MAC W2K8R2 NPS (RADIUS) authentication & Cisco 4400

I have a cisco 4400 wlan put in place for that mac filtering via the RADIUS using MS NPS.

I created a user account AD with address as user name and password. On NPS, I created a political network and connection with the latter policy displayed.

On the client (Win7Pro), I connect the SSID and he made the connection as expected and the entry is recorded in the log of RADIUS.

The problem is that when I stopped the machine or disconnect manually the ssid I can't reconnect to it when the machine comes back upward or when I reconnected it the SSID. Politics is not run, and no RADIUS entry is recorded on the reconnection. What is more, if I disable the network policy so that further communication is not possible, is still it regardless of the political status. The ONLY way to restart the whole process in the right way, i.e. connection via policy, RADIUS logging, etc. is to disable and re-enable the wlan on the controller. After it is completed the machine is properly refused access when the network POLICY server policy is disabled.

In short, once the machine is allowed to connect is seems to stay connected, regardless of the political status until the connection with the wireless network is turned off. My guess is that the computer is somehow caching credentials. However, I hope that it is something that I can change on the controller, because connection to this key wlan devices are approved through dhcp (mac) Reservations; they can be any type of machine with a mac address.

Any help appreciated.

Thank you

Hello

a WLC will not authenticate a client if disconnect you all of a sudden (customer = na not say WLC was disconnect) and if only a short time spent.

By default, this means that the client should be not seen for 5 minutes for the customer entry should be deleted on the controller. It's the "user idle timeout" about WLC and can be configured to be shorter.

To make sure if this is your problem, disconnect your client and check on "monitor-> clients" If you still see the mac client it.

If you do not, then the WLC should request authentication once again and the problem would then be the side microsoft.

I hope this helps.

Nicolas

===

Remember responses of the rate that you find useful

Tags: Cisco Security

Similar Questions

  • RADIUS authentication

    Hello world

    I want to implement RADIUS authentication for my companies Cisco devices. Could someone give me some examples of configuration of how to point my switches and routers on a RADIUS server, and also to try RADIUS authentication. Only by using a locally configured account if RADIUS fails?

    My undertsnading would be to use the following configuration;

    AAA new-model

    AAA authentication login default local radius group

    start-stop radius group AAA accounting network default

    RADIUS RADIUS-server host 1.1.1.1 key auth-port 1812 acct-port 1813

    RADIUS server retransmit 3

    Thanks in advance,

    Dan

    Hello Dan,.

    your configuration seems to be OK...

    more information you can find here

    http://www.Cisco.com/en/us/products/SW/iosswrel/ps1835/products_configuration_guide_chapter09186a00800ca7ab.html

  • RADIUS authentication question

    Hello world

    I'm learning the Radius Authentication. Here are my updated laboratory in place:

    R1 (107.107.107.10)-(107.107.107.4) - WIN2008 (RADIUS SERVER)

    Here is the config of RADIUS on the R1:

    AAA authentication login default local radius group

    RADIUS-server host 107.107.107.4 auth-port 1645 acct-port 1646
    key cisco RADIUS server

    I have a few questions:

    (1) above, I do not specify encryption on R1, R1 will use this as the default encryption?

    In the attached file, we see the password is encrypted, but there is no config on R1 to use particular encryption

    (2) we also see "authenticator", which is I think is R1 host name i.e encrypted with the shared secret. I'm wrong?

    Much appreciated and have a great weekend!

    Hello

    The Protocol Radius encrypts the password for the default user. I think that Radius uses MD5.

    The authenticator is a random string generated by the client and is used in the encryption of the password process.

    Thank you

    John

  • WLAN 4402 for Radius Authentication

    Hi guys,.

    Please help me on how I can install my WLAN 4402 controller for Radius Authentication, if you have links or procedures that you can share, which will be very appreciated. :-)

    Thanks in advance.

    It depends on if you are using Cisco ACS or Windows IAS. Controller configuration is the same but the side RADIUS is different.

    Also what you are trying to configure, systems users, PEAP etc. through RADIUS

    PEAP via ACS is here

    http://www.Cisco.com/en/us/partner/products/ps6366/products_configuration_example09186a00807917aa.shtml

    PEAP via IAS is here

    http://www.Cisco.com/en/us/partner/products/ps6366/products_configuration_example09186a0080921f67.shtml

    Hope that helps

  • Using CHAP with RADIUS authentication

    Hello

    I configured a Cisco 877 router to send the RADIUS requests when a user connects to the console (Console line) or VTY Line using the following configuration:

    AAA new-model

    Group AAA authentication login default RADIUS

    Group AAA authentication ppp default of RADIUS

    RADIUS-server host 10.0.0.1 auth-port 1812 acct-port 1812 mysharedkey key

    When I connect the RADIUS packets I see the Cisco router sends the initial AccessRequest using PAP.

    How can I configure my router to send it's original AccessRequest package with CHAP?

