Configuring External Authentication And Authorization Using A Radius Server - Cisco aironet 1522 Design And Deployment Manual

1520, 1130, 1240 series wireless mesh access points
Hide thumbs Also See for aironet 1522:
Table of Contents

Advertisement

Connecting the Cisco 1520 Series Mesh Access Point to Your Network

Configuring External Authentication and Authorization Using a RADIUS Server

External authorization and authentication of mesh access points using a RADIUS server such as Cisco
ACS (4.1 and later) is supported in release 5.2 and later. The RADIUS server must support the client
authentication type of EAP-FAST with certificates.
Before you employ external authentication within the mesh network, you must make these changes:
Configuring RADIUS Servers
Follow these steps to install and trust the CA certificates on the RADIUS server:
Using Internet Explorer, download the CA certificates for Cisco Root CA 2048:
Step 1
Install the certificates:
Step 2
a.
b.
c.
Configure the external RADIUS servers to trust the CA certificate.
Step 3
a.
b.
c.
d.
Cisco Aironet 1520, 1130, 1240 Series Wireless Mesh Access Points, Design and Deployment Guide, Release 6.0
68
Configure the RADIUS server to be used as an AAA server must be configured on the controller.
The controller must also be configured on the RADIUS server.
Add the mesh access point configured for external authorization and authentication to the user list
of the RADIUS server.
For additional details, refer to the
page
69.
Configure EAP-FAST on the RADIUS server and install the certificates. EAP-FAST authentication
is required if mesh access points are connected to the controller using an 802.11a interface; the
external RADIUS servers need to trust Cisco Root CA 2048. For information on installing and
trusting the CA certificates, see the
Note
If mesh access points connect to a the controller using a Fast Ethernet or Gigabit Ethernet
interface, only MAC authorization is required.
This feature also supports local EAP and PSK authentication on the controller.
Note
http://www.cisco.com/security/pki/certs/crca2048.cer
http://www.cisco.com/security/pki/certs/cmca.cer
From the CiscoSecure ACS main menu, click, click System Configuration > ACS Certificate
Setup > ACS Certification Authority Setup.
In the CA certificate file box, type the CA certificate location (path and name). For example:
c:\Certs\crca2048.cer.
Click Submit.
From the CiscoSecure ACS main menu, choose System Configuration > ACS Certificate Setup >
Edit Certificate Trust List. The Edit Certificate Trust List appears.
Check the check box next to the Cisco Root CA 2048 (Cisco Systems) certificate name.
Click Submit.
To restart ACS, choose System Configuration > Service Control, and then click Restart.
"Adding a Username to a RADIUS Server" section on
"Configuring RADIUS Servers" section on page
68.
OL-20213-01

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents