<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic 802.1x WLAN auth not showing client ip in win 2008 AD security log in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/802-1x-wlan-auth-not-showing-client-ip-in-win-2008-ad-security/m-p/1989699#M191427</link>
    <description>&lt;P&gt;Hello.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a ongoing project configuring a cisco wlan with 802.1x, where microsoft network policy server is used for radius authentication.&lt;/P&gt;&lt;P&gt;Configuring the SSID on the WLC, and the 802.1x on wlc/radius server works fine, users type in their username and password on a smartphone/ipad etc and get access to the network.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The problem im facing is that I want to log the clients ip-address on the radius-server security log, so I can use cisco active directory agent to find the ip against username mapping in ironport.&lt;/P&gt;&lt;P&gt;The active directory agent checks the domain controllers security log to see what ip-address belongs to which user. In this scenario the user is mapped to the wlc ip, not the smartphone/ipad. The result is a lot of users mapped to the wlc ip-address, and the logs in cisco ADA/ironport is worthless.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is there any way to configure wlc/802.1x to send the actual client ip-address to the authentication server, and not the WLC?&lt;/P&gt;</description>
    <pubDate>Mon, 11 Mar 2019 02:14:31 GMT</pubDate>
    <dc:creator>hallvard.solem</dc:creator>
    <dc:date>2019-03-11T02:14:31Z</dc:date>
    <item>
      <title>802.1x WLAN auth not showing client ip in win 2008 AD security log</title>
      <link>https://community.cisco.com/t5/network-access-control/802-1x-wlan-auth-not-showing-client-ip-in-win-2008-ad-security/m-p/1989699#M191427</link>
      <description>&lt;P&gt;Hello.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a ongoing project configuring a cisco wlan with 802.1x, where microsoft network policy server is used for radius authentication.&lt;/P&gt;&lt;P&gt;Configuring the SSID on the WLC, and the 802.1x on wlc/radius server works fine, users type in their username and password on a smartphone/ipad etc and get access to the network.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The problem im facing is that I want to log the clients ip-address on the radius-server security log, so I can use cisco active directory agent to find the ip against username mapping in ironport.&lt;/P&gt;&lt;P&gt;The active directory agent checks the domain controllers security log to see what ip-address belongs to which user. In this scenario the user is mapped to the wlc ip, not the smartphone/ipad. The result is a lot of users mapped to the wlc ip-address, and the logs in cisco ADA/ironport is worthless.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is there any way to configure wlc/802.1x to send the actual client ip-address to the authentication server, and not the WLC?&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 02:14:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/802-1x-wlan-auth-not-showing-client-ip-in-win-2008-ad-security/m-p/1989699#M191427</guid>
      <dc:creator>hallvard.solem</dc:creator>
      <dc:date>2019-03-11T02:14:31Z</dc:date>
    </item>
    <item>
      <title>802.1x WLAN auth not showing client ip in win 2008 AD security l</title>
      <link>https://community.cisco.com/t5/network-access-control/802-1x-wlan-auth-not-showing-client-ip-in-win-2008-ad-security/m-p/1989700#M191428</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Please configure radius accounting on the WLC to have the required logs on the NPS server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On the WLC, make sure we have radius accounting server configured under security &amp;gt; AAA &amp;gt; radius &amp;gt; accounting&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;After that Go to WLAN, edit the WLAN &amp;gt; security &amp;gt; AAA server and enable radius accounting.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Radius accounting on NPS logs&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://technet.microsoft.com/en-us/library/dd197475%28v=ws.10%29.aspx"&gt;http://technet.microsoft.com/en-us/library/dd197475%28v=ws.10%29.aspx&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Jatin&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 26 Jun 2012 19:19:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/802-1x-wlan-auth-not-showing-client-ip-in-win-2008-ad-security/m-p/1989700#M191428</guid>
      <dc:creator>Jatin Katyal</dc:creator>
      <dc:date>2012-06-26T19:19:17Z</dc:date>
    </item>
    <item>
      <title>802.1x WLAN auth not showing client ip in win 2008 AD security l</title>
      <link>https://community.cisco.com/t5/network-access-control/802-1x-wlan-auth-not-showing-client-ip-in-win-2008-ad-security/m-p/1989701#M191429</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you for replying Jatin,&lt;/P&gt;&lt;P&gt;After enabling accounting, I can now see the client ip-address in the nps logfile.&lt;/P&gt;&lt;P&gt;However cisco active directory client cannot map the ip against username unless it's in the windows security event log. Im also afraid it has to be a kerberos authentication, not 802.1x for it to work.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any suggestions how to fix this issue? Cisco ADA is in my opinion worthless not supporting 802.1x.--&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 27 Jun 2012 18:58:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/802-1x-wlan-auth-not-showing-client-ip-in-win-2008-ad-security/m-p/1989701#M191429</guid>
      <dc:creator>hallvard.solem</dc:creator>
      <dc:date>2012-06-27T18:58:08Z</dc:date>
    </item>
    <item>
      <title>802.1x WLAN auth not showing client ip in win 2008 AD security l</title>
      <link>https://community.cisco.com/t5/network-access-control/802-1x-wlan-auth-not-showing-client-ip-in-win-2008-ad-security/m-p/1989702#M191430</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I was actually reading this for your above question.&lt;/P&gt;&lt;P&gt; &lt;A href="http://tools.cisco.com/squish/bdc553" id="ext-gen223"&gt;http://tools.cisco.com/squish/bdc553&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 27 Jun 2012 22:45:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/802-1x-wlan-auth-not-showing-client-ip-in-win-2008-ad-security/m-p/1989702#M191430</guid>
      <dc:creator>Jatin Katyal</dc:creator>
      <dc:date>2012-06-27T22:45:50Z</dc:date>
    </item>
    <item>
      <title>802.1x WLAN auth not showing client ip in win 2008 AD security l</title>
      <link>https://community.cisco.com/t5/network-access-control/802-1x-wlan-auth-not-showing-client-ip-in-win-2008-ad-security/m-p/1989703#M191431</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I'm also having the same dilemma, just curious what if anything you have done to get this to work?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 07 Jan 2013 16:08:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/802-1x-wlan-auth-not-showing-client-ip-in-win-2008-ad-security/m-p/1989703#M191431</guid>
      <dc:creator>richardbergen</dc:creator>
      <dc:date>2013-01-07T16:08:36Z</dc:date>
    </item>
    <item>
      <title>CDA can also act as a syslog</title>
      <link>https://community.cisco.com/t5/network-access-control/802-1x-wlan-auth-not-showing-client-ip-in-win-2008-ad-security/m-p/1989704#M191432</link>
      <description>&lt;P&gt;CDA can also act as a syslog server when one or more syslog clients are added. It can connect to Cisco Identity Services Engine (ISE) and Cisco Secure Access Control System (ACS) and receive syslog messages. You can check live logs to see the syslog messages received. The advantage is to integrate CDA with 802.1x deployment and support other devices that are not necessarily authenticated by Microsoft domain controller.&lt;/P&gt;&lt;P class="pB1_Body1"&gt;CDA supports ISE 1.1.x and 1.2 and ACS 5.3, and 5.4 only.&lt;/P&gt;</description>
      <pubDate>Wed, 15 Jul 2015 00:17:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/802-1x-wlan-auth-not-showing-client-ip-in-win-2008-ad-security/m-p/1989704#M191432</guid>
      <dc:creator>Santhoshkumar Duraiswamy</dc:creator>
      <dc:date>2015-07-15T00:17:21Z</dc:date>
    </item>
  </channel>
</rss>

