Cisco CISCO1401 Software Guide - Page 64

Displaying the RADIUS Configuration, Controlling Bridge Access with TACACS+

Page 64 highlights

Controlling Bridge Access with TACACS+ Chapter 5 Administering the Bridge Beginning in privileged EXEC mode, follow these steps to specify RADIUS authorization for privileged EXEC access and network services: Step 1 Step 2 Command configure terminal aaa authorization network radius Step 3 aaa authorization exec radius Step 4 Step 5 Step 6 end show running-config copy running-config startup-config Purpose Enter global configuration mode. Configure the bridge for user RADIUS authorization for all network-related service requests. Configure the bridge for user RADIUS authorization to determine if the user has privileged EXEC access. The exec keyword might return user profile information (such as autocommand information). Return to privileged EXEC mode. Verify your entries. (Optional) Save your entries in the configuration file. To disable authorization, use the no aaa authorization {network | exec} method1 global configuration command. Displaying the RADIUS Configuration To display the RADIUS configuration, use the show running-config privileged EXEC command. Controlling Bridge Access with TACACS+ This section describes how to control administrator access to the bridge using Terminal Access Controller Access Control System Plus (TACACS+). For complete instructions on configuring the bridge to support TACACS+, see Chapter 11, "Configuring RADIUS and TACACS+ Servers." TACACS+ provides detailed accounting information and flexible administrative control over authentication and authorization processes. TACACS+ is facilitated through AAA and can be enabled only through AAA commands. Note For complete syntax and usage information for the commands used in this section, refer to the Cisco IOS Security Command Reference for Release 12.2. These sections describe TACACS+ configuration: • Default TACACS+ Configuration, page 5-13 • Configuring TACACS+ Login Authentication, page 5-13 • Configuring TACACS+ Authorization for Privileged EXEC Access and Network Services, page 5-14 • Displaying the TACACS+ Configuration, page 5-15 5-12 Cisco Aironet 1400 Series Wireless Bridges Software Configuration Guide OL-4059-01

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286

5-12
Cisco Aironet 1400 Series Wireless Bridges Software Configuration Guide
OL-4059-01
Chapter 5
Administering the Bridge
Controlling Bridge Access with TACACS+
Beginning in privileged EXEC mode, follow these steps to specify RADIUS authorization for privileged
EXEC access and network services:
To disable authorization, use the
no aaa authorization
{
network
|
exec
}
method1
global configuration
command.
Displaying the RADIUS Configuration
To display the RADIUS configuration, use the
show running-config
privileged EXEC command.
Controlling Bridge Access with TACACS+
This section describes how to control administrator access to the bridge using Terminal Access
Controller Access Control System Plus (TACACS+). For complete instructions on configuring the
bridge to support TACACS+, see
Chapter 11, “Configuring RADIUS and TACACS+ Servers.”
TACACS+ provides detailed accounting information and flexible administrative control over
authentication and authorization processes. TACACS+ is facilitated through AAA and can be enabled
only through AAA commands.
Note
For complete syntax and usage information for the commands used in this section, refer to the
Cisco IOS
Security Command Reference for Release 12.2
.
These sections describe TACACS+ configuration:
Default TACACS+ Configuration, page 5-13
Configuring TACACS+ Login Authentication, page 5-13
Configuring TACACS+ Authorization for Privileged EXEC Access and Network Services, page
5-14
Displaying the TACACS+ Configuration, page 5-15
Command
Purpose
Step 1
configure terminal
Enter global configuration mode.
Step 2
aaa authorization network radius
Configure the bridge for user RADIUS authorization for all
network-related service requests.
Step 3
aaa authorization exec radius
Configure the bridge for user RADIUS authorization to determine if the
user has privileged EXEC access.
The
exec
keyword might return user profile information (such as
autocommand
information).
Step 4
end
Return to privileged EXEC mode.
Step 5
show running-config
Verify your entries.
Step 6
copy running-config startup-config
(Optional) Save your entries in the configuration file.