Reports 12 c authentication problem

Hello

Earlier, I could access to http://NomServeur/rapports/rwservlet/showjobs and another servlet orders easily, in the version 12 c, I can't pass this screen:

auth.png

I tried to change the password and restart the server as stated in this link:https://docs.oracle.com/cd/E12839_01/bi.1111/b32121/pbr_conf002.htm#i1007074

And I have two problems:

-I have found no "targets.xml" except in a single location (% DOMAIN_HOME%\sysman\state) and the file is empty.

-I can not find how to disable this authentication.

Thank you

Hello.

If you have an oracle support see Doc ID 2072876.1 for in-process or Doc ID 2071879.1 for the stand-alone reporting server.

Best regards.

Tags: Oracle Development

Similar Questions

  • Authentication problem when you try to connect

    I have a Linksys router. Connected WN2000RPT as described in the instructions of Netgear. Everything went through the lights very well, good, EXT appears on the scan available networks, etc. Tried to connect a Smart TV Vizio and burn TV Amazon tablet Asus. All 3 devices show... EXT with a strong signal. However, each device does not, connect with an error message 'Authentication problem' or simply 'cannot connect."

    My router is connected using personal safety ' WPA2/WPA mixed. " When you configure the wifi extender, I said to use the same SSID and the security that the router setting. Online reading on the settings available on the WN2000 and decided that the problem was perhaps a "lag" in the security implementation because WN2000 is not the same as available router setting. Do you have a factory reset on extension and returned to through the procedure, only not selected use the same level of security as a router, but manually selected WPA/PSK (AES) for the Extender. Same exact error of my devices as before.

    I thought that maybe by using the security settings of the router it was to spoil the Extender because they do not have the same settings available. But perhaps using different parameters (when the Extender receives the signal from the router, but perhaps on a "pass-through" only basis?) problems as well?

    So, can someone tell me if there is a way to get my devices to connect to the Extender, or this is always going to be a problem because the router has a security setting, and if I manually set the security OR say scope to use the same security settings, it will not work because the two units are not compatible? I'm doing something wrong? Any ideas? Thank you!

    Hello RealisticDave

    Did you have a different SSID on the router and not the same as routers SSID?

    DarrenM

  • Yoga of 1050F WiFi authentication problem 2

    Hello

    I am a new Member and just upgraded to 5 android. Seems a big mistake because it is unable to connect to the internet (no problem with android 4) says authentication problem. Tried cancellation and re - enter password, router turning on and off power and factory reset. Nothing. If Lenovo come with a repair how will I be able to get into the Tablet when I have no internet connection. For the moment, I have a tablet which is equally useful as a tile. Help

    Hello

    Just disable IPV6 in your Inbox, because Lollipop use IPV6 (default) and some box are not entirely compatible.

  • BIAPPS-ODI authentication problem

    Hi friends,

    IM at biapps 11g with ODI 11 g. I configured connection odi in the studio and can properly connect to see these maps std BIAPPS in ODI.

    But 2 days before, im in the face of an authentication problem by connecting the ODI studio with the user who I connected successfully forward.

    The error that I'm facing here is the

    ODI: 26130: could not connect to the repository, ODI-10190: user dev_biadmin has his account has expired.


    Im getting the error above and the user tried to connect is "dev_biadmin" in the studio of ODI.


    Therefore, to the question above, I followed the MOS score below



    IM facing the same error explained in the note above, but force helped me because it treats FUSIONAPPS BI I guess.


    Kindly advice me friends, to solve this problem.


    Brgds,

    Saro

    Hi, Saro,

    Connection to studio ODI as a SUPERVISOR user. Go to ODI--> Switch authentication mode--> give your contact information to ODIREPO and sign in.

    You will get the message properly connected. Click the Security tab. try to connect as a SUPERVISOR. Once the connection is successful. Go to the user of the cprresponding (dev_biadmin) account and change the password.

    Logout and go to ODI--> switch authentication mode. Give the details. It will change external authentication. Now you should be able to log in as dev_biadmin.

    Hope this will solve your problem...

    Kind regards

    Vanina

  • I have several websites in Muse. Everything was fine until last night. When publishing to Business Catalyst I get a message, teling me the following: unknown authentication problem - shared unknown error: 80. What should do?

    I have several websites in Muse. Everything was fine until last night. When publishing to Business Catalyst I get a message, teling me the following: unknown authentication problem - shared unknown error: 80. What should do?

    Hello

    To resolve this problem, you will need to disconnect muse and connect again.

    Here are the steps to the disconnection of Muse:

    1. help > log out.

    2. Once signed on restart Muse (please sign using Adobe ID if she invites to connect)

    You should be all set.

    Concerning

    Vivek

  • iCloud for Windows authentication problem

    I have iCloud for V5.2.1.69 Windows running on a current version of Windows 10.

    I have a version to update to iTunes, without no problem logging into my account.

    I can connect to the version of the browser to iCloud without problems.

    I have uninstalled and reinstalled the app iCloud three times now and restarted every time.

    I can't connect to the application windows to iCloud well! Every time he is saying

    "An error has occurred during authentication. Please try again. »

    I must have tried 10 times for several hours and still can not!

    If someone managed to connect via the Windows application?

    I have the same problem. You have made no progress on this?

    Thank you

  • Notification of Motorola ID "Authentication Problem.

    I get a message in my opinion every two days, which is called the problem of authentication. Below it is written: Touch connect with Motorola ID. When I touch the notification to see what's going to happen, it just goes back to the home screen (and probably authenticate something). My phone is otherwise seems to work fine... Yes, I got the update.


  • Authentication problem of proxy server for the domain while accessing internet users?

    We have a problem in my company with the proxy server.

    We have an Isa proxy server to restrict some users who access the internet

    allow us some users and sites for them to access

    but some times it requires authentication for all users who have access also. At that time they keep calling us. so I created a temporary rule to allow all traffic for all users. After awhile, we disable and it is working... but in some cases allow same temp rule also does not work so we say - join the domain and join the domain again...

    It seems that these are all temporary, full-time for us of how, it became

    Is there a permanent solution to this problem...

    Please help us solve this problem

    Thank you and best regards,

    Hi jagdeeshk,

    Your question is more complex than what is generally answered in the Microsoft Answers forums. It is better suited for the IT Pro TechNet public. Please post your question in the TechNet Windows Server forum.

    http://social.technet.Microsoft.com/forums/en-us/winservergen/threads

  • WIFI Lenovo A5000 authentication problem

    Whenever I try to connect to my new Lenovo A5000 in my WIFI connection, it will be said: the problem of authentication.

