<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic The NPS should see RADIUS in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/802-1x-catalyst-4948e-network-policy-server-windows/m-p/3072466#M23461</link>
    <description>&lt;P&gt;The NPS should see RADIUS requests and send response accordingly. Can you run a "debug radius all" to see the RADIUS transaction taking place. Also, does the NPS server logs show you what Connection Request Policy and Network Policy is being used?&lt;/P&gt;</description>
    <pubDate>Fri, 17 Mar 2017 18:00:05 GMT</pubDate>
    <dc:creator>Rahul Govindan</dc:creator>
    <dc:date>2017-03-17T18:00:05Z</dc:date>
    <item>
      <title>802.1x catalyst 4948e network policy server windows authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/802-1x-catalyst-4948e-network-policy-server-windows/m-p/3072465#M23459</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;
&lt;P&gt;I have a WS-C4948E (Catalyst 4500 L3 Switch Software (cat4500e-ENTSERVICESK9-M), Version 15.1(1)SG2) that I have been unsuccessfully trying to configure to allow 802.1x authentication through radius provided by network policy server (tried NPS on both server 2008 and 2012R2)&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Relevant switch config parts:&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;aaa new-model&lt;BR /&gt;!&lt;BR /&gt;aaa group server radius aaa-grp-1x-radius&lt;BR /&gt; server name radius-backupserver&lt;BR /&gt;!&lt;BR /&gt;aaa authentication login aaa-local local&lt;BR /&gt;aaa authentication dot1x default group aaa-grp-1x-radius&lt;BR /&gt;aaa authorization network default group radius&lt;BR /&gt;# also tried aaa authorization network default group&amp;nbsp;aaa-grp-1x-radius&lt;BR /&gt;aaa accounting dot1x default start-stop group aaa-grp-1x-radius&lt;BR /&gt;!&lt;BR /&gt;aaa session-id common&lt;BR /&gt;authentication mac-move permit&lt;BR /&gt;!&lt;BR /&gt;dot1x system-auth-control&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/31&lt;BR /&gt; switchport mode access&lt;BR /&gt; mtu 9000&lt;BR /&gt; authentication port-control auto&lt;BR /&gt; dot1x pae authenticator&lt;BR /&gt;# also tried authentication control-direction in&lt;BR /&gt;&lt;BR /&gt;radius server radius-backupserver&lt;BR /&gt; address ipv4 192.168.1.1 auth-port 1645 acct-port 1646&lt;BR /&gt; key &amp;lt;radius key&amp;gt;&lt;/PRE&gt;
&lt;P&gt;I've tried every type of config on the NPS which is running with a self-signed cert. &amp;nbsp;The client side is windows 7 and I've got it configured to not check for a valid cert and for user authentication.&lt;/P&gt;
