Cisco Systems
Close Window

 
     
 
   



Main Help Topics

Basic Setting
Security
Filters
QoS Configuration
Radio Configuration
VLAN Configuration
Ethernet Configuration
Server Setup
Proxy Mobile IP
Routing Setup
Network Management
Event Notification
Update Firmware
Distribute Firmware and Configuration
Diagnostics
Hot Standby Setup
Index of Help Topics

Security : Enabling EAP in Cisco Secure ACS

Cisco Secure Access Control Server for Windows NT/2000 Servers (Cisco Secure ACS) is network security software that helps authenticate users by controlling access to a network access server (NAS) device, such as an access server, PIX Firewall, router, or wireless access point or bridge.

Cisco Secure ACS operates as a Windows NT or Windows 2000 service and controls the authentication, authorization, and accounting (AAA) of users accessing networks.

Cisco Secure ACS operates with Windows NT 4.0 Server and Windows 2000 Server.

Follow these steps to include the access point as a Network Access Server (NAS) in Cisco Secure ACS:

  1. On the ACS main menu, click Network Configuration.

  2. If you are using Network Device Grouping (NDG), click the name of the NDG to which the NAS is assigned.

  3. Click Add New Access Server.

  4. In the Network Access Server Hostname box, type the name assigned to the access server.

    Note This field does not appear if you are configuring an existing NAS.

  5. In the Network Access Server IP address box, type the access point's IP address.

  6. In the Key box, type the shared secret that the TACACS+ or RADIUS NAS and Cisco Secure ACS use to encrypt the data. For correct operation, the identical key (case sensitive) must be configured on the access point's Authenticator Configuration page and in Cisco Secure ACS.

  7. If you are using NDGs, go to the Network Device Group drop-down menu and click the name of the NDG to which the access point should belong, or click Not Assigned to have the access point be independent of NDGs.

    Note To enable NDGs, click Interface Configuration > Advanced Options > Network Device Groups.

  8. From the Authenticate Using list box, click the network security protocol. Select RADIUS (Cisco Aironet).

  9. To save your changes and apply them immediately, click the Submit + Restart button.

    Tips To save your changes and apply them later, click Submit. When you are ready to implement the changes, click System Configuration > Service Control and click Restart.

    Note Restarting the service clears the Logged-in User Report, refreshes the Max Sessions counter, and temporarily interrupts all Cisco Secure ACS services.

 
 

Copyright (c) 1992-2002 by Cisco Systems, Inc.