User Guide
Table Of Contents
- Cisco Wireless ISR and HWIC Access Point Configuration Guide
- Contents
- Preface
- Overview
- Configuring Radio Settings
- Enabling the Radio Interface
- Roles in Radio Network
- Configuring Network or Fallback Role
- Universal Client Mode
- Configuring Universal Client Mode
- Configuring Radio Data Rates
- Configuring Radio Transmit Power
- Configuring Radio Channel Settings
- Enabling and Disabling World Mode
- Enabling and Disabling Short Radio Preambles
- Configuring Transmit and Receive Antennas
- Disabling and Enabling Access Point Extensions
- Configuring the Ethernet Encapsulation Transformation Method
- Enabling and Disabling Reliable Multicast to Workgroup Bridges
- Enabling and Disabling Public Secure Packet Forwarding
- Configuring Beacon Period and DTIM
- Configuring RTS Threshold and Retries
- Configuring Maximum Data Retries
- Configuring Fragmentation Threshold
- Enabling Short Slot Time for 802.11g Radios
- Performing a Carrier Busy Test
- Configuring Multiple SSIDs
- Configuring an Access Point as a Local Authenticator
- Understand Local Authentication
- Configure a Local Authenticator
- Guidelines for Local Authenticators
- Configuration Overview
- Configuring the Local Authenticator Access Point
- Configuring Other Access Points to Use the Local Authenticator
- Configuring EAP-FAST Settings
- Limiting the Local Authenticator to One Authentication Type
- Unblocking Locked Usernames
- Viewing Local Authenticator Statistics
- Using Debug Messages
- Configuring Encryption Types
- Configuring Authentication Types
- Configuring RADIUS Servers
- Configuring and Enabling RADIUS
- Understanding RADIUS
- RADIUS Operation
- Configuring RADIUS
- Default RADIUS Configuration
- Identifying the RADIUS Server Host
- Configuring RADIUS Login Authentication
- Defining AAA Server Groups
- Configuring RADIUS Authorization for User Privileged Access and Network Services
- Starting RADIUS Accounting
- Selecting the CSID Format
- Configuring Settings for All RADIUS Servers
- Configuring the Access Point to Use Vendor-Specific RADIUS Attributes
- Configuring the Access Point for Vendor-Proprietary RADIUS Server Communication
- Configuring WISPr RADIUS Attributes
- Displaying the RADIUS Configuration
- RADIUS Attributes Sent by the Access Point
- Configuring and Enabling RADIUS
- Configuring VLANs
- Configuring QoS
- Channel Settings
- Protocol Filters
- Supported MIBs
- Error and Event Messages
- Glossary
- Index
4-3
Cisco Wireless ISR and HWIC Access Point Configuration Guide
OL-6415-04
Chapter 4 Configuring an Access Point as a Local Authenticator
Configure a Local Authenticator
Guidelines for Local Authenticators
Follow these guidelines when configuring an access point as a local authenticator:
• Use an access point that does not serve a large number of client devices. When the access point acts
as an authenticator, performance might degrade for associated client devices.
• Secure the access point physically to protect its configuration.
Configuration Overview
You c om ple te fou r ma jo r s tep s w hen yo u s et up a loc al a ut he nt ic ato r:
1. On the local authenticator, create a list of access points authorized to use the authenticator to
authenticate client devices. Each access point that uses the local authenticator is a network access
server (NAS).
Note If your local authenticator access point also serves client devices, you must enter the local
authenticator access point as a NAS. When a client associates to the local authenticator
access point, the access point uses itself to authenticate the client.
2. On the local authenticator, create user groups and configure parameters to be applied to each group
(optional).
3. On the local authenticator, create a list of up to 50 LEAP users, EAP-FAST users, or MAC addresses
that the local authenticator is authorized to authenticate.
Note You d o no t h ave t o s pe ci fy w hi ch ty pe o f a ut he nt ic ati on t ha t y ou wa nt th e lo ca l a uth en ti ca to r
to perform. It automatically performs LEAP, EAP-FAST, or MAC-address authentication for
the users in its user database.
4. On the access points that use the local authenticator, enter the local authenticator as a RADIUS
server.
Note If your local authenticator access point also serves client devices, you must enter the local
authenticator as a RADIUS server in the local authenticator’s configuration. When a client
associates to the local authenticator access point, the access point uses itself to authenticate
the client.
Configuring the Local Authenticator Access Point
Beginning in Privileged Exec mode, follow these steps to configure the access point as a local
authenticator:
Command Purpose
Step 1
configure terminal Enter global configuration mode.
Step 2
aaa new-model Enable AAA.










