Cisco 6941 - Unified IP Phone Slimline VoIP Administration Manual - Page 16

Browse online or download pdf Administration Manual for IP Phone Cisco 6941 - Unified IP Phone Slimline VoIP. Cisco 6941 - Unified IP Phone Slimline VoIP 19 pages. Two-line ip endpoint supporting both video and light-to-moderate voice communications
Also for Cisco 6941 - Unified IP Phone Slimline VoIP: Datasheet (5 pages), Release Notes (18 pages), Datasheet (5 pages), User Manual (38 pages), Administration Manual (14 pages), Setup Manual (16 pages), Features (29 pages), User Manual (24 pages), Quick Reference Manual (2 pages), Quick Start Manual (2 pages), Reference Manual (4 pages), Quick Reference Card (2 pages), Manual To Using (7 pages), Quick Reference Manual (2 pages), Quick Start Manual (4 pages)

Cisco 6941 - Unified IP Phone Slimline VoIP Administration Manual
802.1X Authentication and Status
Option
EAP-MD5
Transaction Status

Set Device Authentication Field

Procedure
Step 1
Choose Applications > Admin Settings > Security Config > 802.1X Authentication > Device
Authentication.
Step 2
Press Edit.
Step 3
Set the Device Authentication option to Enabled or Disabled.
Step 4
Press Save.
Cisco Unified IP Phone 6921, 6941, 6945, and 6961 Administration Guide for Cisco Unified Communications
Manager 10.0 (SCCP and SIP)
16
Description
Device ID: A derivative of the phone
model number and unique MAC
address displayed in this format:
CP-<model>-SEP-<MAC>
Shared Secret: Choose a password to
use on the phone and on the
authentication server. The password
must be between 6 and 32 characters,
consisting of any combination of
numbers or letters.
If you disable 802.1X
Note
authentication or perform a
factory reset of the phone, the
shared secret is deleted.
Realm: Indicates the user network
domain, always set as Network.
Displays the transaction status of your
802.1X Authentication.
Cisco Unified IP Phone Settings
To Change
Display only. Cannot configure.
Set EAP-MD5 Shared Secret Field, on
page 17
Display only. Cannot configure.
To view the transaction status of your
802.1X Authentication, choose
Applications > Admin Settings > Security
Configuration > 802.1X Authentication
Status.