Manually install custom device certificate

You can manually install a Custom Device Certificate (CDC) on the phone by uploading the certificate from the phone administration web page.

Before you begin

Before you can install a custom device certificate for a phone, you must have:

  • A certificate file (.p12 or .pfx) saved on your PC. The file contains the certificate and private key.
  • The extract password of the certificate. The password is used to decrypt the certificate file.
1

Access the phone administration web page.

2

Select Certificate.

3

In the Add Certificate section, click Browse....

4

Browse to the certificate on your PC.

5

In the Extract password field, enter the certificate extract password.

6

Click Upload.

If the certificate file and password are correct, you will receive the message "Certificate added.". Otherwise, the uploading fails with an error message indicating that the certificate can't be uploaded.
7

To check details of the installed certificate, click View in the Existing Certificates section.

8

To remove the installed certificate from the phone, click Delete in the Existing Certificates section.

Once you click the button, the removal operation starts immediately without a confirmation.

If the certificate is removed successfully, you will receive the message "Certificate deleted.".

Automatically install custom device certificate by SCEP

You can set up the Simple Certificate Enrollment Protocol (SCEP) parameters to automatically install the Custom Device Certificate (CDC), if you don't want to manually upload the certificate file or you don't have the certificate file in place.

When the SCEP parameters are configured correctly, the phone sends requests to the SCEP server, and the CA certificate is validated by device using the defined fingerprint.

Before you begin

Before you can perform an auto installation of a custom device certificate for a phone, you must have:

  • SCEP server address
  • SHA-1 or SHA-256 fingerprint of the root CA certificate for the SCEP server
1

Access the phone administration web page.

2

Select Certificate.

3

In the SCEP Configuration 1 section, set the parameters as described in the following table Parameters for SCEP configuration.

4

Click Submit All Changes.

Parameters for SCEP configuration

The following table defines the function and usage of SCEP configuration parameters in the SCEP Configuration 1 section under the Certificate tab in the phone web interface. It also defines the syntax of the string that is added in the phone configuration file (cfg.xml) to configure a parameter.

Table 1. Parameters for SCEP configuration
ParameterDescription
Server

SCEP server address. This parameter is mandatory.

Perform one of the following:

  • In the phone configuration file with XML(cfg.xml), enter a string in this format:

    <CDC_Server_1_ ua="na">http://10.79.57.91</CDC_Server_1_>

  • In the phone web page, enter the SCEP server address.

Valid values: A URL or IP address. The HTTPS scheme is not supported.

Default: Empty

Root CA Fingerprint

SHA256 or SHA1 fingerprint of the Root CA for validation during the SCEP process. This parameter is mandatory.

Perform one of the following:

  • In the phone configuration file with XML(cfg.xml), enter a string in this format:

    <CDC_Root_CA_Fingerprint_1_ ua="na">12040870625C5B755D73F5925285F8F5FF5D55AF</CDC_Root_CA_Fingerprint_1_>

  • In the phone web page, enter a valid fingerprint.

Default: Empty

Challenge Password

The challenge password for Certificate Authority (CA) authorization against the phone during a certificate enrollment via SCEP. This parameter is optional.

According to the actual SCEP environment, the behavior of challenge password varies.

  • If the phone gets a certificate from a Cisco RA that communicates with CA, the challenge password is not supported on CA. In this case, Cisco RA uses the phone's MIC/SUDI for authentication to access to CA. The phone uses MIC/SUDI for both initial enrollment and certificate renewal.
  • If the phone gets a certificate by communicating with CA directly, the challenge password is supported on CA. If configured, it will be used for the initial enrollment only. For the certificate renewal, the installed certificate will be used instead.

Perform one of the following:

  • In the phone configuration file with XML(cfg.xml), enter a string in this format:

    <CDC_Challenge_Password_1_ ua="na"></CDC_Challenge_Password_1_>

    The password is masked in the configuration file.

  • In the phone web page, enter the challenge password.

