<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic cisco-avpair in radius request in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/cisco-avpair-in-radius-request/m-p/1800823#M247019</link>
    <description>&lt;P&gt;Hello&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a cisco IOS router and a freeradius server. The radius server authenticate my admin login to this device. Now I have configured IPSec VPN on the same router and have also enabled the radius authentication for the VPN users.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I will avoid that I can also authenticate the VPN connection with the admin user for the router itself. Is it possible that the router sends the VPN group name(configured with "crypto isakmp client configuration group [GROUPNAME]") in a cisco-avpair attribute to the radius server (raduis request from NAS to radius server) and how can I check this attribute on the freeradius server?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Many thanks for your support.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Martin&lt;/P&gt;</description>
    <pubDate>Mon, 11 Mar 2019 01:21:51 GMT</pubDate>
    <dc:creator>martin.hagmann</dc:creator>
    <dc:date>2019-03-11T01:21:51Z</dc:date>
    <item>
      <title>cisco-avpair in radius request</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-avpair-in-radius-request/m-p/1800823#M247019</link>
      <description>&lt;P&gt;Hello&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a cisco IOS router and a freeradius server. The radius server authenticate my admin login to this device. Now I have configured IPSec VPN on the same router and have also enabled the radius authentication for the VPN users.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I will avoid that I can also authenticate the VPN connection with the admin user for the router itself. Is it possible that the router sends the VPN group name(configured with "crypto isakmp client configuration group [GROUPNAME]") in a cisco-avpair attribute to the radius server (raduis request from NAS to radius server) and how can I check this attribute on the freeradius server?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Many thanks for your support.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Martin&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 01:21:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-avpair-in-radius-request/m-p/1800823#M247019</guid>
      <dc:creator>martin.hagmann</dc:creator>
      <dc:date>2019-03-11T01:21:51Z</dc:date>
    </item>
    <item>
      <title>cisco-avpair in radius request</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-avpair-in-radius-request/m-p/1800824#M247025</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You may want to trun on the following debugs to see what you are sending&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;debug radius&lt;/P&gt;&lt;P&gt;debug aaa authen&lt;/P&gt;&lt;P&gt;debug aaa author&lt;/P&gt;&lt;P&gt;debug aaa account&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Once you see what you are sending you can google the answer for the freeradius. The server should have a log to show if it is failing you and the reason.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 10 Sep 2011 14:10:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-avpair-in-radius-request/m-p/1800824#M247025</guid>
      <dc:creator>Calvin Ryver</dc:creator>
      <dc:date>2011-09-10T14:10:50Z</dc:date>
    </item>
    <item>
      <title>cisco-avpair in radius request</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-avpair-in-radius-request/m-p/1800825#M247042</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Calvin&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for your response. I turned on the debugging but the VPN group name was not sent to the freeradius. But the debugging shows me the value VPN_IPSEC (Orig. component type) if I connect with IPSec VPN. If I login to the router for administration the "Orig. component type" shows me EXEC&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--- VPN ---&lt;/P&gt;&lt;P&gt;004984: Sep 13 18:50:48.951: RADIUS/ENCODE(00000014):&lt;STRONG&gt;Orig. component type = VPN_IPSEC&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;004985: Sep 13 18:50:48.951: RADIUS/ENCODE(00000014): Unsupported AAA attribute chap-authen-user&lt;/P&gt;&lt;P&gt;004986: Sep 13 18:50:48.951: RADIUS:&amp;nbsp; AAA Unsupported Attr: interface&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; [175] 11&amp;nbsp; &lt;/P&gt;&lt;P&gt;004987: Sep 13 18:50:48.951: RADIUS:&amp;nbsp;&amp;nbsp; 38 35 2E 33 2E 32 32 2E 31&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; [85.3.22.1]&lt;/P&gt;&lt;P&gt;004988: Sep 13 18:50:48.951: RADIUS/ENCODE(00000014): dropping service type, "radius-server attribute 6 on-for-login-auth" is off&lt;/P&gt;&lt;P&gt;004989: Sep 13 18:50:48.951: RADIUS(00000014): Config NAS IP: 192.168.66.2&lt;/P&gt;&lt;P&gt;004990: Sep 13 18:50:48.951: RADIUS/ENCODE(00000014): acct_session_id: 20&lt;/P&gt;&lt;P&gt;004991: Sep 13 18:50:48.951: RADIUS(00000014): sending&lt;/P&gt;&lt;P&gt;004992: Sep 13 18:50:48.951: RADIUS(00000014): Send Access-Request to 192.168.13.34:1812 id 1645/13, len 99&lt;/P&gt;&lt;P&gt;004993: Sep 13 18:50:48.951: RADIUS:&amp;nbsp; authenticator A9 01 F7 6F 16 FD 73 93 - BE 1C 10 61 81 1B 49 A6&lt;/P&gt;&lt;P&gt;004994: Sep 13 18:50:48.951: RADIUS:&amp;nbsp; User-Name&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; [1]&amp;nbsp;&amp;nbsp; 14&amp;nbsp; "MyUser"&lt;/P&gt;&lt;P&gt;004995: Sep 13 18:50:48.951: RADIUS:&amp;nbsp; User-Password&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; [2]&amp;nbsp;&amp;nbsp; 18&amp;nbsp; *&lt;/P&gt;&lt;P&gt;004996: Sep 13 18:50:48.951: RADIUS:&amp;nbsp; Calling-Station-Id&amp;nbsp; [31]&amp;nbsp; 16&amp;nbsp; "178.197.232.79"&lt;/P&gt;&lt;P&gt;004997: Sep 13 18:50:48.951: RADIUS:&amp;nbsp; NAS-Port-Type&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; [61]&amp;nbsp; 6&amp;nbsp;&amp;nbsp; Virtual&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; [5]&lt;/P&gt;&lt;P&gt;004998: Sep 13 18:50:48.951: RADIUS:&amp;nbsp; NAS-Port&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; [5]&amp;nbsp;&amp;nbsp; 6&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;hm01rt60#0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;004999: Sep 13 18:50:48.951: RADIUS:&amp;nbsp; NAS-Port-Id&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; [87]&amp;nbsp; 13&amp;nbsp; "85.3.22.100"&lt;/P&gt;&lt;P&gt;005000: Sep 13 18:50:48.951: RADIUS:&amp;nbsp; NAS-IP-Address&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; [4]&amp;nbsp;&amp;nbsp; 6&amp;nbsp;&amp;nbsp; 192.168.66.2&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;005001: Sep 13 18:50:48.995: RADIUS: Received from id 1645/13 192.168.13.34:1812, Access-Accept, len 20&lt;/P&gt;&lt;P&gt;005002: Sep 13 18:50:48.995: RADIUS:&amp;nbsp; authenticator 1C 36 DE 50 92 54 CD B6 - 79 4C 28 A4 A9 23 4D 17&lt;/P&gt;&lt;P&gt;005003: Sep 13 18:50:48.995: RADIUS(00000014): Received from id 1645/13&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--- admin login ---&lt;/P&gt;&lt;P&gt;005077: Sep 13 18:56:20.712: RADIUS/ENCODE(00000017):&lt;STRONG&gt;Orig. component type = EXEC&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Q:&lt;/STRONG&gt; It's not really a radius attribute but is it possible to send the string of the "Orig. component type" in a cisco-avpair attribute to the radius server?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My alternative solution is:&lt;/P&gt;&lt;P&gt;- The radius attribute NAS-Port-ID (87) shows the IP address of the interface the VPN terminates.When I login for administration the attribute NAS-Port-ID shows "tty&lt;PORT-ID&gt;". With this difference I can also verify if the login is for administration or not (freeradius operator =~ / NAS-Port-ID =~ &lt;REGEX&gt;)&lt;/REGEX&gt;&lt;/PORT-ID&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--- VPN ---&lt;/P&gt;&lt;P&gt;004999: Sep 13 18:50:48.951: RADIUS:&amp;nbsp; NAS-Port-Id&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; [87]&amp;nbsp; 13&amp;nbsp; "85.3.22.100"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--- admin login ---&lt;/P&gt;&lt;P&gt;005091: Sep 13 18:56:20.716: RADIUS:&amp;nbsp; NAS-Port-Id&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; [87]&amp;nbsp; 8&amp;nbsp;&amp;nbsp; "&lt;STRONG&gt;tty&lt;/STRONG&gt;196"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for further responses.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Martin&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 14 Sep 2011 06:59:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-avpair-in-radius-request/m-p/1800825#M247042</guid>
      <dc:creator>martin.hagmann</dc:creator>
      <dc:date>2011-09-14T06:59:28Z</dc:date>
    </item>
  </channel>
</rss>

