<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic For read/write access you in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/wlc-management-access-via-ise-2-2-radius/m-p/3004445#M23196</link>
    <description>&lt;P&gt;For read/write access you need this attribute in addition to the ACCESS_ACCEPT access-type:&lt;/P&gt;
&lt;P&gt;Radius:Service-Type = Administrative&lt;/P&gt;</description>
    <pubDate>Fri, 07 Apr 2017 14:14:47 GMT</pubDate>
    <dc:creator>M. Wisely</dc:creator>
    <dc:date>2017-04-07T14:14:47Z</dc:date>
    <item>
      <title>WLC Management Access via ISE 2.2 Radius</title>
      <link>https://community.cisco.com/t5/network-access-control/wlc-management-access-via-ise-2-2-radius/m-p/3004443#M23194</link>
      <description>&lt;P&gt;We recently upgraded ISE from 2.1 to 2.2 and have radius configured to authenticate management sessions to our network devices. After the upgrade we can login to our WLC via GUI or SSH, but when a change is made an Authorization Failed. No sufficient privileges pops up. From the CLI no changes can be made, but we can login.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Here is my Results&amp;gt;Authorization&amp;gt;Authorization Profiles. This is then used in a policy set shared with our switches and routers.&lt;/P&gt;
&lt;P&gt;Web Authentication (Local Web Auth) - is checked&lt;/P&gt;
&lt;P&gt;Attribute settings are:&lt;/P&gt;
&lt;P&gt;Radius:Service-Type = Administrative&lt;/P&gt;
&lt;P&gt;Cisco:cisco-av-pair = shell:priv-lvl=15&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Any help from the forum experts would be greatly appreciated.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;BW&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 07:37:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/wlc-management-access-via-ise-2-2-radius/m-p/3004443#M23194</guid>
      <dc:creator>bret</dc:creator>
      <dc:date>2019-03-11T07:37:03Z</dc:date>
    </item>
    <item>
      <title>Hi</title>
      <link>https://community.cisco.com/t5/network-access-control/wlc-management-access-via-ise-2-2-radius/m-p/3004444#M23195</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Could you paste screenshots of your config please?&lt;/P&gt;
&lt;P&gt;Then can you have a try and paste here the result of your ISE servers and output of your WLC debug (&lt;B&gt;debug aaa events enable&lt;/B&gt;)&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;thanks&amp;nbsp;&lt;/P&gt;
&lt;P&gt;PS: Please don't forget to rate and mark as correct answer if this answered your question&lt;/P&gt;</description>
      <pubDate>Fri, 07 Apr 2017 14:02:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/wlc-management-access-via-ise-2-2-radius/m-p/3004444#M23195</guid>
      <dc:creator>Francesco Molino</dc:creator>
      <dc:date>2017-04-07T14:02:34Z</dc:date>
    </item>
    <item>
      <title>For read/write access you</title>
      <link>https://community.cisco.com/t5/network-access-control/wlc-management-access-via-ise-2-2-radius/m-p/3004445#M23196</link>
      <description>&lt;P&gt;For read/write access you need this attribute in addition to the ACCESS_ACCEPT access-type:&lt;/P&gt;
&lt;P&gt;Radius:Service-Type = Administrative&lt;/P&gt;</description>
      <pubDate>Fri, 07 Apr 2017 14:14:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/wlc-management-access-via-ise-2-2-radius/m-p/3004445#M23196</guid>
      <dc:creator>M. Wisely</dc:creator>
      <dc:date>2017-04-07T14:14:47Z</dc:date>
    </item>
    <item>
      <title>Thanks for chiming in so</title>
      <link>https://community.cisco.com/t5/network-access-control/wlc-management-access-via-ise-2-2-radius/m-p/3004446#M23197</link>
      <description>&lt;P&gt;Thanks for chiming in so quickly guys. I have a case opened, but the response is terrible.&lt;/P&gt;
&lt;P&gt;Attached are the debugs from the WLC and my authorization profile. This profile is used by our switches and routers and there are no problems. Also attached is my Policy Set.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 07 Apr 2017 14:37:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/wlc-management-access-via-ise-2-2-radius/m-p/3004446#M23197</guid>
      <dc:creator>bret</dc:creator>
      <dc:date>2017-04-07T14:37:33Z</dc:date>
    </item>
    <item>
      <title>Something to note. I have</title>
      <link>https://community.cisco.com/t5/network-access-control/wlc-management-access-via-ise-2-2-radius/m-p/3004447#M23198</link>
      <description>&lt;P&gt;Something to note. I have another controller on a different ISE server ver 1.2 using the same policy set and results with no issues. So something changed with ISE 2.2 to make this stop working.&lt;/P&gt;</description>
      <pubDate>Fri, 07 Apr 2017 14:44:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/wlc-management-access-via-ise-2-2-radius/m-p/3004447#M23198</guid>
      <dc:creator>bret</dc:creator>
      <dc:date>2017-04-07T14:44:50Z</dc:date>
    </item>
    <item>
      <title>Hi,</title>
      <link>https://community.cisco.com/t5/network-access-control/wlc-management-access-via-ise-2-2-radius/m-p/3004448#M23199</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;The policy is to authenticate a user to manage your WLC. Why have you checked Local Webauth?&lt;/P&gt;
