4-22
Cisco Unified Wireless IP Phone 7925G Administration Guide for Cisco Unified Communications Manager 7.0(1)
OL-15984-01
Chapter 4 Using the Cisco Unified Wireless IP Phone 7925G Web Pages
Configuring Network Profiles
Step 1 Export the Authentication Server Root Certificate from the ACS. See Exporting Certificates from the
ACS, page 4-20.
Step 2 Go to the phone web page and choose Certificates.
Step 3 Click Import next to the Authentication Server Root certificate.
Step 4 Restart the phone.
Configuring the ACS Server Setup
To set up the user account name and install the MIC root certificate for the phone on the ACS, follow
these steps:
Note For more information about using the ACS configuration tool, see the ACS online help or the User Guide
for Cisco Secure ACS for Windows.
Procedure
Step 1 From the ACS configuration tool User Setup page, create a phone user account name if it is not already
set up. Typically, the user name includes the phone MAC address at the end (for example,
CP-7925G-SEPxxxxxxxxxxxx). No password is necessary for EAP-TLS.
Note Make sure the user name matches the Common Name field in the User Certificate Installation
page. See
“Requesting and Importing the User Installed Certificate” section on page 4-21.
Step 2 On the System Configuration page, in the EAP-TLS section, enable these fields:
• Allow EAP-TLS
• Certificate CN comparison.
Step 3 On the ACS Certification Authority Setup page, add the Manufacturing Root Certificate and
Manufacturing CA Certificate to the ACS server.
Step 4 Enable both the Manufacturing Root Certificate and Manufacturing CA Certificate in the ACS
Certificate Trust List.
Configuring PEAP
Protected Extensible Authentication Protocol (PEAP) uses server-side public key certificates to
authenticate clients by creating an encrypted SSL/TLS tunnel between the client and the authentication
server.
Note The authentication server validation can be enabled by importing the authentication server certificate.
Before You Begin
Before you configure PEAP authentication for the phone, make sure these Cisco Secure ACS
requirements are met: