<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic NAC Wireless OOB using VPN-SSO Not working in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/nac-wireless-oob-using-vpn-sso-not-working/m-p/2002835#M169174</link>
    <description>&lt;P&gt;Dilema &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Customer has 4 5508 wireless lan controllers being serviced by 3 NAC Servers&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;WLC configuration will allow me to put in all 3 NAC Servers in the radius accounting field for VPN-SSO functionality.&lt;/P&gt;&lt;P&gt;Radius acct updates allow sso through the CAS … BUT the wlc will only notify the first nac server in the list as radius acct entry 2 and 3 will only be forwarded if Acct packets timeout to the first. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now VPN-SSO will only work if the client uses the first nac server and the other 2 are now manual auth only. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What is the solution folks &lt;/P&gt;</description>
    <pubDate>Mon, 11 Mar 2019 02:15:05 GMT</pubDate>
    <dc:creator>ROBERT WATSON</dc:creator>
    <dc:date>2019-03-11T02:15:05Z</dc:date>
    <item>
      <title>NAC Wireless OOB using VPN-SSO Not working</title>
      <link>https://community.cisco.com/t5/network-access-control/nac-wireless-oob-using-vpn-sso-not-working/m-p/2002835#M169174</link>
      <description>&lt;P&gt;Dilema &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Customer has 4 5508 wireless lan controllers being serviced by 3 NAC Servers&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;WLC configuration will allow me to put in all 3 NAC Servers in the radius accounting field for VPN-SSO functionality.&lt;/P&gt;&lt;P&gt;Radius acct updates allow sso through the CAS … BUT the wlc will only notify the first nac server in the list as radius acct entry 2 and 3 will only be forwarded if Acct packets timeout to the first. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now VPN-SSO will only work if the client uses the first nac server and the other 2 are now manual auth only. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What is the solution folks &lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 02:15:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/nac-wireless-oob-using-vpn-sso-not-working/m-p/2002835#M169174</guid>
      <dc:creator>ROBERT WATSON</dc:creator>
      <dc:date>2019-03-11T02:15:05Z</dc:date>
    </item>
    <item>
      <title>NAC Wireless OOB using VPN-SSO Not working</title>
      <link>https://community.cisco.com/t5/network-access-control/nac-wireless-oob-using-vpn-sso-not-working/m-p/2002836#M169184</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Are you using virtual gateway? I am trying to understand how you could have 3 CAS server on the same L2 segment (same SSID) without introducing a spanning tree loop. Typically you would run a CAS pair in HA and point the accounting server to the trusted interface VIP to handle HA, as far as 3 different servers, if they are on seperate vlans, then you will have seperate SSIDs which you can assign each SSID its own primary accounting server which the clients agent traffic will be switched to.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Tarik Admani&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 27 Jun 2012 22:27:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/nac-wireless-oob-using-vpn-sso-not-working/m-p/2002836#M169184</guid>
      <dc:creator>Tarik Admani</dc:creator>
      <dc:date>2012-06-27T22:27:54Z</dc:date>
    </item>
    <item>
      <title>NAC Wireless OOB using VPN-SSO Not working</title>
      <link>https://community.cisco.com/t5/network-access-control/nac-wireless-oob-using-vpn-sso-not-working/m-p/2002837#M169197</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; There are 3 seperate Wlan's each mapped to a CAS.&amp;nbsp; Will re-order per wlan tomorrow thanks for the tip&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 27 Jun 2012 23:10:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/nac-wireless-oob-using-vpn-sso-not-working/m-p/2002837#M169197</guid>
      <dc:creator>ROBERT WATSON</dc:creator>
      <dc:date>2012-06-27T23:10:50Z</dc:date>
    </item>
    <item>
      <title>NAC Wireless OOB using VPN-SSO Not working</title>
      <link>https://community.cisco.com/t5/network-access-control/nac-wireless-oob-using-vpn-sso-not-working/m-p/2002838#M169248</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Not a problem, I hope that helps!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 27 Jun 2012 23:24:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/nac-wireless-oob-using-vpn-sso-not-working/m-p/2002838#M169248</guid>
      <dc:creator>Tarik Admani</dc:creator>
      <dc:date>2012-06-27T23:24:15Z</dc:date>
    </item>
    <item>
      <title>NAC Wireless OOB using VPN-SSO Not working</title>
      <link>https://community.cisco.com/t5/network-access-control/nac-wireless-oob-using-vpn-sso-not-working/m-p/2002839#M169301</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let me know if that helped. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 01 Jul 2012 03:36:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/nac-wireless-oob-using-vpn-sso-not-working/m-p/2002839#M169301</guid>
      <dc:creator>Tarik Admani</dc:creator>
      <dc:date>2012-07-01T03:36:58Z</dc:date>
    </item>
  </channel>
</rss>