Default: Empty

SCEP parameters configuration via DHCP option 43

In addition to the SCEP certificate enrollment by the manual configurations on the phone web page, you can also use the DHCP option 43 to populate the parameters from a DHCP server. The DHCP option 43 is preconfigured with the SCEP parameters, later the phone can fetch the parameters from the DHCP server to perform the SCEP certificate enrollment.

  • The SCEP parameters configuration via DHCP option 43 is only available for the phone where a factory reset is performed.
  • Phones shall not be placed in the network that supports both Option 43 and remote provisioning (for example, Options 66,160,159,150, or cloud provisioning). Otherwise, phones may not get the Option 43 configurations.

To enroll an SCEP certificate by configuring the SCEP parameters in the DHCP option 43, do the following:

  1. Prepare an SCEP environment.

    For information about SCEP environment setup, see your SCEP server documentation.

  2. Set up DHCP option 43 (defined in 8.4 Vendor Specific Information, RFC 2132).

    Suboptions (10–15) are reserved for the method:

    Parameter on phone web pageSuboptionTypeLength (byte)Mandatory
    FIPS Mode10boolean1No*
    Server11string208 - length (Challenge Password)Yes
    Root CA Fingerprint12binary20 or 32Yes
    Challenge Password13string208 - length (Server)No*
    Enable 802.1X Authentication14boolean1No
    Certificate Select15unsigned 8-bit1No

    When you use the DHCP option 43, notice the following characteristics of the method:

    • Suboptions (10–15) are reserved for Custom Device Certificate (CDC).
    • The maximum length of DHCP option 43 is 255 bytes.
    • The maximum length of Server + Challenge Password shall be less than 208 bytes.
    • The value of FIPS Mode shall be consistent with the onboarding provisioning configuration. Otherwise, the phone fails to retrieve the previously installed certificate after onboarding. Specifically,
      • If the phone will be registered to an environment where the FIPS mode is disabled, you don't need to configure the parameter FIPS Mode in DHCP option 43. By default, the FIPS mode is disabled.
      • If the phone will be registered to an environment where the FIPS mode is enabled, you must enable the FIPS mode in DHCP option 43. See Enable FIPS mode for details.
    • The password in Option 43 is in cleartext.

      If the challenge password is empty, the phone uses MIC/SUDI for the initial enrollment and certificate renewal. If the challenge password is configured, it is used only for the initial enrollment, and the installed certificate will be used for the certificate renewal.

    • Enable 802.1X Authentication and Certificate Select are used only for the phones in wired network.
    • DHCP option 60 (Vendor Class Identifier) is used to identify the device model.

    The following table provides an example of DHCP option 43 (suboptions 10–15):

    Suboption decimal/hexValue length (byte) decimal/hexValueHex value
    10/0a1/011 (0: Disabled; 1: Enabled)01
    11/0b18/12http://10.79.57.91687474703a2f2f31302e37392e35372e3931
    12/0c20/1412040870625C5B755D73F5925285F8F5FF5D55AF12040870625C5B755D73F5925285F8F5FF5D55AF
    13/0d16/10D233CCF9B9952A1544323333434346394239393532413135
    14/0e1/011 (0: No; 1: Yes)01
    15/0f1/011 (0: Manufacturing installed; 1: Custom installed) 01

    Summary of the parameter values:

    • FIPS Mode = Enabled

    • Server = http://10.79.57.91

    • Root CA Fingerprint = 12040870625C5B755D73F5925285F8F5FF5D55AF

    • Challenge Password = D233CCF9B9952A15

    • Enable 802.1X Authentication = Yes

    • Certificate Select = Custom installed

    The syntax of the final hex value is: {<suboption><length><value>}...

    According to the parameter values above, the final hex value is as the follows:

    0a01010b12687474703a2f2f31302e37392e35372e39310c1412040870625C5B755D73F5925285F8F5FF5D55AF0d10443233334343463942393935324131350e01010f0101

  3. Configure DHCP option 43 on a DHCP server.

    This step provides an example of the DHCP option 43 configurations on Cisco Network Register.

    1. Add DHCP option definition set.

      The Vendor Option String is model name of the IP phones. The valid value is: DP-9841, DP-9851, DP-9861, DP-9871, or CP-8875.

