310
Cisco 3900 Series, Cisco 2900 Series, and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide
Chapter Administering the Wireless Device
Controlling Access Point Access with TACACS+
To specify RADIUS authorization for privileged EXEC access and network services, follow these steps,
beginning in privileged EXEC mode.
SUMMARY STEPS
1. configure terminal
2. aaa authorization network radius
3. aaa authorization exec radius
4. end
5. show running-config
6. copy running-config startup-config
DETAILED STEPS
To disable authorization, use the no aaa authorization {network | exec} method1 command in global
configuration mode.
Displaying the RADIUS Configuration
To display the RADIUS configuration, use the show running-config command in privileged EXEC
mode.
Controlling Access Point Access with TACACS+
This section describes how to control administrator access to the wireless device using Terminal Access
Controller Access Control System Plus (TACACS+). For complete instructions on configuring the
wireless device to support TACACS+, see the “Configuring Radius and TACACS+ Servers” chapter in
Cisco IOS Software Configuration Guide for Cisco Aironet Access Points.
TACACS+ provides detailed accounting information and flexible administrative control over
authentication and authorization processes. TACACS+ is facilitated through AAA and can be enabled
only through AAA commands.
Command Purpose
Step 1
configure terminal Enters global configuration mode.
Step 2
aaa authorization network radius Configures the wireless device for user RADIUS authorization for all
network-related service requests.
Step 3
aaa authorization exec radius Configures the wireless device for user RADIUS authorization to
determine whether the user has privileged EXEC access.
The exec keyword might return user profile information (such as
autocommand information).
Step 4
end Returns to privileged EXEC mode.
Step 5
show running-config Verifies your entries.
Step 6
copy running-config startup-config (Optional) Saves your entries in the configuration file.