Configuring Authentication and Authorization by MAC Address
459
Changing the MAC
Authorization
Password for RADIUS
When you enable MAC authentication, the client does not supply a
regular username or password. The MAC address of the user’s device is
extracted from frames received from the device.
To authenticate and authorize MAC users via RADIUS, MSS must supply a
password for MAC users, which is called the outbound authorization
password. By default, MSS sends the MAC user’s MAC address as that
user’s password too.
To set the authorization password to a specific value for all MAC users,
use the following command:
set radius server
server-name
author-password
password
Before setting the outbound authorization password for a RADIUS server,
you must have set the address for the RADIUS server. For more
information, see “Configuring RADIUS Servers” on page 521.
For example, the following command sets the outbound authorization
password for MAC users on server
bigbird
to
h00per
:
WX1200#
set radius server bigbird author-password h00per
success: change accepted.
If the MAC address is in the database, MSS uses the VLAN attribute and
other attributes associated with it for user authorization. Otherwise, MSS
tries the fallthru authentication type, which can be last-resort, Web, or
none.
A MAC address must be dash-delimited in the RADIUS database
—
for
example, 00-00-01-03-04-05. However, the MSS always displays
colon-delimited MAC addresses.
To reset the authorization password to the default (user’s MAC address),
clear the RADIUS server, then readd it without specifying the
authorization password. To clear a RADIUS server, use the
clear radius
server
server-name
command.
Summary of Contents for 3CRWX120695A
Page 138: ...138 CHAPTER 6 CONFIGURING AND MANAGING IP INTERFACES AND SERVICES ...
Page 272: ...272 CHAPTER 11 CONFIGURING RF LOAD BALANCING FOR MAPS ...
Page 310: ...310 CHAPTER 13 CONFIGURING USER ENCRYPTION ...
Page 322: ...322 CHAPTER 14 CONFIGURING RF AUTO TUNING ...
Page 350: ...350 CHAPTER 16 CONFIGURING QUALITY OF SERVICE ...
Page 368: ...368 CHAPTER 17 CONFIGURING AND MANAGING SPANNING TREE PROTOCOL ...
Page 412: ...412 CHAPTER 19 CONFIGURING AND MANAGING SECURITY ACLS ...
Page 518: ...518 CHAPTER 21 CONFIGURING AAA FOR NETWORK USERS ...
Page 530: ...530 CHAPTER 22 CONFIGURING COMMUNICATION WITH RADIUS ...
Page 542: ...542 CHAPTER 23 MANAGING 802 1X ON THE WX SWITCH ...
Page 598: ...598 CHAPTER 26 ROGUE DETECTION AND COUNTERMEASURES ...
Page 706: ...706 GLOSSARY ...