And authorization – Rockwell Automation 1783-WAPxxx Stratix 5100 Wireless Access Point User Manual User Manual

Page 220

Advertising
background image

220

Rockwell Automation Publication 1783-UM006A-EN-P - May 2014

Chapter 6

Administering the WAP Access

Configuring the Access Point
for Local Authentication and
Authorization

You can configure AAA to operate without a server by configuring the wireless
device to implement AAA in local mode. The wireless device then handles
authentication and authorization. No accounting is available in this
configuration.

Beginning in privileged EXEC mode, follow these steps to configure the wireless
device for local AAA:

1. Enter global configuration mode.

configure terminal

2. Enable AAA.

aaa new-model

3. Set the login authentication to use the local username database.

The

default

keyword applies the local user database authentication to

all interfaces.

aaa authentication login default local

4. Configure user AAA authorization to determine if the user is allowed to

run an EXEC shell by checking the local database.

aaa authorization exec local

5. Configure user AAA authorization for all service requests that are network

related.

aaa authorization network local

6. Enter the local database, and establish an authentication system based on

the username.

Repeat this command for each user.

For name, specify the user ID as one word. Spaces and quotation marks are

not allowed.

(Optional) For level, specify the privilege level the user has after gaining

access. The range is 0…15. Level 15 gives privileged EXEC mode access.
Level 0 gives user EXEC mode access.

For encryption-type, enter

0

to specify that an unencrypted password

follows. Enter

7 to specify that a hidden password follows.

TIP

You can configure the wireless device as a local authenticator for 802.1x-
enabled client devices to provide a back-up for your main server or to provide
authentication service on a network without a RADIUS server.

See

Configure an Access Point as a Local Authenticator on page 319

for detailed

instructions on configuring the wireless device as a local authenticator.

Advertising