    2. Add the DHCP option 43 and suboptions to the DHCP option definition set.

      Example:

      Screenshot of DHCP option 43 definitions on Cisco Network Register

    3. Add options 43 to the DHCP policy and set up the value as follows:

      Example:

      (10 1)(11 http://10.79.57.91)(12 12040870625C5B755D73F5925285F8F5FF5D55AF)(13 D233CCF9B9952A15)(14 1)(15 1)

    4. Verify the settings. You can use Wireshark to capture a trace of the network traffic between the phone and the service.
  4. Perform a factory reset for the phone.

    After the phone is reset, the parameters Server, Root CA Fingerprint, and Challenge Password will be filled in automatically. These parameters are located in the section SCEP Configuration 1 from Certificate > Custom on the phone administration web page.

    To check details of the installed certificate, click View in the Existing Certificates section.

    To check the certificate installation status, select Certificate > Custom Cert Status. The Download Status 1 shows the latest result. If any issue occurs during the certificate enrollment, the download status can show the problem reason for troubleshooting purposes.

    If the challenge password authentication fails, users will be prompted to enter the password on the phone screen.
  5. (Optional): To remove the installed certificate from the phone, click Delete in the Existing Certificates section.
    Once you click the button, the removal operation starts immediately without a confirmation.

Certificate renewal by SCEP

The device certificate can be refreshed automatically by the SCEP process.

  • The phone checks whether the certificate will expire in 15 days every 4 hours. If so, the phone starts the certificate renewal process automatically.
  • If the challenge password is empty, the phone uses MIC/SUDI for both initial enrollment and certificate renewal. If the challenge password is configured, it is used for initial enrollment only, the existing/installed certificate is used for certificate renewal.
  • The phone doesn't remove the old device certificate until it retrieves the new one.
  • If certificate renewal fails because device certificate or CA expires, the phone triggers the initial enrollment automatically. In the meantime, if the challenge password authentication fails, a password input screen pops up on the phone screen, and users are prompted to enter the challenge password on the phone.

Enable FIPS mode

You can make a phone Federal Information Processing Standards (FIPS) compliant.

FIPS are a set of standards that describe document processing, encryption algorithms, and other information technology standards for use within non-military government and by government contractors and vendors who work with the agencies. CiscoSSL FOM (FIPS Object Module) is a carefully defined software component and designed for compatibility with the CiscoSSL library, so products using the CiscoSSL library and API can be converted to use FIPS 140-2 validated cryptography with minimal effort.

1

Access the phone administration web page.

2

Select Voice > System.

3

In the Security Settings section, choose Yes or No from the FIPS Mode parameter.

4

Click Submit All Changes.

When you enable FIPS, the following features work seamlessly on the phone:
  • Image authentication
  • Secure storage
  • Config file encryption
  • TLS:
    • HTTPs
    • PRT Upload
    • Firmware upgrade
    • Profile resync
    • Onboard service
    • Webex onboarding
    • SIP over TLS
    • 802.1x (Wired)
  • SIP digest (RFC 8760)
  • SRTP
  • Webex call logs and Webex directory
  • One Button to Push (OBTP)

Manually remove a security certificate

You can manually remove a security certificate from a phone if Simple Certificate Enrollment Protocol (SCEP) is not available.

1

From the phone administration web page, select Certificates.

2

Locate the certificate on the Certificates page.

3

Click Delete.

4

Restart the phone after the deletion process completes.

Set the user and admin password

After the phone is registered to a call control system at the first time or you perform a factory reset on the phone, you must set the user and admin password to enhance the security of the phone. Only when the password is set, you can submit the changes from the phone web page.

By default, the no password warning is enabled on the phone. When the phone doesn't have any user or admin password, the following warnings display:

  • The phone web page displays the "No admin password provided. The web is in read-only mode, and you cannot submit changes. Please change the password." at the top left corner.

    The User Password and Admin Password fields display the warning "No password provided" respectively if it's empty.

  • The phone screen Issues and diagnostics displays the "No password provided" issue.
1

Access the phone administration web page

2

Select Voice > System.

3

(Optional) In the System Configuration section, set the Display Password Warnings parameter to Yes, and then click Submit All Changes.

