Limiting The Local Authenticator To One Authentication Type; Unblocking Locked Usernames; Viewing Local Authenticator Statistics - Cisco M10-RM Software Manual

Cisco ios releases 12.4(10b)ja and 12.3(8)jec
Hide thumbs Also See for M10-RM:
Table of Contents

Advertisement

Chapter 9
Configuring an Access Point as a Local Authenticator

Limiting the Local Authenticator to One Authentication Type

By default, a local authenticator access point performs LEAP, EAP-FAST, and MAC-based
authentication for client devices. However, you can limit the local authenticator to perform only one or
two authentication types. Use the no form of the authentication command to restrict the authenticator to
an authentication type:
AP(config-radsrv)# [no] authentication [eapfast] [leap] [mac]
Because all authentication types are enabled by default, you enter the no form of the command to disable
authentication types. For example, if you want the authenticator to perform only LEAP authentication,
you enter these commands:
AP(config-radsrv)# no authentication eapfast
AP(config-radsrv)# no authentication mac

Unblocking Locked Usernames

You can unblock usernames before the lockout time expires, or when the lockout time is set to infinite.
In Privileged Exec mode on the local authenticator, enter this command to unblock a locked username:
AP# clear radius local-server user username

Viewing Local Authenticator Statistics

In privileged exec mode, enter this command to view statistics collected by the local authenticator:
AP# show radius local-server statistics
This example shows local authenticator statistics:
Successes
Client blocks
Unknown NAS
NAS : 10.91.6.158
Successes
Client blocks
Corrupted packet
No username attribute
Shared key mismatch
Unknown EAP message
Auto provision success : 0
PAC refresh
OL-14209-01
: 0
Unknown usernames
: 0
Invalid passwords
: 0
Invalid packet from NAS: 0
: 0
Unknown usernames
: 0
Invalid passwords
: 0
Unknown RADIUS message : 0
: 0
Missing auth attribute : 0
: 0
Invalid state attribute: 0
: 0
Unknown EAP auth type
Auto provision failure : 0
: 0
Invalid PAC received
Cisco IOS Software Configuration Guide for Cisco Aironet Access Points
Configuring a Local Authenticator
: 0
: 0
: 0
: 0
: 0
: 0
9-9

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Aironet series

Table of Contents