&lt;P&gt;Some more switch show commands and debug dot1x all output:&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;show dot1x int gi 1/31 details&lt;BR /&gt;Dot1x Info for GigabitEthernet1/31&lt;BR /&gt;-----------------------------------&lt;BR /&gt;PAE = AUTHENTICATOR&lt;BR /&gt;QuietPeriod = 60&lt;BR /&gt;ServerTimeout = 0&lt;BR /&gt;SuppTimeout = 30&lt;BR /&gt;ReAuthMax = 2&lt;BR /&gt;MaxReq = 2&lt;BR /&gt;TxPeriod = 30&lt;/PRE&gt;
&lt;PRE class="prettyprint"&gt;&amp;nbsp;#show authentication session interface gigabitEthernet 1/31&lt;BR /&gt; Interface: GigabitEthernet1/31&lt;BR /&gt; MAC Address: ab12.cd34.de56&lt;BR /&gt; IP Address: Unknown&lt;BR /&gt; User-Name: DOMAIN\user&lt;BR /&gt; Status: Running&lt;BR /&gt; Domain: UNKNOWN&lt;BR /&gt; Oper host mode: single-host&lt;BR /&gt; Oper control dir: both&lt;BR /&gt; Session timeout: N/A&lt;BR /&gt; Idle timeout: N/A&lt;BR /&gt; Common Session ID: 0A000079000263C623CE857D&lt;BR /&gt; Acct Session ID: 0x000263E0&lt;BR /&gt; Handle: 0x0800040C&lt;BR /&gt;Runnable methods list:&lt;BR /&gt; Method State&lt;BR /&gt; dot1x Running&lt;/PRE&gt;
&lt;PRE class="prettyprint"&gt;#show port-security interface gigabitEthernet 1/31&lt;BR /&gt;Port Security : Disabled&lt;BR /&gt;Port Status : Secure-down&lt;BR /&gt;Violation Mode : Shutdown&lt;BR /&gt;Aging Time : 0 mins&lt;BR /&gt;Aging Type : Absolute&lt;BR /&gt;SecureStatic Address Aging : Disabled&lt;BR /&gt;Maximum MAC Addresses : 1&lt;BR /&gt;Total MAC Addresses : 0&lt;BR /&gt;Configured MAC Addresses : 0&lt;BR /&gt;Sticky MAC Addresses : 0&lt;BR /&gt;Last Source Address:Vlan : 0000.0000.0000:0&lt;BR /&gt;Security Violation Count : 0&lt;/PRE&gt;
&lt;PRE class="prettyprint"&gt;#term mon&lt;BR /&gt;#debug dot1x all&lt;BR /&gt;Mar 17 15:22:19.623: dot1x-ev(Gi1/31): Interface state changed to UP&lt;BR /&gt;Mar 17 15:22:19.623: dot1x_auth Gi1/31: initial state auth_initialize has enter&lt;BR /&gt;Mar 17 15:22:19.623: dot1x-sm(Gi1/31): 0xAC0004D7:auth_initialize_enter called&lt;BR /&gt;Mar 17 15:22:19.623: dot1x_auth Gi1/31: during state auth_initialize, got event 0(cfg_auto)&lt;BR /&gt;Mar 17 15:22:19.623: @@@ dot1x_auth Gi1/31: auth_initialize -&amp;gt; auth_disconnected&lt;BR /&gt;Mar 17 15:22:19.623: dot1x-sm(Gi1/31): 0xAC0004D7:auth_disconnected_enter called&lt;BR /&gt;Mar 17 15:22:19.623: dot1x_auth Gi1/31: idle during state auth_disconnected&lt;BR /&gt;Mar 17 15:22:19.623: @@@ dot1x_auth Gi1/31: auth_disconnected -&amp;gt; auth_restart&lt;BR /&gt;Mar 17 15:22:19.623: dot1x-sm(Gi1/31): 0xAC0004D7:auth_restart_enter called&lt;BR /&gt;Mar 17 15:22:19.623: dot1x-ev(Gi1/31): Sending create new context event to EAP for 0xAC0004D7 (0000.0000.0000)&lt;BR /&gt;Mar 17 15:22:19.623: dot1x_auth_bend Gi1/31: initial state auth_bend_initialize