You can also enable the parameters in the phone configuration file (cfg.xml).

<Display_Password_Warnings ua="na">Yes</Display_Password_Warnings>

Default: Yes

Options: Yes|No

When the parameter is set to No, the password warning doesn't appear either on the web page or on the phone screen. Also, the ready-only mode for the page web will not be activated even though the password is empty.

4

Locate the parameter User Password or Admin Password, and click Change Password next to the parameter.

5

Enter the current user password in the Old Password field.

If you don't have a password, keep the field empty. The default value is empty.
6

Enter a new password in the New Password field.

7

Click Submit.

The message Password has been changed successfully. will display in the web page. The web page will refresh in several seconds. The warning next to the parameter will disappear.

After you set the user password, this parameter displays the following in the phone configuration XML file (cfg.xml):

<!--
<Admin_Password ua="na">*************</Admin_Password>
<User_Password ua="rw">*************</User_Password>
-->

If you receive the 403 error code when you try to access the phone web page, you must set the user or admin password by provisioning in the phone configuration file (cfg.xml). For example, enter a string in this format:

<Admin_Password ua="na">P0ssw0rd_tes89</Admin_Password>

<User_Password ua="rw">Abc123</User_Password>

802.1X Authentication

The Cisco IP Phones support 802.1X Authentication.

Cisco IP Phones and Cisco Catalyst switches traditionally use Cisco Discovery Protocol (CDP) to identify each other and determine parameters such as VLAN allocation and inline power requirements. CDP doesn’t identify locally attached workstations. Cisco IP Phones provide an EAPOL pass-through mechanism. This mechanism allows a workstation attached to the Cisco IP Phone to pass EAPOL messages to the 802.1X authenticator at the LAN switch. The pass-through mechanism ensures that the IP phone doesn’t act as the LAN switch to authenticate a data endpoint before accessing the network.

Cisco IP Phones also provide a proxy EAPOL Logoff mechanism. If the locally attached PC disconnects from the IP phone, the LAN switch doesn’t see the physical link fail, because the link between the LAN switch and the IP phone is maintained. To avoid compromising network integrity, the IP phone sends an EAPOL-Logoff message to the switch on behalf of the downstream PC, which triggers the LAN switch to clear the authentication entry for the downstream PC.

Support for 802.1X authentication requires several components:

  • Cisco IP Phone: The phone initiates the request to access the network. Cisco IP Phones contain an 802.1X supplicant. This supplicant allows network administrators to control the connectivity of IP phones to the LAN switch ports. The current release of the phone 802.1X supplicant uses the EAP-FAST and EAP-TLS options for network authentication.

  • Authentication server: The authentication server and the switch must both be configured with a shared secret that authenticates the phone.

  • Switch: The switch must support 802.1X, so it can act as the authenticator and pass the messages between the phone and the authentication server. After the exchange completes, the switch grants or denies the phone access to the network.

You must perform the following actions to configure 802.1X.

  • Configure the other components before you enable 802.1X Authentication on the phone.

  • Configure PC Port: The 802.1X standard doesn’t consider VLANs and thus recommends that only a single device should be authenticated to a specific switch port. However, some switches support multidomain authentication. The switch configuration determines whether you can connect a PC to the PC port of the phone.

    • Enabled: If you’re using a switch that supports multidomain authentication, you can enable the PC port and connect a PC to it. In this case, Cisco IP Phones support proxy EAPOL-Logoff to monitor the authentication exchanges between the switch and the attached PC.

      For more information about IEEE 802.1X support on the Cisco Catalyst switches, see the Cisco Catalyst switch configuration guides at:

      http://www.cisco.com/en/US/products/hw/switches/ps708/tsd_products_support_series_home.html

    • Disabled: If the switch doesn’t support multiple 802.1X-compliant devices on the same port, you should disable the PC Port when 802.1X authentication is enabled. If you don’t disable this port and then attempt to attach a PC to it, the switch denies network access to both the phone and the PC.