    My apologies if this has already been discussed, I searched high and low for an answer.

    Thanks in advance.

    John

    Hi John,.

    PPP connection supported by CHAP because a configuration command to activate the CHAP protocol as Protocol of stimulus / response. However, the Console VTY connections and to THE will always go on PAP when using RADIUS authentication. There is no command to activate the CHAP protocol for these types of connections.

    Best regards.

  • VPN Site to Site Secret shared and can co-exist RADIUS authenticated VPN?

    Hello

    I have a setup VPN site to site between two offices on 515Es PIX (v.6.2 software) and has recently added a vpngroup/shared secret based VPN remote access to one of the offices. Given that just forced me to add a number of different policies to my existing crypto card, it was a plant direct and easily implemented. For more security, I want to use a RADIUS server to give to each remote user their own connections and profiles rather than a group on all password is configured. To do this, however, it seems that I have to add the following additional commands to my existing crypto card:

    client configuration address map mymap crypto initiate

    client card crypto mymap RADIUS authentication

    These do not correspond to the policy number (my site-to-site is 10, and remote access policy is political 20), so I don't know what the effect would be if I added the. It would cause my connection from site to site for authentication RADIUS request (a very bad thing)? If so, do I need another interface to bind a new encryption card to? The answer to this would be greatly appreciated!

    Also, if anyone knows an example configuration for a similar configuration, I can look at, please let me know! Thank you.

    -A.Hsu

    For the site to site connection, you change line isakmp keys and add the parameters of "No.-xauth No.-config-mode" at the end of this one, which tells the PIX not to do the auth RADIUS or assign an IP address, etc. for the specific site-to-site tunnel.

    Example of config is here:

    http://www.Cisco.com/warp/public/110/37.html

    Note that there is no command options I have just said, I just sent an email to the web guys to fix this. Basically, your config will look with the options "No.-xauth No.-config-mode" on the line «isakmp x.x.x.x key...» "for LAN-to-LAN tunnel.

  • RADIUS authentication for the switch using ISE

    Hi guys,.

    Someone did he do Radius Authentication for switch cli connection using ISE?

    We did it in our environment with ISE, but it is a challenge to give read-only access / Priv-1.

    If some users know the enable password, they can use and earn full privilege.

    Anyway to get around this other than to change the enable password?

    We have thousands of switches and won't change on each of them.

    If you have another method please advice.

    Thank you in advance.

    Well, you can set the "enable" function also be controlled via the AAA server with the following command:

    AAA authentication enable... This way server AAA will be checked for authentication for the secret to activate and use the local database as a last resort

    I hope this helps!

    Thank you for evaluating useful messages!

  • RADIUS authentication problem

    I have a C6509 with switch IOS sup32 base. I also allows RADIUS authentication on the switch. But whenever I have telnet to the switch brings the following:

    Username: XXXXXXXX

    Password: XXXXXXXX

    Quick > activate

    User access audit

    Username: XXXXXXXX

    Password: XXXXXXXX

    I don't like the second username. I was expecting after the enable command, I should just be asked to enter my password and do not ask me a username again.

    Here is the version of IOS of the switch:

    s3223-adventerprisek9_wan - mz.122 - 33.SXH3a.bin

    Here is the config of aaa:

    AAA new-model

    AAA authentication login default group Ganymede + line activate

    the AAA authentication enable default group Ganymede + activate

    AAA authorization exec default group Ganymede + authenticated if

    AAA authorization commands 15 default group Ganymede + authenticated if

    AAA accounting exec default start-stop Ganymede group.

    orders accounting AAA 15 by default start-stop Ganymede group.

    Kind regards

    Enrico

    you run may be in bug CSCsu21040. This problem is fixed in SXH4.

  • 5.2 ACS with different RADIUS authentication servers

    Hello

    I want to migrate from ACS ACS 5.2 4.1. I have already configured authentication GANYMEDE +, but now I've stuck to the RADIUS authentication for remote access WebVPN configuration. Please see the following diagram:

    I want to configure ACS to use Server Token WBS first. If authentication fails or the user is not found, ACS must use IAS in Windows Server. If this server fails also ACS must use internal DB. Additional attributes as belonging to a group or ACL downloadable should be taken from internal ACS DB.

    Is it possible to configure ACS like that? ACS 4.1 it is very easy to configure by selecting the per user authentication method.

    Thanks for your help!

    There is an option in the Advanced tab of definition 'RADIUS Identity server' th:

    This storage of identity differentiates between 'authentication failed' and 'user not found' when an authentication attempt is rejected. Among the options below, select how a rejection of authentication of the identity store must be interpreted by FAC for the politics of identity of treatment and reports.
    Releases to treat as 'authentication failed' treat dismisses them as "user not found".

    In order to continue in the sequence, I think you have to select the option "user not found".

  • RADIUS authentic works not 3560

    Hello world.

    The switch's config for RADIUS authentic.