has enter&lt;BR /&gt;Mar 17 15:22:19.623: dot1x-sm(Gi1/31): 0xAC0004D7:auth_bend_initialize_enter called&lt;BR /&gt;Mar 17 15:22:19.623: dot1x_auth_bend Gi1/31: initial state auth_bend_initialize has idle&lt;BR /&gt;Mar 17 15:22:19.627: dot1x_auth_bend Gi1/31: during state auth_bend_initialize, got event 16383(idle)&lt;BR /&gt;Mar 17 15:22:19.627: @@@ dot1x_auth_bend Gi1/31: auth_bend_initialize -&amp;gt; auth_bend_idle&lt;BR /&gt;Mar 17 15:22:19.627: dot1x-sm(Gi1/31): 0xAC0004D7:auth_bend_idle_enter called&lt;BR /&gt;Mar 17 15:22:19.627: dot1x-ev(Gi1/31): Created a client entry (0xAC0004D7)&lt;BR /&gt;Mar 17 15:22:19.627: dot1x-ev(Gi1/31): Dot1x authentication started for 0xAC0004D7 (0000.0000.0000)&lt;BR /&gt;Mar 17 15:22:19.627: dot1x-ev:DOT1X Supplicant not enabled on GigabitEthernet1/31&lt;BR /&gt;Mar 17 15:22:19.627: dot1x-sm(Gi1/31): Posting !EAP_RESTART on Client 0xAC0004D7&lt;BR /&gt;Mar 17 15:22:19.627: dot1x_auth Gi1/31: during state auth_restart, got event 6(no_eapRestart)&lt;BR /&gt;Mar 17 15:22:19.627: @@@ dot1x_auth Gi1/31: auth_restart -&amp;gt; auth_connecting&lt;BR /&gt;Mar 17 15:22:19.627: dot1x-sm(Gi1/31): 0xAC0004D7:auth_connecting_enter called&lt;BR /&gt;Mar 17 15:22:19.627: dot1x-sm(Gi1/31): 0xAC0004D7:auth_restart_connecting_action called&lt;BR /&gt;Mar 17 15:22:19.627: dot1x-sm(Gi1/31): Posting RX_REQ on Client 0xAC0004D7&lt;BR /&gt;Mar 17 15:22:19.627: dot1x_auth Gi1/31: during state auth_connecting, got event 10(eapReq_no_reAuthMax)&lt;BR /&gt;Mar 17 15:22:19.627: @@@ dot1x_auth Gi1/31: auth_connecting -&amp;gt; auth_authenticating&lt;BR /&gt;Mar 17 15:22:19.627: dot1x-sm(Gi1/31): 0xAC0004D7:auth_authenticating_enter called&lt;BR /&gt;Mar 17 15:22:19.627: dot1x-sm(Gi1/31): 0xAC0004D7:auth_connecting_authenticating_action called&lt;BR /&gt;Mar 17 15:22:19.627: dot1x-sm(Gi1/31): Posting AUTH_START for 0xAC0004D7&lt;BR /&gt;Mar 17 15:22:19.627: dot1x_auth_bend Gi1/31: during state auth_bend_idle, got event 4(eapReq_authStart)&lt;BR /&gt;Mar 17 15:22:19.627: @@@ dot1x_auth_bend Gi1/31: auth_bend_idle -&amp;gt; auth_bend_request&lt;BR /&gt;Mar 17 15:22:19.627: dot1x-sm(Gi1/31): 0xAC0004D7:auth_bend_request_enter called&lt;BR /&gt;Mar 17 15:22:19.627: dot1x-ev(Gi1/31): Sending EAPOL packet to group PAE address&lt;BR /&gt;Mar 17 15:22:19.627: dot1x-ev(Gi1/31): Role determination not required&lt;BR /&gt;Mar 17 15:22:19.627: dot1x-registry:registry:dot1x_ether_macaddr called&lt;BR /&gt;Mar 17 15:22:19.627: dot1x-ev(Gi1/31): Sending out EAPOL packet&lt;BR /&gt;Mar 17 15:22:19.627: EAPOL pak dump Tx&lt;BR /&gt;Mar 17 15:22:19.627: EAPOL Version: 0x3 type: 0x0 length: 0x0005&lt;BR /&gt;Mar 17 15:22:19.627: EAP code: 0x1 id: 0x1 