<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ACS 5.3 Configuring 802.1x in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/acs-5-3-configuring-802-1x/m-p/1807068#M246466</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Carlos,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I´m recreating a lab for a customer that all machines are W7, so CSSC is not useful.&amp;nbsp; So all this, it's because ACS v5.3??&amp;nbsp; Last year I recreate a lab using ACS v4.2 and had no problem with XP and W7, do I have to move to that version??&amp;nbsp; I read some comments that ACS 5.1 it's better than 5.3, what do you recommend??&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It will be helpful if you add screenshots for CSSC.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Juan Carlos&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 20 Jan 2012 01:54:52 GMT</pubDate>
    <dc:creator>Juan Carlos Arias Perez</dc:creator>
    <dc:date>2012-01-20T01:54:52Z</dc:date>
    <item>
      <title>ACS 5.3 Configuring 802.1x</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-3-configuring-802-1x/m-p/1807054#M246452</link>
      <description>&lt;P&gt;Trying to configure 802.1x with ACS 5.3, have some general doubts about how to make it, this is what I got for the moment:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ACS 5.3 = 192.168.240.28&lt;/P&gt;&lt;P&gt;AD = 192.168.251.97&lt;/P&gt;&lt;P&gt;Switch = 192.168.240.171&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;IOS device config&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Already configured and running Device Administration using Tacacs, mising with Radius aaa commands:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa group server tacacs+ TACACS_PLUS&lt;/P&gt;&lt;P&gt; server 192.168.240.28&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;aaa group server radius RADIUS_1x&lt;/P&gt;&lt;P&gt; server 192.168.240.28 auth-port 1812 acct-port 1813&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;aaa authentication login default group TACACS_PLUS&lt;/P&gt;&lt;P&gt;aaa authentication login no_tacacs enable local&lt;/P&gt;&lt;P&gt;aaa authentication enable default group RADIUS_1x&lt;/P&gt;&lt;P&gt;aaa authentication dot1x default group RADIUS_1x&lt;/P&gt;&lt;P&gt;aaa authorization config-commands&lt;/P&gt;&lt;P&gt;aaa authorization exec no_tacacs local &lt;/P&gt;&lt;P&gt;aaa authorization commands 15 TACACS_PLUS group tacacs+ &lt;/P&gt;&lt;P&gt;aaa authorization network default group RADIUS_1x &lt;/P&gt;&lt;P&gt;aaa authorization auth-proxy default group RADIUS_1x &lt;/P&gt;&lt;P&gt;aaa accounting send stop-record authentication failure &lt;/P&gt;&lt;P&gt;aaa accounting update newinfo&lt;/P&gt;&lt;P&gt;aaa accounting dot1x default start-stop group RADIUS_1x&lt;/P&gt;&lt;P&gt;aaa accounting exec default start-stop group TACACS_PLUS&lt;/P&gt;&lt;P&gt;aaa accounting network default start-stop group TACACS_PLUS&lt;/P&gt;&lt;P&gt;aaa accounting connection default start-stop group TACACS_PLUS&lt;/P&gt;&lt;P&gt;aaa accounting system default start-stop group RADIUS_1x&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;tacacs-server host 192.168.240.28 port 49 key 7 104D0617040717180F05&lt;/P&gt;&lt;P&gt;tacacs-server directed-request&lt;/P&gt;&lt;P&gt;radius-server attribute 8 include-in-access-req&lt;/P&gt;&lt;P&gt;radius-server host 192.168.240.28 auth-port 1812 acct-port 1813&lt;/P&gt;&lt;P&gt;radius-server timeout 20&lt;/P&gt;&lt;P&gt;radius-server key 7 094F410718151201080D&lt;/P&gt;&lt;P&gt;radius-server vsa send authentication&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;dot1x system-auth-control&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;errdisable detect cause security-violation shutdown vlan&lt;/P&gt;&lt;P&gt;errdisable recovery cause security-violation&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/24&lt;/P&gt;&lt;P&gt; switchport mode access&lt;/P&gt;&lt;P&gt; switchport voice vlan 7&lt;/P&gt;&lt;P&gt; dot1x pae authenticator&lt;/P&gt;&lt;P&gt; dot1x port-control auto&lt;/P&gt;&lt;P&gt; dot1x host-mode multi-host&lt;/P&gt;&lt;P&gt; dot1x timeout quiet-period 15&lt;/P&gt;&lt;P&gt; spanning-tree portfast&lt;/P&gt;&lt;P&gt; spanning-tree bpduguard enable&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;ACS 5.3 Configuration until now&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG src="https://community.cisco.com/legacyfs/online/legacy/9/4/1/73149-2.jpg" alt="2.jpg" class="jive-image-thumbnail jive-image" width="450" /&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG src="https://community.cisco.com/legacyfs/online/legacy/0/5/1/73150-2.jpg" alt="2.jpg" class="jive-image-thumbnail jive-image" width="450" /&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG src="https://community.cisco.com/legacyfs/online/legacy/1/5/1/73151-3.jpg" alt="3.jpg" class="jive-image-thumbnail jive-image" width="450" /&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG src="https://community.cisco.com/legacyfs/online/legacy/2/5/1/73152-4.jpg" alt="4.jpg" class="jive-image-thumbnail jive-image" width="450" /&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG src="https://community.cisco.com/legacyfs/online/legacy/3/5/1/73153-5.jpg" alt="5.jpg" class="jive-image-thumbnail jive-image" width="450" /&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG src="https://community.cisco.com/legacyfs/online/legacy/4/5/1/73154-6.jpg" alt="6.jpg" class="jive-image-thumbnail jive-image" width="450" /&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG src="https://community.cisco.com/legacyfs/online/legacy/5/5/1/73155-7.jpg" alt="7.jpg" class="jive-image-thumbnail jive-image" width="450" /&gt;&lt;/P&gt;&lt;P&gt;I have a document on how to configure this on ACS 4.2, but I have some problems trying to configure on ACS 5.3.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'll appreciate a lot any ideas that could help me on this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Juan Carlos&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 01:44:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-3-configuring-802-1x/m-p/1807054#M246452</guid>