    -Ensure that you have the password
    -Make sure you have the latest firmware
    -Test with another router wireless

  • Windows 7 network authentication problem

    Having Windows 7 installed and have problems connecting to wireless internet. I see our wireless network, but whenever I click on it, I get a box titled "Network authentication" where it says "Please enter the credentials of the user" with a name and a password. My computer does not have a password. I don't have the credentials saved in the computer (I checked via the control panel). I tried all possible combinations of things and I can just go. If I 'x' out of it, behind it states that "additional connection information are necessary. I entered in the control panel and already ticked the box in the network and sharing Center to "disable password protected sharing. Has nothing. Any help to get rid of this annoying credential dialog would be MUCH appreciated!

    XbowSteve and Yelliez,

    I had the same problem: I bought a new computer (laptop ASUS U43F), and when I tried to connect to my home wireless network, I got a window that says "Windows Security" and "network authentication: Please enter the user credentials" also including a block a username and password.  I have three other machines humming happily my wireless network on Windows 7 and some on Mac OSX Snow Leopard.

    Problem was, I bought this computer today and do not enter a password system.  In addition, I was the one who put my wireless network and I did not need only an encryption key, user authentication.  In addition, there is no credential stored again, and I had only my admin account set up.

    #1: don't listen to those who say that it is a router problem, it is not.  IT DOES NOT ASK THE ADMIN ROUTER USERNAME AND PASSWORD!

    #2: don't take you in the long list of issues poorly answered in the nets of the 'credentials of the user.

    #3: IT IS NOT A QUESTION OF SHARING PROTECTED BY WORD!  ACK!

    Instead, follow these steps:

    (1) go to Panel and then network and Internet, then network and sharing Center.

    (2) click on manage networks wireless in the upper left of the window.

    (3) If your computer is new, then simply click 'Add '. If not, then click on "add", go through the steps below and choose the new network as your active network.

    (4) select 'Manually create a network profile.'

    (5) the form in the next window, including your network SSID, encryption, encryption, etc..  Select Conect automatically.

    (6) save.  It should say "Network successfully added."

    Presto!  Who should do it - I'm not so different.

  • 5.6 ACS authentication problem

    We are in the process of upgrading our ACS 4.1 for a 5.6 ACS appliance.

    The unit is installed on the network, etc. correctly licensed.

    I joined the ACS server to the AD domain without problem. I created a few local and external (AD) users for testing.

    I created a network (switch catalyst) as a Ganymede client device + and specified single-connect.

    When I SSH into the switch, I can connect using my AD user name and password, but I can't go into enable mode. It says "authentication failure".

    My aaa settings are

    radius-server host 172.25.50.8
    RADIUS-server timeout 3
    RADIUS-server application made
    radius-server key

    Miss me something somewhere, I don't know where. If I try and download the bundle to support ACS, it says download, but does not say where (or how).

    any advice would be great. I'm new to this product.

    See the document: http://www.cisco.com/c/en/us/td/docs/net_mgmt/cisco_secure_access_control_system/5-6/migration/guide/migration_guide/Migration_support.html#pgfId-1014889

  • 802. 1 x EAP-PEAP authentication problem

    Hi Experts,

    I'm having a problem where the authentication process for two of my wireless networks prompts the user to enter their credentials at least twice before letting them on the network.

    The networks in question are configured in the same way, here is an overview:

    Layer 2 security is WPA & WPA2

    WPA - TKIP

    WPA2 - AES

    East of authentication key 802 management. 1 X

    RADIUS servers are microsoft Windows 2008 Network Policy Service (used for IAS) - all users are Active Directory and IAS strategy enables access absed on ad group.

    This has all worked well before and still works fine, if you enter the name of username/password combo at least twice on the original profile configuration. (For the record, once the wireless profile is configured, you should I not get guest credentials once again, this problem not ony during initial installation)

    We have recently added an another WLAN that uses web authentication, pointing to a RADIUS server to. In order to get it going, we changed the setting to 'Web Radius Authentication' to the 'BOY' for "PAP" under the controller. General config.

    That's the only change I can think of that might be relevant.

    Anyone would be able to shed some light on why I would be prompted to authenticate twice? Affected clients are Windows 7 and Mac OSX at the mo.

    Debugs as follows:

    * 11 Oct 16:12:10.237: 00:23:12:08:25:28 adding mobile on 00:13:5f:fb:0f:40 (0) LWAPP AP
    * 11 Oct 16:12:10.237: 00:23:12:08:25:28 removal of Scheduling of Station Mobile: (callerId: 23) in 5 seconds
    * 11 Oct 16:12:10.237: 00:23:12:08:25:28 apfProcessProbeReq (apf_80211.c:4598) State of change for mobile 00:23:12:08:25:28 on 00:13:5f:fb:0f:40 of Idle to probe AP

