Chapter 7 Configuring RADIUS Servers

Configuring and Enabling RADIUS

 

Command

Purpose

Step 3

 

 

radius-server key string

Specify the shared secret text string used between the

 

 

access point and the vendor-proprietary RADIUS

 

 

server. The access point and the RADIUS server use

 

 

this text string to encrypt passwords and exchange

 

 

responses.

 

 

Note The key is a text string that must match the

 

 

encryption key used on the RADIUS server.

 

 

Leading spaces are ignored, but spaces within

 

 

and at the end of the key are used. If you use

 

 

spaces in your key, do not enclose the key in

 

 

quotation marks unless the quotation marks

 

 

are part of the key.

Step 4

 

 

end

Return to privileged EXEC mode.

Step 5

 

 

show running-config

Verify your settings.

Step 6

 

 

copy running-config startup-config

(Optional) Save your entries in the configuration file.

 

 

 

To delete the vendor-proprietary RADIUS host, use the no radius-server host {hostname ip-address} non-standardglobal configuration command. To disable the key, use the no radius-server key global configuration command.

This example shows how to specify a vendor-proprietary RADIUS host and to use a secret key of rad124 between the access point and the server:

router(config)# radius-server host 172.20.30.15 nonstandard router(config)# radius-server key rad124

Configuring WISPr RADIUS Attributes

The Wi-Fi Alliance’s WISPr Best Current Practices for Wireless Internet Service Provider (WISP) Roaming document lists RADIUS attributes that access points must send with RADIUS accounting and authentication requests. The access point currently supports only the WISPr location-name and the ISO and International Telecommunications Union (ITU) country and area codes attributes. Use the snmp-server location and the dot11 location isocc commands to configure these attributes on the access point.

The WISPr Best Current Practices for Wireless Internet Service Provider (WISP) Roaming document also requires the access point to include a class attribute in RADIUS authentication replies and accounting requests. The access point includes the class attribute automatically and does not have to be configured to do so.

You can find a list of ISO and ITU country and area codes at the ISO and ITU websites. Cisco IOS software does not check the validity of the country and area codes that you configure on the access point.

Cisco Wireless ISR and HWIC Access Point Configuration Guide

7-16

OL-6415-04

 

 

Page 122
Image 122
Cisco Systems OL-6415-04 manual Configuring WISPr Radius Attributes, Radius-server key string