      <dc:creator>Juan Carlos Arias Perez</dc:creator>
      <dc:date>2019-03-11T01:44:07Z</dc:date>
    </item>
    <item>
      <title>ACS 5.3 Configuring 802.1x</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-3-configuring-802-1x/m-p/1807055#M246453</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I try to test the conection to radius server, but I have a problem since here, this is the error message:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;SW-LAB#test aaa group RADIUS_1x juancarlos.arias 12345 legacy&lt;/P&gt;&lt;P&gt;Attempting authentication test to server-group RADIUS_1x using radius&lt;/P&gt;&lt;P&gt;No authoritative response from any server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I appreciate any ideas that could help.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Juan Carlos Arias&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 19 Jan 2012 01:10:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-3-configuring-802-1x/m-p/1807055#M246453</guid>
      <dc:creator>Juan Carlos Arias Perez</dc:creator>
      <dc:date>2012-01-19T01:10:38Z</dc:date>
    </item>
    <item>
      <title>ACS 5.3 Configuring 802.1x</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-3-configuring-802-1x/m-p/1807056#M246454</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Juan Carlos,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is the ACS reporting any Failure under the reports for RADIUS Authentications?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also, can you verify the Access Services Rules in order to confirm that the request is hitting the appropriate rule to get to "Network Access" Service rule?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If there are no hitcounts increasing for Authorization, Identity or even the Access Service Selection Rule then the ACS might be dropping the request before processing it. Have you already defined the IOS switch as a RADIUS AAA Client with the appropriate shared secret?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Enable "debug aaa authentication" and "debug radius" and perform the test command again. If you see timeouts we will have to collect a capture on the ACS switchport (SPAN Session) in order to verify that the traffic is getting to the ACS.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Feel free to share the debugs outputs with us.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 19 Jan 2012 17:33:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-3-configuring-802-1x/m-p/1807056#M246454</guid>
      <dc:creator>camejia</dc:creator>
      <dc:date>2012-01-19T17:33:49Z</dc:date>
    </item>
    <item>
      <title>ACS 5.3 Configuring 802.1x</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-3-configuring-802-1x/m-p/1807057#M246455</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Carlos,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On ACS reporting I got this message errors:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;TABLE id="S2"&gt;&lt;TBODY&gt;&lt;TR align="left" style="font-weight: normal; color: #ff0000; padding: 1pt 2pt; border-top: thin none #8499a2; border-right: thin solid #8499a2; border-bottom: thin none #8499a2; border-left: thin solid #8499a2;" valign="middle"&gt;&lt;TD style="padding: 2pt 4pt;" valign="middle"&gt;&lt;P style="margin-top: 0pt;"&gt;24616&amp;nbsp; RADIUS token identity store received timeout error&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR align="left" style="font-weight: normal; color: #ff0000; padding: 1pt 2pt; border-top: thin none #8499a2; border-right: thin solid #8499a2; border-bottom: thin none #8499a2; border-left: thin solid #8499a2;" valign="middle"&gt;&lt;TD style="padding: 2pt 4pt;" valign="middle"&gt;&lt;P style="margin-top: 0pt;"&gt;22059&amp;nbsp; The advanced option that is configured for process failure is used.&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR align="left" style="font-weight: normal; color: #ff0000; padding: 1pt 2pt; border-top: thin none #8499a2; border-right: thin solid #8499a2; border-bottom: thin none #8499a2; border-left: thin solid #8499a2;" valign="middle"&gt;&lt;TD style="padding: 2pt 4pt;" valign="middle"&gt;&lt;P style="margin-top: 0pt;"&gt;22062&amp;nbsp; The 'Drop' advanced option is configured in case of a failed authentication request.&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On Access Services Rules, the request is hitting the correct rule, look at screenshot (Rule-2):&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG src="http://supportforums.cisco.com/sites/default/files/legacy/9/3/2/73239-1.jpg" class="jive-image" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But, I got no hit counts on Authorization policy, I retype again the shared secret to be sure, but always timeout.