    * 11 Oct 16:12:10.237: 00:23:12:08:25:28 removal of Scheduling of Station Mobile: (callerId: 24) in 5 seconds
    * 11 Oct 16:12:10.238: 00:23:12:08:25:28 removal of Scheduling of Station Mobile: (callerId: 24) in 5 seconds
    * 11 Oct 16:12:10.247: 00:23:12:08:25:28 removal of Scheduling of Station Mobile: (callerId: 24) in 5 seconds
    * 11 Oct 16:12:10.247: 00:23:12:08:25:28 removal of Scheduling of Station Mobile: (callerId: 24) in 5 seconds
    * 11 Oct 16:12:10.247: 00:23:12:08:25:28 removal of Scheduling of Station Mobile: (callerId: 24) in 5 seconds
    * 11 Oct 16:12:10.388: 00:23:12:08:25:28 removal of Scheduling of Station Mobile: (callerId: 24) in 5 seconds
    * 11 Oct 16:12:11.076: 00:23:12:08:25:28 removal of Scheduling of Station Mobile: (callerId: 24) in 5 seconds
    * 11 Oct 16:12:11.076: 00:23:12:08:25:28 removal of Scheduling of Station Mobile: (callerId: 24) in 5 seconds
    * 11 Oct 16:12:11.076: 00:23:12:08:25:28 removal of Scheduling of Station Mobile: (callerId: 24) in 5 seconds
    * 11 Oct 16:12:11.077: 00:23:12:08:25:28 removal of Scheduling of Station Mobile: (callerId: 24) in 5 seconds
    * 11 Oct 16:12:11.086: 00:23:12:08:25:28 removal of Scheduling of Station Mobile: (callerId: 24) in 5 seconds
    * 11 Oct 16:12:11.086: 00:23:12:08:25:28 removal of Scheduling of Station Mobile: (callerId: 24) in 5 seconds
    * 11 Oct 16:12:11.228: 00:23:12:08:25:28 removal of Scheduling of Station Mobile: (callerId: 24) in 5 seconds
    * 11 Oct 16:12:11.229: 00:23:12:08:25:28 removal of Scheduling of Station Mobile: (callerId: 24) in 5 seconds
    * 11 Oct 16:12:11.239: 00:23:12:08:25:28 removal of Scheduling of Station Mobile: (callerId: 24) in 5 seconds
    * 11 Oct 16:12:14.296: 00:23:12:08:25:28 removal of Scheduling of Station Mobile: (callerId: 24) in 5 seconds
    * 11 Oct 16:12:14.305: 00:23:12:08:25:28 removal of Scheduling of Station Mobile: (callerId: 24) in 5 seconds
    * 11 Oct 16:12:14.306: 00:23:12:08:25:28 removal of Scheduling of Station Mobile: (callerId: 24) in 5 seconds
    * 11 Oct 16:12:14.306: 00:23:12:08:25:28 removal of Scheduling of Station Mobile: (callerId: 24) in 5 seconds
    * 11 Oct 16:12:14.317: 00:23:12:08:25:28 removal of Scheduling of Station Mobile: (callerId: 24) in 5 seconds
    * 11 Oct 16:12:14.448: 00:23:12:08:25:28 removal of Scheduling of Station Mobile: (callerId: 24) in 5 seconds
    * 11 Oct 16:12:14.449: 00:23:12:08:25:28 removal of Scheduling of Station Mobile: (callerId: 24) in 5 seconds
    * 11 Oct 16:12:14.458: 00:23:12:08:25:28 removal of Scheduling of Station Mobile: (callerId: 24) in 5 seconds
    * 11 Oct 16:12:14.459: 00:23:12:08:25:28 removal of Scheduling of Station Mobile: (callerId: 24) in 5 seconds
    * 11 Oct 16:12:14.600: 00:23:12:08:25:28 removal of Scheduling of Station Mobile: (callerId: 24) in 5 seconds
    * 11 Oct 16:12:14.610: 00:23:12:08:25:28 removal of Scheduling of Station Mobile: (callerId: 24) in 5 seconds
    * 11 Oct 16:12:16.715: 00:23:12:08:25:28 removal of Scheduling of Station Mobile: (callerId: 24) in 5 seconds
    * 11 Oct 16:12:16.715: 00:23:12:08:25:28 removal of Scheduling of Station Mobile: (callerId: 24) in 5 seconds
    * 11 Oct 16:12:16.715: 00:23:12:08:25:28 removal of Scheduling of Station Mobile: (callerId: 24) in 5 seconds
    * 11 Oct 16:12:16.725: 00:23:12:08:25:28 removal of Scheduling of Station Mobile: (callerId: 24) in 5 seconds
    * 11 Oct 16:12:16.725: 00:23:12:08:25:28 removal of Scheduling of Station Mobile: (callerId: 24) in 5 seconds
    * 11 Oct 16:12:16.725: 00:23:12:08:25:28 removal of Scheduling of Station Mobile: (callerId: 24) in 5 seconds
    * 11 Oct 16:12:16.868: 00:23:12:08:25:28 removal of Scheduling of Station Mobile: (callerId: 24) in 5 seconds
    * 11 Oct 16:12:16.878: 00:23:12:08:25:28 removal of Scheduling of Station Mobile: (callerId: 24) in 5 seconds
    * 11 Oct 16:12:17.031: 00:23:12:08:25:28 removal of Scheduling of Station Mobile: (callerId: 24) in 5 seconds
    * 11 Oct 16:12:19.927: 00:23:12:08:25:28 removal of Scheduling of Station Mobile: (callerId: 24) in 5 seconds
    * 11 Oct 16:12:19.934: 00:23:12:08:25:28 removal of Scheduling of Station Mobile: (callerId: 24) in 5 seconds
    * 11 Oct 16:12:19.938: 00:23:12:08:25:28 removal of Scheduling of Station Mobile: (callerId: 24) in 5 seconds
    * 11 Oct 16:12:19.938: 00:23:12:08:25:28 removal of Scheduling of Station Mobile: (callerId: 24) in 5 seconds
    * 11 Oct 16:12:20.080: 00:23:12:08:25:28 removal of Scheduling of Station Mobile: (callerId: 24) in 5 seconds
    * 11 Oct 16:12:20.080: 00:23:12:08:25:28 removal of Scheduling of Station Mobile: (callerId: 24) in 5 seconds
    * 11 Oct 16:12:20.090: 00:23:12:08:25:28 removal of Scheduling of Station Mobile: (callerId: 24) in 5 seconds
    * 11 Oct 16:12:20.233: 00:23:12:08:25:28 removal of Scheduling of Station Mobile: (callerId: 24) in 5 seconds
    * 11 Oct 16:12:20.243: 00:23:12:08:25:28 removal of Scheduling of Station Mobile: (callerId: 24) in 5 seconds
    * 11 Oct 16:12:24.941: 00:23:12:08:25:28 apfMsExpireCallback (apf_ms.c:417) expires Mobile!
    * 11 Oct 16:12:24.941: 00:23:12:08:25:28 0.0.0.0 START (0) deleted LWAPP mobile to the rule on the AP [00:13:5f:fb:0f:40]
    * 11 Oct 16:12:24.941: 00:23:12:08:25:28 remove mobile on AP 00:13:5f:fb:0f:40 (0)
    * 11 Oct 16:12:25.219: 00:23:12:08:25:28 adding mobile on 00:11:5c:14:6d:d0 (0) LWAPP AP
    * 11 Oct 16:12:25.219: 00:23:12:08:25:28 the reassociation received from a mobile phone on AP 00:11:5 c: d 14:6: d0
    * 11 Oct 16:12:25.219: 00:23:12:08:25:28 STA - rates (8): 139 150 24 36 48 72 96 108 0 0 0 0 0 0 0 0
    * 11 Oct 16:12:25.219: 00:23:12:08:25:28 STA - rates (10): 139 150 24 36 48 72 96 108 12 18 0 0 0 0 0 0
    * 11 Oct 16:12:25.219: 00:23:12:08:25:28 treatment RSN IE type 48, length 20 for mobile 00:23:12:08:25:28
    * 11 Oct 16:12:25.219: 00:23:12:08:25:28 IE RSN received with mobile 00:23:12:08:25:28 PMKIDs 0
    * 16:12:25.219 Oct 11: policy of STARTING (0) initialization 00:23:12:08:25:28 0.0.0.0
    * 11 Oct 16:12:25.219: 00:23:12:08:25:28 0.0.0.0 START (0) change the State last status of AUTHCHECK (2), AUTHCHECK (2)