    When I try here is the log

    % SSH-SSH2_USERAUTH 5: 'xy' authentication SSH2 Session 192.168.x.x (ATS = 1) using crypto cipher "aes256-cbc" hmac "hmac-sha1' Failed

    What should I check now

    Concerning

    Mahesh

    You must post a few outings until I'd suggest something. If SSH works very well with the local database which means the keys RSA are fine.

    If you can't attach the executed full show. Attach the bottom of the outputs listed in your next reply.

    See the race | in aaa

    See the race | Please line vty 0 4

    Debug RADIUS

    Debug aaa authentic

    Debug aaa approval

    The radius, if any server error.

    ~ BR
    Jatin kone

    * Does the rate of useful messages *.

  • [Cisco AnyConnect] Certificate on RADIUS authentication

    Hello

    I use authentication and LDAP authorization certificates and it works fine.

    Now, I want to centralize authentication and authorization on the server RADIUS (Cisco ACS in my case)

    In the connection profile, we have 3 authentication methods:

    • AAA: I can choose RADIUS server group or LDAP--> the user is prompted to enter the username/password credentials
    • Certificate: I can't choose AAA server...--> user group will have to provide the certificate
    • Both: I choose the RADIUS or LDAP--> the user is prompted for username/password credentials and the user must provide the certificate

    If I choose the certificate authentication methods, I can't delegate the authentication and authorization of RADIUS server.

    Is there a solution to delegate the authentication of the certificate to the RADIUS?

    I have different authorization for each VPN connection profile rules

    ASA can send a VPN connection profile to the RADIUS? (in the RADIUS attribute...)

    Thanks for your help,

    Patrick

    Patrick,

    The essential in deployments using WLC is begging on client can talk to EAP (including EAP - TLS) so the AAA server can authenticate the certificate.

    In the case of Anyconnect, or old IPsec client there is no way to send the full cert to server AAA (not implemented/redundant from the point of view of the customer, or not in the standard).

    IOS also gives you a possibility to make calls for authorization of PKI:

    http://www.Cisco.com/en/us/docs/iOS-XML/iOS/sec_conn_pki/configuration/15-2mt/sec-cfg-auth-Rev-cert.html

    AFAIR is no similar mechanism on the SAA.

    M.

  • Authentication RADIUS and Cisco ACE load balancers?

    Is it necessary to have user accounts local on the load balancers Cisco ACE as well as the user accounts on GANYMEDE where authenticated?

    Thank you very much

    Florrie

    The username account should be there (I agree this is stupid), but the password is arbitrary because it is auth back to ACS. From what I remember, he had something to do with access to the contexts and ACS is not able to determine what context is which and for which user. If all goes well it is 'fixed' in DCC 5 and later version of the ACE.

  • EAP-FAST and the MAC with WPA2 on RADIUS authentication Local for 1242AG access point

    Hello

    Does anyone has a Setup for this combination work?

    Concerning

    VP

    Hi EAP - FAST didn't need any cert... We must generate CAP... Here is the link... that gives the comparison between different EAP

    http://ciscosystems.com/en/us/prod/collateral/wireless/ps5679/ps5861/prod_qas09186a00802030dc_ps4555_Products_Q_and_A_Item.html

    Here is the link to generate or use the CAP

    http://www.Cisco.com/en/us/docs/wireless/access_point/12.3_8_JA/configuration/guide/s38local.html#wp1050270

    Let me know if that helps...

    Concerning

    Surendra

  • INTERNET AUTHENTICATION SERVICE RADIUS AUTHENTICATION USING

    Hi, I have problems with the same configuration. I authenticate remote users in AD using the Internet Authentication Service on windows 2003 as radius server configure the same VPN via ASA5520 profile. Please a knowledge or have the same information on this type of server configuration? Thank you very much.

    Greetings from the King.

    Elias Vucinovich.

    Have a look here.

    http://www.Cisco.com/en/us/products/HW/vpndevc/ps2030/products_configuration_example09186a00806de37e.shtml

    Rgds

    Jorge

  • RADIUS authentication to activate PW

    Hello world

    I have my authentication RADIUS working for login password but not the enable password. My config is lower;

    AAA new-model

    AAA authentication login default local radius group

    start-stop radius group AAA accounting network default

    When I add the command;

    AAA authentication enable default group enable RADIUS

    I expect he allow me to enter my pw of RADIUS to activate a to, but it doesn't. And does not allow me to enter the configured locally?

    Any help would be great,

    Thank you

    Dan

    Hello

    Usually the RADIUS is not used the device management - because most of RADIUS servers do NOT have the proper authorization.

    Same Cisco ACS doesn't do much in the way of authorization for the RADIUS.

    IAS is not any notion of IOS activate. IAS will also want to make default MSCHAP. Enable authentication is basically PAP. So you have IAS to authenticate using the text that excludes practically using ad a return that will end unless you store the user in the format "reversably" encrypted passwords within the AD.

    Mounira

Maybe you are looking for