authentication based on the host: < - address of the host > is ignored

Hi guys,.

I try authentication based on the host to the cluster nodes. but the nodes are not authenticated at all, even a knot on a host not specified in the configuration is joining the cluster and newspapers are absolutely perfect. Can't understand why <-host address > is ignored?

Here is my config:
<coherence xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://xmlns.oracle.com/coherence/coherence-operational-config"
     xsi:schemaLocation="http://xmlns.oracle.com/coherence/coherence-operational-config coherence-operational-config.xsd">

     <cluster-config>  
     <unicast-listener>
               <well-known-addresses>                 
                  <socket-address id="1"><address>10.152.21.52</address><port>31760</port></socket-address>
                  <socket-address id="2"><address>10.152.21.53</address><port>31760</port></socket-address>
                  <socket-address id="3"><address>10.152.21.54</address><port>31760</port></socket-address>
                    <socket-address id="4"><address>10.152.21.55</address><port>31760</port></socket-address>
             </well-known-addresses>     
     <address>localhost</address> 
           <port>31760</port>         
         </unicast-listener>      
     <authorized-hosts>               
                     <host-address id="1">10.152.21.52</host-address>
         <host-address id="2">10.152.21.53</host-address>
         <host-address id="3">10.152.21.54</host-address> 
                <!-- <host-range>
                     <from-address>10.152.21.52</from-address>
                     <to-address>10.152.21.55</to-address>
         </host-range> -->
     </authorized-hosts> 
       </cluster-config>       
       <configurable-cache-factory-config>
            <class-name>com.oracle.coherence.environment.extensible.ExtensibleEnvironment</class-name>
          <init-params>
                      <init-param>
                          <param-type>java.lang.String</param-type>
                          <param-value>ccoe-cache-config.xml</param-value>
                      </init-param>
            </init-params>
         </configurable-cache-factory-config>
</coherence>
However, if I use <-host range > instead of <-host address > it works quite well and trying to reach any node a host outside the specified range cluster it gets and exception 'this member is not allowed to join the cluster' as expected.

Any ideas why <-host address > is completely ignored? I'm misssing something stupid?

Thank you
D

Hi D,

It looks like a bug in consistency for me due to the fact that the tangosol - default coherence.xml file contains an empty host range in the section authorized hosts. Even if you overloaded authorized hosts this empty beach is always included in the Cluster configuration, then the class that reads this part of the configuration is messed up.

Specifically, in your case, the XML from your substitution file combined with the default settings in tangosol - coherence.xml would look like this...


    
        
        
            
            
        
        10.152.21.52
        10.152.21.53
        10.152.21.54
    

.. .who processing does not create a filter to authorized hosts.

Here's a test case...

String XML = "" +
        "    " +
        "        " +
        "        " +
        "            " +
        "            " +
        "        " +
        "        10.152.21.52" +
        "        10.152.21.53" +
        "        10.152.21.54 " +
        "    " +
        "";

XmlDocument xml = XmlHelper.loadXml(XML);
LegacyXmlClusterDependencies deps = new LegacyXmlClusterDependencies();
deps.fromXml(xml);
Filter authHostsFilter = deps.getAuthorizedHostFilter();
// Oops... authHostsFilter is null!

If you delete the Virgin beach of the XML in the test and run again you get a filter.

JK

Published by: Jonathan.Knight on February 8, 2012 11:55

Tags: Fusion Middleware

Similar Questions

  • (2FA) two-factor authentication based on the ship of Group Member

    Hello world

    We have implemented 2FA, but I don't want to use it for all my clients, little need 2FA.

    So I disabled the option 'Require all authenticated users two factors', and I created an advanced target.

    This advanced lens is connected to my RDS test. but when I connect to the app portal that test RDS is always visible and accessible without 2FA.

    Can I forget something?

    Hello

    Try to create a rule as follows:

    and then this applies to your client application.  Make sure that your client application its non-target to something else.