    * 11 Oct 16:12:25.219: 00:23:12:08:25:28 0.0.0.0 AUTHCHECK (2) change the State of 8021X_REQD (3) the last State 8021X_REQD (3)

    * 11 Oct 16:12:25.219: 8021X_REQD 00:23:12:08:25:28 0.0.0.0 (3) mobile devices rule LWAPP on AP 00:11:5 c: d 14:6: tasteless d0 4 apVapId 4
    * 11 Oct 16:12:25.220: 00:23:12:08:25:28 apfPemAddUser2 (apf_policy.c:208) State of change for mobile 00:23:12:08:25:28 on AP 00:11:5 c: d 14:6: Idle associated d0

    * 11 Oct 16:12:25.220: 00:23:12:08:25:28 stop deletion of Station Mobile: (callerId: 48)
    * 11 Oct 16:12:25.220: 00:23:12:08:25:28 send Assoc response to station BSSID 00:11:5 c: d 14:6: d0 (State 0)
    * 11 Oct 16:12:25.220: 00:23:12:08:25:28 apfProcessAssocReq (apf_80211.c:4310) State of change for mobile 00:23:12:08:25:28 on AP 00:11:5 c: d 14:6: d0 of associated Associated

    * 11 Oct 16:12:25.223: 00:23:12:08:25:28 Disable re-auth, use life PMK.
    * 11 Oct 16:12:25.223: 00:23:12:08:25:28 Station 00:23:12:08:25:28 setting dot1x timeout = 7200 reauth
    * 11 Oct 16:12:25.223: 00:23:12:08:25:28 dot1x - penetrating mobile 00:23:12:08:25:28 of connection state
    * 11 Oct 16:12:25.223: 00:23:12:08:25:28 send request/identity EAP to mobile 00:23:12:08:25:28 (EAP Id 1)
    * 11 Oct 16:12:25.243: 00:23:12:08:25:28 EAPPKT EAPOL received from mobile 00:23:12:08:25:28
    * 11 Oct 16:12:25.243: 00:23:12:08:25:28 response received identity (count = 1) 00:23:12:08:25:28 mobile
    * 11 Oct 16:12:25.243: 00:23:12:08:25:28 EAP State Update connection for mobile 00:23:12:08:25:28 authentication
    * 11 Oct 16:12:25.243: 00:23:12:08:25:28 dot1x - penetrating mobile 00:23:12:08:25:28 of State authentication
    * 11 Oct 16:12:25.243: 00:23:12:08:25:28 State entering Backend Auth response for mobile 00:23:12:08:25:28
    * 11 Oct 16:12:25.250: 00:23:12:08:25:28 treatment Access-Challenge for mobile 00:23:12:08:25:28
    * 11 Oct 16:12:25.250: 00:23:12:08:25:28 State entering Backend Auth Req (id = 2) for mobile 00:23:12:08:25:28
    * 11 Oct 16:12:25.251: 00:23:12:08:25:28 send EAP request of AAA to mobile 00:23:12:08:25:28 (EAP Id 2)
    * 11 Oct 16:12:25.260: 00:23:12:08:25:28 EAPPKT EAPOL received from mobile 00:23:12:08:25:28
    * 11 Oct 16:12:25.262: 00:23:12:08:25:28 response EAP received from mobile 00:23:12:08:25:28 (2 Id EAP, EAP Type 25)
    * 11 Oct 16:12:25.262: 00:23:12:08:25:28 State entering Backend Auth response for mobile 00:23:12:08:25:28
    * 11 Oct 16:12:25.265: 00:23:12:08:25:28 treatment Access-Challenge for mobile 00:23:12:08:25:28
    * 11 Oct 16:12:25.265: 00:23:12:08:25:28 State entering Backend Auth Req (id = 3) for mobile 00:23:12:08:25:28
    * 11 Oct 16:12:25.265: 00:23:12:08:25:28 send EAP request of AAA to mobile 00:23:12:08:25:28 (EAP Id 3)
    * 11 Oct 16:12:25.269: 00:23:12:08:25:28 EAPPKT EAPOL received from mobile 00:23:12:08:25:28
    * 11 Oct 16:12:25.269: 00:23:12:08:25:28 response EAP received from mobile 00:23:12:08:25:28 (3 Id EAP, EAP Type 25)
    * 11 Oct 16:12:25.269: 00:23:12:08:25:28 State entering Backend Auth response for mobile 00:23:12:08:25:28
    * 11 Oct 16:12:25.270: 00:23:12:08:25:28 treatment Access-Challenge for mobile 00:23:12:08:25:28
    * 11 Oct 16:12:25.271: 00:23:12:08:25:28 State entering Backend Auth Req (id = 4) for mobile 00:23:12:08:25:28
    * 11 Oct 16:12:25.271: 00:23:12:08:25:28 send EAP request of AAA to mobile 00:23:12:08:25:28 (EAP Id 4)
    * 11 Oct 16:12:25.274: 00:23:12:08:25:28 EAPPKT EAPOL received from mobile 00:23:12:08:25:28
    * 11 Oct 16:12:25.274: 00:23:12:08:25:28 response EAP received from mobile 00:23:12:08:25:28 (4 Id EAP, EAP Type 25)
    * 11 Oct 16:12:25.274: 00:23:12:08:25:28 State entering Backend Auth response for mobile 00:23:12:08:25:28
    * 11 Oct 16:12:25.275: 00:23:12:08:25:28 treatment Access-Challenge for mobile 00:23:12:08:25:28
    * 11 Oct 16:12:25.275: 00:23:12:08:25:28 State entering Backend Auth Req (id = 5) for mobile 00:23:12:08:25:28
    * 11 Oct 16:12:25.275: 00:23:12:08:25:28 send EAP request of AAA to mobile 00:23:12:08:25:28 (EAP Id 5)
    * 11 Oct 16:12:25.285: 00:23:12:08:25:28 EAPPKT EAPOL received from mobile 00:23:12:08:25:28
    * 11 Oct 16:12:25.286: 00:23:12:08:25:28 response EAP received from mobile 00:23:12:08:25:28 (5 Id EAP, EAP Type 25)
    * 11 Oct 16:12:25.286: 00:23:12:08:25:28 State entering Backend Auth response for mobile 00:23:12:08:25:28
    * 11 Oct 16:12:25.292: 00:23:12:08:25:28 treatment Access-Challenge for mobile 00:23:12:08:25:28
    * 11 Oct 16:12:25.292: 00:23:12:08:25:28 State entering Backend Auth Req (id = 6) for mobile 00:23:12:08:25:28
    * 11 Oct 16:12:25.292: 00:23:12:08:25:28 send EAP request of AAA to mobile 00:23:12:08:25:28 (EAP Id 6)
    * 11 Oct 16:12:25.318: 00:23:12:08:25:28 EAPPKT EAPOL received from mobile 00:23:12:08:25:28
    * 11 Oct 16:12:25.318: 00:23:12:08:25:28 response EAP received from mobile 00:23:12:08:25:28 (6 EAP, EAP Type 25 Id)
    * 11 Oct 16:12:25.318: 00:23:12:08:25:28 State entering Backend Auth response for mobile 00:23:12:08:25:28
    * 11 Oct 16:12:25.320: 00:23:12:08:25:28 treatment Access-Challenge for mobile 00:23:12:08:25:28
    * 11 Oct 16:12:25.320: 00:23:12:08:25:28 State entering Backend Auth Req (id = 7) for mobile 00:23:12:08:25:28
    * 11 Oct 16:12:25.320: 00:23:12:08:25:28 send EAP request of AAA to mobile 00:23:12:08:25:28 (EAP Id 7)
    * 11 Oct 16:12:25.321: 00:23:12:08:25:28 EAPPKT EAPOL received from mobile 00:23:12:08:25:28
    * 11 Oct 16:12:25.323: 00:23:12:08:25:28 response EAP received from mobile 00:23:12:08:25:28 (7 Id EAP, EAP Type 25)
    * 11 Oct 16:12:25.323: 00:23:12:08:25:28 State entering Backend Auth response for mobile 00:23:12:08:25:28
    * 11 Oct 16:12:25.326: 00:23:12:08:25:28 treatment Access-Challenge for mobile 00:23:12:08:25:28
    * 11 Oct 16:12:25.326: 00:23:12:08:25:28 State entering Backend Auth Req (id = 8) for mobile 00:23:12:08:25:28