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;000143: Jan 19 16:39:23.421 GDL: RADIUS(00000000): Started 20 sec timeout&lt;/P&gt;&lt;P&gt;000144: Jan 19 16:39:40.836 GDL: RADIUS(00000000): Request timed out &lt;/P&gt;&lt;P&gt;000145: Jan 19 16:39:40.836 GDL: %RADIUS-4-RADIUS_DEAD: RADIUS server 192.168.240.28:1812,1813 is not responding.&lt;/P&gt;&lt;P&gt;000146: Jan 19 16:39:40.836 GDL: %RADIUS-4-RADIUS_ALIVE: RADIUS server 192.168.240.28:1812,1813 is being marked alive.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Maybe this policy is missing something:&lt;/P&gt;&lt;P&gt;&lt;IMG src="http://supportforums.cisco.com/sites/default/files/legacy/0/4/2/73240-2.jpg" class="jive-image" /&gt;&lt;/P&gt;&lt;P&gt;Identity policy has hits matches:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG src="http://supportforums.cisco.com/sites/default/files/legacy/7/4/2/73247-3.jpg" class="jive-image" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This are the results when enabling debugs:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;000150: Jan 19 16:45:23.237 GDL: AAA: parse name=&lt;NO string=""&gt; idb type=-1 tty=-1&lt;/NO&gt;&lt;/P&gt;&lt;P&gt;000151: Jan 19 16:45:23.237 GDL: AAA/MEMORY: create_user (0x376C7D8) user='juancarlos.arias' ruser='NULL' ds0=0 port='' rem_addr='NULL' authen_type=ASCII service=LOGIN priv=1 initial_task_id='0', vrf= (id=0)&lt;/P&gt;&lt;P&gt;000152: Jan 19 16:45:23.237 GDL: RADIUS: Pick NAS IP for u=0x376C7D8 tableid=0 cfg_addr=0.0.0.0&lt;/P&gt;&lt;P&gt;000153: Jan 19 16:45:23.237 GDL: RADIUS(00000000): Config NAS IPv6: ::&lt;/P&gt;&lt;P&gt;000154: Jan 19 16:45:23.237 GDL: RADIUS: ustruct sharecount=1&lt;/P&gt;&lt;P&gt;000155: Jan 19 16:45:23.237 GDL: Radius: radius_port_info() success=0 radius_nas_port=1&lt;/P&gt;&lt;P&gt;000156: Jan 19 16:45:23.237 GDL: RADIUS/ENCODE: Best Local IP-Address 192.168.240.171 for Radius-Server 192.168.240.28&lt;/P&gt;&lt;P&gt;000157: Jan 19 16:45:23.237 GDL: RADIUS(00000000): Send Access-Request to 192.168.240.28:1812 id 1645/6, len 68&lt;/P&gt;&lt;P&gt;000158: Jan 19 16:45:23.237 GDL: RADIUS:&amp;nbsp; authenticator 30 E1 BC 4D 61 E0 72 C0 - 02 A1 E8 3E 88 91 DA D9&lt;/P&gt;&lt;P&gt;000159: Jan 19 16:45:23.237 GDL: RADIUS:&amp;nbsp; NAS-IP-Address&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; [4]&amp;nbsp;&amp;nbsp; 6&amp;nbsp;&amp;nbsp; 192.168.240.171&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;000160: Jan 19 16:45:23.237 GDL: RADIUS:&amp;nbsp; NAS-Port-Type&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; [61]&amp;nbsp; 6&amp;nbsp;&amp;nbsp; Async&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; [0]&lt;/P&gt;&lt;P&gt;000161: Jan 19 16:45:23.237 GDL: RADIUS:&amp;nbsp; User-Name&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; [1]&amp;nbsp;&amp;nbsp; 18&amp;nbsp; "juancarlos.arias"&lt;/P&gt;&lt;P&gt;000162: Jan 19 16:45:23.237 GDL: RADIUS:&amp;nbsp; User-Password&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; [2]&amp;nbsp;&amp;nbsp; 18&amp;nbsp; *&lt;/P&gt;&lt;P&gt;000163: Jan 19 16:45:23.237 GDL: RADIUS(00000000): Sending a IPv4 Radius Packet&lt;/P&gt;&lt;P&gt;000164: Jan 19 16:45:23.237 GDL: RADIUS(00000000): Started 20 sec timeout&lt;/P&gt;&lt;P&gt;000165: Jan 19 16:45:40.350 GDL: RADIUS(00000000): Request timed out &lt;/P&gt;&lt;P&gt;000166: Jan 19 16:45:40.350 GDL: RADIUS: Retransmit to (192.168.240.28:1812,1813) for id 1645/6&lt;/P&gt;&lt;P&gt;000167: Jan 19 16:45:40.350 GDL: RADIUS(00000000): Started 20 sec timeout&lt;/P&gt;&lt;P&gt;000168: Jan 19 16:45:59.392 GDL: RADIUS(00000000): Request timed out &lt;/P&gt;&lt;P&gt;000169: Jan 19 16:45:59.392 GDL: RADIUS: Retransmit to (192.168.240.28:1812,1813) for id 1645/6&lt;/P&gt;&lt;P&gt;000170: Jan 19 16:45:59.392 GDL: RADIUS(00000000): Started 20 sec timeout&lt;/P&gt;&lt;P&gt;000171: Jan 19 16:46:17.235 GDL: RADIUS(00000000): Request timed out &lt;/P&gt;&lt;P&gt;000172: Jan 19 16:46:17.235 GDL: RADIUS: Retransmit to (192.168.240.28:1812,1813) for id 1645/6&lt;/P&gt;&lt;P&gt;000173: Jan 19 16:46:17.235 GDL: RADIUS(00000000): Started 20 sec timeout&lt;/P&gt;&lt;P&gt;000174: Jan 19 16:46:37.133 GDL: RADIUS(00000000): Request timed out &lt;/P&gt;&lt;P&gt;000175: Jan 19 16:46:37.133 GDL: RADIUS: No response from (192.168.240.28:1812,1813) for id 1645/6&lt;/P&gt;&lt;P&gt;000176: Jan 19 16:46:37.133 GDL: RADIUS: No response from server&lt;/P&gt;&lt;P&gt;000177: Jan 19 16:46:37.133 GDL: AAA/MEMORY: free_user (0x376C7D8) user='juancarlos.arias' ruser='NULL' port='' rem_addr='NULL' authen_type=ASCII service=LOGIN priv=1 vrf= (id=0)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Just as you said, there timeouts, I´ll proceed to collect packets on ACS port, please hold on some minutes.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks again for your time.&lt;/P&gt;&lt;P&gt;Juan Carlos&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 19 Jan 2012 22:57:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-3-configuring-802-1x/m-p/1807057#M246455</guid>
      <dc:creator>Juan Carlos Arias Perez</dc:creator>
      <dc:date>2012-01-19T22:57:56Z</dc:date>
    </item>
    <item>
      <title>Re: ACS 5.3 Configuring 802.1x</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-3-configuring-802-1x/m-p/1807058#M246456</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Juan Carlos,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;How is the Identity Store MNCH-Radius configured? Are you trying to authenticate against an OTP database like RSA?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The packet capture can wait until checking the Identity Store Sequence configuration.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 19 Jan 2012 23:11:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-3-configuring-802-1x/m-p/1807058#M246456</guid>
