14.04.2014 Views

Cisco IOS Software Configuration Guide for Cisco Aironet Access ...

Cisco IOS Software Configuration Guide for Cisco Aironet Access ...

Cisco IOS Software Configuration Guide for Cisco Aironet Access ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Controlling <strong>Access</strong> Point <strong>Access</strong> with RADIUS<br />

Chapter 5<br />

Administering the <strong>Access</strong> Point<br />

RADIUS provides detailed accounting in<strong>for</strong>mation and flexible administrative control over<br />

authentication and authorization processes. RADIUS is facilitated through AAA and can be enabled only<br />

through AAA commands.<br />

Note<br />

For complete syntax and usage in<strong>for</strong>mation <strong>for</strong> the commands used in this section, refer to the <strong>Cisco</strong> <strong>IOS</strong><br />

Security Command Reference <strong>for</strong> Release 12.3.<br />

These sections describe RADIUS configuration:<br />

• Default RADIUS <strong>Configuration</strong>, page 5-10<br />

• Configuring RADIUS Login Authentication, page 5-10 (required)<br />

• Defining AAA Server Groups, page 5-12 (optional)<br />

• Configuring RADIUS Authorization <strong>for</strong> User Privileged <strong>Access</strong> and Network Services, page 5-14<br />

(optional)<br />

• Displaying the RADIUS <strong>Configuration</strong>, page 5-15<br />

Default RADIUS <strong>Configuration</strong><br />

RADIUS and AAA are disabled by default.<br />

To prevent a lapse in security, you cannot configure RADIUS through a network management<br />

application. When enabled, RADIUS can authenticate users accessing the wireless device through the<br />

CLI.<br />

Configuring RADIUS Login Authentication<br />

To configure AAA authentication, you define a named list of authentication methods and then apply that<br />

list to various interfaces. The method list defines the types of authentication to be per<strong>for</strong>med and the<br />

sequence in which they are per<strong>for</strong>med; it must be applied to a specific interface be<strong>for</strong>e any of the defined<br />

authentication methods are per<strong>for</strong>med. The only exception is the default method list (which, by<br />

coincidence, is named default). The default method list is automatically applied to all interfaces except<br />

those that have a named method list explicitly defined.<br />

A method list describes the sequence and authentication methods to be queried to authenticate a user.<br />

You can designate one or more security protocols to be used <strong>for</strong> authentication, thus ensuring a backup<br />

system <strong>for</strong> authentication in case the initial method fails. The software uses the first method listed to<br />

authenticate users; if that method fails to respond, the software selects the next authentication method in<br />

the method list. This process continues until there is successful communication with a listed<br />

authentication method or until all defined methods are exhausted. If authentication fails at any point in<br />

this cycle—meaning that the security server or local username database responds by denying the user<br />

access—the authentication process stops, and no other authentication methods are attempted.<br />

Beginning in privileged EXEC mode, follow these steps to configure login authentication. This<br />

procedure is required.<br />

Command<br />

Purpose<br />

Step 1 configure terminal Enter global configuration mode.<br />

Step 2 aaa new-model Enable AAA.<br />

5-10<br />

<strong>Cisco</strong> <strong>IOS</strong> <strong>Software</strong> <strong>Configuration</strong> <strong>Guide</strong> <strong>for</strong> <strong>Cisco</strong> <strong>Aironet</strong> <strong>Access</strong> Points<br />

OL-8191-01

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!