Home > Cisco > Router > Cisco Router 860, 880 Series User Manual

Cisco Router 860, 880 Series User Manual

    Download as PDF Print this page Share this page

    Have a look at the manual Cisco Router 860, 880 Series User Manual online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 53 Cisco manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.

    							17-33
    Book Title
    OL-xxxxx-xx
    Chapter 17      Administering the Wireless Device
      Configuring the Authentication Cache and Profile
    The following commands that support this feature are included in Cisco IOS Release 12.3(7):
    cache expiry
    cache authorization profile
    cache authentication profile
    aaa cache profile
    NoteSee the Cisco IOS Command Reference for Cisco Aironet Access Points and Bridges, Versions 
    12.4(10b)JA and 12.3(8)JEC for information about these commands.
    The following is a configuration example from an access point configured for Admin authentication 
    using TACACS+ with the auth cache enabled. While this example is based on a TACACS server, the 
    access point could be configured for Admin authentication using RADIUS:
    version 12.3 no service pad 
    service timestamps debug datetime msec 
    service timestamps log datetime msec service password-encryption 
    ! 
    hostname ap ! 
    ! 
    username Cisco password 7 123A0C041104 username admin privilege 15 password 7 01030717481C091D25 
    ip subnet-zero 
    ! ! 
    aaa new-model 
    ! 
    ! aaa group server radius rad_eap 
    server 192.168.134.229 auth-port 1645 acct-port 1646 
    ! aaa group server radius rad_mac 
    server 192.168.134.229 auth-port 1645 acct-port 1646 
    ! aaa group server radius rad_acct 
    server 192.168.134.229 auth-port 1645 acct-port 1646 
    ! aaa group server radius rad_admin 
    server 192.168.134.229 auth-port 1645 acct-port 1646 
    cache expiry 1 cache authorization profile admin_cache 
    cache authentication profile admin_cache 
    ! aaa group server tacacs+ tac_admin 
    server 192.168.133.231 
    cache expiry 1 cache authorization profile admin_cache 
    cache authentication profile admin_cache 
    ! aaa group server radius rad_pmip 
    ! 
    aaa group server radius dummy ! 
    aaa authentication login default local cache tac_admin group tac_admin 
    aaa authentication login eap_methods group rad_eap aaa authentication login mac_methods local 
    aaa authorization exec default local cache tac_admin group tac_admin  
    aaa accounting network acct_methods start-stop group rad_acct  
    						
    							17-34
    Book Title
    OL-xxxxx-xx
    Chapter 17      Administering the Wireless Device
      Configuring the Authentication Cache and Profile
    aaa cache profile admin_cache all 
    ! 
    aaa session-id common ! 
    ! 
    ! bridge irb 
    ! 
    ! interface Dot11Radio0 
    no ip address 
    no ip route-cache shutdown 
    speed basic-1.0 basic-2.0 basic-5.5 6.0 9.0 basic-11.0 12.0 18.0 24.0 36.0 48.0 54.0 
    station-role root bridge-group 1 
    bridge-group 1 subscriber-loop-control 
    bridge-group 1 block-unknown-source no bridge-group 1 source-learning 
    no bridge-group 1 unicast-flooding 
    bridge-group 1 spanning-disabled ! 
    interface Dot11Radio1 
    no ip address 
    no ip route-cache shutdown 
    speed basic-6.0 9.0 basic-12.0 18.0 basic-24.0 36.0 48.0 54.0 
    station-role root bridge-group 1 
    bridge-group 1 subscriber-loop-control 
    bridge-group 1 block-unknown-source no bridge-group 1 source-learning 
    no bridge-group 1 unicast-flooding 
    bridge-group 1 spanning-disabled ! 
    interface FastEthernet0 
    no ip address no ip route-cache 
    duplex auto 
    speed auto bridge-group 1 
    no bridge-group 1 source-learning 
    bridge-group 1 spanning-disabled ! 
    interface BVI1 
    ip address 192.168.133.207 255.255.255.0 no ip route-cache 
    ! 
    ip http server ip http authentication aaa 
    no ip http secure-server 
    ip http help-path http://www.cisco.com/warp/public/779/smbiz/prodconfig/help/eag ip radius source-interface BVI1  
    ! 
    tacacs-server host 192.168.133.231 key 7 105E080A16001D1908 tacacs-server directed-request 
    radius-server attribute 32 include-in-access-req format %h 
    radius-server host 192.168.134.229 auth-port 1645 acct-port 1646 key 7 111918160405041E00 radius-server vsa send accounting 
    ! 
    control-plane ! 
    bridge 1 route ip  
    						
