. VAD is a Cisco Unified CallManager parameter that applies to all phones registered to a specific cluster.
•
The Cisco Aironet AP 1200s were configured to support 802.11b WANs.
•
No more than 15 802.11b users were used for any single Cisco Aironet AP 1200. The recommended maximum number of users is 20 to 25.
•
No more than two VLANs were used per Cisco Aironet AP 1200. Each wireless VLAN was represented with a unique SSID name.
•
Distance between Cisco Aironet AP 1200 devices can cause throughput variations for clients based on distance from the Cisco Aironet AP 1200. Cisco recommends that you limit the Cisco Aironet AP 1200 data rate to the higher data rates of 11 Mbps for 802.11b.
•
The number of Cisco Aironet AP 1200s that you will require depends on your coverage and throughput requirements.
•
EAP-Cisco (Network EAP or LEAP) was used as the security mechanism.
•
The Cisco Secure ACS local database was used to store the username and password.
Cisco Unified Wireless IP Phone 7920 Configuration
The Cisco Unified Wireless IP Phone 7920 was implemented with Open and LEAP authentication types. WEP encryption was not configured or used. The phones were installed and configured as described in the Cisco Unified Wireless IP Phone 7920 documentation. For detailed information about installing, configuring, and administering the Cisco Unified Wireless IP Phone 7920, see the phone documentation listed in Table 10-1.
Cisco Aironet 1200 Access Point Configuration File
This section shows a configuration file that is recommended for the Cisco Aironet AP 1200 wireless deployment. This example includes settings for the Cisco Secure ACS and the local RADIUS server hosts. In this way, this Cisco Aironet AP 1200 can be used as a backup LEAP authentication sever when the Cisco Secure ACS is unavailable.
For related information, see the Access Point documentation listed in Table 10-1.
version 12.2no service padservice timestamps debug datetime msecservice timestamps log datetime msecservice password-encryption!hostname ap!enable secret 5 $1$ZyA5$VTX31sQLnZ2cZnBnGhX6v/!username Cisco password 7 00271A150754clock timezone U -8clock summer-time U recurringip subnet-zero!aaa new-model!aaa group server radius rad_eap!aaa group server radius rad_mac!aaa group server radius rad_acct!aaa group server radius rad_admin!aaa group server tacacs+ tac_admin!aaa group server radius rad_pmip!aaa group server radius dummy!aaa authentication login eap_methods group rad_eapaaa authentication login mac_methods localaaa authorization exec default localaaa authorization ipmobile default group rad_pmipaaa accounting network acct_methods start-stop group rad_acctaaa session-id commondot11 phonedot11 arp-cache!policy-map dataclass class-defaultset cos 1policy-map managementclass class-defaultset cos 7policy-map voiceclass class-defaultset cos 6!bridge irb!interface Dot11Radio0no ip addressno ip route-cache!encryption vlan 1 key 1 size 128bit 7 C6BDD88611D089948782B58DA1E4 transmit-keyencryption vlan 1 mode wep mandatory!encryption vlan 2 key 1 size 128bit 7 9FD518A21653687A4251AEE12308 transmit-keyencryption vlan 2 mode wep mandatory!encryption vlan 3 key 1 size 128bit 7 09E1230C15B678330C1A84143960 transmit-keyencryption vlan 3 mode wep mandatory!ssid datavlan 2authentication open!ssid voicevlan 3authentication open!speed basic-11.0rts threshold 2312power local 20power client 20channel 2437station-role root!interface Dot11Radio0.1encapsulation dot1Q 1 nativeno ip route-cacheservice-policy input managementservice-policy output managementbridge-group 1bridge-group 1 subscriber-loop-controlbridge-group 1 block-unknown-sourceno bridge-group 1 source-learningno bridge-group 1 unicast-floodingbridge-group 1 spanning-disabled!interface Dot11Radio0.2encapsulation dot1Q 2no ip route-cacheservice-policy input dataservice-policy output databridge-group 2bridge-group 2 subscriber-loop-controlbridge-group 2 block-unknown-sourceno bridge-group 2 source-learningno bridge-group 2 unicast-floodingbridge-group 2 spanning-disabled!interface Dot11Radio0.3encapsulation dot1Q 3no ip route-cacheservice-policy input voiceservice-policy output voicebridge-group 3bridge-group 3 subscriber-loop-controlbridge-group 3 block-unknown-sourceno bridge-group 3 source-learningno bridge-group 3 unicast-floodingbridge-group 3 spanning-disabled!interface FastEthernet0no ip addressno ip route-cacheduplex autospeed autontp broadcast client!interface FastEthernet0.1encapsulation dot1Q 1 nativeno ip route-cachebridge-group 1no bridge-group 1 source-learningbridge-group 1 spanning-disabled!interface FastEthernet0.2encapsulation dot1Q 2no ip route-cachebridge-group 2no bridge-group 2 source-learningbridge-group 2 spanning-disabled!interface FastEthernet0.3encapsulation dot1Q 3no ip route-cachebridge-group 3no bridge-group 3 source-learningbridge-group 3 spanning-disabled!interface BVI1ip address 10.0.0.5 255.255.255.0no ip route-cache!ip default-gateway 10.0.0.1ip http serverip http help-path http://www.cisco.com/warp/public/779/smbiz/prodconfig/help/eag/ivory/1100ip http authentication localip radius source-interface BVI1!radius-server attribute 32 include-in-access-req format %hradius-server authorization permit missing Service-Typeradius-server vsa send accountingbridge 1 route ip!line con 0line vty 5 15!ntp clock-period 2860645ntp server 10.0.0.1endCisco Access Control Server for LEAP Configuration
The Cisco Secure ACS was configured for LEAP authentication using RADIUS (Cisco Aironet). The local CiscoSecure user database was used.
The ACSs were installed and configured as described in the Cisco Secure ACS documentation, which is available at this URL:
http://www.cisco.com/en/US/products/sw/secursw/ps2086/ps5340/index.html
For a detailed step-by-step configuration example, also see Configuring the Cisco Unified Wireless IP Phone 7920 with WEP Keys, VLANs and LEAP (Table 10-1 provides a link to this document.)
To include LEAP functionality for the access point, include the following lines in the configuration shown in the "Cisco Aironet 1200 Access Point Configuration File" section:
143645292A50737C750D64637B3153375B2200010F75052F564935017D03010507user cisco9 nthash 706512D076F185C4E5035462859560E0A75701564014355302027050B0104755E52user cisco10 nthash 7091A185F3A5635375C5D510B080178606D75315746565707017C700059534A300Euser cisco11 nthash 705535129716F6A5B4C563645582A220B73017E17117B4254435025020B0A70765Buser cisco12 nthash 70147275678592059071B68583D5346425E2D530809067A6A6D0445574454250408user cisco13 nthash 70479532759721F6D2B4C2135405228507F08717C17630646534F5424007A7B000D!radius-server host 10.0.0.30 auth-port 1645 acct-port 1646 key 7110A1016141D5A5E57radius-server host 10.0.0.61 auth-port 1812 acct-port 1813 key 7045802150C2E1D1C5Aradius-server deadtime 10radius-server authorization permit missing Service-Typebridge 1 route ip!line con 0password 7 082F43400Cline vty 0 4exec-timeout 60 0password 7 045504080Aline vty 5 15exec-timeout 60 0password 7 000A1C0801!end