EasyManuals Logo

Cisco 3945 User Manual

Cisco 3945
408 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #318 background imageLoading...
Page #318 background image
310
Cisco 3900 Series, Cisco 2900 Series, and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide
Chapter Administering the Wireless Device
Controlling Access Point Access with TACACS+
To specify RADIUS authorization for privileged EXEC access and network services, follow these steps,
beginning in privileged EXEC mode.
SUMMARY STEPS
1. configure terminal
2. aaa authorization network radius
3. aaa authorization exec radius
4. end
5. show running-config
6. copy running-config startup-config
DETAILED STEPS
To disable authorization, use the no aaa authorization {network | exec} method1 command in global
configuration mode.
Displaying the RADIUS Configuration
To display the RADIUS configuration, use the show running-config command in privileged EXEC
mode.
Controlling Access Point Access with TACACS+
This section describes how to control administrator access to the wireless device using Terminal Access
Controller Access Control System Plus (TACACS+). For complete instructions on configuring the
wireless device to support TACACS+, see the “Configuring Radius and TACACS+ Servers” chapter in
Cisco IOS Software Configuration Guide for Cisco Aironet Access Points.
TACACS+ provides detailed accounting information and flexible administrative control over
authentication and authorization processes. TACACS+ is facilitated through AAA and can be enabled
only through AAA commands.
Command Purpose
Step 1
configure terminal Enters global configuration mode.
Step 2
aaa authorization network radius Configures the wireless device for user RADIUS authorization for all
network-related service requests.
Step 3
aaa authorization exec radius Configures the wireless device for user RADIUS authorization to
determine whether the user has privileged EXEC access.
The exec keyword might return user profile information (such as
autocommand information).
Step 4
end Returns to privileged EXEC mode.
Step 5
show running-config Verifies your entries.
Step 6
copy running-config startup-config (Optional) Saves your entries in the configuration file.

Table of Contents

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Cisco 3945 and is the answer not in the manual?

Cisco 3945 Specifications

General IconGeneral
Form FactorRack-mountable
Maximum Throughput75 Mbps
Product TypeRouter
Connectivity TechnologyWired
Data Link ProtocolEthernet, Fast Ethernet, Gigabit Ethernet
Operating SystemCisco IOS
Flash Memory256 MB
Network/Transport ProtocolIPSec
Remote Management ProtocolSNMP
Encryption AlgorithmDES, AES
FeaturesFirewall, VPN, Quality of Service (QoS), VLAN support
Interfaces2 x USB
Security FeaturesIntrusion Prevention System (IPS)
Operating Temperature32 °F to 104 °F (0 °C to 40 °C)
Storage Temperature-4 °F to 149 °F (-20 °C to 65 °C)
Humidity10 - 85% (non-condensing)
Memory2 GB
Expansion Slots4 (free) x EHWIC ¦ 2 x service module ¦ 1 x ISM ¦ 1 x CompactFlash Card

Related product manuals