  • Configure Voice VLAN: Because the 802.1X standard doesn't account for VLANs, you should configure this setting based on the switch support.
    • Enabled: If you’re using a switch that supports multidomain authentication, you can continue it to use the voice VLAN.
    • Disabled: If the switch doesn’t support multidomain authentication, disable the Voice VLAN and consider assigning the port to the native VLAN.
  • (For Cisco Desk Phone 9800 Series only)

    Cisco Desk Phone 9800 Series has a different prefix in the PID from that for the other Cisco phones. To enable your phone to pass 802.1X authentication, set the Radius·User-Name parameter to include your Cisco Desk Phone 9800 Series.

    For example, the PID of phone 9841 is DP-9841; you can set Radius·User-Name to Start with DP or Contains DP. You can set it in both of the following sections:

    • Policy > Conditions > Library Conditions

    • Policy > Policy Sets > Authorization Policy > Authorization Rule 1

Enable 802.1X authentication

When 802.1X authentication is enabled, the phone uses 802.1X authentication to request network access. When 802.1X authentication is disabled, the phone uses Cisco Discovery Protocol (CDP) to acquire VLAN and network access. You can also view the transaction status and change on the phone screen menu.

When 802.1X authentication is enabled, you can also select the device certificate (MIC/SUDI or custom) for the initial enrollment and certificate renewal. Typically, MIC is for Cisco Video Phone 8875, SUDI is for Cisco Desk Phone 9800 Series. CDC can be used for authentication only in 802.1x.

1

Perform one of the following actions to enable 802.1X authentication:

  • In the phone web interface, select Voice > System and set the Enable 802.1X Authentication parameter to Yes. Then, click Submit All Changes.
  • In the configuration file (cfg.xml), enter a string in this format:

    <Enable_802.1X_Authentication ua="rw">Yes</Enable_802.1X_Authentication>

    Valid values: Yes|No

    Default: No

  • On the phone, press Settings the Settings hard key, and navigate to Network and service > Security settings > 802.1X authentication. Toggle the Device authentication field to On, and then select Apply.
Table 2. Parameters for 802.1X authentication on the phone screen

Parameters

Options

Default

Description

Device authentication

On

Off

Off

Enable or disable 802.1X authentication on the phone.

Transaction status

Disabled

Displays the state of 802.1X authentication. The state can be (not limited to):

  • Authenticating: Indicates that the authentication process is in progress.
  • Authenticated: Indicates that the phone is authenticated.
  • Disabled: Indicates that 802.1x authentication is disabled on the phone.

Protocol

None

Displays the EAP method that is used for 802.1X authentication. The protocol can be EAP-FAST or EAP-TLS.

User certificate type

Manufacturing installed

Custom installed

Manufacturing installed

Choose the certificate for the 802.1X authentication during the initial enrollment and certificate renewal.

  • Manufacturing installed—The Manufacturing Installed Certificate (MIC) and Secure Unique Device Identifier (SUDI) is used.
  • Custom installed—The Custom Device Certificate (CDC) is used. This type of certificate can be installed either by manual uploading on the phone web page or by installation from a Simple Certificate Enrollment Protocol (SCEP) server.

This parameter appears on the phone only when Device authentication is enabled.

2

Select a certificate (MIC or custom) for the 802.1X authentication on the phone web page.

  • For wired network, select Voice > System, choose a certificate type from the drop-down list Certificate Select in the section 802.1X Authentication.

    You can also configure this parameter in the configuration file (cfg.xml):

    <Certificate_Select ua="rw">Custom installed</Certificate_Select>

    Valid values: Manufacturing installed|Custom installed

    Default: Manufacturing installed

  • For wireless network, select Voice > System, choose a certificate type from the drop-down list Certificate Select in the section Wi-Fi Profile 1.

    You can also configure this parameter in the configuration file (cfg.xml):

    <Wi-Fi_Certificate_Select_1_ ua="rw">Custom installed</Wi-Fi_Certificate_Select_1_>

    Valid values: Manufacturing installed|Custom installed

    Default: Manufacturing installed

For information about how to select a certificate type on the phone screen, see Connect your phone to a Wi-Fi network.