    * 11 Oct 16:12:25.326: 00:23:12:08:25:28 send EAP request of AAA to mobile 00:23:12:08:25:28 (EAP Id 8)

    At this point, the user name and password dialog box appears again.

    If the credentials are not entered, the following timeout message appears...

    * 11 Oct 16:12:53.973: 00:23:12:08:25:28 802. 1 x "timeoutEvt" Timer expired for station 00:23:12:08:25:28

    If the credentials are entered again the computer continues:

    * 11 Oct 16:12:53.975: 00:23:12:08:25:28 relay 1 of EAP-Request (length 79) for mobile 00:23:12:08:25:28
    * 11 Oct 16:13:01.093: 00:23:12:08:25:28 EAPPKT EAPOL received from mobile 00:23:12:08:25:28
    * 11 Oct 16:13:01.093: 00:23:12:08:25:28 response EAP received from mobile 00:23:12:08:25:28 (8 Id EAP, EAP Type 25)
    * 11 Oct 16:13:01.094: 00:23:12:08:25:28 State entering Backend Auth response for mobile 00:23:12:08:25:28
    * 11 Oct 16:13:01.098: 00:23:12:08:25:28 treatment Access-Challenge for mobile 00:23:12:08:25:28
    * 11 Oct 16:13:01.098: 00:23:12:08:25:28 State entering Backend Auth Req (id = 9) for mobile 00:23:12:08:25:28
    * 11 Oct 16:13:01.098: 00:23:12:08:25:28 send EAP request of AAA to mobile 00:23:12:08:25:28 (EAP Id 9)
    * 11 Oct 16:13:01.102: 00:23:12:08:25:28 EAPPKT EAPOL received from mobile 00:23:12:08:25:28
    * 11 Oct 16:13:01.102: 00:23:12:08:25:28 response EAP received from mobile 00:23:12:08:25:28 (9 Id EAP, EAP Type 25)
    * 11 Oct 16:13:01.102: 00:23:12:08:25:28 State entering Backend Auth response for mobile 00:23:12:08:25:28
    * 11 Oct 16:13:01.106: 00:23:12:08:25:28 treatment Access-Challenge for mobile 00:23:12:08:25:28
    * 11 Oct 16:13:01.106: 00:23:12:08:25:28 State entering Backend Auth Req (id = 10) for mobile 00:23:12:08:25:28
    * 11 Oct 16:13:01.106: 00:23:12:08:25:28 send EAP request of AAA to mobile 00:23:12:08:25:28 (EAP Id 10)
    * 11 Oct 16:13:01.108: 00:23:12:08:25:28 EAPPKT EAPOL received from mobile 00:23:12:08:25:28
    * 11 Oct 16:13:01.108: 00:23:12:08:25:28 response EAP received from mobile 00:23:12:08:25:28 (10 Id EAP, EAP Type 25)
    * 11 Oct 16:13:01.108: 00:23:12:08:25:28 State entering Backend Auth response for mobile 00:23:12:08:25:28
    * 11 Oct 16:13:01.113: 00:23:12:08:25:28 Access-Accept treatment for mobile 00:23:12:08:25:28
    * 11 Oct 16:13:01.113: 00:23:12:08:25:28 setting re-auth timeout to 7200 seconds, got config WLAN.
    * 11 Oct 16:13:01.113: 00:23:12:08:25:28 Station 00:23:12:08:25:28 setting dot1x timeout = 7200 reauth
    * 11 Oct 16:13:01.113: 00:23:12:08:25:28 creating a Cache PMKID PKC entry for station 00:23:12:08:25:28 (ARS 2)
    * 11 Oct 16:13:01.113: 00:23:12:08:25:28 adding BSSID 00:11:5 c: 14:6 d: d3 to the PMKID cache for station 00:23:12:08:25:28
    * 11 Oct 16:13:01.113: new PMKID: (16)

    * 16:13:01.113 Oct 11: [0000] 15 9th 3d 61 e3 94 bb 82 2B 6f 7F 05 74 49 81 52

    * 11 Oct 16:13:01.113: 00:23:12:08:25:28 disabling re-auth, given that life expectancy PMK can handle similarly.
    * 11 Oct 16:13:01.116: 00:23:12:08:25:28 PMK sent to the mobility group
    * 11 Oct 16:13:01.116: 00:23:12:08:25:28 send EAP-success in mobile 00:23:12:08:25:28 (EAP Id 10)
    * 16:13:01.116 Oct 11: including PMKID in M1 (16)

