<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ACS 5.2 with different RADIUS authentication servers in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/acs-5-2-with-different-radius-authentication-servers/m-p/1526864#M263561</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;There is an option in the Advanced tab of th "RADIUS Identity server" definition:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This Identity Store does not differentiate between 'authentication failed' and 'user not found' when an authentication attempt is rejected. From the options below, select how such an authentication reject from the Identity Store should be interpreted by ACS for Identity Policy processing and reporting . &lt;BR /&gt;&lt;INPUT maxlength="2147483647" name="onReject" size="20" type="radio" value="fail" /&gt;Treat Rejects as 'authentication failed' &lt;INPUT maxlength="2147483647" name="onReject" size="20" type="radio" value="unknown" /&gt;Treat Rejects as 'user not found'&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In order to continue in the sequence I think you need to select the "user not found" option&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 27 Oct 2010 08:35:52 GMT</pubDate>
    <dc:creator>jrabinow</dc:creator>
    <dc:date>2010-10-27T08:35:52Z</dc:date>
    <item>
      <title>ACS 5.2 with different RADIUS authentication servers</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-2-with-different-radius-authentication-servers/m-p/1526858#M263555</link>
      <description>&lt;P class="MsoNormal" style="margin: 0cm 0cm 0pt;"&gt;&lt;SPAN style="color: #000000; font-size: 12pt; mso-ansi-language: EN-GB; font-family: Arial; "&gt;Hi&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0cm 0cm 0pt;"&gt;&lt;SPAN style="color: #000000; font-size: 12pt; mso-ansi-language: EN-GB; font-family: Arial; "&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0cm 0cm 0pt;"&gt;&lt;SPAN style="color: #000000; font-size: 12pt; mso-ansi-language: EN-GB; font-family: Arial; "&gt;I like to migrate from ACS 4.1 to ACS 5.2. I've already configured TACACS+ authentication but now I stuck at configuring RADIUS authentication for WebVPN remote access. Please look at the diagram below:&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0cm 0cm 0pt;"&gt;&lt;SPAN style="color: #000000; font-size: 12pt; mso-ansi-language: EN-GB; font-family: Arial; "&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0cm 0cm 0pt;"&gt;&lt;SPAN style="color: #000000; font-size: 12pt; font-family: Arial; "&gt;&lt;IMG src="https://community.cisco.com/legacyfs/online/legacy/1/5/5/8551-acs.JPG" alt="acs.JPG" class="jive-image-thumbnail jive-image" onclick="" width="450" /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0cm 0cm 0pt;"&gt;&lt;SPAN style="font-family: Arial; color: #000000; font-size: 12pt;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0cm 0cm 0pt;"&gt;&lt;SPAN style="color: #000000; font-size: 12pt; mso-ansi-language: EN-GB; font-family: Arial; "&gt;I want to configure ACS to use OTP Token Server first. If authentication fails or user is not found, ACS has to use Windows IAS server. If this server also fails ACS has to use internal DB. Additional attributes like group membership or downloadable ACL have to be taken from internal ACS DB.&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0cm 0cm 0pt;"&gt;&lt;SPAN style="color: #000000; font-size: 12pt; mso-ansi-language: EN-GB; font-family: Arial; "&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0cm 0cm 0pt;"&gt;&lt;SPAN style="color: #000000; font-size: 12pt; mso-ansi-language: EN-GB; font-family: Arial; "&gt;Is it possible to configure ACS like this? In ACS 4.1 it was very easy to configure by selecting authentication method per user.&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0cm 0cm 0pt;"&gt;&lt;SPAN style="color: #000000; font-size: 12pt; mso-ansi-language: EN-GB; font-family: Arial; "&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0cm 0cm 0pt;"&gt;&lt;SPAN style="color: #000000; font-size: 12pt; mso-ansi-language: EN-GB; font-family: Arial; "&gt;Thanks for your help!&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 00:31:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-2-with-different-radius-authentication-servers/m-p/1526858#M263555</guid>
