User's Manual
9-4
Cisco IOS Software Configuration Guide for Cisco Aironet Access Points
OL-11350-01
Chapter 9 Configuring an Access Point as a Local Authenticator
 Configuring a Local Authenticator
Step 3
radius-server local Enable the access point as a local authenticator and enter 
configuration mode for the authenticator.
Step 4
nas ip-address key shared-key Add an access point to the list of units that use the local 
authenticator. Enter the access point’s IP address and the shared 
key used to authenticate communication between the local 
authenticator and other access points. You must enter this shared 
key on the access points that use the local authenticator. If your 
local authenticator also serves client devices, you must enter the 
local authenticator access point as a NAS.
Note Leading spaces in the key string are ignored, but spaces 
within and at the end of the key are used. If you use spaces 
in your key, do not enclose the key in quotation marks 
unless the quotation marks are part of the key.
Repeat this step to add each access point that uses the local 
authenticator.
Step 5
group group-name (Optional) Enter user group configuration mode and configure a 
user group to which you can assign shared settings. 
Step 6
vlan vlan (Optional) Specify a VLAN to be used by members of the user 
group. The access point moves group members into that VLAN, 
overriding other VLAN assignments. You can assign only one 
VLAN to the group.
Step 7
ssid ssid (Optional) Enter up to 20 SSIDs to limit members of the user 
group to those SSIDs. The access point checks that the SSID that 
the client used to associate matches one of the SSIDs in the list. 
If the SSID does not match, the client is disassociated.
Step 8
reauthentication time seconds (Optional) Enter the number of seconds after which access points 
should reauthenticate members of the group. The 
reauthentication provides users with a new encryption key. The 
default setting is 0, which means that group members are never 
required to reauthenticate.
Step 9
block count count 
time { seconds | infinite }
(Optional) To help protect against password guessing attacks, 
you can lock out members of a user group for a length of time 
after a set number of incorrect passwords. 
• count—The number of failed passwords that triggers a 
lockout of the username.
• time—The number of seconds the lockout should last. If you 
enter infinite, an administrator must manually unblock the 
locked username. See the “Unblocking Locked Usernames” 
section on page 9-9 for instructions on unblocking client 
devices.
Step 10
exit Exit group configuration mode and return to authenticator 
configuration mode.
Command Purpose