    * 16:13:01.116 Oct 11: [0000] 15 9th 3d 61 e3 94 bb 82 2B 6f 7F 05 74 49 81 52

    * 11 Oct 16:13:01.116: 00:23:12:08:25:28 exchange of departure for 00:23:12:08:25:28 mobile key, data packages will be removed
    * 11 Oct 16:13:01.116: 00:23:12:08:25:28 transmission of EAPOL-Key Message for mobile 00:23:12:08:25:28
    INITPMK (message 1) State, counter replay 00.00.00.00.00.00.00.00
    * 11 Oct 16:13:01.116: 00:23:12:08:25:28 State entering Backend Auth success (id = 10) for mobile 00:23:12:08:25:28
    * 11 Oct 16:13:01.116: 00:23:12:08:25:28 success Auth received by authenticating the State for mobile 00:23:12:08:25:28
    * 11 Oct 16:13:01.116: 00:23:12:08:25:28 dot1x - penetrating mobile 00:23:12:08:25:28 authenticated state
    * 11 Oct 16:13:01.996: 00:23:12:08:25:28 802. 1 x "timeoutEvt" Timer expired for station 00:23:12:08:25:28
    * 11 Oct 16:13:01.997: 00:23:12:08:25:28 1 retransmit of EAPOL M1 (length 121) key for mobile 00:23:12:08:25:28
    * 11 Oct 16:13:01.999: 00:23:12:08:25:28 received EAPOL-Key of mobile 00:23:12:08:25:28
    * 11 Oct 16:13:01.999: 00:23:12:08:25:28 Ignoring EAPOL version invalid (1) in the mobile 00:23:12:08:25:28 EAPOL Key message
    * 11 Oct 16:13:01.999: 00:23:12:08:25:28 key EAPOL received in State PTK_START (message 2) of 00:23:12:08:25:28 mobile
    * 11 Oct 16:13:01.999: 00:23:12:08:25:28 for mobile 00:23:12:08:25:28 retransmission timer stop
    * 11 Oct 16:13:02.000: 00:23:12:08:25:28 transmission of EAPOL-Key Message for mobile 00:23:12:08:25:28
    PTKINITNEGOTIATING (message 3) State, counter replay 00.00.00.00.00.00.00.02
    * 11 Oct 16:13:02.002: 00:23:12:08:25:28 received EAPOL-Key of mobile 00:23:12:08:25:28
    * 11 Oct 16:13:02.002: 00:23:12:08:25:28 Ignoring EAPOL version invalid (1) in the mobile 00:23:12:08:25:28 EAPOL Key message
    * 11 Oct 16:13:02.002: 00:23:12:08:25:28 key EAPOL received in State PTKINITNEGOTIATING (message 4) of mobile 00:23:12:08:25:28
    * 11 Oct 16:13:02.002: 8021X_REQD 00:23:12:08:25:28 0.0.0.0 (3) change the State of L2AUTHCOMPLETE (4) State last, L2AUTHCOMPLETE (4)

    * 11 Oct 16:13:02.004: 00:23:12:08:25:28 0.0.0.0 L2AUTHCOMPLETE (4) mobile devices rule LWAPP on AP 00:11:5 c: d 14:6: tasteless d0 4 apVapId 4
    * 11 Oct 16:13:02.004: 00:23:12:08:25:28 0.0.0.0 L2AUTHCOMPLETE (4) change the State of the last State DHCP_REQD (7) DHCP_REQD (7)