    Concerning

    Paul

  • ISE 1.3 not allow authentication based on the group network

    ISE 1.3

    MS AD 2008R2

    Two groups: all employees, all students

    Problem: Students employee network connection

    I have two wireless networks, STUDENTS and EMPLOYEES. In ISE, I have two strategies for approval for these networks. In an effort prior to keep students to connect to the network employee, I set the permission policy:

    Employee: If (Wireless_802.1X AND AD1:ExternalGroups is equal to mydomain/accounts/all employees AND the AD1:ExternalGroups NOT_EQUALS mydomain/students/all students) then: Employee_Profile

    Unfortunately, it did not work. Students have their own username and password in AD and each faculty and staff member. I checked that students are using their identification and employee network connection information. Conversely, I can connect to the student network using the credentials of the employee. The main problem is with the students, employee network, they use all the applicable DHCP scope addresses.

    I need to not allow the network connection used by students and the network of students by employees.

    Any help would be appreciated!

    Kevin

    Glad you were able to solve your problem! Also thank you for taking the time to come back and share the solution with everyone (+ 5) to me.

    If your problem is resolved, you must mark the thread as "answered":) ".

  • Using PEAP get "authentication failed" in the event log

    I'm trying to set up a server RADIUS and PEAP on a CISCO ARI-AP1242AG-A-K9 and I get an authentication failure message in the event log.

    First of all, I see 10.209.128.61:1645, 1646 RADIUS server does not respond.

    Then I see 10.209.128.61:1645, 1646 RADIUS server is back.

    Then, I get the message "failure of authentication station.

    The association tab shows the status of the client as 'treatment of the association.

    Customers are a Flint MX-560 and a windows XP SP2 laptop HP with a intel PRO/Wireless 3945ABG Network card internal.

    I was able to get the Flint to work using JUMP, but no luck at all either with the PEAP Protocol.

    Can someone help me?

    Thank you!

    PEAP allows to authenticate wireless users without requiring that they have USER certificates, but we still need a ROOT certificate.

    Here are some more specific details on PEAP:

    ... 'the protected '.

    Extensible Authentication Protocol (PEAP) Version 2, which provides

    a tunnel encrypted and authenticated, based on the transport layer

    Security (TLS) that encapsulates the EAP authentication mechanisms.

    PEAPv2 uses TLS security to protect against rogue authenticators, to protect

    against various attacks on confidentiality and the integrity of the method internal EAP Exchange and provide the EAP peer for the protection of privacy. »

    "In negotiating TLS, the server presents a certificate of.

    the peer. The peer MUST verify the validity of the EAP server

    certificate and SHOULD also consider the name of the EAP server presented in

    the certificate to determine if the EAP server can be

    of trust. »

    http://Tools.ietf.org/ID/draft-josefsson-PPPEXT-EAP-TLS-EAP-10.txt

    •PEAP uses the side authentication server of digital certification PKI public key Infrastructure-based.

    •PEAP uses TLS to encrypt all sensitive user authentication information.

    http://www.Cisco.com/en/us/docs/wireless/technology/PEAP/technical/reference/PEAP_D.html#wp998638

  • Configure access ssh_key based switch MXL. Not "based on the host."

    I have read the documentation and cannot get to a cohesive whole procedure in order to get the simple key-based authentication to work.

    The docs separate this task in a wide variety of measures in order to activate authentication "host-based", but I don't want to.  I use two laptops and 2 different offices in various locations.  "Host-based" is not going to work for me.  I need an authentication of purely "function key".  You need an example of what involved specific steps and the order to execute them.  I find that this process is pretty simple on the HP based including the new Arubas switches.  But this MXL documentation is difficult to decipher.

    It seems as it is a one-at-a-time operation, but it is more advanced and allows you to better separate, and so I'm happy with it so far.

    1. create the user with administrator privileges
    SN - MXL (conf) "JUtilisateur" somepass privilège 15 password #username

    2 enable authentication rsa
    SN - MXL (conf) ssh rsa authentication #ip activate

    3. copy your public key in the MXL (pull)
    SN - MXL #copy scp: flash:
    Address or name of the host remote []: 172.16.11.10
    Port number of the server [22]:
    Source file name []:.ssh/juser_rsa.pub
    User name to host remote login: "JUtilisateur"
    Password to the remote to connect host:
    The destination [juser_rsa.pub] file name:
    !!
    403 bytes copied successfully

    4. now log in as user, and run:
    SN - MXL #ip ssh juser_rsa.pub my authorized key of rsa authentication
    RSA keys added to the list of authorized Keys user.
    Delete the juser_rsa.pub file: (yes/no)? Yes

    5. I had to create the file ~.ssh/config with the following statement:

    host mxl
    Host name 172.16.11.1
    The user juser
    IdentityFile ~/.ssh/juser_rsa

    This means that the PRIVATE key is referenced.  Note: Make sure that your config file is has 644 permissions.

