EasyManuals Logo
Home>Cisco>Network Router>2911

Cisco 2911 Configuration Guide

Cisco 2911
408 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #313 background imageLoading...
Page #313 background image
305
Cisco 3900 Series, Cisco 2900 Series, and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide
Chapter Administering the Wireless Device
Controlling Access Point Access with RADIUS
Controlling Access Point Access with RADIUS
This section describes how to control administrator access to the wireless device by using Remote
Authentication Dial-In User Service (RADIUS). For complete instructions on configuring the wireless
device to support RADIUS, see the “Configuring Radius and TACACS+ Servers” chapter in Cisco IOS
Software Configuration Guide for Cisco Aironet Access Points.
RADIUS provides detailed accounting information and flexible administrative control over
authentication and authorization processes. RADIUS is facilitated through authentication, authorization,
and accounting (AAA) and can be enabled only through AAA commands.
Note For complete syntax and usage information for the commands used in this section, see Cisco IOS
Security Command Reference.
These sections describe RADIUS configuration:
Default RADIUS Configuration, page 305
Configuring RADIUS Login Authentication, page 305 (required)
Defining AAA Server Groups, page 307 (optional)
Configuring RADIUS Authorization for User Privileged Access and Network Services, page 309
(optional)
Displaying the RADIUS Configuration, page 310
Default RADIUS Configuration
RADIUS and AAA are disabled by default.
To prevent a lapse in security, you cannot configure RADIUS through a network management
application. When enabled, RADIUS can authenticate users who are accessing the wireless device
through the command-line interface (CLI).
Configuring RADIUS Login Authentication
To configure AAA authentication, you define a named list of authentication methods and then apply the
list to various interfaces. The method list defines the types of authentication to be performed and the
sequence in which they are performed; it must be applied to a specific interface before any defined
authentication methods are performed. The only exception is the default method list (which is named
default). The default method list is automatically applied to all interfaces except those that have a named
method list explicitly defined.
A method list describes the sequence and authentication methods to be used to authenticate a user. You
can designate one or more security protocols for authentication, thus ensuring a backup system for
authentication in case the initial method fails. The software uses the first method listed to authenticate
users. If that method fails to respond, the software selects the next authentication method in the method
list. This process continues until there is successful communication with a listed authentication method
or until all defined methods are exhausted. If authentication fails at any point in this cycle—that is, the
security server or local username database responds by denying the user access—the authentication
process stops, and no other authentication methods are attempted.

Table of Contents

Other manuals for Cisco 2911

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Cisco 2911 and is the answer not in the manual?

Cisco 2911 Specifications

General IconGeneral
Ethernet LANYes
Cabling technology10/100/1000Base-T(X)
Networking standardsIEEE 802.1Q, IEEE 802.1ag, IEEE 802.3, IEEE 802.3ab, IEEE 802.3af, IEEE 802.3ah, IEEE 802.3u
Ethernet LAN data rates10, 100, 1000 Mbit/s
Ethernet interface typeGigabit Ethernet
DHCP client-
Routing protocolsBGP, EIGRP, OSPF
Supported protocolsIPv4, IPv6, IS-IS, IGMPv3, PIM SM, SSM, DVMRP, IPSec, GRE, BVD, MPLS, L2TPv3, PPP, MLPPP, MLFR, HDLC, RS-232, RS-449, X.21, V.35, EIA-530, PPPoE, ATM
USB version2.0
RS-232 ports1
Expansion slots4 x EHWIC 2 x DSP 1 x ISM
USB ports quantity2
Ethernet LAN (RJ-45) ports3
Firewall securityCisco IOS
Input current2.2 A
AC input voltage100 - 240 V
Power source typeAC
AC input frequency47 - 63 Hz
Power consumption (typical)50 W
Product colorBlack
Rack capacity2U
Operating altitude0 - 4000 m
Non-operating altitude0 - 4570 m
Storage temperature (T-T)-40 - 80 °C
Operating temperature (T-T)0 - 40 °C
Storage relative humidity (H-H)5 - 95 %
Operating relative humidity (H-H)5 - 85 %
SafetyUL 60950-1, CAN/CSA C22.2 No. 60950-1, EN 60950-1, AS/NZS 60950-1, IEC 60950-1
Electromagnetic compatibility47 CFR, ICES-003, EN55022, CISPR22, AS/NZS 3548, VCCI V-3, EN 300-386, EN 61000, EN 55024, CISPR 24EN50082-1
Weight and Dimensions IconWeight and Dimensions
Depth304.8 mm
Width438.2 mm
Height88.9 mm
Weight8200 g

Related product manuals