Specifications
5-12
Cisco IOS Software Configuration Guide for Cisco Aironet Access Points
OL-5260-01
Chapter 5 Administering the Access Point
Controlling Access Point Access with TACACS+
Beginning in privileged EXEC mode, follow these steps to specify RADIUS authorization for privileged
EXEC access and network services:
To disable authorization, use the no aaa authorization {network | exec} method1 global configuration
command.
Displaying the RADIUS Configuration
To display the RADIUS configuration, use the show running-config privileged EXEC command.
Controlling Access Point Access with TACACS+
This section describes how to control administrator access to the access point using Terminal Access
Controller Access Control System Plus (TACACS+). For complete instructions on configuring the
access point to support TACACS+, see Chapter 12, “Configuring RADIUS and TACACS+ Servers.”
TACACS+ provides detailed accounting information and flexible administrative control over
authentication and authorization processes. TACACS+ is facilitated through AAA and can be enabled
only through AAA commands.
Note For complete syntax and usage information for the commands used in this section, refer to the Cisco IOS
Security Command Reference for Release 12.2.
These sections describe TACACS+ configuration:
• Default TACACS+ Configuration, page 5-13
• Configuring TACACS+ Login Authentication, page 5-13
• Configuring TACACS+ Authorization for Privileged EXEC Access and Network Services, page
5-14
• Displaying the TACACS+ Configuration, page 5-15
Command Purpose
Step 1
configure terminal Enter global configuration mode.
Step 2
aaa authorization network radius Configure the access point for user RADIUS authorization for all
network-related service requests.
Step 3
aaa authorization exec radius Configure the access point for user RADIUS authorization to determine if
the user has privileged EXEC access.
The exec keyword might return user profile information (such as
autocommand information).
Step 4
end Return to privileged EXEC mode.
Step 5
show running-config Verify your entries.
Step 6
copy running-config startup-config (Optional) Save your entries in the configuration file.