    6 test

    $ ssh mxl

    The option of SupportAssist EULA acceptance has not been selected. SupportAssist
    can be activated once the EULA of SupportAssist has been accepted. Use of the:
    command "Activate support-assist" to accept the EULA and activate SupportAssist.

    MON-MXL #.

    And I am.  Either way, I want to get rid of that little nag, as this MXL stack is not in a country supported by DELL.  Anyone know how to remove the horse?

  • Assign a static IP address via DHCP based on the Mac address of the virtual machine

    Hi all

    It is especially a feature request, as I'm sure that it is not currently possible to do what I want to do...

    I would like to be able to assign static IP addresses to VM without having to manually configure the network settings of the virtual machine directly. I want to be able to do it from the DHCP settings in the virtual network Editor.

    Most of the routers DHCP allow this. They give an IP address through DHCP based on the MAC address of the client. This means that the customer is concerned that he receives a regular IP DHCP address, but it is never change.

    DHCP is the default option for all OS this makes things much easier to manage, as IP addresses is assigned in the same way, in one place for all DHCP clients, regardless of the client operating system, and without having to manually keep track of which the IP is assigned to which customers etc..

    Also AFAIK at least for Ubuntu, you cannot assign a static IP address without having to also statically assign to the DNS server. It is only the IP address I need to be static, so I prefer not to have to worry about manually assign the DNS server.

    I can just kind of fudge making the really long DHCP lease duration, but the maximum is 99 days only, so finally addresses are going to change, that would mean a whole bunch of reconfiguration for VM services, etc..

    Does anyone know if the workstation 9 has this ability? I am currently on version 8, but I would probably upgrade this function only if she can do it.

    If there is no way to do what I want to directly through the virtual network Editor, can anyone recommend a way to do this, perhaps using Guest only network and then, by running a kind of services to the 3rd party NAT and DHCP on the host?

    Thank you

    Eugene

    There is no GUI option to get what you are looking for, but you can do it manually. Please take a look at Re: assign a static IP to guest with network adapter NAT Virt? where I posted an example.

    André

  • MSR maps - research based on the address no longer appears.

    Original title: cards MSR

    Microsoft has stopped support MSR maps?  The research based on the address seems to no longer work.  I use this site frequently to retrieve USGS maps.

    Hi Mark,

    What exactly happens when you perform a search by address? You receive error messages?

    You can read the following article:

    On the Microsoft Research maps

  • Cisco ASA 5510 - restrictions of VPN (AnyConnect) based on the AD user or IP address

    Hello

    I want to test how to restrict access user on an ASA 5510 AnyConnect. In politics, I can define what networks will go through the VPN tunnel and which not (split tunneling). The ASA has a LDAP connection and only AD users with a special security group can connect over AnyConnect.
    On the other hand I would like to restrict access for special users within a VPN policy.

    So my question:
    What are your recommendations to implement this szenario?

    My two ideas would be:
    1. the access rules based on the user of the AD.
    2. special reserve IP addresses in the pool of addresses AnyConnect for some users, so I can limit access to the normal firewall rules base based on the source IP address.

    What are your recommendations and is it possible to realize my ideas (and how)?

    Thanks in advance

    Best regards

    Hello

    I will suggest that you configure a second ad group in the server and another group strategy in the ASA, you can configure certain access on each group policy "the installer of the filters, assign different split political tunnel, different ACL' and in the ad server, you can assign users for example to the AD Group A and AD Group B based on the access you want to give them now , you must configure LDAP mapping to assign the user specific group policy that you want based on the AD group that they belong.

    You can follow this documentation that will help you configure the LDAP Mapping:

    http://www.Cisco.com/c/en/us/support/docs/security/ASA-5500-x-series-NEX...

