Displaying The Radius Configuration; Controlling Access Point Access With Tacacs; Default Tacacs+ Configuration; Configuring Tacacs+ Login Authentication - Cisco M10-RM Software Manual

Cisco ios releases 12.4(10b)ja and 12.3(8)jec
Hide thumbs Also See for M10-RM:
Table of Contents

Advertisement

Chapter 5
Administering the Access PointWireless Device Access
Command
Step 5
show running-config
Step 6
copy running-config startup-config
To disable authorization, use the no aaa authorization {network | exec} method1 global configuration
command.

Displaying the RADIUS Configuration

To display the RADIUS configuration, use the show running-config privileged EXEC command.

Controlling Access Point Access with TACACS+

This section describes how to control administrator access to the wireless device using Terminal Access
Controller Access Control System Plus (TACACS+). For complete instructions on configuring the
wireless device to support TACACS+, see
TACACS+ provides detailed accounting information and flexible administrative control over
authentication and authorization processes. TACACS+ is facilitated through AAA and can be enabled
only through AAA commands.
Note
For complete syntax and usage information for the commands used in this section, refer to the Cisco IOS
Security Command Reference for Release 12.3.
These sections describe TACACS+ configuration:

Default TACACS+ Configuration

TACACS+ and AAA are disabled by default.
To prevent a lapse in security, you cannot configure TACACS+ through a network management
application.When enabled, TACACS+ can authenticate administrators accessing the wireless device
through the CLI.

Configuring TACACS+ Login Authentication

To configure AAA authentication, you define a named list of authentication methods and then apply that
list to various interfaces. The method list defines the types of authentication to be performed and the
sequence in which they are performed; it must be applied to a specific interface before any of the defined
OL-14209-01
Purpose
Verify your entries.
(Optional) Save your entries in the configuration file.
Default TACACS+ Configuration, page 5-15
Configuring TACACS+ Login Authentication, page 5-15
Configuring TACACS+ Authorization for Privileged EXEC Access and Network Services,
page 5-17
Displaying the TACACS+ Configuration, page 5-17
Chapter 13, "Configuring RADIUS and TACACS+ Servers."
Cisco IOS Software Configuration Guide for Cisco Aironet Access Points
Controlling Access Point Access with TACACS+
5-15

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Aironet series

Table of Contents