
5-16
Cisco IOS Software Configuration Guide for Cisco Aironet Access Points
OL-14209-01
Chapter 5 Administering the Access PointWireless Device Access
Controlling Access Point Access with
authentication methods are performed. The only exception is the default method list (which, by
coincidence, is named
default
). The default method list is automatically applied to all interfaces except
those that have a named method list explicitly defined. A defined method list overrides the default
method list.
A method list describes the sequence and authentication methods to be queried to authenticate a user.
You can designate one or more security protocols to be used for authentication, thus ensuring a backup
system for authentication in case the initial method fails. The software uses the first method listed to
authenticate users; if that method fails, the software selects the next authentication method in the method
list. This process continues until there is successful communication with a listed authentication method
or until all defined methods are exhausted. If authentication fails at any point in this cycle—meaning
that the security server or local username database responds by denying the user access—the
authentication process stops, and no other authentication methods are attempted.
Beginning in privileged EXEC mode, follow these steps to configure login authentication. This
procedure is required.
Command
Purpose
Step 1
configure terminal
Enter global configuration mode.
Step 2
aaa new-model
Enable AAA.
Step 3
aaa authentication login
{
default
|
list-name
}
method1
[
method2...
]
Create a login authentication method list.
•
To create a default list that is used when a named list is
not
specified
in the
login authentication
command, use the
default
keyword
followed by the methods that are to be used in default situations. The
default method list is automatically applied to all interfaces.
•
For
list-name
, specify
a character string to name the list you are
creating.
•
For
method1...
, specify the actual method the authentication
algorithm tries. The additional methods of authentication are used
only if the previous method returns an error, not if it fails.
Select one of these methods:
•
local
—Use the local username database for authentication. You must
enter username information into the database. Use the
username
password
global configuration command.
•
—Use authentication. You must configure the
server before you can use this authentication method.
Step 4
line
[
console
|
tty
|
vty
]
line-number
[
ending-line-number
]
Enter line configuration mode, and configure the lines to which you want
to apply the authentication list.
Step 5
login authentication
{
default
|
list-name
}
Apply the authentication list to a line or set of lines.
•
If you specify
default
, use the default list created with the
aaa
authentication login
command.
•
For
list-name
, specify the list created with the
aaa authentication
login
command.
Step 6
end
Return to privileged EXEC mode.
Step 7
show running-config
Verify your entries.
Step 8
copy running-config startup-config
(Optional) Save your entries in the configuration file.