    Best regards, please rate.

  • Authentication/authorization GANYMEDE + based on the subnet of the user

    Hi guys/girls

    We have number of speeds of production, which are configured with Ganymede cisco + and all their work very well. But now I have an obligation to implement SSH-ver2 across the network, consist of about 8000 cisco gear.

    I need to develop a proof of concept (POC), that activate SSH to gears production will not affect Ganymede + existing and authorized user authentication.

    In our lab cisco gear, it was already configured with Ganymede + production for authentication and authorization server. Now, I am allowed to test SSH on these machines in the lab but I without disrupting other users who use the same laboratory-gears.

    So, I want to activate SSH version 2 on these machines in lab-however, when the user from a certain specific subnet, this user must be authenticated and authorized by the LABORATORY Ganymede +, but no production Ganymede +, however please note that lab-gears, that I'm testing with also already configured for production Ganymede + server as well. These devices in the laboratory must be able to do authentication and authorization of two different Ganymede + server based on subnet of users that he or she coming.

    Is - this plan is feasible? I am looking for documentation to implement the test of this method, is not successful.

    Your comments will be appreciated and evaluated.

    Thank you

    Rizwan James

    Adely,

    It won't work, the Ganymede authentication begins once the ssh connection is established, the n (router or switch) will open a Ganymede connection and send the start indicator to the RADIUS server in which the 'getusername' message is sent from the RADIUS server to the device and the user terminal. You cannot create an acl in order to choose which Ganymede servers you can authenticate either. When it comes to authenticate users from a specific subnet to a server specific RADIUS which is not the design of Ganymede, when you configure multiple servers in a group is to ensure high availability such that when a Ganymede server goes down you have a secondary school continue with authentication requests from the.

    Here is an example of how the RADIUS authentication is performed.

    http://www.Cisco.com/en/us/Tech/tk59/technologies_tech_note09186a0080094e99.shtml#comp_traffic

    Thank you and I hope this helps.

    Tarik Admani
    * Please note the useful messages *.

  • ANyConnect Client certificate authentication and verify the Client against the Microsoft AD using DAP via LDAP domain membership

    Hello

    as described in the title one want to connect with AnyConnect Secure Mobility Client 3.0.2052 ASA 5540 Version 8.4 and licence Premium SSL.

    Customers using Maschine certificate to authenticate to ASA. It works very well.

    Now, I want to install a DAP to check the customer against the Microsoft AD using LDAP. I have configured the LDAP server in see ASA:

    AAA-Server LDAP protocol ldap
    AAA-Server LDAP (inside) host ldap.com
    LDAP-base-dn DC = x DC = x, DC = x DC = com
    LDAP-scope subtree
    LDAP-login-password *.
    LDAP-connection-dn *.
    microsoft server type

    I see that it works if I test via the testbotton server in ASDM and I also see in CLI "debugging ldap 255". But if I configure in DAP: AAA attribute ID:memberOf = Membre_domaine I can't see any request to the LDAP server as I try to connect with the Client und does not correspond to the DAP.

    No idea where the problem lies?

    Thanks in advance

    Hi Klaus,

    DAP will not make any call LDAP itself, it will only act based on the attributes received LDAP via the LDAP authentication or authorization.

    So you will need to enable the LDAP authorization in the tunnel - or connect to groups.

    Once you have, you can either use DAP or a map attribute LDAP for accept/deny access, see the example of these two methods.

    HTH

    Herbert

  • How do I script in DIAdem to include specific lines of code (similar to .ini in LabVIEW files) based on the computer/user?

    I took Basic training courses so DIAdem Advanced and have been scripting for several months.  I am interested in how to include specific lines of code based on the computer.  Told me it would be similar to .ini in LabVIEW files, although I've never used myself .ini files.

    Hi Karen,.

    What do you mean by "includes the lines of code?  Do you mean what happens when you run a command 'ScriptInclude()' or 'ScriptCmdAdd()' in a tiara VBScript?  Or do you mean that you want to run several lines as DIAdem begins, similar to 'ScriptStart() '?