    * 16:13:02.006 Oct 11: rule of TMP adding 4391, 00:23:12:08:25:28 0.0.0.0 DHCP_REQD (7) pemAdvanceState2
    * 16:13:02.007 Oct 11: rule DHCP_REQD (7) add Fast Path 00:23:12:08:25:28 0.0.0.0
    type = Airespace AP - IP address learn
    on AP 00:11:5 c: d 14:6: d0, location 0, interface = 29, QOS = 0
    ACL Id = 255, Jumbo F
    * 11 Oct 16:13:02.007: 00:23:12:08:25:28 0.0.0.0 DHCP_REQD (7) climbs with successful mobile rule (ACL ID 255)
    * 11 Oct 16:13:02.007: 00:23:12:08:25:28 for mobile 00:23:12:08:25:28 retransmission timer stop
    * 16:13:02.010 Oct 11: added entry NPU 00:23:12:08:25:28 9, dtlFlags 0x0 type 0.0.0.0
    * 11 Oct 16:13:02.010: 00:23:12:08:25:28 sent an XID frame
    * 11 Oct 16:13:02.283: 00:23:12:08:25:28 DHCP received op BOOTREQUEST (1) (len 308, port 29, encap 0xec03)
    * 11 Oct 16:13:02.283: 00:23:12:08:25:28 package of DHCP drop due to the current mobility handshake Exchange, (siaddr 0.0.0.0, mobility status = "apfMsMmQueryRequested"
    * 11 Oct 16:13:03.906: 00:23:12:08:25:28 0.0.0.0 DHCP_REQD State (7) set a day of mobility-incomplete for complete mobility, mobility role = Local, client state = APF_MS_STATE_ASSOCIATED
    * 16:13:03.906 Oct 11: rule of TMP adding 4072, 00:23:12:08:25:28 0.0.0.0 DHCP_REQD (7) pemAdvanceState2
    * 16:13:03.906 Oct 11: rule DHCP_REQD (7) replacing Fast Path 00:23:12:08:25:28 0.0.0.0
    type = Airespace AP - IP address learn
    on AP 00:11:5 c: d 14:6: d0, location 0, interface = 29, QOS = 0
    ACL Id = 255, Jumb
    * 11 Oct 16:13:03.906: 00:23:12:08:25:28 0.0.0.0 DHCP_REQD (7) climbs with successful mobile rule (ACL ID 255)
    * 16:13:03.909 Oct 11: added entry NPU 00:23:12:08:25:28 9, dtlFlags 0x0 type 0.0.0.0
    * 11 Oct 16:13:03.909: 00:23:12:08:25:28 sent an XID frame
    * 11 Oct 16:13:04.879: 00:23:12:08:25:28 DHCP received op BOOTREQUEST (1) (len 308, port 29, encap 0xec03)
    * 11 Oct 16:13:04.880: 00:23:12:08:25:28 DHCP by selecting the relay 1 - control block parameters:
    dhcpServer: 0.0.0.0, dhcpNetmask: 0.0.0.0
    dhcpGateway: 0.0.0.0, dhcpRelay: 0.0.0.0 VLAN: 0
    * 11 Oct 16:13:04.880: 00:23:12:08:25:28 DHCP selected relay 1 - 172.19.0.50 (address local 172.23.24.2, gateway 172.23.24.1, 110 VLAN, port 29)
    * 11 Oct 16:13:04.880: 00:23:12:08:25:28 DHCP forwarding DHCP REQUEST (3)
    * 11 Oct 16:13:04.880: 00:23:12:08:25:28 op DHCP: BOOTREQUEST, htype: Ethernet, hlen: 6, hops: 1
    * 11 Oct 16:13:04.880: 00:23:12:08:25:28 DHCP xid: 0x53839a5f (1401133663), dry: 4, flags: 0
    * 11 Oct 16:13:04.880: 00:23:12:08:25:28 DHCP CHADRR: 00:23:12:08:25:28
    * 11 Oct 16:13:04.880: 00:23:12:08:25:28 DHCP ciaddr: 0.0.0.0, yiaddr: 0.0.0.0
    * 11 Oct 16:13:04.881: 00:23:12:08:25:28 DHCP siaddr: 0.0.0.0, giaddr: 172.23.24.2
    * 11 Oct 16:13:04.881: 00:23:12:08:25:28 requested DHCP ip: 172.23.26.53
    * 11 Oct 16:13:04.881: 00:23:12:08:25:28 DHCP sends REQUEST to 172.23.24.1 (len 350, 29 port, vlan 110)
    * 11 Oct 16:13:04.881: 00:23:12:08:25:28 selection of DHCP Relay 2 - control block parameters:
    dhcpServer: 0.0.0.0, dhcpNetmask: 0.0.0.0
    dhcpGateway: 0.0.0.0, dhcpRelay: 172.23.24.2 VLAN: 110
    * 11 Oct 16:13:04.881: 00:23:12:08:25:28 DHCP selected Relay 2 - 172.19.0.51 (address local 172.23.24.2, gateway 172.23.24.1, 110 VLAN, port 29)
    * 11 Oct 16:13:04.881: 00:23:12:08:25:28 DHCP forwarding DHCP REQUEST (3)
    * 11 Oct 16:13:04.883: 00:23:12:08:25:28 op DHCP: BOOTREQUEST, htype: Ethernet, hlen: 6, hops: 2
    * 11 Oct 16:13:04.883: 00:23:12:08:25:28 DHCP xid: 0x53839a5f (1401133663), dry: 4, flags: 0
    * 11 Oct 16:13:04.883: 00:23:12:08:25:28 DHCP CHADRR: 00:23:12:08:25:28
    * 11 Oct 16:13:04.883: 00:23:12:08:25:28 DHCP ciaddr: 0.0.0.0, yiaddr: 0.0.0.0
    * 11 Oct 16:13:04.883: 00:23:12:08:25:28 DHCP siaddr: 0.0.0.0, giaddr: 172.23.24.2
    * 11 Oct 16:13:04.883: 00:23:12:08:25:28 requested DHCP ip: 172.23.26.53
    * 11 Oct 16:13:04.885: 00:23:12:08:25:28 DHCP sends REQUEST to 172.23.24.1 (len 350, 29 port, vlan 110)
    * 11 Oct 16:13:04.890: 00:23:12:08:25:28 DHCP received op BOOTREPLY (2) (len 327, port 29, encap 0xec00)
    * 11 Oct 16:13:04.890: 00:23:12:08:25:28 configuration server of ACK (172.19.0.50, 172.23.26.53 yiaddr) DHCP
    * 11 Oct 16:13:04.890: 00:23:12:08:25:28 172.23.26.53 DHCP_REQD (7) change the State RUN (20) of the last RUN status (20)

    * 11 Oct 16:13:04.890: 00:23:12:08:25:28 172.23.26.53 RUN Reached (20) PLUMBFASTPATH: 4856 line
    * 11 Oct 16:13:04.891: 00:23:12:08:25:28 172.23.26.53 rule of RACE (20) replacing Fast Path
    type = Airespace AP Client
    on AP 00:11:5 c: d 14:6: d0, location 0, interface = 29, QOS = 0
    ACL Id = 255, Jumbo = N frames
    * 11 Oct 16:13:04.891: 00:23:12:08:25:28 172.23.26.53 rule RUN (20) correctly mobile ascent (ACL ID 255)
    * 11 Oct 16:13:04.891: 00:23:12:08:25:28 address assignment 172.23.26.53 on mobile
    * 11 Oct 16:13:04.891: 00:23:12:08:25:28 DHCP sending MEET STA (len 430, 29 port, vlan 0)
    * 11 Oct 16:13:04.892: 00:23:12:08:25:28 DHCP forwarding DHCP ACK (5)
    * 11 Oct 16:13:04.892: 00:23:12:08:25:28 op DHCP: BOOTREPLY, htype: Ethernet, hlen: 6, hops: 0
    * 11 Oct 16:13:04.892: 00:23:12:08:25:28 DHCP xid: 0x53839a5f (1401133663), dry: 0, flags: 0
    * 11 Oct 16:13:04.892: 00:23:12:08:25:28 DHCP CHADRR: 00:23:12:08:25:28
    * 11 Oct 16:13:04.892: 00:23:12:08:25:28 DHCP ciaddr: 0.0.0.0, yiaddr: 172.23.26.53
    * 11 Oct 16:13:04.894: 00:23:12:08:25:28 DHCP siaddr: 0.0.0.0, giaddr: 0.0.0.0
    * 11 Oct 16:13:04.894: 00:23:12:08:25:28 DHCP server id: 1.1.1.1 rcvd server id: 172.19.0.50
    * 16:13:04.898 Oct 11: added entry NPU 00:23:12:08:25:28 172.23.26.53 type 1, dtlFlags 0 x 0
    * 11 Oct 16:13:04.900: 00:23:12:08:25:28 send a free ARP to 172.23.26.53, VLAN Id 110
    * 11 Oct 16:13:04.907: 00:23:12:08:25:28 DHCP received op BOOTREPLY (2) (len 327, port 29, encap 0xec00)
    * 11 Oct 16:13:04.907: 00:23:12:08:25:28 DHCP ACK from 172.19.0.51 (yiaddr: 172.23.26.53)

    At this point, the client is connected and everything works.

    Hello

    In Windows 7, in your properties of wireless network, on the Security tab, click Advanced settings and try to set the authentication as "The user authentication Mode" mode tab in 802. 1 x to see if it helps.

    Kind regards

    Bastien

  • Users wireless with peap authentication problem

    Good afternoon

    I am currently trying to authenticate users wireless using PEAP and an external RADIUS server. The problem is when I try to authenticate that I get this error:

    AAA/AUTHENTIC/PPP: List of selection method "permanent premises.