length: 0x0005 type: 0x1&lt;BR /&gt;Mar 17 15:22:19.627: dot1x-packet(Gi1/31): EAPOL packet sent to client 0xAC0004D7 (0000.0000.0000)&lt;BR /&gt;Mar 17 15:22:19.627: dot1x-sm(Gi1/31): 0xAC0004D7:auth_bend_idle_request_action called&lt;BR /&gt;Mar 17 15:22:19.647: dot1x-ev(Gi1/31): Role determination not required&lt;BR /&gt;Mar 17 15:22:19.647: dot1x-packet(Gi1/31): queuing an EAPOL pkt on Auth Q&lt;BR /&gt;Mar 17 15:22:19.647: dot1x-ev:Enqueued the eapol packet to the global authenticator queue&lt;BR /&gt;Mar 17 15:22:19.647: dot1x-ev(Gi1/31): Role determination not required&lt;BR /&gt;Mar 17 15:22:19.647: dot1x-packet(Gi1/31): Queuing an EAPOL pkt on Authenticator Q&lt;BR /&gt;Mar 17 15:22:19.647: dot1x-ev:Enqueued the eapol packet to the global authenticator queue&lt;BR /&gt;Mar 17 15:22:19.647: EAPOL pak dump rx&lt;BR /&gt;Mar 17 15:22:19.647: EAPOL Version: 0x1 type: 0x1 length: 0x0000&lt;BR /&gt;Mar 17 15:22:19.647: dot1x-ev:&lt;BR /&gt;dot1x_auth_queue_event: Int Gi1/31 CODE= 0,TYPE= 0,LEN= 0&lt;BR /&gt;Mar 17 15:22:19.647: dot1x-packet(Gi1/31): Received an EAPOL frame&lt;BR /&gt;Mar 17 15:22:19.647: dot1x-ev(Gi1/31): Received pkt saddr =ab12.cd34.de56 , daddr = 0180.c200.0003, pae-ether-type = 888e.0101.0000&lt;BR /&gt;Mar 17 15:22:19.647: dot1x-ev(Gi1/31): Couldn't find the supplicant in the list&lt;BR /&gt;Mar 17 15:22:19.647: dot1x-ev(Gi1/31): New client detected, issuing Start Request to AuthMgr&lt;BR /&gt;Mar 17 15:22:19.647: EAPOL pak dump rx&lt;BR /&gt;Mar 17 15:22:19.647: EAPOL Version: 0x1 type: 0x0 length: 0x0017&lt;BR /&gt;Mar 17 15:22:19.647: dot1x-ev:&lt;BR /&gt;dot1x_auth_queue_event: Int Gi1/31 CODE= 2,TYPE= 1,LEN= 23&lt;BR /&gt;Mar 17 15:22:19.647: dot1x-packet(Gi1/31): Received an EAPOL frame&lt;BR /&gt;Mar 17 15:22:19.647: dot1x-ev(Gi1/31): Received pkt saddr =ab12.cd34.de56 , daddr = 0180.c200.0003, pae-ether-type = 888e.0100.0017&lt;BR /&gt;Mar 17 15:22:19.647: dot1x-ev(Gi1/31): Couldn't find the supplicant in the list&lt;BR /&gt;Mar 17 15:22:19.647: dot1x-ev(Gi1/31): New client detected, issuing Start Request to AuthMgr&lt;BR /&gt;Mar 17 15:22:19.647: dot1x-ev(Gi1/31): New client notification from AuthMgr for 0xAC0004D7 - ab12.cd34.de56&lt;BR /&gt;Mar 17 15:22:19.647: %AUTHMGR-5-START: Starting 'dot1x' for client (ab12.cd34.de56) on Interface Gi1/31 AuditSessionID 0A000079000263CD23D520E5&lt;BR /&gt;Mar 17 15:22:19.647: dot1x-sm(Gi1/31): Posting RESTART on Client 0xAC0004D7&lt;BR /&gt;Mar 17 15:22:19.647: dot1x_auth Gi1/31: during state auth_authenticating, got event 13(restart)&lt;BR /&gt;Mar 17 15:22:19.647: @@@ dot1x_auth Gi1/31: auth_authenticating -&amp;gt; auth_aborting&lt;BR /&gt;Mar 17 15:22:19.647: dot1x-sm(Gi1/31): 