      <dc:creator>camejia</dc:creator>
      <dc:date>2012-01-19T23:11:06Z</dc:date>
    </item>
    <item>
      <title>ACS 5.3 Configuring 802.1x</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-3-configuring-802-1x/m-p/1807059#M246457</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Carlos,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is my Radius Identity Server configuration, don't know if this is the correct way to do it, maybe something there is missing, I want to authenticate with AD.&amp;nbsp; IP Address of IOS device (NAS) = 192.168.240.171&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG src="http://supportforums.cisco.com/sites/default/files/legacy/8/4/2/73248-10.jpg" class="jive-image" /&gt;&lt;IMG src="http://supportforums.cisco.com/sites/default/files/legacy/9/4/2/73249-11.jpg" class="jive-image" /&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 19 Jan 2012 23:18:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-3-configuring-802-1x/m-p/1807059#M246457</guid>
      <dc:creator>Juan Carlos Arias Perez</dc:creator>
      <dc:date>2012-01-19T23:18:58Z</dc:date>
    </item>
    <item>
      <title>Re: ACS 5.3 Configuring 802.1x</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-3-configuring-802-1x/m-p/1807060#M246458</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Juan Carlos,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So, 192.168.240.171 is a Domain Controller of your Active Directory domain? Or is it a RADIUS microsoft Server like MS IAS or MS NPS?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If it is a Domain Controller for your AD domain then we should try to bind the ACS to the AD domain instead of configuring as an external RADIUS Server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am attaching a configuration example on how to bind the ACS to the AD Domain and which are the requirements.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please confirm the above statements.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 19 Jan 2012 23:23:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-3-configuring-802-1x/m-p/1807060#M246458</guid>
      <dc:creator>camejia</dc:creator>
      <dc:date>2012-01-19T23:23:59Z</dc:date>
    </item>
    <item>
      <title>ACS 5.3 Configuring 802.1x</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-3-configuring-802-1x/m-p/1807061#M246459</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Carlos,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;No, 192.168.240.171 is my IOS device, a switch.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Just to notice, I already bind the ACS to AD domain, cause I'm using it for Device Admin:&lt;/P&gt;&lt;P&gt;&lt;IMG src="http://supportforums.cisco.com/sites/default/files/legacy/0/5/2/73250-20.jpg" class="jive-image" /&gt;&lt;/P&gt;&lt;P&gt;.. and also changed the Network Access Identity to AD instead of Identity Store MNCH-Radius. But on Network Access Authorization the hits count still in 0, I'm confuse with this policy, don't know what is missing.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Juan Carlos&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 19 Jan 2012 23:44:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-3-configuring-802-1x/m-p/1807061#M246459</guid>
      <dc:creator>Juan Carlos Arias Perez</dc:creator>
      <dc:date>2012-01-19T23:44:01Z</dc:date>
    </item>
    <item>
      <title>ACS 5.3 Configuring 802.1x</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-3-configuring-802-1x/m-p/1807062#M246460</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Carlos, with this change, now I can see on Radius reports that Authentication succeeded, maybe just need to fix Network Access Authorization, don't you think??&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;TABLE id="S2"&gt;&lt;TBODY&gt;&lt;TR align="left" style="font-style: normal; font-weight: normal; color: #000000; padding: 1pt 2pt; border-top: thin none #8499a2; border-right: thin solid #8499a2; border-bottom: thin none #8499a2; border-left: thin solid #8499a2; background-color: #d9e3e9; text-decoration: underline;" valign="middle"&gt;&lt;TD style="padding: 2pt 4pt;" valign="middle"&gt;&lt;P style="margin-top: 0pt;"&gt;Evaluating Identity Policy&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR align="left" style="font-weight: normal; color: #000000; padding: 1pt 2pt; border-top: thin none #8499a2; border-right: thin solid #8499a2; border-bottom: thin none #8499a2; border-left: thin solid #8499a2;" valign="middle"&gt;&lt;TD style="padding: 2pt 4pt;" valign="middle"&gt;&lt;P style="margin-top: 0pt;"&gt;15004&amp;nbsp; Matched rule&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR align="left" style="font-weight: normal; color: #000000; padding: 1pt 2pt; border-top: thin none #8499a2; border-right: thin solid #8499a2; border-bottom: thin none #8499a2; border-left: thin solid #8499a2;" valign="middle"&gt;&lt;TD style="padding: 2pt 4pt;" valign="middle"&gt;&lt;P style="margin-top: 0pt;"&gt;15013&amp;nbsp; Selected Identity Store - AD1&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR align="left" style="font-weight: normal; color: #000000; padding: 1pt 2pt; border-top: thin none #8499a2; border-right: thin solid #8499a2; border-bottom: thin none #8499a2; border-left: thin solid #8499a2;" valign="middle"&gt;&lt;TD style="padding: 2pt 4pt;" valign="middle"&gt;&lt;P style="margin-top: 0pt;"&gt;24430&amp;nbsp; Authenticating