    							17-35
    Book Title
    OL-xxxxx-xx
    Chapter 17      Administering the Wireless Device
      Configuring the Access Point to Provide DHCP Service
    ! ! 
    ! 
    line con 0 transport preferred all 
    transport output all 
    line vty 0 4 transport preferred all 
    transport input all 
    transport output all line vty 5 15 
    transport preferred all 
    transport input all transport output all 
    ! 
    end
    Configuring the Access Point to Provide DHCP Service
    These sections describe how to configure the wireless device to act as a DHCP server:
     Setting up the DHCP Server, page 17-35
     Monitoring and Maintaining the DHCP Server Access Point, page 17-37
    Setting up the DHCP Server
    By default, access points are configured to receive IP settings from a DHCP server on your network. You 
    can also configure an access point to act as a DHCP server to assign IP settings to devices on both your 
    wired and wireless LANs.
    NoteWhen you configure the access point as a DHCP server, it assigns IP addresses to devices on its subnet. 
    The devices communicate with other devices on the subnet but not beyond it. If data needs to be passed 
    beyond the subnet, you must assign a default router. The IP address of the default router should be on 
    the same subnet as the access point configured as the DHCP server. 
    For detailed information on DHCP-related commands and options, refer to the DHCP part in the 
    Cisco IOS IP Addressing Services Configuration Guide, Release 12.4. Click this URL to browse to the 
    DHCP part:
    http://www.cisco.com/en/US/docs/ios/ipaddr/configuration/guide/iad_dhcp_rdmp_ps6350_TSD_Produ
    cts_Configuration_Guide_Chapter.html 
    						
    							17-36
    Book Title
    OL-xxxxx-xx
    Chapter 17      Administering the Wireless Device
      Configuring the Access Point to Provide DHCP Service
    To configure an access point to provide DHCP service and specify a default router, follow these steps 
    beginning in privileged EXEC mode:
    Use the no form of these commands to return to default settings.
    This example shows how to configure the wireless device as a DHCP server, exclude a range of IP 
    address, and assign a default router:
    AP# configure terminal
    AP(config)# ip dhcp excluded-address 172.16.1.1 172.16.1.20AP(config)# ip dhcp pool wishbone
    AP(dhcp-config)# network 172.16.1.0 255.255.255.0
    AP(dhcp-config)# lease 10AP(dhcp-config)# default-router 172.16.1.1
    AP(dhcp-config)# end
    CommandPurpose
    Step 1configure terminalEnters global configuration mode.
    Step 2ip dhcp excluded-address low_address 
    [high_address]Excludes the wireless device’s IP address from the range of addresses the 
    wireless device assigns. Enter the IP address in four groups of characters, 
    such as 10.91.6.158.
    The wireless device assumes that all IP addresses in a DHCP address pool 
    subnet are available for assigning to DHCP clients. You must specify the 
    IP addresses that the DHCP Server should not assign to clients. 
    (Optional) To enter a range of excluded addresses, enter the address at the 
    low end of the range followed by the address at the high end of the range.
    Step 3ip dhcp pool pool_nameCreates a name for the pool of IP addresses that the wireless device 
    assigns in response to DHCP requests, and enter DHCP configuration 
    mode.
    Step 4network subnet_number  
    [mask | prefix-length]
    Assigns the subnet number for the address pool. The wireless device 
    assigns IP addresses within this subnet.
    (Optional) Assigns a subnet mask for the address pool, or specifies the 
    number of bits that comprise the address prefix. The prefix is an 
    alternative way of assigning the network mask. The prefix length must be 
    preceded by a forward slash (/).
    Step 5lease { days [hours] [minutes] |  
    infinite }
    Configures the duration of the lease for IP addresses assigned by the 
    wireless device. 
     days—configure the lease duration in number of days
     (optional) hours—configure the lease duration in number of hours
     (optional) minutes—configure the lease duration in number of 
    minutes
     infinite—set the lease duration to infinite
    Step 6default-router address [address2 ... 
    address 8]Specifies the IP address of the default router for DHCP clients on the 
    subnet. One IP address is required; however, you can specify up to eight 
    addresses in one command line.
    Step 7endReturns to privileged EXEC mode.
    Step 8show running-configVerifies your entries.
    Step 9copy running-config startup-config(Optional) Saves your entries in the configuration file. 
    						
