Manual
5-22
Cisco IOS Software Configuration Guide for Cisco Aironet Access Points
OL-30644-01
Chapter 5 Administering the Access Point
Configuring the Authentication Cache and Profile
To disable AAA, use the no aaa new-model global configuration command. To disable authorization,
use the no aaa authorization {network | exec} method1 global configuration command.
Configuring the Authentication Cache and Profile
The authentication cache and profile feature allows the access point to cache the
authentication/authorization responses for a user so that subsequent authentication/authorization
requests do not need to be sent to the AAA server.
Note On the access point, this feature is only supported for Admin authentication.
The following commands that support this feature are included in Cisco IOS Release 12.3(7):
cache expiry
cache authorization profile
cache authentication profile
aaa cache profile
Note See the Cisco IOS Command Reference for Cisco Aironet Access Points and Bridges, 12.3(7)JA for
information about these commands.
The following is a configuration example from an access point configured for Admin authentication
using TACACS+ with the auth cache enabled. While this example is based on a TACACS server, the
access point could be configured for Admin authentication using RADIUS:
Step 6
username name [privilege level]
{password encryption-type password}
Enter the local database, and establish a username-based authentication
system.
Repeat this command for each user.
• For name, specify the user ID as one word. Spaces and quotation
marks are not allowed.
• (Optional) For level, specify the privilege level the user has after
gaining access. The range is 0 to 15. Level 15 gives privileged EXEC
mode access. Level 0 gives user EXEC mode access.
• For encryption-type, enter 0 to specify that an unencrypted password
follows. Enter 7 to specify that a hidden password follows.
• For password, specify the password the user must enter to gain access
to the wireless device. The password must be from 1 to 25 characters,
can contain embedded spaces, and must be the last option specified
in the username command.
Note Characters TAB, ?, $, +, and [ are invalid characters for
passwords.
Step 7
end Return to privileged EXEC mode.
Step 8
show running-config Verify your entries.
Step 9
copy running-config startup-config (Optional) Save your entries in the configuration file.
Command Purpose