user against Active Directory&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR align="left" style="font-weight: normal; color: #000000; padding: 1pt 2pt; border-top: thin none #8499a2; border-right: thin solid #8499a2; border-bottom: thin none #8499a2; border-left: thin solid #8499a2;" valign="middle"&gt;&lt;TD style="padding: 2pt 4pt;" valign="middle"&gt;&lt;P style="margin-top: 0pt;"&gt;24416&amp;nbsp; User's Groups retrieval from Active Directory succeeded&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR align="left" style="font-weight: normal; color: #000000; padding: 1pt 2pt; border-top: thin none #8499a2; border-right: thin solid #8499a2; border-bottom: thin none #8499a2; border-left: thin solid #8499a2;" valign="middle"&gt;&lt;TD style="padding: 2pt 4pt;" valign="middle"&gt;&lt;P style="margin-top: 0pt;"&gt;24420&amp;nbsp; User's Attributes retrieval from Active Directory succeeded&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR align="left" style="font-weight: normal; color: #000000; padding: 1pt 2pt; border-top: thin none #8499a2; border-right: thin solid #8499a2; border-bottom: thin none #8499a2; border-left: thin solid #8499a2;" valign="middle"&gt;&lt;TD style="padding: 2pt 4pt;" valign="middle"&gt;&lt;P style="margin-top: 0pt;"&gt;24402&amp;nbsp; User authentication against Active Directory succeeded&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR align="left" style="font-weight: normal; color: #000000; padding: 1pt 2pt; border-top: thin none #8499a2; border-right: thin solid #8499a2; border-bottom: thin none #8499a2; border-left: thin solid #8499a2;" valign="middle"&gt;&lt;TD style="padding: 2pt 4pt;" valign="middle"&gt;&lt;P style="margin-top: 0pt;"&gt;22037&amp;nbsp; Authentication Passed&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&lt;/P&gt;&lt;TABLE id="S2"&gt;&lt;TBODY&gt;&lt;TR align="left" style="font-style: normal; font-weight: normal; color: #000000; padding: 1pt 2pt; border-top: thin none #8499a2; border-right: thin solid #8499a2; border-bottom: thin none #8499a2; border-left: thin solid #8499a2; background-color: #d9e3e9; text-decoration: underline;" valign="middle"&gt;&lt;TD style="padding: 2pt 4pt;" valign="middle"&gt;&lt;P style="margin-top: 0pt;"&gt;Evaluating Authorization Policy&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR align="left" style="font-weight: normal; color: #000000; padding: 1pt 2pt; border-top: thin none #8499a2; border-right: thin solid #8499a2; border-bottom: thin none #8499a2; border-left: thin solid #8499a2;" valign="middle"&gt;&lt;TD style="padding: 2pt 4pt;" valign="middle"&gt;&lt;P style="margin-top: 0pt;"&gt;15006&amp;nbsp; Matched Default Rule&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR align="left" style="font-weight: normal; color: #000000; padding: 1pt 2pt; border-top: thin none #8499a2; border-right: thin solid #8499a2; border-bottom: thin none #8499a2; border-left: thin solid #8499a2;" valign="middle"&gt;&lt;TD style="padding: 2pt 4pt;" valign="middle"&gt;&lt;P style="margin-top: 0pt;"&gt;15016&amp;nbsp; Selected Authorization Profile - Permit Access&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR align="left" style="font-weight: normal; color: #000000; padding: 1pt 2pt; border-top: thin none #8499a2; border-right: thin solid #8499a2; border-bottom: thin none #8499a2; border-left: thin solid #8499a2;" valign="middle"&gt;&lt;TD style="padding: 2pt 4pt;" valign="middle"&gt;&lt;P style="margin-top: 0pt;"&gt;22065&amp;nbsp; Max sessions policy passed&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR align="left" style="font-weight: normal; color: #000000; padding: 1pt 2pt; border-top: thin none #8499a2; border-right: thin solid #8499a2; border-bottom: thin none #8499a2; border-left: thin solid #8499a2;" valign="middle"&gt;&lt;TD style="padding: 2pt 4pt;" valign="middle"&gt;&lt;P style="margin-top: 0pt;"&gt;22064&amp;nbsp; New accounting session created in Session cache&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR align="left" style="font-weight: normal; color: #000000; padding: 1pt 2pt; border-top: thin none #8499a2; border-right: thin solid #8499a2; border-bottom: thin none #8499a2; border-left: thin solid #8499a2;" valign="middle"&gt;&lt;TD style="padding: 2pt 4pt;" valign="middle"&gt;&lt;P style="margin-top: 0pt;"&gt;11002&amp;nbsp; Returned RADIUS Access-Accept&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Juan Carlos&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 19 Jan 2012 23:49:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-3-configuring-802-1x/m-p/1807062#M246460</guid>
      <dc:creator>Juan Carlos Arias Perez</dc:creator>
      <dc:date>2012-01-19T23:49:32Z</dc:date>
    </item>
    <item>
      <title>ACS 5.3 Configuring 802.1x</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-3-configuring-802-1x/m-p/1807063#M246461</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Juan Carlos,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you share the whole report? The Authorization condition does reference to an AD Group (MNCH-GDL) and also to the Authentication Method (EAP-MSCHAPV2). &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The Test Command for authentication on the IOS will always go as PAP. We will not match the above condition as we are not using EAP-MSCHAPV2.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You need to either remove the EAP-MSCHAPV2 Condition or test with a 802.1x Complian client configured for PEAP (EAP-MSCHAPV2).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 20 Jan 2012 00:01:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-3-configuring-802-1x/m-p/1807063#M246461</guid>