Enable client-Initiated mode for media plane security negotiations

To protect media sessions, you can configure the phone to initiate media plane security negotiations with the server. The security mechanism follows the standards stated in RFC 3329 and its extension draft Security Mechanism Names for Media (See https://tools.ietf.org/html/draft-dawes-sipcore-mediasec-parameter-08#ref-2). The transport of negotiations between the phone and the server can use SIP protocol over UDP, TCP, and TLS. You can limit that media plane security negotiation is applied only when the signaling transport protocol is TLS.

1

Access the phone administration web page.

2

Select Voice > Ext (n).

3

In the SIP Settings section, set the MediaSec Request and MediaSec Over TLS Only fields as defined in the following table:

Table 3. Parameters for media plane security negotiation
ParameterDescription

MediaSec Request

Specifies whether the phone initiates media plane security negotiations with the server.

Perform one of the following:

  • In the phone configuration file with XML(cfg.xml), enter a string in this format:

    <MediaSec_Request_1_ ua="na">Yes</MediaSec_Request_1_>
  • In the phone web interface, set this field to Yes or No as needed.

Allowed values: Yes|No

  • Yes—Client-initiated Mode. The phone initiates media plane security negotiations.
  • No—Server-initiated Mode. The server initiates media plane security negotiations. The phone doesn't initiate negotiations, but can handle negotiation requests from the server to establish secure calls.

Default: No

MediaSec Over TLS Only

Specifies the signaling transport protocol over which media plane security negotiation is applied.

Before setting this field to Yes, ensure that the signaling transport protocol is TLS.

Perform one of the following:

  • In the phone configuration file with XML(cfg.xml), enter a string in this format:

    <MediaSec_Over_TLS_Only_1_ ua="na">No</MediaSec_Over_TLS_Only_1_>

  • In the phone web interface, set this field to Yes or No as needed.

Allowed values: Yes|No

  • Yes—The phone initiates or handles media plane security negotiations only when the signaling transport protocol is TLS.
  • No—The phone initiates and handles media plane security negotiations regardless of the signaling transport protocol.

Default: No

4

Click Submit All Changes.

WLAN security

Because all WLAN devices that are within range can receive all other WLAN traffic, securing voice communications is critical in WLANs. To ensure that intruders don’t manipulate nor intercept voice traffic, the Cisco SAFE Security architecture supports the phone. For more information about security in networks, see http://www.cisco.com/en/US/netsol/ns744/networking_solutions_program_home.html.

The Cisco Wireless IP telephony solution provides wireless network security that prevents unauthorized sign-ins and compromised communications by using the following authentication methods that the phone supports:

  • Open Authentication: Any wireless device can request authentication in an open system. The AP that receives the request may grant authentication to any requestor or only to requestors that are found on a list of users. Communication between the wireless device and Access Point (AP) could be nonencrypted.

  • Extensible Authentication Protocol-Flexible Authentication via Secure Tunneling (EAP-FAST) Authentication: This client-server security architecture encrypts EAP transactions within a Transport Level Security (TLS) tunnel between the AP and the RADIUS server, such as Identity Services Engine (ISE).

    The TLS tunnel uses Protected Access Credentials (PACs) for authentication between the client (phone) and the RADIUS server. The server sends an Authority ID (AID) to the client (phone), which in turn selects the appropriate PAC. The client (phone) returns a PAC-Opaque to the RADIUS server. The server decrypts the PAC with the primary key. Both endpoints now contain the PAC key and a TLS tunnel is created. EAP-FAST supports automatic PAC provisioning, but you must enable it on the RADIUS server.

    In ISE, by default, the PAC expires in one week. If the phone has an expired PAC, authentication with the RADIUS server takes longer while the phone gets a new PAC. To avoid PAC provisioning delays, set the PAC expiration period to 90 days or longer on the ISE or RADIUS server.

  • Extensible Authentication Protocol-Transport Layer Security (EAP-TLS) Authentication: EAP-TLS requires a client certificate for authentication and network access. For wireless EAP-TLS, the client certificate can be MIC, LSC, or user-installed certificate.

  • Protected Extensible Authentication Protocol (PEAP): Cisco proprietary password-based mutual authentication scheme between the client (phone) and a RADIUS server. The phone can use PEAP for authentication with the wireless network. Both PEAP-MSCHAPV2 and PEAP-GTC authentication methods are supported.