&lt;P&gt;2nd thing, on your wlc debugs, we see the service-type 7 (NAS-Prompt) instead of service-type 6 (Administrative):&lt;/P&gt;
&lt;P&gt;radiusTransportThread: Apr 07 09:49:01.801: AVP[02] ServiceType.............................0x00000007 (7) (4 bytes)&lt;/P&gt;
&lt;P&gt;Do you have ISE authorization logs for that specific session?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;PS: Please don't forget to rate and mark as correct answer if this answered your question&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 07 Apr 2017 15:30:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/wlc-management-access-via-ise-2-2-radius/m-p/3004448#M23199</guid>
      <dc:creator>Francesco Molino</dc:creator>
      <dc:date>2017-04-07T15:30:42Z</dc:date>
    </item>
    <item>
      <title>The local webauth check may</title>
      <link>https://community.cisco.com/t5/network-access-control/wlc-management-access-via-ise-2-2-radius/m-p/3004449#M23200</link>
      <description>&lt;P&gt;The local webauth check may have been an oversight. It was removed and still does not allow RW access.&lt;/P&gt;
&lt;P&gt;I noticed the service-type was 7 as well, but the service-type in the authorization profile is set for Administrative. Now I need to figure out why that is happening.&lt;/P&gt;
&lt;P&gt;I do and there are no errors with event authentication succeeded. I compared to a switch and the only difference is in the result. The switch shows the result Service-Type NAS Prompt, where the WLC shows no service-type in the Result.&lt;/P&gt;</description>
      <pubDate>Fri, 07 Apr 2017 16:06:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/wlc-management-access-via-ise-2-2-radius/m-p/3004449#M23200</guid>
      <dc:creator>bret</dc:creator>
      <dc:date>2017-04-07T16:06:31Z</dc:date>
    </item>
    <item>
      <title>Is the WLC taking the right</title>
      <link>https://community.cisco.com/t5/network-access-control/wlc-management-access-via-ise-2-2-radius/m-p/3004450#M23201</link>
      <description>&lt;P&gt;Is the WLC taking the right rule? or is it taking another one maybe?&lt;/P&gt;
&lt;P&gt;are you running ISE as policy-set? If Yes, you can have a test by creating a new policy set just for that specific WLC and recreate your authz rule to validate.&lt;/P&gt;
&lt;P&gt;You said you have another wlc, can you validate the other one that you have service-type 6 received ? Are they taking both the exact same rule?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;PS: Please don't forget to rate and mark as correct answer if this answered your question&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 07 Apr 2017 18:31:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/wlc-management-access-via-ise-2-2-radius/m-p/3004450#M23201</guid>
      <dc:creator>Francesco Molino</dc:creator>
      <dc:date>2017-04-07T18:31:22Z</dc:date>
    </item>
    <item>
      <title>Hi,</title>
      <link>https://community.cisco.com/t5/network-access-control/wlc-management-access-via-ise-2-2-radius/m-p/3004451#M23202</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;I have the same problem. I debugged the aaa session on the WLC and Service-Type 7 showed up in the authorization result however ISE policy is configured with&amp;nbsp;&lt;SPAN&gt;Service-Type Administrative.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;This must be an ISE issue, the authorization result is configured properly but the logs show Service-Type 7.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Update 1: &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;I found this bug.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvd61189/?reffering_site=dumpcr"&gt;CSCvd61189&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Update 2:&lt;/P&gt;
&lt;P&gt;I reverted to ISE 2.1, now the WLC debug log contains Service Type 6 however ISE log contains NAS-Prompt. So it's only a cosmetic issue on ISE 2.1.&lt;/P&gt;</description>
      <pubDate>Sun, 09 Apr 2017 18:25:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/wlc-management-access-via-ise-2-2-radius/m-p/3004451#M23202</guid>
      <dc:creator>zoltan.varga0217</dc:creator>
      <dc:date>2017-04-09T18:25:33Z</dc:date>
    </item>
    <item>
      <title>Hi </title>
      <link>https://community.cisco.com/t5/network-access-control/wlc-management-access-via-ise-2-2-radius/m-p/3004452#M23203</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I've upgraded my lab ISE to 2.2 and face the same bug.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;However, right now there is no correction.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Sorry for that.&lt;/P&gt;
&lt;P&gt;If you have a backup before upgrade, do a rollback..&lt;/P&gt;
&lt;P&gt;Thanks&amp;nbsp;&lt;/P&gt;
&lt;P&gt;PS: Please don't forget to rate and mark as correct answer if this answered your question&lt;/P&gt;</description>
      <pubDate>Sun, 09 Apr 2017 18:25:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/wlc-management-access-via-ise-2-2-radius/m-p/3004452#M23203</guid>
      <dc:creator>Francesco Molino</dc:creator>
      <dc:date>2017-04-09T18:25:34Z</dc:date>
    </item>
  </channel>
</rss>

