Avaya 3641/3645 Wireless IP Telephone Configuration
Issue 6, January 2011
63
WPA2-PSK
– The security features of WPA2 (Wi-Fi Protected Access) using PSK (Pre-
Shared Key) are available and may be used if supported by the access points in the
facility. Select either
Passphras
e and enter a passphrase between eight and 63 characters
in length or
Pre-Shared Key
and enter the 256-bit key code.
WPA-PSK
– The security features of WPA (Wi-Fi Protected Access) using PSK (Pre-Shared
Key) are available and may be used if supported by the access points in the facility. Select
either
Passphrase
and enter a passphrase between eight and 63 characters in length or
Pre-Shared Key
and enter the 256-bit key code.
Cisco FSR
(Fast Secure Roaming) In order to provide the highest level of security without
compromising voice quality on Cisco Aironet wireless LAN access points, Avaya and Cisco
Systems have cooperated to implement the Fast Secure Roaming mechanism. FSR is
designed to minimize call interruptions for Avaya 3641/3645 Wireless IP Telephone users
as they roam throughout a facility. Existing Aironet 350, 1100, and 1200 APs may
require a firmware upgrade to support FSR. Cisco FSR requires specific configuration of
the Cisco access points in your site. See your Cisco representative for detailed
documentation on configuring your access points and other required security services on
your wired network. To configure Cisco FSR in your Avaya 3641/3645 Wireless IP
Telephone, you must enter a Radius Server username and password into each handset.
Username
– Enter a username that matches an entry on your Radius server.
Usernames are alphanumeric strings, and can be entered using the alphanumeric
string entry technique.
Password
– Enter the password that corresponds to this Username.
Consult the
VIEW Configuration Guide
for the access points (APs) installed in
your facility for information on which of the WPA versions are recommended by
Avaya engineering. Configure the recommended version on the AP and select the
corresponding option on the Admin menu.
WPA2-Enterprise
The
Authentication
setting can select either *
EAP
-
FAST
or
PEAP
as the
authentication method for RADIUS server. The following authentication servers have
been validated for use with R3.0:
•
Juniper Networks Steel-belted Radius Enterprise Edition (formerly Funk), v6.1
•
Microsoft Internet Security and Acceleration (ISA) Server 2003
•
Cisco Secure Access Control Server (ACS), v4.1
•
FreeRADIUS v2.0.1 and 1.1.7
Other RADIUS servers will likely work properly with the handsets, but have not been
tested. Inquiries on untested servers will receive limited, “
Best Effort
”, support.
Username
– Enter a username that matches an entry on your RADIUS server.
Alphanumeric strings can be entered using the alphanumeric string entry technique.
Password
– Enter the password that corresponds to this username.
Fast
Handoff
allows the use of either *
CCKM
(Cisco Centralized Key Management,
for Cisco APs only) or
OKC
(Opportunistic Key Caching) to select a fast handoff
mechanism. These mechanisms allow a phone to quickly and securely roam between
APs with a minimum disruption of audio.
Summary of Contents for 3641
Page 4: ......
Page 8: ......
Page 100: ......
Page 101: ...Issue 6 January 2011 101 C Handset Administration Tool Installation How to Use ...
Page 107: ...Installing the Handset Administration Tool Issue 6 January 2011 107 ...
Page 148: ......