14.04.2014 Views

Cisco IOS Software Configuration Guide for Cisco Aironet Access ...

Cisco IOS Software Configuration Guide for Cisco Aironet Access ...

Cisco IOS Software Configuration Guide for Cisco Aironet Access ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Chapter 5<br />

Administering the <strong>Access</strong> Point<br />

Controlling <strong>Access</strong> Point <strong>Access</strong> with TACACS+<br />

Command<br />

Purpose<br />

Step 5 show running-config Verify your entries.<br />

Step 6 copy running-config startup-config (Optional) Save your entries in the configuration file.<br />

To disable authorization, use the no aaa authorization {network | exec} method1 global configuration<br />

command.<br />

Displaying the RADIUS <strong>Configuration</strong><br />

To display the RADIUS configuration, use the show running-config privileged EXEC command.<br />

Controlling <strong>Access</strong> Point <strong>Access</strong> with TACACS+<br />

This section describes how to control administrator access to the wireless device using Terminal <strong>Access</strong><br />

Controller <strong>Access</strong> Control System Plus (TACACS+). For complete instructions on configuring the<br />

wireless device to support TACACS+, see Chapter 13, “Configuring RADIUS and TACACS+ Servers.”<br />

TACACS+ provides detailed accounting in<strong>for</strong>mation and flexible administrative control over<br />

authentication and authorization processes. TACACS+ is facilitated through AAA and can be enabled<br />

only through AAA commands.<br />

Note<br />

For complete syntax and usage in<strong>for</strong>mation <strong>for</strong> the commands used in this section, refer to the <strong>Cisco</strong> <strong>IOS</strong><br />

Security Command Reference <strong>for</strong> Release 12.3.<br />

These sections describe TACACS+ configuration:<br />

• Default TACACS+ <strong>Configuration</strong>, page 5-15<br />

• Configuring TACACS+ Login Authentication, page 5-15<br />

• Configuring TACACS+ Authorization <strong>for</strong> Privileged EXEC <strong>Access</strong> and Network Services, page<br />

5-17<br />

• Displaying the TACACS+ <strong>Configuration</strong>, page 5-17<br />

Default TACACS+ <strong>Configuration</strong><br />

TACACS+ and AAA are disabled by default.<br />

To prevent a lapse in security, you cannot configure TACACS+ through a network management<br />

application.When enabled, TACACS+ can authenticate administrators accessing the wireless device<br />

through the CLI.<br />

Configuring TACACS+ Login Authentication<br />

To configure AAA authentication, you define a named list of authentication methods and then apply that<br />

list to various interfaces. The method list defines the types of authentication to be per<strong>for</strong>med and the<br />

sequence in which they are per<strong>for</strong>med; it must be applied to a specific interface be<strong>for</strong>e any of the defined<br />

OL-8191-01<br />

<strong>Cisco</strong> <strong>IOS</strong> <strong>Software</strong> <strong>Configuration</strong> <strong>Guide</strong> <strong>for</strong> <strong>Cisco</strong> <strong>Aironet</strong> <strong>Access</strong> Points<br />

5-15

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!