      <dc:creator>dominikhug</dc:creator>
      <dc:date>2019-03-11T00:31:22Z</dc:date>
    </item>
    <item>
      <title>Re: ACS 5.2 with different RADIUS authentication servers</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-2-with-different-radius-authentication-servers/m-p/1526859#M263556</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN style="font-family: arial,helvetica,sans-serif;"&gt;I think what you need to do is as follows:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: arial,helvetica,sans-serif;"&gt;- define RSA server:&lt;SPAN class="cuesBreadcrumbStatic"&gt;Users and Identity Stores&lt;/SPAN&gt; &amp;gt; &lt;SPAN class="cuesBreadcrumbStatic"&gt;External Identity Stores&lt;/SPAN&gt; &amp;gt; &lt;SPAN class="cuesBreadcrumbLast"&gt;RSA SecurID Token Servers&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: arial,helvetica,sans-serif;"&gt;- For IAS server create a "RADIUS Identity Server":&lt;SPAN class="cuesBreadcrumbStatic"&gt;Users and Identity Stores&lt;/SPAN&gt; &amp;gt; &lt;SPAN class="cuesBreadcrumbStatic"&gt;External Identity Stores&lt;/SPAN&gt; &amp;gt; &lt;SPAN class="cuesBreadcrumbLast"&gt;RADIUS Identity Servers&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: arial,helvetica,sans-serif; "&gt;- Create an identity sequeunce:&lt;SPAN class="cuesBreadcrumbStatic"&gt;Users and Identity Stores&lt;/SPAN&gt; &amp;gt; &lt;SPAN class="cuesBreadcrumbLast"&gt;Identity Store Sequences&lt;/SPAN&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: arial,helvetica,sans-serif; "&gt;Select password based authentication method and in &lt;SPAN style="color: #000000;"&gt;Authentication and Attribute Retrieval Search List select the RSA, RADIUS identiy server and internal users. In Additional Attribute Retrieval Search List select the internal users&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; font-family: arial,helvetica,sans-serif; "&gt;- Select the identity sequence as the result of the identity policy of the RADIUS server&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; "&gt;What this should do is access each of the RSA, Identity server and internal user db until an authentication gets deterministic response and also in any case retrieve the attributes from the internal identity store&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 27 Oct 2010 07:01:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-2-with-different-radius-authentication-servers/m-p/1526859#M263556</guid>
      <dc:creator>jrabinow</dc:creator>
      <dc:date>2010-10-27T07:01:20Z</dc:date>
    </item>
    <item>
      <title>Re: ACS 5.2 with different RADIUS authentication servers</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-2-with-different-radius-authentication-servers/m-p/1526860#M263557</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Correct, that would be the way to achieve the authentication, then after the user is authenticated in which ever DB, you move to the authorization part where you can return the ACL.&lt;/P&gt;&lt;P&gt;For this you can configure an Authorization Profile, and include the ACL name on it.&lt;/P&gt;&lt;P&gt;The ACL itself is configured on the Named Permission Objects -&amp;gt; Downloadable ACLs.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then on the Service matched under the Access Policies, you have to create rules under the authorization section to return that Authorization Profile where the dACL is.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH,&lt;/P&gt;&lt;P&gt;Tiago&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 27 Oct 2010 08:13:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-2-with-different-radius-authentication-servers/m-p/1526860#M263557</guid>