0xAC0004D7:auth_authenticating_exit called&lt;BR /&gt;Mar 17 15:22:19.647: dot1x-sm(Gi1/31): 0xAC0004D7:auth_aborting_enter called&lt;BR /&gt;Mar 17 15:22:19.647: dot1x-sm(Gi1/31): 0xAC0004D7:auth_authenticating_aborting_action called&lt;BR /&gt;Mar 17 15:22:19.647: dot1x-sm(Gi1/31): Posting AUTH_ABORT for 0xAC0004D7&lt;BR /&gt;Mar 17 15:22:19.647: dot1x_auth_bend Gi1/31: during state auth_bend_request, got event 1(authAbort)&lt;BR /&gt;Mar 17 15:22:19.647: @@@ dot1x_auth_bend Gi1/31: auth_bend_request -&amp;gt; auth_bend_initialize&lt;BR /&gt;Mar 17 15:22:19.647: dot1x-sm(Gi1/31): 0xAC0004D7:auth_bend_initialize_enter called&lt;BR /&gt;Mar 17 15:22:19.647: dot1x_auth_bend Gi1/31: idle during state auth_bend_initialize&lt;BR /&gt;Mar 17 15:22:19.647: @@@ dot1x_auth_bend Gi1/31: auth_bend_initialize -&amp;gt; auth_bend_idle&lt;BR /&gt;Mar 17 15:22:19.647: dot1x-sm(Gi1/31): 0xAC0004D7:auth_bend_idle_enter called&lt;BR /&gt;Mar 17 15:22:19.647: dot1x-sm(Gi1/31): Posting !AUTH_ABORT on Client 0xAC0004D7&lt;BR /&gt;Mar 17 15:22:19.647: dot1x_auth Gi1/31: during state auth_aborting, got event 20(no_eapolLogoff_no_authAbort)&lt;BR /&gt;Mar 17 15:22:19.647: @@@ dot1x_auth Gi1/31: auth_aborting -&amp;gt; auth_restart&lt;BR /&gt;Mar 17 15:22:19.647: dot1x-sm(Gi1/31): 0xAC0004D7:auth_aborting_exit called&lt;BR /&gt;Mar 17 15:22:19.647: dot1x-sm(Gi1/31): 0xAC0004D7:auth_restart_enter called&lt;BR /&gt;Mar 17 15:22:19.647: dot1x-ev(Gi1/31): Resetting the client 0xAC0004D7 (ab12.cd34.de56)&lt;BR /&gt;Mar 17 15:22:19.647: dot1x-ev(Gi1/31): Sending create new context event to EAP for 0xAC0004D7 (ab12.cd34.de56)&lt;BR /&gt;Mar 17 15:22:19.647: dot1x-sm(Gi1/31): 0xAC0004D7:auth_aborting_restart_action called&lt;BR /&gt;Mar 17 15:22:19.647: dot1x-sm(Gi1/31): Posting !EAP_RESTART on Client 0xAC0004D7&lt;BR /&gt;Mar 17 15:22:19.647: dot1x_auth Gi1/31: during state auth_restart, got event 6(no_eapRestart)&lt;BR /&gt;Mar 17 15:22:19.647: @@@ dot1x_auth Gi1/31: auth_restart -&amp;gt; auth_connecting&lt;BR /&gt;Mar 17 15:22:19.647: dot1x-sm(Gi1/31): 0xAC0004D7:auth_connecting_enter called&lt;BR /&gt;Mar 17 15:22:19.647: dot1x-sm(Gi1/31): 0xAC0004D7:auth_restart_connecting_action called&lt;BR /&gt;Mar 17 15:22:19.647: dot1x-sm(Gi1/31): Posting RX_REQ on Client 0xAC0004D7&lt;BR /&gt;Mar 17 15:22:19.647: dot1x_auth Gi1/31: during state auth_connecting, got event 10(eapReq_no_reAuthMax)&lt;BR /&gt;Mar 17 15:22:19.647: @@@ dot1x_auth Gi1/31: auth_connecting -&amp;gt; auth_authenticating&lt;BR /&gt;Mar 17 15:22:19.647: dot1x-sm(Gi1/31): 0xAC0004D7:auth_authenticating_enter called&lt;BR /&gt;Mar 17 15:22:19.647: dot1x-sm(Gi1/31): 0xAC0004D7:auth_connecting_authenticating_action