    							17-37
    Book Title
    OL-xxxxx-xx
    Chapter 17      Administering the Wireless Device
      Configuring the Access Point to Provide DHCP Service
    Monitoring and Maintaining the DHCP Server Access Point
    These sections describe commands you can use to monitor and maintain the DHCP server access point:
     Show Commands, page 17-37
     Clear Commands, page 17-37
     Debug Command, page 17-38
    Show Commands
    In privileged EXEC mode, enter the commands in Ta b l e 17-4 to display information about the wireless 
    device as DHCP server.
    Clear Commands
    In privileged EXEC mode, use the commands in Ta b l e 17-5 to clear DHCP server variables.
    Ta b l e 17-4 Show Commands for DHCP Server 
    CommandPurpose
    show ip dhcp conflict [address]Displays a list of all address conflicts recorded by 
    a specific DHCP Server. Enter the wireless 
    device’s IP address to show conflicts recorded by 
    the wireless device.
    show ip dhcp database [url]Displays recent activity on the DHCP database.
    NoteUse this command in privileged EXEC 
    mode.
    show ip dhcp server statisticsDisplays count information about server statistics 
    and messages sent and received.
    Ta b l e 17-5 Clear Commands for DHCP Server
    CommandPurpose
    clear ip dhcp binding  
    {address | *}
    Deletes an automatic address binding from the 
    DHCP database. Specifying the address argument 
    clears the automatic binding for a specific (client) 
    IP address. Specifying an asterisk (*) clears all 
    automatic bindings.
    clear ip dhcp conflict  
    {address | *}
    Clears an address conflict from the DHCP 
    database. Specifying the address argument clears 
    the conflict for a specific IP address. Specifying 
    an asterisk (*) clears conflicts for all addresses.
    clear ip dhcp server statisticsResets all DHCP Server counters to 0. 
    						
    							17-38
    Book Title
    OL-xxxxx-xx
    Chapter 17      Administering the Wireless Device
      Configuring the Access Point for Secure Shell
    Debug Command
    To enable DHCP server debugging, use this command in privileged EXEC mode:
    debug ip dhcp server { events | packets | linkage }
    Use the no form of the command to disable debugging for the wireless device DHCP server.
    Configuring the Access Point for Secure Shell
    This section describes how to configure the Secure Shell (SSH) feature. 
    NoteFor complete syntax and usage information for the commands used in this section, refer to the “Secure 
    Shell Commands” section in the Cisco IOS Security Command Reference for Release 12.4.
    Understanding SSH 
    SSH is a protocol that provides a secure, remote connection to a Layer 2 or Layer 3 device. There are 
    two versions of SSH: SSH version 1 and SSH version 2. This software release supports both SSH 
    versions. If you do not specify the version number, the access point defaults to version 2.
    SSH provides more security for remote connections than Telnet by providing strong encryption when a 
    device is authenticated. The SSH feature has an SSH server and an SSH integrated client. The client 
    supports these user authentication methods:
     RADIUS (for more information, see the “Controlling Access Point Access with RADIUS” section 
    on page 17-9)
     Local authentication and authorization (for more information, see the “Configuring the Access Point 
    for Local Authentication and Authorization” section on page 17-31)
    For more information about SSH, refer to Part 5, “Other Security Features” in the Cisco IOS Security 
    Configuration Guide for Release 12.4.
    NoteThe SSH feature in this software release does not support IP Security (IPsec). 
    Configuring SSH
    Before configuring SSH, download the crypto software image from Cisco.com. For more information, 
    refer to the release notes for this release.
    For information about configuring SSH and displaying SSH settings, refer to Part 6, “Other Security 
    Features” in the Cisco IOS Security Configuration Guide for Release 12.4, which is available on 
    Cisco.com at the following link:
    http://www.cisco.com/en/US/docs/ios/security/configuration/guide/12_4/sec_12_4_book.html 
    						