      <dc:creator>Tiago Antunes</dc:creator>
      <dc:date>2010-10-27T08:13:35Z</dc:date>
    </item>
    <item>
      <title>Re: ACS 5.2 with different RADIUS authentication servers</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-2-with-different-radius-authentication-servers/m-p/1526861#M263558</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Because we are not using RSA SecureID Server I have added the server as a external RADIUS server. But I think it doesn't matter if I use an RSA server or a RADIUS server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've already tried using store sequences but unfortunately ACS only queries the token server. The token server sends a access-reject to ACS server and then ACS stopps query the other server in store sequence.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;TABLE id="AUTOGENBOOKMARK_28" style="border-bottom: black; margin-top: 0pt; width: 100%; border-collapse: collapse; empty-cells: show;"&gt;&lt;TBODY&gt;&lt;TR valign="top"&gt;&lt;TD align="left" colspan="2" style="font-family: arial; white-space: nowrap; font-size: 10pt;" valign="middle"&gt;&lt;DIV id="AUTOGENBOOKMARK_49" style="border-bottom: #43758d thin dotted; font-family: Verdana; color: #43758d; font-size: 8pt; padding-top: 3pt;"&gt;Access Policy&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="background-color: #f5f9fd;" valign="top"&gt;&lt;TD align="left" style="font-family: arial; white-space: nowrap; font-size: 10pt;" valign="middle"&gt;&lt;DIV id="AUTOGENBOOKMARK_50"&gt;Access Service:&lt;/DIV&gt;&lt;/TD&gt;&lt;TD align="left" style="font-family: arial; white-space: normal; font-size: 10pt;" valign="middle"&gt;VPN Remote Access&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="background-color: #ebeff3;" valign="top"&gt;&lt;TD align="left" style="font-family: arial; white-space: nowrap; font-size: 10pt;" valign="middle"&gt;&lt;DIV id="AUTOGENBOOKMARK_51"&gt;Identity Store:&lt;/DIV&gt;&lt;/TD&gt;&lt;TD align="left" style="font-family: arial; white-space: normal; font-size: 10pt;" valign="middle"&gt;&lt;DIV&gt;Token Server&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="background-color: #f5f9fd;" valign="top"&gt;&lt;TD align="left" style="font-family: arial; white-space: nowrap; font-size: 10pt;" valign="middle"&gt;&lt;DIV id="AUTOGENBOOKMARK_52"&gt;Authorization Profiles:&lt;/DIV&gt;&lt;/TD&gt;&lt;TD align="left" style="font-family: arial; white-space: normal; font-size: 10pt;" valign="middle"&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="background-color: #ebeff3;" valign="top"&gt;&lt;TD align="left" style="font-family: arial; white-space: nowrap; font-size: 10pt;" valign="middle"&gt;&lt;DIV id="AUTOGENBOOKMARK_53"&gt;Exception Authorization Profiles:&lt;/DIV&gt;&lt;/TD&gt;&lt;TD align="left" style="font-family: arial; white-space: normal; font-size: 10pt;" valign="middle"&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="background-color: #f5f9fd;" valign="top"&gt;&lt;TD align="left" style="font-family: arial; white-space: nowrap; font-size: 10pt;" valign="middle"&gt;&lt;DIV id="AUTOGENBOOKMARK_54"&gt;Active Directory Domain:&lt;/DIV&gt;&lt;/TD&gt;&lt;TD align="left" style="font-family: arial; white-space: normal; font-size: 10pt;" valign="middle"&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="background-color: #ebeff3;" valign="top"&gt;&lt;TD align="left" style="font-family: arial; white-space: nowrap; font-size: 10pt;" valign="middle"&gt;&lt;DIV id="AUTOGENBOOKMARK_55"&gt;Identity Group:&lt;/DIV&gt;&lt;/TD&gt;&lt;TD align="left" style="font-family: arial; white-space: normal; font-size: 10pt;" valign="middle"&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="background-color: #f5f9fd;" valign="top"&gt;&lt;TD align="left" style="font-family: