Chapter 7 Configuring RADIUS Servers

Configuring and Enabling RADIUS

To remove the specified RADIUS server, use the no radius-server host hostname ip-addressglobal configuration command. To remove a server group from the configuration list, use the no aaa group server radius group-nameglobal configuration command. To remove the IP address of a RADIUS server, use the no server ip-addressserver group configuration command.

In this example, the access point is configured to recognize two different RADIUS group servers (group1 and group2). Group1 has two different host entries on the same RADIUS server configured for the same services. The second host entry acts as a fail-over backup to the first entry.

router(config)# aaa new-model

router(config)# radius-server host 172.20.0.1 auth-port 1000 acct-port 1001 router(config)# radius-server host 172.10.0.1 auth-port 1645 acct-port 1646

router(config)# aaa group

server radius group1

router(config-sg-radius)#

server 172.20.0.1 auth-port 1000 acct-port 1001

router(config-sg-radius)#

exit

router(config)# aaa group

server radius group2

router(config-sg-radius)#

server 172.20.0.1 auth-port 2000 acct-port 2001

router(config-sg-radius)#

exit

Configuring RADIUS Authorization for User Privileged Access and Network Services

AAAauthorization limits the services available to a user. When AAA authorization is enabled, the access point uses information retrieved from the user’s profile, which is in the local user database or on the security server, to configure the user’s session. The user is granted access to a requested service only if the information in the user profile allows it.

Note This section describes setting up authorization for access point administrators, not for wireless client devices.

You can use the aaa authorization global configuration command with the radius keyword to set parameters that restrict a user’s network access to privileged EXEC mode.

The aaa authorization exec radius local command sets these authorization parameters:

Use RADIUS for privileged EXEC access authorization if authentication was performed by using

RADIUS.

Use the local database if authentication was not performed by using RADIUS.

Note Authorization is bypassed for authenticated users who log in through the CLI even if authorization has been configured.

Cisco Wireless ISR and HWIC Access Point Configuration Guide

 

OL-6415-04

7-11

 

 

 

Page 117
Image 117
Cisco Systems OL-6415-04 manual Radius