    Dot11-7-AUTH_FAILED: Station... Failed authentication

    Should not use local authentication, but the aaa server that I set up.

    I looked on the internet but have not found a working solution.

    Does anyone know why it does not work?

    Here is my configuration running:

    Current configuration: 4276 bytes
    !
    ! Last modification of the configuration at 00:45:40 UTC Monday, March 1, 1993
    ! NVRAM config update at 16:38:23 UTC Thursday, July 24, 2014
    ! NVRAM config update at 16:38:23 UTC Thursday, July 24, 2014
    version 15.2
    no service button
    horodateurs service debug datetime msec
    Log service timestamps datetime msec
    encryption password service
    !
    host ap name
    !
    !
    Pulse 9 logging console
    enable secret 5 $1$ QVC3$ dIVAarlXOo52rN3ceZm1k0
    !
    AAA new-model
    !
    !
    AAA rad_eap radius server group
    192.168.2.2 Server ACCT-port auth-port 1812 1813
    !
    AAA rad_mac radius server group
    !
    AAA rad_acct radius server group
    !
    AAA rad_admin radius server group
    !
    AAA server Ganymede group + tac_admin
    !
    AAA rad_pmip radius server group
    !
    RADIUS server AAA dummy group
    !
    AAA authentication login eap_methods group rad_eap
    AAA authentication login mac_methods local
    AAA authorization exec default local
    AAA accounting network acct_methods power group rad_acct
    !
    !
    !
    !
    !
    AAA - the id of the joint session
    no ip Routing
    no ip cef
    !
    !
    !
    dot11 syslog
    !
    ssid dot11 test
    authentication open eap eap_list
    authentication-key wpa version2 management
    Comments-mode
    !
    !
    EAP peap profile
    peap method
    !
    Crypto pki token removal timeout default 0
    !
    ...
    !
    !
    Bridge IRB
    !
    !
    !
    interface Dot11Radio0
    no ip address
    no ip route cache
    !
    encryption ciphers aes - ccm mode
    !
    SSID test
    !
    gain of antenna 0
    STBC
    beamform ofdm
    root of station-role
    Bridge-Group 1
    Bridge-group subscriber-loop-control 1
    Bridge-Group 1 covering-disabled people
    Bridge-Group 1 block-unknown-source
    No source of bridge-Group 1-learning
    unicast bridge-Group 1-floods
    !
    interface Dot11Radio1
    no ip address
    no ip route cache
    Shutdown
    gain of antenna 0
    no block of dfs
    channel SFR
    root of station-role
    Bridge-Group 1
    Bridge-group subscriber-loop-control 1
    Bridge-Group 1 covering-disabled people
    Bridge-Group 1 block-unknown-source
    No source of bridge-Group 1-learning
    unicast bridge-Group 1-floods
    !
    interface GigabitEthernet0
    no ip address
    no ip route cache
    automatic duplex
    automatic speed
    dot1x EAP authenticator
    Bridge-Group 1
    Bridge-Group 1 covering-disabled people
    No source of bridge-Group 1-learning
    !
    interface BVI1
    192.168.3.10 IP address 255.255.255.0
    no ip route cache
    !
    The default gateway IP
    IP forward-Protocol ND
    IP http server
    IP http secure server
    IP http help-path http://www.cisco.com/warp/public/779/smbiz/prodconfig/help/eag
    radius of the IP source-interface BVI1
    !
    format of server RADIUS attribute 32 include-in-access-req hour
    RADIUS-server host 192.168.2.2 auth-port 1812 acct-port 1813 borders 7 140441081E501F0B7D
    RADIUS vsa server send accounting
    !
    1 channel ip bridge
    !
    !
    !
    Line con 0
    line vty 0 4
    transport of entry all
    !
    end

    Thank you

    I don't have installation autonomous APs before but I think I see the problem. You define a list of authentication , called "eap_methods" but you never call for it in the settings of your SSID. Instead he call you a list named "eap_list" in addition, I think that you might miss one order more. So maybe try this:

     dot11 ssid test authentication open eap eap_methods authentication network-eap eap_methods authentication key-management wpa version 2 guest-mode

    I hope this helps!

    Thank you for evaluating useful messages!

  • RADIUS authentication problem

    I have a C6509 with switch IOS sup32 base. I also allows RADIUS authentication on the switch. But whenever I have telnet to the switch brings the following:

    Username: XXXXXXXX

    Password: XXXXXXXX

    Quick > activate

    User access audit

    Username: XXXXXXXX

    Password: XXXXXXXX

    I don't like the second username. I was expecting after the enable command, I should just be asked to enter my password and do not ask me a username again.

    Here is the version of IOS of the switch:

    s3223-adventerprisek9_wan - mz.122 - 33.SXH3a.bin

    Here is the config of aaa:

    AAA new-model

    AAA authentication login default group Ganymede + line activate

    the AAA authentication enable default group Ganymede + activate

    AAA authorization exec default group Ganymede + authenticated if

    AAA authorization commands 15 default group Ganymede + authenticated if

    AAA accounting exec default start-stop Ganymede group.

    orders accounting AAA 15 by default start-stop Ganymede group.

    Kind regards

    Enrico

    you run may be in bug CSCsu21040. This problem is fixed in SXH4.

  • GANYMEDE + SSH authentication problem Fo ASA

    Dear Sir

    I managed an ASA 5540 assets/failover pair. SSH authentication is performed via GANYMEDE + ACS located 4.2 in the same VLAN as the inside interface of the firewall. I have added two firewalls on the ACS using their inside as the interface IP addresses (using addresses active and reserve). I can succesfully authenticate and connect to the ASA assets without any problem. But on the SAA on hold, I get SSH prompt but I couldn't connect. When I see the log of failed attempts under GBA, I noticed that "Unknown SIN" for the ASA. How can I solve this problem?

    Best regards

    Abebe Amare

    Engineer network, VivaCell

    Hi Abebe,

    On the ASA high school, please check the following:

    SH failover---> and make sure that the secondary image is waiting ready and not missed.

    HS-Server aaa---> check the output and see if the ASA marked the radius server under the name 'UP' and the exchange of packets.

    Activate the following debugs and perform an authentication test as shown:

    Debug aaa authentication

    debugging Ganymede

    Debug ssh

    aaa-server host username authentication test "insert name of" passes "insert a password."

    Provide me with him debugs after taking on your username in it so that I can analyze.

    See you soon,.

    Christian V

Maybe you are looking for