      <dc:creator>camejia</dc:creator>
      <dc:date>2012-01-20T00:01:32Z</dc:date>
    </item>
    <item>
      <title>ACS 5.3 Configuring 802.1x</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-3-configuring-802-1x/m-p/1807064#M246462</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ok Carlos, I make it simple, just AD as condition and authorization profile, I tested with compliant client, and still receiving timeout, and Network Access Authorization still in 0, here is the debug:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;001250: Jan 19 18:40:58.028 GDL: AAA/BIND(0000002F): Bind i/f&amp;nbsp; &lt;/P&gt;&lt;P&gt;001251: Jan 19 18:40:58.237 GDL: %AUTHMGR-5-START: Starting 'dot1x' for client (f04d.a2a2.a028) on Interface Gi0/24 AuditSessionID C0A8F0AB0000001101B6C743&lt;/P&gt;&lt;P&gt;001252: Jan 19 18:41:00.007 GDL: %LINK-3-UPDOWN: Interface GigabitEthernet0/24, changed state to up&lt;/P&gt;&lt;P&gt;001253: Jan 19 18:41:01.014 GDL: %LINEPROTO-5-UPDOWN: Line protocol on Interface GigabitEthernet0/24, changed state to up&lt;/P&gt;&lt;P&gt;001254: Jan 19 18:41:08.547 GDL: AAA/AUTHEN/8021X (0000002F): Pick method list 'default' &lt;/P&gt;&lt;P&gt;001255: Jan 19 18:41:08.547 GDL: RADIUS/ENCODE(0000002F):Orig. component type = Dot1X&lt;/P&gt;&lt;P&gt;001256: Jan 19 18:41:08.547 GDL: RADIUS(0000002F): Config NAS IP: 0.0.0.0&lt;/P&gt;&lt;P&gt;001257: Jan 19 18:41:08.547 GDL: RADIUS(0000002F): Config NAS IPv6: ::&lt;/P&gt;&lt;P&gt;001258: Jan 19 18:41:08.555 GDL: RADIUS/ENCODE(0000002F): acct_session_id: 37&lt;/P&gt;&lt;P&gt;001259: Jan 19 18:41:08.555 GDL: RADIUS(0000002F): sending&lt;/P&gt;&lt;P&gt;001260: Jan 19 18:41:08.555 GDL: RADIUS/ENCODE: Best Local IP-Address 192.168.240.171 for Radius-Server 192.168.240.28&lt;/P&gt;&lt;P&gt;001261: Jan 19 18:41:08.555 GDL: RADIUS(0000002F): Send Access-Request to 192.168.240.28:1812 id 1645/27, len 246&lt;/P&gt;&lt;P&gt;001262: Jan 19 18:41:08.555 GDL: RADIUS:&amp;nbsp; authenticator 27 15 50 22 ED AB FC 34 - F1 24 56 87 30 6F 7D F9&lt;/P&gt;&lt;P&gt;001263: Jan 19 18:41:08.555 GDL: RADIUS:&amp;nbsp; User-Name&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; [1]&amp;nbsp;&amp;nbsp; 18&amp;nbsp; "juancarlos.arias"&lt;/P&gt;&lt;P&gt;001264: Jan 19 18:41:08.555 GDL: RADIUS:&amp;nbsp; Service-Type&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; [6]&amp;nbsp;&amp;nbsp; 6&amp;nbsp;&amp;nbsp; Framed&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; [2]&lt;/P&gt;&lt;P&gt;001265: Jan 19 18:41:08.555 GDL: RADIUS:&amp;nbsp; Vendor, Cisco&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; [26]&amp;nbsp; 27&amp;nbsp; &lt;/P&gt;&lt;P&gt;001266: Jan 19 18:41:08.555 GDL: RADIUS:&amp;nbsp;&amp;nbsp; Cisco AVpair&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; [1]&amp;nbsp;&amp;nbsp; 21&amp;nbsp; "service-type=Framed"&lt;/P&gt;&lt;P&gt;001267: Jan 19 18:41:08.555 GDL: RADIUS:&amp;nbsp; Framed-MTU&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; [12]&amp;nbsp; 6&amp;nbsp;&amp;nbsp; 1500&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;001268: Jan 19 18:41:08.555 GDL: RADIUS:&amp;nbsp; Called-Station-Id&amp;nbsp;&amp;nbsp; [30]&amp;nbsp; 19&amp;nbsp; "00-1C-0E-08-69-98"&lt;/P&gt;&lt;P&gt;001269: Jan 19 18:41:08.555 GDL: RADIUS:&amp;nbsp; Calling-Station-Id&amp;nbsp; [31]&amp;nbsp; 19&amp;nbsp; "F0-4D-A2-A2-A0-28"&lt;/P&gt;&lt;P&gt;001270: Jan 19 18:41:08.555 GDL: RADIUS:&amp;nbsp; EAP-Message&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; [79]&amp;nbsp; 23&amp;nbsp; &lt;/P&gt;&lt;P&gt;001271: Jan 19 18:41:08.555 GDL: RADIUS:&amp;nbsp;&amp;nbsp; 02 01 00 15 01 6A 75 61 6E 63 61 72 6C 6F 73 2E 61 72 69 61 73&amp;nbsp; [ juancarlos.arias]&lt;/P&gt;&lt;P&gt;001272: Jan 19 18:41:08.555 GDL: RADIUS:&amp;nbsp; Message-Authenticato[80]&amp;nbsp; 18&amp;nbsp; &lt;/P&gt;&lt;P&gt;001273: Jan 19 18:41:08.555 GDL: RADIUS:&amp;nbsp;&amp;nbsp; E5 92 90 F9 39 F2 EA A9 E4 B2 C9 02 12 9D EA B0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; [ 9]&lt;/P&gt;&lt;P&gt;001274: Jan 19 18:41:08.555 GDL: RADIUS:&amp;nbsp; EAP-Key-Name&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; [102] 2&amp;nbsp;&amp;nbsp; *&lt;/P&gt;&lt;P&gt;001275: Jan 19 18:41:08.555 GDL: RADIUS:&amp;nbsp; Vendor, Cisco&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; [26]&amp;nbsp; 49&amp;nbsp; &lt;/P&gt;&lt;P&gt;001276: Jan 19 18:41:08.555 GDL: RADIUS:&amp;nbsp;&amp;nbsp; Cisco AVpair&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; [1]&amp;nbsp;&amp;nbsp; 43&amp;nbsp; "audit-session-id=C0A8F0AB0000001101B6C743"&lt;/P&gt;&lt;P&gt;001277: Jan 19 18:41:08.555 GDL: RADIUS:&amp;nbsp; NAS-Port-Type&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; [61]&amp;nbsp; 6&amp;nbsp;&amp;nbsp; Ethernet&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; [15]&lt;/P&gt;&lt;P&gt;001278: Jan 19 18:41:08.555 GDL: RADIUS:&amp;nbsp; NAS-Port&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; [5]&amp;nbsp;&amp;nbsp; 6&amp;nbsp;&amp;nbsp; 50024&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;001279: Jan 19 18:41:08.555 GDL: RADIUS:&amp;nbsp; NAS-Port-Id&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; [87]&amp;nbsp; 21&amp;nbsp; "GigabitEthernet0/24"&lt;/P&gt;&lt;P&gt;001280: Jan 19 18:41:08.555 GDL: RADIUS:&amp;nbsp; NAS-IP-Address&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; [4]&amp;nbsp;&amp;nbsp; 6&amp;nbsp;&amp;nbsp; 192.168.240.171&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;001281: Jan 19 18:41:08.555 GDL: RADIUS(0000002F): Sending a IPv4 Radius Packet&lt;/P&gt;&lt;P&gt;001282: Jan 19 18:41:08.555 GDL: RADIUS(0000002F): Started 20 sec timeout&lt;/P&gt;&lt;P&gt;001283: Jan 19 18:41:26.507 GDL: RADIUS(0000002F): Request timed out &lt;/P&gt;&lt;P&gt;001284: Jan 19 18:41:26.507 GDL: RADIUS: Retransmit to (192.168.240.28:1812,1813) for id 1645/27&lt;/P&gt;&lt;P&gt;001285: Jan 19 18:41:26.507 GDL: RADIUS(0000002F): Started 20 sec timeout&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Complete Report:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG src="http://supportforums.cisco.com/sites/default/files/legacy/1/5/2/73251-1.jpg" class="jive-image" /&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG src="http://supportforums.cisco.com/sites/default/files/legacy/3/5/2/73253-2.jpg" class="jive-image" /&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG src="http://supportforums.cisco.com/sites/default/files/legacy/4/5/2/73254-3.jpg" class="jive-image" /&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG src="http://supportforums.cisco.com/sites/default/files/legacy/5/5/2/73255-4.jpg" class="jive-image" /&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG src="http://supportforums.cisco.com/sites/default/files/legacy/6/5/2/73256-5.jpg" class="jive-image" /&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG src="http://supportforums.cisco.com/sites/default/files/legacy/7/5/2/73257-6.jpg" class="jive-image" /&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG src="http://supportforums.cisco.com/sites/default/files/legacy/8/5/2/73258-7.jpg" class="jive-image" /&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG src="http://supportforums.cisco.com/sites/default/files/legacy/9/5/2/73259-8.jpg" class="jive-image" /&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG src="http://supportforums.cisco.com/sites/default/files/legacy/0/6/2/73260-9.jpg" class="jive-image" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa group server tacacs+ TACACS_PLUS&lt;/P&gt;&lt;P&gt; server 192.168.240.28&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;aaa group server radius RADIUS_1x&lt;/P&gt;&lt;P&gt; server 192.168.240.28 auth-port 1812 acct-port 1813&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;aaa authentication login default group TACACS_PLUS&lt;/P&gt;&lt;P&gt;aaa authentication login no_tacacs enable local&lt;/P&gt;&lt;P&gt;aaa authentication enable default group RADIUS_1x&lt;/P&gt;&lt;P&gt;aaa authentication dot1x default group RADIUS_1x&lt;/P&gt;&lt;P&gt;aaa authorization config-commands&lt;/P&gt;&lt;P&gt;aaa authorization exec no_tacacs local &lt;/P&gt;&lt;P&gt;aaa authorization commands 15 TACACS_PLUS group tacacs+ &lt;/P&gt;&lt;P&gt;aaa authorization network default group RADIUS_1x &lt;/P&gt;&lt;P&gt;aaa authorization auth-proxy default group RADIUS_1x &lt;/P&gt;&lt;P&gt;aaa accounting send stop-record authentication failure&lt;/P&gt;&lt;P&gt;aaa accounting update newinfo&lt;/P&gt;&lt;P&gt;aaa accounting dot1x default start-stop group RADIUS_1x&lt;/P&gt;&lt;P&gt;aaa accounting exec default start-stop group TACACS_PLUS&lt;/P&gt;&lt;P&gt;aaa accounting network default start-stop group TACACS_PLUS&lt;/P&gt;&lt;P&gt;aaa accounting connection default start-stop group TACACS_PLUS&lt;/P&gt;&lt;P&gt;aaa accounting system default start-stop group RADIUS_1x&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;dot1x system-auth-control&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/24&lt;/P&gt;&lt;P&gt; switchport mode access&lt;/P&gt;&lt;P&gt; switchport voice vlan 7&lt;/P&gt;&lt;P&gt; authentication port-control auto&lt;/P&gt;&lt;P&gt; authentication violation protect&lt;/P&gt;&lt;P&gt; dot1x pae authenticator&lt;/P&gt;&lt;P&gt; dot1x timeout quiet-period 15&lt;/P&gt;&lt;P&gt; spanning-tree portfast&lt;/P&gt;&lt;P&gt; spanning-tree bpduguard enable&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;tacacs-server host 192.168.240.28 key 7 104D0617040717180F05&lt;/P&gt;&lt;P&gt;tacacs-server directed-request&lt;/P&gt;&lt;P&gt;radius-server attribute 8 include-in-access-req&lt;/P&gt;&lt;P&gt;radius-server host 192.168.240.28 auth-port 1812 acct-port 1813 key 7 15110402053A2E372B32&lt;/P&gt;&lt;P&gt;radius-server timeout 20&lt;/P&gt;&lt;P&gt;radius-server key 7 0110090A5A1B031C224D&lt;/P&gt;&lt;P&gt;radius-server vsa send authentication&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The compliant client should have access to Vlan 60.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 20 Jan 2012 01:02:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-3-configuring-802-1x/m-p/1807064#M246462</guid>
      <dc:creator>Juan Carlos Arias Perez</dc:creator>
      <dc:date>2012-01-20T01:02:24Z</dc:date>
    </item>
    <item>
      <title>Re: ACS 5.3 Configuring 802.1x</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-3-configuring-802-1x/m-p/1807065#M246463</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Juan Carlos,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is the ACS still reporting an Authentication Success? We need the report for the authentication attempt.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please share it with us as well. Configuration seems to be fine now. On the report we should be able to see the AD Group MNCH-GDL as an attribute for the user under "Other Attributes" in order for us to match the authorization rule.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 20 Jan 2012 01:05:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-3-configuring-802-1x/m-p/1807065#M246463</guid>