    							17-39
    Book Title
    OL-xxxxx-xx
    Chapter 17      Administering the Wireless Device
      Configuring Client ARP Caching
    Configuring Client ARP Caching
    You can configure the wireless device to maintain an ARP cache for associated client devices. 
    Maintaining an ARP cache on the wireless device reduces the traffic load on your wireless LAN. ARP 
    caching is disabled by default.
    This section contains this information:
     Understanding Client ARP Caching, page 17-39
     Configuring ARP Caching, page 17-39
    Understanding Client ARP Caching
    ARP caching on the wireless device reduces the traffic on your wireless LAN by stopping ARP requests 
    for client devices at the wireless device. Instead of forwarding ARP requests to client devices, the 
    wireless device responds to requests on behalf of associated client devices. 
    When ARP caching is disabled, the wireless device forwards all ARP requests through the radio port to 
    associated clients, and the client to which the ARP request is directed responds. When ARP caching is 
    enabled, the wireless device responds to ARP requests for associated clients and does not forward 
    requests to clients. When the wireless device receives an ARP request for an IP address not in the cache, 
    the wireless device drops the request and does not forward it. In its beacon, the wireless device includes 
    an information element to alert client devices that they can safely ignore broadcast messages to increase 
    battery life. 
    Optional ARP Caching
    When a non-Cisco client device is associated to an access point and is not passing data, the wireless 
    device might not know the client’s IP address. If this situation occurs frequently on your wireless LAN, 
    you can enable optional ARP caching. When ARP caching is optional, the wireless device responds on 
    behalf of clients with IP addresses known to the wireless device but forwards out its radio port any ARP 
    requests addressed to unknown clients. When the wireless device learns the IP addresses for all 
    associated clients, it drops ARP requests not directed to its associated clients.
    Configuring ARP Caching
    To configure the wireless device to maintain an ARP cache for associated clients, follow these steps 
    beginning in privileged EXEC mode:
    CommandPurpose
    Step 1configure terminalEnters global configuration mode.
    Step 2dot11 arp-cache [optional]Enables ARP caching on the wireless device. 
     (Optional) Use the optional keyword to enable ARP caching only for 
    the client devices whose IP addresses are known to the wireless 
    device.
    Step 3endReturns to privileged EXEC mode. 
    						
    							17-40
    Book Title
    OL-xxxxx-xx
    Chapter 17      Administering the Wireless Device
      Configuring Multiple VLAN and Rate Limiting for Point-to-Multipoint Bridging
    This example shows how to configure ARP caching on an access point:
    AP# configure terminalAP(config)# dot11 arp-cache
    AP(config)# end
    Configuring Multiple VLAN and Rate Limiting for 
    Point-to-Multipoint Bridging
    This feature modifies the way point-to-multipoint bridging can be configured to operate on multiple 
    VLANs with the ability to control traffic rates on each VLAN.
    NoteA rate limiting policy can be applied only to Fast Ethernet ingress ports on non-root bridges.
    In a typical scenario, multiple-VLAN support permits users to set up point-to-multipoint bridge links 
    with remote sites, with each remote site on a separate VLAN. This configuration provides the capability 
    for separating and controlling traffic to each site. Rate limiting ensures that no remote site consumes 
    more than a specified amount of the entire link bandwidth. Only uplink traffic can be controlled by using 
    the Fast Ethernet ingress ports of non-root bridges.
    Using the class-based policing feature, you can specify the rate limit and apply it to ingress of the 
    Ethernet interface of a non-root bridge. Applying the rate at the ingress of the Ethernet interface ensures 
    that all incoming Ethernet packets conform to the configured rate.
    Step 4show running-configVerifies your entries.
    Step 5copy running-config startup-config(Optional) Saves your entries in the configuration file.
    Command Purpose 
    						
    							 
    PART 4
    Additional Information 
    						
    All Cisco manuals Comments (0)

    Related Manuals for Cisco Router 860, 880 Series User Manual