called&lt;BR /&gt;Mar 17 15:22:19.651: dot1x-sm(Gi1/31): Posting AUTH_START for 0xAC0004D7&lt;BR /&gt;Mar 17 15:22:19.651: dot1x_auth_bend Gi1/31: during state auth_bend_idle, got event 4(eapReq_authStart)&lt;BR /&gt;Mar 17 15:22:19.651: @@@ dot1x_auth_bend Gi1/31: auth_bend_idle -&amp;gt; auth_bend_request&lt;BR /&gt;Mar 17 15:22:19.651: dot1x-sm(Gi1/31): 0xAC0004D7:auth_bend_request_enter called&lt;BR /&gt;Mar 17 15:22:19.651: dot1x-ev(Gi1/31): Sending EAPOL packet to group PAE address&lt;BR /&gt;Mar 17 15:22:19.651: dot1x-ev(Gi1/31): Role determination not required&lt;BR /&gt;Mar 17 15:22:19.651: dot1x-registry:registry:dot1x_ether_macaddr called&lt;BR /&gt;Mar 17 15:22:19.651: dot1x-ev(Gi1/31): Sending out EAPOL packet&lt;BR /&gt;Mar 17 15:22:19.651: EAPOL pak dump Tx&lt;BR /&gt;Mar 17 15:22:19.651: EAPOL Version: 0x3 type: 0x0 length: 0x0005&lt;BR /&gt;Mar 17 15:22:19.651: EAP code: 0x1 id: 0x1 length: 0x0005 type: 0x1&lt;BR /&gt;Mar 17 15:22:19.651: dot1x-packet(Gi1/31): EAPOL packet sent to client 0xAC0004D7 (ab12.cd34.de56)&lt;BR /&gt;Mar 17 15:22:19.651: dot1x-sm(Gi1/31): 0xAC0004D7:auth_bend_idle_request_action called&lt;BR /&gt;Mar 17 15:22:19.667: dot1x-ev(Gi1/31): Role determination not required&lt;BR /&gt;Mar 17 15:22:19.667: dot1x-packet(Gi1/31): Queuing an EAPOL pkt on Authenticator Q&lt;BR /&gt;Mar 17 15:22:19.667: dot1x-ev:Enqueued the eapol packet to the global authenticator queue&lt;BR /&gt;Mar 17 15:22:19.667: EAPOL pak dump rx&lt;BR /&gt;Mar 17 15:22:19.667: EAPOL Version: 0x1 type: 0x0 length: 0x0017&lt;BR /&gt;Mar 17 15:22:19.667: dot1x-ev:&lt;BR /&gt;dot1x_auth_queue_event: Int Gi1/31 CODE= 2,TYPE= 1,LEN= 23&lt;BR /&gt;Mar 17 15:22:19.667: dot1x-packet(Gi1/31): Received an EAPOL frame&lt;BR /&gt;Mar 17 15:22:19.667: dot1x-ev(Gi1/31): Received pkt saddr =ab12.cd34.de56 , daddr = 0180.c200.0003, pae-ether-type = 888e.0100.0017&lt;BR /&gt;Mar 17 15:22:19.667: dot1x-packet(Gi1/31): Received an EAP packet&lt;BR /&gt;Mar 17 15:22:19.667: EAPOL pak dump rx&lt;BR /&gt;Mar 17 15:22:19.667: EAPOL Version: 0x1 type: 0x0 length: 0x0017&lt;BR /&gt;Mar 17 15:22:19.667: dot1x-packet(Gi1/31): Received an EAP packet from ab12.cd34.de56&lt;BR /&gt;Mar 17 15:22:19.667: dot1x-sm(Gi1/31): Posting EAPOL_EAP for 0xAC0004D7&lt;BR /&gt;Mar 17 15:22:19.667: dot1x_auth_bend Gi1/31: during state auth_bend_request, got event 6(eapolEap)&lt;BR /&gt;Mar 17 15:22:19.667: @@@ dot1x_auth_bend Gi1/31: auth_bend_request -&amp;gt; auth_bend_response&lt;BR /&gt;Mar 17 15:22:19.667: dot1x-sm(Gi1/31): 0xAC0004D7:auth_bend_response_enter called&lt;BR /&gt;Mar 17 15:22:19.667: dot1x-ev(Gi1/31): dot1x_sendRespToServer: Response sent to the server from 0xAC0004D7 (ab12.cd34.de56)&lt;BR /&gt;Mar 17 15:22:19.667: dot1x-sm(Gi1/31): 0xAC0004D7:auth_bend_request_response_action called&lt;BR /&gt;Mar 17 15:22:19.687: dot1x-sm(Gi1/31): Posting EAP_REQ for 0xAC0004D7&lt;BR /&gt;Mar 17 15:22:19.687: dot1x_auth_bend Gi1/31: during state auth_bend_response, got event 7(eapReq)&lt;BR /&gt;Mar 17 15:22:19.687: @@@ dot1x_auth_bend Gi1/31: auth_bend_response -&amp;gt; auth_bend_request&lt;BR /&gt;Mar 17 15:22:19.687: dot1x-sm(Gi1/31): 0xAC0004D7:auth_bend_response_exit called&lt;BR /&gt;Mar 17 15:22:19.687: dot1x-sm(Gi1/31): 0xAC0004D7:auth_bend_request_enter called&lt;BR /&gt;Mar 17 15:22:19.687: dot1x-ev(Gi1/31): Sending EAPOL packet to group PAE address&lt;BR /&gt;Mar 17 15:22:19.687: dot1x-ev(Gi1/31): Role determination not required&lt;BR /&gt;Mar 17 15:22:19.687: dot1x-registry:registry:dot1x_ether_macaddr called&lt;BR /&gt;Mar 17 15:22:19.687: dot1x-ev(Gi1/31): Sending out EAPOL packet&lt;BR /&gt;Mar 17 15:22:19.687: EAPOL pak dump Tx&lt;BR /&gt;Mar 17 15:22:19.687: EAPOL Version: 0x3 type: 0x0 length: 0x0022&lt;BR /&gt;Mar 17 15:22:19.687: EAP code: 0x1 id: 0x2 length: 0x0022 type: 0x1A&lt;BR /&gt;Mar 17 15:22:19.687: dot1x-packet(Gi1/31): EAPOL packet sent to client 0xAC0004D7 (ab12.cd34.de56)&lt;BR /&gt;Mar 17 15:22:19.687: dot1x-sm(Gi1/31): 0xAC0004D7:auth_bend_response_request_action called&lt;BR /&gt;Mar 17 15:22:19.687: dot1x-ev(Gi1/31): Role determination not required&lt;BR /&gt;Mar 17 15:22:19.687: dot1x-packet(Gi1/31): Queuing an EAPOL pkt on Authenticator Q&lt;BR /&gt;Mar 17 15:22:19.687: dot1x-ev:Enqueued the eapol packet to the global authenticator queue&lt;BR /&gt;Mar 17 15:22:19.687: EAPOL pak dump rx&lt;BR /&gt;Mar 17 15:22:19.687: EAPOL Version: 0x1 type: 0x0 length: 0x0006&lt;BR /&gt;Mar 17 15:22:19.687: dot1x-ev:&lt;BR /&gt;dot1x_auth_queue_event: Int Gi1/31 CODE= 2,TYPE= 3,LEN= 6&lt;BR /&gt;Mar 17 15:22:19.687: dot1x-packet(Gi1/31): Received an EAPOL frame&lt;BR /&gt;Mar 17 15:22:19.687: dot1x-ev(Gi1/31): Received pkt saddr =ab12.cd34.de56 , daddr = 0180.c200.0003, pae-ether-type = 888e.0100.0006&lt;BR /&gt;Mar 17 15:22:19.687: dot1x-packet(Gi1/31): Received an EAP packet&lt;BR /&gt;Mar 17 15:22:19.687: EAPOL pak dump rx&lt;BR /&gt;Mar 17 15:22:19.687: EAPOL Version: 0x1 type: 0x0 length: 0x0006&lt;BR /&gt;Mar 17 15:22:19.687: dot1x-packet(Gi1/31): Received an EAP packet from ab12.cd34.de56&lt;BR /&gt;Mar 17 15:22:19.687: dot1x-sm(Gi1/31): Posting EAPOL_EAP for 0xAC0004D7&lt;BR /&gt;Mar 17 15:22:19.687: dot1x_auth_bend Gi1/31: during state auth_bend_request, got event 6(eapolEap)&lt;BR /&gt;Mar 17 15:22:19.687: @@@ dot1x_auth_bend Gi1/31: auth_bend_request -&amp;gt; auth_bend_response&lt;BR /&gt;Mar 17 15:22:19.687: dot1x-sm(Gi1/31): 0xAC0004D7:auth_bend_response_enter called&lt;BR /&gt;Mar 17 15:22:19.687: dot1x-ev(Gi1/31): dot1x_sendRespToServer: Response sent to the server from 0xAC0004D7 (ab12.cd34.de56)&lt;BR /&gt;Mar 17 15:22:19.687: dot1x-sm(Gi1/31): 0xAC0004D7:auth_bend_request_response_action called&lt;/PRE&gt;