    What do you mean by "computer-based?  Do you mean you want to implement different batch files on different computers, but you are still using the same file (named) command on each target computer?  Or do you mean that you want to implement the same command on all target computers file, but you want different commands to run this file based on the computer on which you are.  In the latter case, how do you determine computer on which you are on - MAC address, logged in user name, or what?

    Brad Turpin

    Tiara Product Support Engineer

    National Instruments

  • NAC - STACKED IN THE AUTHENTICATION VLAN IF THE PC IS CONNECTED TO THE CISCO IP PHONE

    Hello

    I have configured my NAC in L3OOB, if I connect my pc directly to the switch I have no problem, I can access the network as out-of-band user, I can pass authentication. BUT IF I CONNECT a Cisco ip to switch phone and my pc is connected to the Cisco ip phone I'm stacked to the vlan authentication and cannot access the network. The event logs of the my CAM, it's say that it detects several mac address.

    Please guys help me with this problem...

    Thank you and best regards.

    Hello

    Have you added your phone MAC address to your CAM in the filter to IGNORE it?

    Faisal

  • MAB authentication fails on the port of multi-domain: dead result of authentication "server."

    Hi all

    First of all, I have no experience with the configuration of Cisco switches (about half a year now) but I read loads and loads of documentation.

    I am trying to configure several areas (MDA) authentication on our Cisco switches using mab and spin into something strange. Currently, single mab is asked by my employer.

    Switch = 48-3560G IOS version 12.2 (55) SE1

    RADIUS = Freeradius (version 2.1.10)

    http://www.Cisco.com/en/us/docs/switches/LAN/catalyst3560/software/release/12.2_55_se/configuration/guide/swiosfs.html is my bible

    On port Gi0/29 a Cisco 7961 IP phone is connected and plugged into the phone that a laptop is connected

    The switch configuration:

    AAA new-model
    !
    Group AAA dot1x default authentication RADIUS
    Group AAA authorization network default RADIUS
    AAA accounting delay start
    start-stop radius group AAA accounting dot1x default
    start-stop radius group AAA accounting network default
    !

    interface GigabitEthernet0/29
    235 a description
    switchport access vlan 4
    switchport mode access
    switchport voice vlan 2
    load-interval 30
    bandwidth share SRR-queue 10 10 60 20
    queue-series 2
    priority queue
    action retry authentication event 0 failure allow vlan 7
    action of death event authentication server allow vlan 4
    living action of the server reset the authentication event
    multi-domain of host-mode authentication
    Auto control of the port of authentication
    restrict the authentication violation
    MAB
    Auto qos voip cisco-phone
    spanning tree portfast
    service-policy input AutoQoS-Police-CiscoPhone
    !

    dead-criteria 5 tent 5 times RADIUS server
    RADIUS-server host 10.1.1.24 auth-port 1812 acct-port 1813
    RADIUS server key 7 xxx
    RADIUS vsa server send accounting
    RADIUS vsa server send authentication

    Radius response: (for the full reply see attached RADIUS - response.txt)

    Sending acceptance of access to the port id 98 to 10.1.1.207 1645
    Cisco-AVPair = "Tunnel-Type = VLAN.
    Cisco-AVPair = "Tunnel-Medium-Type = 802.
    Cisco-AVPair = "Tunnel-private-Group-ID = 7.
    Cisco-AVPair = "Tunnel-preference.

    That's why access accept with assignment data VLAN

    Debugging on the switch :