  • Pre-Shared Key (PSK): The phone supports ASCII format. You must use this format when setting up a WPA/WPA2/SAE Pre-shared key:

    ASCII: an ASCII-character string with 8 to 63 characters in length (0-9, lowercase and uppercase A-Z, and special characters)

    Example: GREG123567@9ZX&W

The following authentication schemes use the RADIUS server to manage authentication keys:

  • WPA/WPA2/WPA3: Uses RADIUS server information to generate unique keys for authentication. Because these keys are generated at the centralized RADIUS server, WPA2/WPA3 provides more security than WPA preshared keys that are stored on the AP and phone.

  • Fast Secure Roaming: Uses RADIUS server and a wireless domain server (WDS) information to manage and authenticate keys. The WDS creates a cache of security credentials for FT-enabled client devices for fast and secure reauthentication. Cisco Desk Phone 9861 and 9871 and Cisco Video Phone 8875 support 802.11r (FT). Both over the air and over the DS are supported to allow for fast secure roaming. But we strongly recommend utilizing the 802.11r (FT) over air method.

With WPA/WPA2/WPA3, encryption keys aren’t entered on the phone, but are automatically derived between the AP and phone. But the EAP username and password that are used for authentication must be entered on each phone.

To ensure that voice traffic is secure, the phone supports TKIP and AES for encryption. When these mechanisms are used for encryption, both the signaling SIP packets and voice Real-Time Transport Protocol (RTP) packets are encrypted between the AP and the phone.

TKIP

WPA uses TKIP encryption that has several improvements over WEP. TKIP provides per-packet key ciphering and longer initialization vectors (IVs) that strengthen encryption. In addition, a message integrity check (MIC) ensures that encrypted packets aren’t being altered. TKIP removes the predictability of WEP that helps intruders decipher the WEP key.

AES

An encryption method used for WPA2/WPA3 authentication. This national standard for encryption uses a symmetrical algorithm that has the same key for encryption and decryption. AES uses Cipher Blocking Chain (CBC) encryption of 128 bits in size, which supports key sizes of 128 bits, 192 bits and 256 bits, as a minimum. The phone supports a key size of 256 bits.

Cisco Desk Phone 9861 and 9871 and Cisco Video Phone 8875 don't support Cisco Key Integrity Protocol (CKIP) with CMIC.

Authentication and encryption schemes are set up within the wireless LAN. VLANs are configured in the network and on the APs and specify different combinations of authentication and encryption. An SSID associates with a VLAN and the particular authentication and encryption scheme. For wireless client devices to authenticate successfully, you must configure the same SSIDs with their authentication and encryption schemes on the APs and on the phone.

Some authentication schemes require specific types of encryption.

  • When you use WPA pre-shared key, WPA2 pre-shared key, or SAE, the pre-shared key must be statically set on the phone. These keys must match the keys that are on the AP.
  • The phone supports auto EAP negotiation for FAST or PEAP, but not for TLS. For EAP-TLS mode, you must specify it.

The authentication and encryption schemes in the following table shows the network configuration options for the phone that corresponds to AP configuration.

Table 4. Authentication and encryption schemes
FSR TypeAuthenticationKey ManagementEncryptionProtected Management Frame (PMF)
802.11r (FT)PSK

WPA-PSK

WPA-PSK-SHA256

FT-PSK

AESNo
802.11r (FT)WPA3

SAE

FT-SAE

AESYes
802.11r (FT)EAP-TLS

WPA-EAP

FT-EAP

AESNo
802.11r (FT)EAP-TLS (WPA3)

WPA-EAP-SHA256

FT-EAP

AESYes
802.11r (FT)EAP-FAST

WPA-EAP

FT-EAP

AESNo
802.11r (FT)EAP-FAST (WPA3)

WPA-EAP-SHA256

FT-EAP

AESYes
802.11r (FT)EAP-PEAP

WPA-EAP

FT-EAP

AESNo
802.11r (FT)EAP-PEAP (WPA3)

WPA-EAP-SHA256

FT-EAP

AESYes

Set up Wi-Fi profile

You can configure a Wi-Fi profile from the phone web page or from remote device profile resync and then associate the profile to the available Wi-Fi networks. You can use this Wi-Fi profile to connect to a Wi-Fi. Currently, only one Wi-Fi profile can be configured.