      <dc:creator>camejia</dc:creator>
      <dc:date>2012-01-20T01:05:54Z</dc:date>
    </item>
    <item>
      <title>Re: ACS 5.3 Configuring 802.1x</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-3-configuring-802-1x/m-p/1807066#M246464</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Carlos, sorry I missed that, here it is using compliant client:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P id="AUTOGENBOOKMARK_11"&gt;RADIUS Status:&lt;/P&gt;&lt;P&gt; EAP session timed out&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : &lt;/P&gt;&lt;P&gt; &lt;A href="https://192.168.240.28/avreports/servlet/GenericRedirector?command=submit&amp;amp;__requesttype=immediate&amp;amp;invokeSubmit=true&amp;amp;__executableName=%2Fhome%2Fmonarch%2FFailure_Reason%2FAuthentication_Failure_Code_Lookup.rptdesign&amp;amp;rptFailureReason=5411+EAP+session+timed+out&amp;amp;__locale=en_US&amp;amp;iportalID=SVYYMEQW&amp;amp;__masterpage=false&amp;amp;__newWindow=false" style="color: red; margin-top: 0pt;" target="_self"&gt;5411 EAP session timed out&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Radius authentication failed for USER: juancarlos.arias&amp;nbsp; MAC: F0-4D-A2-A2-A0-28&amp;nbsp; AUTHTYPE:&amp;nbsp; Radius authentication failed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But if I use test command:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On Radius report Authentication succeeded, but not on IOS&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;SW-LAB#test aaa group RADIUS juancarlos.arias 12345 new-code &lt;/P&gt;&lt;P&gt;User rejected&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 20 Jan 2012 01:09:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-3-configuring-802-1x/m-p/1807066#M246464</guid>
      <dc:creator>Juan Carlos Arias Perez</dc:creator>
      <dc:date>2012-01-20T01:09:15Z</dc:date>
    </item>
    <item>
      <title>Re: ACS 5.3 Configuring 802.1x</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-3-configuring-802-1x/m-p/1807067#M246465</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Juan Carlos,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;EAP Session Timeout can be a tricky one as it has always been related to Supplicant issues. It is hard to prove but on TAC we always download and install Cisco Secure Services Client (CSSC - Cisco Supplicant).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can download the Supplicant CSSC version 4.x and install it on your XP Machine (Does not support Vista/7). You need a valid Cisco CCOiD to download it:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Products &amp;gt; Wireless &amp;gt; Client Adapters and Client Software &amp;gt; Cisco Secure Services Client &amp;gt; Secure Services Client Software &amp;gt; Windows XP-4.2.3&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You migth want to test with it or open a TAC case for an engineer to deeper troubleshoot the issue.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The EAP Session Timeout is usually related to a Challenge send by the ACS that the supplicant is not able to Respond.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you try with a different client (Let's say Windows XP Client with Windows Native supplicant) does it work? If not, we will have to try the CSSC supplicant installed on a XP machine.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If needed I can shared configuration screenshots for the CSSC but can take me sometime.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If this has been helpful please rate.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 20 Jan 2012 01:18:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-3-configuring-802-1x/m-p/1807067#M246465</guid>
      <dc:creator>camejia</dc:creator>
      <dc:date>2012-01-20T01:18:47Z</dc:date>
    </item>
    <item>
      <title>ACS 5.3 Configuring 802.1x</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-3-configuring-802-1x/m-p/1807068#M246466</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Carlos,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I´m recreating a lab for a customer that all machines are W7, so CSSC is not useful.&amp;nbsp; So all this, it's because ACS v5.3??&amp;nbsp; Last year I recreate a lab using ACS v4.2 and had no problem with XP and W7, do I have to move to that version??&amp;nbsp; I read some comments that ACS 5.1 it's better than 5.3, what do you recommend??&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It will be helpful if you add screenshots for CSSC.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Juan Carlos&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 20 Jan 2012 01:54:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-3-configuring-802-1x/m-p/1807068#M246466</guid>
      <dc:creator>Juan Carlos Arias Perez</dc:creator>
      <dc:date>2012-01-20T01:54:52Z</dc:date>
    </item>
    <item>
      <title>ACS 5.3 Configuring 802.1x</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-3-configuring-802-1x/m-p/1807069#M246467</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Carlos, thanks for time, I appreciate all your comments.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Juan Carlos Arias&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 20 Jan 2012 18:02:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-3-configuring-802-1x/m-p/1807069#M246467</guid>
      <dc:creator>Juan Carlos Arias Perez</dc:creator>
      <dc:date>2012-01-20T18:02:10Z</dc:date>
    </item>
  </channel>
</rss>