    001776: * Mar 1 09:27:35.606: mab-ev(Gi0/29): context MAB received create from AuthMgr
    001777: * Mar 1 09:27:35.606: mab-ev(Gi0/29): MAB authorizing MACAddress
    001778: * Mar 1 09:27:35.606: mab-ev(Gi0/29): client context created MAB 0x2200000F
    001779: * 09:27:35.606 Mar 1: mab: State has original mab_initialize enter
    001780: * Mar 1 09:27:35.606: mab-ev(Gi0/29): sent to create a new context of EAP of MAB to 0x2200000F (MACAddress) event
    001781: * Mar 1 10:27:35.606 THIS: % AUTHMGR-5-START: start "mab" for the customer (MACAddress) on the Interface Gi0/29 AuditSessionID 0A0101CF0000007F0207A4AC
    001782: * Mar 1 09:27:35.606: mab-sm(Gi0/29): the event received 'MAB_CONTINUE' on the 0x2200000F handle
    001783: * 09:27:35.606 Mar 1: mab: during the mab_initialize State, had 1 (mabContinue) event
    001784: * 09:27:35.606 Mar 1: @ mab: mab_initialize-> mab_authorizing
    001785: * Mar 1 09:27:35.606: mab-ev(Gi0/29): MAC-AUTH-BYPASS boot for 0x2200000F (MACAddress)
    001786: * Mar 1 09:27:35.614: mab-ev(Gi0/29): MAB received a Reject Access for 0x2200000F (MACAddress)
    001787: * Mar 1 10:27:35.622 THIS: % MAB-5-FAIL: failure of authentication for the client (MACAddress) on the Interface Gi0/29 AuditSessionID 0A0101CF0000007F0207A4AC
    001788: * Mar 1 09:27:35.622: mab-sm(Gi0/29): the event received 'MAB_RESULT' on the 0x2200000F handle
    001789: * 09:27:35.622 Mar 1: mab: during the mab_authorizing State, had 5 (mabResult) event
    001790: * 09:27:35.622 Mar 1: @ mab: mab_authorizing-> mab_terminate
    001791: * Mar 1 09:27:35.622: mab-ev(Gi0/29): removed the credentials of 0x2200000F (dot1x_mac_auth_MACAddress) profile
    001792: * Mar 1 09:27:35.622: mab-ev(Gi0/29): AuthMGR for MACAddress sending event (2)
    001793: * Mar 1 10:27:35.622 THIS: % AUTHMGR-7-RESULT: result "dead server" authentication "mab" for the customer (MACAddress) on the Interface Gi0/29 AuditSessionID 0A0101CF0000007F0207A4AC
    001794: * Mar 1 10:27:35.622 THIS: % AUTHMGR-5-VLANASSIGN: VLAN 4 assigned to Interface Gi0/29 AuditSessionID 0A0101CF0000007F0207A4AC
    001795: * Mar 1 10:27:36.512 THIS: % AUTHMGR-5-SUCCESS: authorization succeeded for client (MACAddress) on the Interface Gi0/29 AuditSessionID 0A0101CF0000007F0207A4AC

    So RADIUS returns an Access_Accept and the switch treats it as a rejection of access and little esteem RADIUS as dead.

    Help would be appreciated!

    Chris

    Hi Chris,

    In response to your last post, assignment of vlan dynamic could be achieved with the help of the IETF RADIUS attributes according to the link:
    http://Tools.Cisco.com/Squish/d1791

    or using the pair of cisco-av according to the link:
    http://Tools.Cisco.com/Squish/8Bd61

    As for free using the Radius and cisco-av pairs. Please can you activate debug on switch output and reproduce the problem with the attempt to authentiation of customer:
    Debug RADIUS
    Debug authentication of all the
    debug functionality of authentication all

    As a result the customer authentication event, also benefit from the following switch:
    display the interface authentication sessions

    I met problems with respect to the case of the pair of cisco-av. assignment of vlan for example work using the sensitive tiny "tunnel-private-group-id (# 81) = vlanid ' instead of ' tunnel-private-group-ID (# 81) = vlanid.

    When testing with the 'tunnel-private-group-ID(#81) = vlanid', I get an error:

    RADIUS/DECODE: parse cisco unknown vsa 'tunnel-private-group-ID' - FAIL

    So the 2nd link, with the changes:
    Cisco-avpair = "tunnel-type(#64) = VLAN (13).
    Cisco-avpair = "tunnel-medium-type(#65) = 802 media (6).
    Cisco-avpair = "tunnel-private-group-id(#81) = vlanid.

    If you still have a question, please include the output of debug/display above which will shed light on the problem.

    Thank you
    Alex

  • Based on the roles of the views of CLI with AAA method

    Hello

    I'm configuration based on the roles of views CLI on a router to limit access to users.

    My criteria:

    -There should be a local user account on the router that has the view of 'service' in the annex

    -If the router is online and can reach the radius server, people in the right group are assigned to the view 'service '.

