Cisco CISCO1401 Software Guide - Page 14

Remote Authentication Dial-In User Service RADIUS and Terminal Access Controller Access Control

Page 14 highlights

Organization Preface Chapter 5, "Administering the Bridge," describes how to perform one-time operations to administer your bridge, such as preventing unauthorized access to the bridge, setting the system date and time, and setting the system name and prompt. Chapter 6, "Configuring Radio Settings," describes how to configure settings for the bridge radio such as the role in the radio network, data rates, transmit power, channel settings, and others. Chapter 7, "Configuring SSIDs," describes how to configure and manage multiple service set identifiers (SSIDs) on your bridge. You can configure up to 16 SSIDs on your bridge and assign different configuration settings to each SSID. Chapter 8, "Configuring Spanning Tree Protocol," descibes how to configure Spanning Tree Protocol (STP) on your bridge. STP prevents bridge loops in your network. Chapter 9, "Configuring WEP and WEP Features," describes how to configure the cipher suites required to use authenticated key management, Wired Equivalent Privacy (WEP), and WEP features including MIC, CMIC, TKIP, CKIP, and broadcast key rotation. Chapter 10, "Configuring Authentication Types," describes how to configure authentication types on the bridge. Client devices use these authentication methods to join your network. Chapter 11, "Configuring RADIUS and TACACS+ Servers," describes how to enable and configure the Remote Authentication Dial-In User Service (RADIUS) and Terminal Access Controller Access Control System Plus (TACACS+), which provide detailed accounting information and flexible administrative control over authentication and authorization processes. Chapter 12, "Configuring VLANs," describes how to configure your bridge to interoperate with the VLANs set up on your wired LAN. Chapter 13, "Configuring QoS," describes how to configure quality of service (QoS) on your bridge. With this feature, you can provide preferential treatment to certain traffic at the expense of others. Chapter 14, "Configuring Filters," describes how to configure and manage MAC address, IP, and Ethertype filters on the bridge using the web-browser interface. Chapter 15, "Configuring CDP," describes how to configure Cisco Discovery Protocol (CDP) on your bridge. CDP is a device-discovery protocol that runs on all Cisco network equipment. Chapter 16, "Configuring SNMP," describes how to configure the Simple Network Management Protocol (SNMP) on your bridge. Chapter 17, "Managing Firmware and Configurations," describes how to manipulate the Flash file system, how to copy configuration files, and how to archive (upload and download) software images. Chapter 18, "Configuring System Message Logging," describes how to configure system message logging on your bridge. Chapter 19, "Troubleshooting," describes how to troubleshoot common problems with your bridge. Appendix A, "Channels and Antenna Settings," lists the bridge radio channels and the maximum power levels supported by the world's regulatory domains. Appendix B, "Protocol Filters," lists some of the protocols that you can filter on the bridge. Appendix C, "Supported MIBs," lists the Simple Network Management Protocol (SNMP) Management Information Bases (MIBs) that the bridge supports for this software release. Appendix D, "Error and Event Messages," lists the CLI error and event messages and provides an explanation and recommended action for each message. Cisco Aironet 1400 Series Wireless Bridges Software Configuration Guide xiv OL-4059-01

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286

xiv
Cisco Aironet 1400 Series Wireless Bridges Software Configuration Guide
OL-4059-01
Preface
Organization
Chapter
5, “Administering the Bridge,”
describes how to perform one-time operations to administer your
bridge, such as preventing unauthorized access to the bridge, setting the system date and time, and
setting the system name and prompt.
Chapter 6, “Configuring Radio Settings,”
describes how to configure settings for the bridge radio such
as the role in the radio network, data rates, transmit power, channel settings, and others.
Chapter 7, “Configuring SSIDs,”
describes how to configure and manage multiple service set identifiers
(SSIDs) on your bridge. You can configure up to 16 SSIDs on your bridge and assign different
configuration settings to each SSID.
Chapter 8, “Configuring Spanning Tree Protocol,”
descibes how to configure Spanning Tree Protocol
(STP) on your bridge. STP prevents bridge loops in your network.
Chapter 9, “Configuring WEP and WEP Features,”
describes how to configure the cipher suites required
to use authenticated key management, Wired Equivalent Privacy (WEP), and WEP features including
MIC, CMIC, TKIP, CKIP, and broadcast key rotation.
Chapter
10, “Configuring Authentication Types,”
describes how to configure authentication types on the
bridge. Client devices use these authentication methods to join your network.
Chapter 11, “Configuring RADIUS and TACACS+ Servers,”
describes how to enable and configure the
Remote Authentication Dial-In User Service (RADIUS) and Terminal Access Controller Access Control
System Plus (TACACS+), which provide detailed accounting information and flexible administrative
control over authentication and authorization processes.
Chapter 12, “Configuring VLANs,”
describes how to configure your bridge to interoperate with the
VLANs set up on your wired LAN.
Chapter 13, “Configuring QoS,”
describes how to configure quality of service (QoS) on your bridge.
With this feature, you can provide preferential treatment to certain traffic at the expense of others.
Chapter 14, “Configuring Filters,”
describes how to configure and manage MAC address, IP, and
Ethertype filters on the bridge using the web-browser interface.
Chapter 15, “Configuring CDP,”
describes how to configure Cisco Discovery Protocol (CDP) on your
bridge. CDP is a device-discovery protocol that runs on all Cisco network equipment.
Chapter 16, “Configuring SNMP,”
describes how to configure the Simple Network Management
Protocol (SNMP) on your bridge.
Chapter 17, “Managing Firmware and Configurations,”
describes how to manipulate the Flash file
system, how to copy configuration files, and how to archive (upload and download) software images.
Chapter 18, “Configuring System Message Logging,”
describes how to configure system message
logging on your bridge.
Chapter 19, “Troubleshooting,”
describes how to troubleshoot common problems with your bridge.
Appendix A, “Channels and Antenna Settings,”
lists the bridge radio channels and the maximum power
levels supported by the world’s regulatory domains.
Appendix B, “Protocol Filters,”
lists some of the protocols that you can filter on the bridge.
Appendix C, “Supported MIBs,”
lists the Simple Network Management Protocol (SNMP) Management
Information Bases (MIBs) that the bridge supports for this software release.
Appendix D, “Error and Event Messages,”
lists the CLI error and event messages and provides an
explanation and recommended action for each message.