Cisco Systems 78-11741-02 Wireless Office Headset User Manual


 
Configuring Mobile IP
Mobile IP Configuration Task List
IPC-169
Cisco IOS IP Configuration Guide
Configuring RADIUS in the Mobile IP Environment
Remote Authentication Dial-in User Service (RADIUS) is a method for defining the exchange of AAA
information in the network. In the Cisco implementation, RADIUS clients run on Cisco routers and send
authentication requests to a RADIUS server that contains all user authentication and network server
access information. For detailed information about RADIUS configuration options, refer to the
“Configuring RADIUS” chapter in the Cisco IOS Security Configuration Guide.
To configure RADIUS in the Mobile IP environment, use the following commands in global
configuration mode:
Configuring TACACS+ in the Mobile IP Environment
Terminal Access Controller Access Control System Plus (TACACS+) is an authentication protocol that
provides remote access authentication and related services, such as event logging. For detailed
information about TACACS+ configuration options, refer to the “Configuring TACACS+” chapter in the
Cisco IOS Security Configuration Guide.
To configure TACACS+ in the Mobile IP environment, use the following commands in global
configuration mode:
Verifying Setup
To make sure Mobile IP is set up correctly, use the following commands in EXEC mode as needed:
Command Purpose
Step 1
Router(config)# aaa new-model
Enables the AAA access control model.
Step 2
Router(config)# aaa authorization ipmobile
{tacacs+ | radius}
Authorizes Mobile IP to retrieve security associations
from the AAA server using TACACS+ or RADIUS.
Command Purpose
Step 1
Router(config)# radius-server host
Specifies a RADIUS server host.
Step 2
Router(config)# radius-server key
Sets the authentication and encryption key for all
RADIUS communications between the router and the
RADIUS daemon.
Command Purpose
Step 1
Router(config)# tacacs-server host
Specifies a TACACS+ server host.
Step 2
Router(config)# tacacs-server key
Sets the authentication encryption key used for all
TACACS+ communications between the access server
and the TACACS+ daemon.