&lt;P&gt;The client tries and then eventually finishes with authentication failed. &amp;nbsp;Also tried configuring NPS to just require the NAS IP address but no progress. &amp;nbsp;&lt;/P&gt;
&lt;P&gt;I'd appreciate any suggestions as I seem to be making no progress. &amp;nbsp;I've tried switching it off and back on again &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 07:33:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/802-1x-catalyst-4948e-network-policy-server-windows/m-p/3072465#M23459</guid>
      <dc:creator>Cameron Webster</dc:creator>
      <dc:date>2019-03-11T07:33:21Z</dc:date>
    </item>
    <item>
      <title>The NPS should see RADIUS</title>
      <link>https://community.cisco.com/t5/network-access-control/802-1x-catalyst-4948e-network-policy-server-windows/m-p/3072466#M23461</link>
      <description>&lt;P&gt;The NPS should see RADIUS requests and send response accordingly. Can you run a "debug radius all" to see the RADIUS transaction taking place. Also, does the NPS server logs show you what Connection Request Policy and Network Policy is being used?&lt;/P&gt;</description>
      <pubDate>Fri, 17 Mar 2017 18:00:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/802-1x-catalyst-4948e-network-policy-server-windows/m-p/3072466#M23461</guid>
      <dc:creator>Rahul Govindan</dc:creator>
      <dc:date>2017-03-17T18:00:05Z</dc:date>
    </item>
    <item>
      <title>The radius server was sending</title>
      <link>https://community.cisco.com/t5/network-access-control/802-1x-catalyst-4948e-network-policy-server-windows/m-p/3072467#M23462</link>
      <description>&lt;P&gt;The radius server was sending Access-Reject found running debug radius. &amp;nbsp;That seems to be a bit of a red herring as I've just enabled unencrypted authentication (PAP,SPAP) in the radius server network policy and the switch 'test aaa group...' command now works. &amp;nbsp;Is there any way to enable encrypted authentication between the switch and NPS for 802.1x requests?&lt;/P&gt;
&lt;P&gt;(Thanks for the reply)&lt;/P&gt;</description>
      <pubDate>Thu, 23 Mar 2017 10:41:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/802-1x-catalyst-4948e-network-policy-server-windows/m-p/3072467#M23462</guid>
      <dc:creator>Cameron Webster</dc:creator>
      <dc:date>2017-03-23T10:41:10Z</dc:date>
    </item>
  </channel>
</rss>

