Manual
4-27
Cisco IOS Software Configuration Guide for Cisco Aironet Access Points
OL-30644-01
Chapter 4 Configuring the Access Point for the First Time
Configuring the 802.1X Supplicant
their network connection used by an outsider. Second, when a repeater access point is incorporated into
a wireless network, the repeater access point must authenticate to the root access point in the same way
as a client does.
Note The 802.1X supplicant is available on 1040, 1130AG, 1140, 1240AG, 1250, 1260, and 1300 series access
points. It is not available on 1100 and 1200 series access points.
The supplicant is configured in two phases:
• Create and configure a credentials profile
• Apply the credentials to an interface or SSID
You can complete the phases in any order, but they must b
e completed before the supplicant becomes
operational.
Creating a Credentials Profile
Command Purpose
Step 1
Step 2
Step 3
Step 4
Step 5
Step 6
Note
Unencrypted and clear text are the same. You can enter a
0 followed by the clear text password, or omit the 0 and
enter the clear text password.
Step 7
Step 8
Step 9
Beginning in privileged EXEC mode, follow these steps to create an 802.1X credentials profile:
Use the no form of
the dot1x credentials command to negate a parameter.
The following example creates a credentials profile named test with the username Cisco and a the
unencrypted password Cisco:
ap1240AG>enable
Password:xxxxxxx
configure terminal Enter global configuration mode.
dot1x credentials pr
ofile Creates a dot1x credentials profile and enters the dot1x
credentials configuration submode.
anonymous-id descri
ption (Optional)—Enter the anonymous identity to be used.
description de
scription (Optional)—Enter a description for the credentials profile
username usernam
e Enter the authentication user id.
password {0 | 7 | LINE} E
nter an unencrypted password for the credentials.
0—An unencrypted password will follow.
7—A hidden password will follow. Hidden passwords are used
when applying a previously saved configuration.
LINE—An unencrypted (clear text) password.
pki-trustpoint p
ki-trustpoint (Optional and only used for EAP-TLS)—Enter the default
pki-trustpoint.
end Retu
rn to the privileged EXEC mode.
copy running config
startup-conf
ig
(Optional) Save your entries in the configuration file.