Configuring Local Authentication Using LDAP
This module provides information about configuring local authentication for Cisco Identity Based Networking Services.
The documentation set for this product strives to use bias-free language. For the purposes of this documentation set, bias-free is defined as language that does not imply discrimination based on age, disability, gender, racial identity, ethnic identity, sexual orientation, socioeconomic status, and intersectionality. Exceptions may be present in the documentation due to language that is hardcoded in the user interfaces of the product software, language used based on RFP documentation, or language that is used by a referenced third-party product. Learn more about how Cisco is using Inclusive Language.
This chapter provides information about configuring local authentication for Cisco Identity Based Networking Services.
This module provides information about configuring local authentication for Cisco Identity Based Networking Services.
Local authentication using Lightweight Directory Access Protocol (LDAP) allows an endpoint to be authenticated using 802.1X, MAC authentication bypass (MAB), or web authentication with LDAP as a backend. Local authentication in Identity-Based Networking Services also supports associating an authentication, authorization, and accounting (AAA) attribute list with the local username for wireless sessions.
Perform this task to specify the AAA method list for local authentication and to associate an attribute list with a local username.
Command or Action | Purpose | |
---|---|---|
Step 1 |
enable Example:
|
Enables privileged EXEC mode.
|
Step 2 |
configure terminal Example:
|
Enters global configuration mode. |
Step 3 |
aaa new-model Example:
|
Enables the authentication, authorization, and accounting (AAA) access control model. |
Step 4 |
aaa local authentication {method-list-name | default} authorization {method-list-name | default} Example:
|
Specifies the method lists to use for local authentication and authorization from a LDAP server. |
Step 5 |
username name aaa attribute list aaa-attribute-list [password password] Example:
|
Associates a AAA attribute list with a local username. |
Step 6 |
exit Example:
|
Exits global configuration mode and returns to privileged EXEC mode. |
Perform this task to set the RADIUS compatibility mode, the MAC delimiter, and the MAC address as the username to support MAC filtering.
Command or Action | Purpose | |
---|---|---|
Step 1 |
enable Example:
|
Enables privileged EXEC mode.
|
Step 2 |
configure terminal Example:
|
Enters global configuration mode. |
Step 3 |
aaa new-model Example:
|
Enables the authentication, authorization, and accounting (AAA) access control model. |
Step 4 |
aaa group server radius group-name Example:
|
Groups different RADIUS server hosts into distinct lists. |
Step 5 |
subscriber mac-filtering security-mode {mac | none | shared-secret} Example:
|
Specifies the RADIUS compatibility mode for MAC filtering.
|
Step 6 |
mac-delimiter {colon | hyphen | none | single-hyphen} Example:
|
Specifies the MAC delimiter for RADIUS compatibility mode.
|
Step 7 |
exit Example:
|
Exits server group configuration mode and returns to global configuration mode. |
Step 8 |
username mac-address mac [aaa attribute list aaa-attribute-list] Example:
|
Allows a MAC address to be used as the username for MAC filtering done locally. |
Step 9 |
exit Example:
|
Exits global configuration mode and returns to privileged EXEC mode. |
The following example shows a configuration for local authentication:
!
username USER_1 password 0 CISCO
username USER_1 aaa attribute list LOCAL_LIST
aaa new-model
aaa local authentication EAP_LIST authorization EAP_LIST
!
The following example shows a configuration for MAC filtering:
username 00-22-WP-EC-23-3C mac aaa attribute list AAA_list1
!
aaa new-model
aaa group server radius RAD_GROUP1
subscriber mac-filtering security-mode mac
mac-delimiter hyphen
This table provides release and related information for the features explained in this module.
These features are available in all the releases subsequent to the one they were introduced in, unless noted otherwise.
Release |
Feature Name |
Feature Information |
---|---|---|
Cisco IOS XE Fuji 16.9.2 |
Local Authentication Using LDAP |
Introduces support for local authentication using Lightweight Directory Access Protocol (LDAP). |
Cisco IOS XE Cupertino 17.9.1 |
Local Authentication Using LDAP |
This feature was implemented on the C9200CX-12P-2X2G, C9200CX-8P-2X2G, and C9200CX-12T-2X2G models. |
Use the Cisco Feature Navigator to find information about platform and software image support. To access Cisco Feature Navigator, go to https://cfnng.cisco.com.