EasyManuals Logo

Cisco 3925 User Manual

Cisco 3925
408 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #318 background imageLoading...
Page #318 background image
310
Cisco 3900 Series, Cisco 2900 Series, and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide
Chapter Administering the Wireless Device
Controlling Access Point Access with TACACS+
To specify RADIUS authorization for privileged EXEC access and network services, follow these steps,
beginning in privileged EXEC mode.
SUMMARY STEPS
1. configure terminal
2. aaa authorization network radius
3. aaa authorization exec radius
4. end
5. show running-config
6. copy running-config startup-config
DETAILED STEPS
To disable authorization, use the no aaa authorization {network | exec} method1 command in global
configuration mode.
Displaying the RADIUS Configuration
To display the RADIUS configuration, use the show running-config command in privileged EXEC
mode.
Controlling Access Point Access with TACACS+
This section describes how to control administrator access to the wireless device using Terminal Access
Controller Access Control System Plus (TACACS+). For complete instructions on configuring the
wireless device to support TACACS+, see the “Configuring Radius and TACACS+ Servers” chapter in
Cisco IOS Software Configuration Guide for Cisco Aironet Access Points.
TACACS+ provides detailed accounting information and flexible administrative control over
authentication and authorization processes. TACACS+ is facilitated through AAA and can be enabled
only through AAA commands.
Command Purpose
Step 1
configure terminal Enters global configuration mode.
Step 2
aaa authorization network radius Configures the wireless device for user RADIUS authorization for all
network-related service requests.
Step 3
aaa authorization exec radius Configures the wireless device for user RADIUS authorization to
determine whether the user has privileged EXEC access.
The exec keyword might return user profile information (such as
autocommand information).
Step 4
end Returns to privileged EXEC mode.
Step 5
show running-config Verifies your entries.
Step 6
copy running-config startup-config (Optional) Saves your entries in the configuration file.

Table of Contents

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Cisco 3925 and is the answer not in the manual?

Cisco 3925 Specifications

General IconGeneral
Product TypeRouter
Form FactorRack-mountable
Data Link ProtocolEthernet, Fast Ethernet, Gigabit Ethernet
Connectivity TechnologyWired
PowerAC 120/230 V (50/60 Hz)
Redundant Power SupplyOptional
Routing ProtocolOSPF, IS-IS, BGP, EIGRP, PIM
Network/Transport ProtocolIPSec
Remote Management ProtocolSNMP, Telnet, SSH, HTTP
Encryption AlgorithmDES, Triple DES, AES
Flash Memory256 MB
Weight11.5 kg
Interfaces2 x SFP (mini-GBIC)
Power SourceInternal power supply
Authentication MethodRADIUS, TACACS+, LDAP
Compliant StandardsIEEE 802.1Q, IEEE 802.3af
Operating Temperature0 to 40 °C
Operating Humidity5% to 85% (non-condensing)
Dimensions (WxDxH)44.5 x 47.2 x 8.9 cm

Related product manuals