The profile contains the parameters required for phones to connect to the phone server with Wi-Fi. When you create and use a Wi-Fi profile, you or your users don't need to configure the wireless network for individual phones.

A Wi-Fi profile enables you to prevent or limit changes to the Wi-Fi configuration on the phone by the user.

We recommend that you use a secure profile with encryption enabled protocols to protect keys and passwords when you use a Wi-Fi profile.

When you set up the phones to use the EAP-FAST authentication method in security mode, your users need individual credentials to connect to an access point.

1

Access the phone web page.

2

Select Voice > System.

3

In the section Wi-Fi Profile (n), set the parameters as described in the following table Parameters for Wi-Fi profile.

The Wi-Fi profile configuration is also available to the user login.
4

Click Submit All Changes.

Parameters for Wi-Fi profile

The following table defines the function and usage of each parameter in the Wi-Fi Profile(n) section under the System tab in the phone web page. It also defines the syntax of the string that is added in the phone configuration file (cfg.xml) to configure a parameter.

ParameterDescription
Network NameAllows you to enter a name for the SSID that will display on the phone. Multiple profiles can have the same network name with different security mode.

Perform one of the following:

  • In the phone configuration file with XML(cfg.xml), enter a string in this format:

    <Network_Name_1_ ua="rw">cisco</Network_Name_1_>

  • In the phone web page, enter a name for the SSID.

Default: Empty

Security ModeAllows you to select the authentication method that is used to secure access to the Wi-Fi network. Depending on the method you choose, a password field appears so that you can provide the credentials that are required to join this Wi-Fi network.

Perform one of the following:

  • In the phone configuration file with XML(cfg.xml), enter a string in this format:

    <Security_Mode_1_ ua="rw">EAP-TLS</Security_Mode_1_> <!-- available options: Auto|EAP-FAST|||PSK||None|EAP-PEAP|EAP-TLS -->

  • In the phone web page, select one of the methods:
    • Auto
    • EAP-FAST
    • PSK
    • None
    • EAP-PEAP
    • EAP-TLS

Default: Auto

Wi-Fi User IDAllows you to enter a user ID for the network profile.

This field is available when you set the security mode to Auto, EAP-FAST, or EAP-PEAP. This is a mandatory field and it allows maximum length of 32 alphanumeric characters.

Perform one of the following:

  • In the phone configuration file with XML(cfg.xml), enter a string in this format:

    <Wi-Fi_User_ID_1_ua="rw"></Wi-Fi_User_ID_1_>

  • In the phone web page, enter a user ID for the network profile.

Default: Empty

Wi-Fi PasswordAllows you to enter the password for the specified Wi-Fi User ID.

Perform one of the following:

  • In the phone configuration file with XML(cfg.xml), enter a string in this format:

    <Wi-Fi_Password_1_ ua="rw"></Wi-Fi_Password_1_>

  • In the phone web page, enter a password for the user ID that you have added.

Default: Empty

Frequency BandAllows you to select the wireless signal frequency band that is the WLAN uses.

Perform one of the following:

  • In the phone configuration file with XML(cfg.xml), enter a string in this format:

    <Frequency_Band_1_ ua="rw">Auto</Frequency_Band_1_>

  • In the phone web page, select one of the options:
    • Auto
    • 2.4 GHz
    • 5 GHz

Default: Auto

Certificate SelectAllows you to select a certificate type for certificate initial enrollment and certificate renewal in the wireless network. This process is only available for 802.1X authentication.

Perform one of the following:

  • In the phone configuration file with XML(cfg.xml), enter a string in this format:

    <Certificate_Select_1_ ua="rw">Manufacturing installed</Certificate_Select_1_>

  • In the phone web page, select one of the options:
    • Manufacturing installed
    • Custom installed

Default: Manufacturing installed