Configuring Wispr Radius Attributes - Cisco M10-RM Software Manual

Cisco ios releases 12.4(10b)ja and 12.3(8)jec
Hide thumbs Also See for M10-RM:
Table of Contents

Advertisement

Configuring and Enabling RADIUS
Command
Step 3
radius-server key string
Step 4
end
Step 5
show running-config
Step 6
copy running-config startup-config
To delete the vendor-proprietary RADIUS host, use the no radius-server host {hostname | ip-address}
non-standard global configuration command. To disable the key, use the no radius-server key global
configuration command.
This example shows how to specify a vendor-proprietary RADIUS host and to use a secret key of rad124
between the access point and the server:
AP(config)# radius-server host 172.20.30.15 nonstandard
AP(config)# radius-server key rad124

Configuring WISPr RADIUS Attributes

The Wi-Fi Alliance's WISPr Best Current Practices for Wireless Internet Service Provider (WISP)
Roaming document lists RADIUS attributes that access points must send with RADIUS accounting and
authentication requests. The access point currently supports only the WISPr location-name and the ISO
and International Telecommunications Union (ITU) country and area codes attributes. Use the
snmp-server location and the dot11 location isocc commands to configure these attributes on the
access point.
The WISPr Best Current Practices for Wireless Internet Service Provider (WISP) Roaming document
also requires the access point to include a class attribute in RADIUS authentication replies and
accounting requests. The access point includes the class attribute automatically and does not have to be
configured to do so.
You can find a list of ISO and ITU country and area codes at the ISO and ITU websites. Cisco IOS
software does not check the validity of the country and area codes that you configure on the access point.
Cisco IOS Software Configuration Guide for Cisco Aironet Access Points
13-18
Chapter 13
Configuring RADIUS and TACACS+ Servers
Purpose
Specify the shared secret text string used between the
access point and the vendor-proprietary RADIUS
server. The access point and the RADIUS server use
this text string to encrypt passwords and exchange
responses.
The key is a text string that must match the
Note
encryption key used on the RADIUS server.
Leading spaces are ignored, but spaces within
and at the end of the key are used. If you use
spaces in your key, do not enclose the key in
quotation marks unless the quotation marks
are part of the key.
Return to privileged EXEC mode.
Verify your settings.
(Optional) Save your entries in the configuration file.
OL-14209-01

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Aironet series

Table of Contents