<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: C2960X error Radius through SSH in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/c2960x-error-radius-through-ssh/m-p/3913800#M24716</link>
    <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/300873"&gt;@Steveosh72&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You need to share your ISE config as well since that would tell us whether your RADIUS Policy Set is correct &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have pasted the ISE 2.3/2.4/2.6 Style RADIUS Policy Set below for Cisco IOS and WLC devices&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;It shows what RADIUS attributes are expected during a device authentication via RADIUS at the Top Level of the Policy Set:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="RADIUS.PNG" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/43756i3D7C060766D96701/image-size/large?v=v2&amp;amp;px=999" role="button" title="RADIUS.PNG" alt="RADIUS.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The point is this: you need to allow PAP only, and then depending on the Conditions shown above, create an Authentication and Authorization Policy accordingly - the top level conditions shown above are required to match on the RADIUS traffic that results from a device admin AAA event.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 26 Aug 2019 03:37:45 GMT</pubDate>
    <dc:creator>Arne Bier</dc:creator>
    <dc:date>2019-08-26T03:37:45Z</dc:date>
    <item>
      <title>C2960X error Radius through SSH</title>
      <link>https://community.cisco.com/t5/network-access-control/c2960x-error-radius-through-ssh/m-p/3912681#M24713</link>
      <description>&lt;P&gt;Hi there&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have a new C2960X that we are replacing a couple old ones with.&lt;/P&gt;&lt;P&gt;I can not get RADIUS working&amp;nbsp; .&amp;nbsp; yes the switch can ping the radius server .. i took out the key but it is there&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;HELP&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have it programmed like this&lt;/P&gt;&lt;P&gt;aaa new-model&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;aaa group server radius RADIUS_AUTH&lt;BR /&gt;!&lt;BR /&gt;aaa authentication login networkaccess group RADIUS_AUTH local enable&lt;BR /&gt;aaa authorization exec default group RADIUS_AUTH local if-authenticated&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;!&lt;BR /&gt;radius server RADIUS_AUTH&lt;BR /&gt;address ipv4 172.20.253.222 auth-port 1812 acct-port 1813&lt;BR /&gt;key 7 0XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXD&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;line con 0&lt;BR /&gt;exec-timeout 0 0&lt;BR /&gt;line vty 0 4&lt;BR /&gt;access-class 99 in&lt;BR /&gt;exec-timeout 0 0&lt;BR /&gt;password 7 09584B051A0403&lt;BR /&gt;login authentication networkaccess&lt;BR /&gt;length 0&lt;BR /&gt;transport input ssh&lt;BR /&gt;line vty 5 15&lt;BR /&gt;access-class 99 in&lt;BR /&gt;exec-timeout 0 0&lt;BR /&gt;password 7 09584B051A0403&lt;BR /&gt;login authentication networkaccess&lt;BR /&gt;transport input ssh&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;crypto key gener rsa&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;what i get is&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;login as: xxxxxxx&lt;BR /&gt;Keyboard-interactive authentication prompts from server:&lt;BR /&gt;| Password:&lt;BR /&gt;End of keyboard-interactive prompts from server&lt;BR /&gt;Access denied&lt;BR /&gt;Keyboard-interactive authentication prompts from server:&lt;BR /&gt;| Password:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 22 Aug 2019 23:32:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/c2960x-error-radius-through-ssh/m-p/3912681#M24713</guid>
      <dc:creator>Steveosh72</dc:creator>
      <dc:date>2019-08-22T23:32:09Z</dc:date>
    </item>
    <item>
      <title>Re: C2960X error Radius through SSH</title>
      <link>https://community.cisco.com/t5/network-access-control/c2960x-error-radius-through-ssh/m-p/3913800#M24716</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/300873"&gt;@Steveosh72&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You need to share your ISE config as well since that would tell us whether your RADIUS Policy Set is correct &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have pasted the ISE 2.3/2.4/2.6 Style RADIUS Policy Set below for Cisco IOS and WLC devices&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;It shows what RADIUS attributes are expected during a device authentication via RADIUS at the Top Level of the Policy Set:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="RADIUS.PNG" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/43756i3D7C060766D96701/image-size/large?v=v2&amp;amp;px=999" role="button" title="RADIUS.PNG" alt="RADIUS.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The point is this: you need to allow PAP only, and then depending on the Conditions shown above, create an Authentication and Authorization Policy accordingly - the top level conditions shown above are required to match on the RADIUS traffic that results from a device admin AAA event.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 26 Aug 2019 03:37:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/c2960x-error-radius-through-ssh/m-p/3913800#M24716</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2019-08-26T03:37:45Z</dc:date>
    </item>
  </channel>
</rss>