    My configuration:

    AAA new-model

    Select the secret 1234

    username view service secret service 1234

    !

    AAA my_radius radius server group
    private-server 10.1.1.1 auth-port 1645 acct-port 1646 timeout 3 retransmit 2 0 1234 key
    private-server 10.1.1.2 auth-port 1645 acct-port 1646 timeout 2 relay 1 0 1234 key

    !

    authorization AAA console
    AAA authentication login my_radius local group mgmt
    AAA authorization exec mgmt my_radius local group

    !
    Line con 0
    authorization exec mgmt
    Synchronous recording
    login authentication mgmt
    line vty 0 4
    authorization exec mgmt
    Synchronous recording
    login authentication mgmt
    entry ssh transport

    THE ERROR

    Now, I want to go set up the cli view "service"...

    # mode

    Password: 1234

    * 08:00:02.991 Jun 1: AAA/AUTHENTIC/SEE (0000000 D): method of picking list "mgmt".
    * Jun 1 08:00:02.991: RADIUS / ENCODE (0000000D): ask "" password: ".
    * Jun 1 08:00:02.991: RADIUS / ENCODE (0000000D): upload the package. GET_PASSWORD
    * 08:00:21.011 Jun 1: RADIUS: receipt id 1645/13 10.1.1.1:1645, Access-Reject, len 20

    Questions

    Why the view "enable" trying to choose a list of method when you need to provide secrecy to enable it to access the root view?

    You can change this behavior to always use the key to activate it?

    The TEMPORARY Solution

    If you are connected to the router via telnet or SSH, the solution or workaround for this problem is:

    local VIEW_CONFG AAA authentication login

    !

    line vty 0 4

    authentication of the connection VIEW_CONFG

    Make your view configuration and reconfigure the line to use the correct (desired) authentication method.

    ________________________________

    Thanks a lot for the suggestions

    / ENTOMOLOGIST

    Hello

    You have configured the following:

    AAA authentication login my_radius local group mgmt
    AAA authorization exec mgmt my_radius local group

    Line con 0
    authorization exec mgmt
    Synchronous recording
    login authentication mgmt
    line vty 0 4
    authorization exec mgmt
    Synchronous recording
    login authentication mgmt

    entry ssh transport

    So every time you try to connect to the console or ssh authentication will travel to the server radius because of the following command 'connection authentication mgmt '.

    You can get there. What is set on the method list mgmt first will take precedence.

    activate seceret is defined locally. but you have configured the following:

    AAA authorization exec mgmt my_radius local group

    Line con 0
    authorization exec mgmt

    line vty 0 4
    authorization exec mgmt

    So exec mode is also via the radius server.

    When you set up:

    local VIEW_CONFG AAA authentication login

    !

    line vty 0 4

    authentication of the connection VIEW_CONFG

    You do local authentication, so it works the way you want.

    In short, regardless of authentication is set 1 on the list method will take priority. the relief will be checked only if the 1st aaa server is not accessible.

    I hope this helps.

    Kind regards

    Anisha

    P.S.: Please mark this thread as answered if you feel that your query is resolved. Note the useful messages.

  • Can I send a notification e-mail to a certain group of people based on the transmitter?

    I have a form that we use for internal queries. We have a team of 4 set up to work on applications, they need to receive the notification, we want to send a copy of the email to its creator, which could be 1 of 4 different people. Right now, we use the form processing stage, send a Notification email, Setup with the container Email address is always the same, with the e-mail addresses of the 4 team receives notification by e-mail. What I want to know, is there a way to conditionally send people the team and its creator, so that everyone gets the same email?

    Thank you

    GWin

    gwinhfaction E10 in the form of steps, that you will see options for always, conditionally or never treatment.  IF you use the conditional you can set up the terms based on the form submit data or the contact data.  Then you just create 4 steps in processing form, who says always send the same to the person, puts conditional based on the needs of A person, then the next stage of treatment of form still the same E-mail of person B, but make it conditional on the needs of the person of B and so on.

    The conditional processing steps you give as much flexibility and can be used in many different ways.

    I hope this has been helpful!

    Leigh

Maybe you are looking for