arial; white-space: nowrap; font-size: 10pt;" valign="middle"&gt;&lt;DIV id="AUTOGENBOOKMARK_56"&gt;Access Service Selection Matched Rule:&lt;/DIV&gt;&lt;/TD&gt;&lt;TD align="left" style="font-family: arial; white-space: normal; font-size: 10pt;" valign="middle"&gt;&lt;DIV&gt;Rule-3&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="background-color: #ebeff3;" valign="top"&gt;&lt;TD align="left" style="font-family: arial; white-space: nowrap; font-size: 10pt;" valign="middle"&gt;&lt;DIV id="AUTOGENBOOKMARK_57"&gt;Identity Policy Matched Rule:&lt;/DIV&gt;&lt;/TD&gt;&lt;TD align="left" style="font-family: arial; white-space: normal; font-size: 10pt;" valign="middle"&gt;&lt;DIV&gt;VPN Store Sequence&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="background-color: #f5f9fd;" valign="top"&gt;&lt;TD align="left" style="font-family: arial; white-space: nowrap; font-size: 10pt;" valign="middle"&gt;&lt;DIV id="AUTOGENBOOKMARK_58"&gt;Selected Identity Stores:&lt;/DIV&gt;&lt;/TD&gt;&lt;TD align="left" style="font-family: arial; white-space: normal; font-size: 10pt;" valign="middle"&gt;&lt;DIV&gt;Token Server, IAS, Internal Users&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="background-color: #ebeff3;" valign="top"&gt;&lt;TD align="left" style="font-family: arial; white-space: nowrap; font-size: 10pt;" valign="middle"&gt;&lt;DIV id="AUTOGENBOOKMARK_59"&gt;Query Identity Stores:&lt;/DIV&gt;&lt;/TD&gt;&lt;TD align="left" style="font-family: arial; white-space: normal; font-size: 10pt;" valign="middle"&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="background-color: #f5f9fd;" valign="top"&gt;&lt;TD align="left" style="font-family: arial; white-space: nowrap; font-size: 10pt;" valign="middle"&gt;&lt;DIV id="AUTOGENBOOKMARK_60"&gt;Selected Query Identity Stores:&lt;/DIV&gt;&lt;/TD&gt;&lt;TD align="left" style="font-family: arial; white-space: normal; font-size: 10pt;" valign="middle"&gt;&lt;DIV&gt;Internal Users&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="background-color: #ebeff3;" valign="top"&gt;&lt;TD align="left" style="font-family: arial; white-space: nowrap; font-size: 10pt;" valign="middle"&gt;&lt;DIV id="AUTOGENBOOKMARK_61"&gt;Group Mapping Policy Matched Rule:&lt;/DIV&gt;&lt;/TD&gt;&lt;TD align="left" style="font-family: arial; white-space: normal; font-size: 10pt;" valign="middle"&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="background-color: #f5f9fd;" valign="top"&gt;&lt;TD align="left" style="font-family: arial; white-space: nowrap; font-size: 10pt;" valign="middle"&gt;&lt;DIV id="AUTOGENBOOKMARK_62"&gt;Authorization Policy Matched Rule:&lt;/DIV&gt;&lt;/TD&gt;&lt;TD align="left" style="font-family: arial; white-space: normal; font-size: 10pt;" valign="middle"&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="background-color: #ebeff3;" valign="top"&gt;&lt;TD align="left" style="font-family: arial; white-space: nowrap; font-size: 10pt;" valign="middle"&gt;&lt;DIV id="AUTOGENBOOKMARK_63"&gt;Authorization Exception Policy Matched Rule:&lt;/DIV&gt;&lt;/TD&gt;&lt;TD align="left" style="font-family: arial; white-space: normal; font-size: 10pt;" valign="middle"&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;TABLE id="S2" style="border-bottom: #808080 1px solid; border-left: #808080 1px solid; margin: 0pt; width: 100%; border-collapse: collapse; font-family: sans-serif; empty-cells: show; font-size: small; border-top: #e3e3e3 1px; border-right: #808080 1px solid;"&gt;&lt;TBODY&gt;&lt;TR align="left" style="border-bottom: #8499a2 thin; border-left: #8499a2 thin solid; padding-bottom: 1pt; padding-left: 2pt; padding-right: 2pt; color: #000000; border-top: #8499a2 thin; font-weight: normal; border-right: #8499a2 thin solid; padding-top: 1pt;" valign="middle"&gt;&lt;TD style="padding-bottom: 2pt; padding-left: 4pt; padding-right: 4pt; padding-top: 2pt;" valign="middle"&gt;&lt;DIV style="margin-top: 0pt;"&gt;15004&amp;nbsp; Matched rule&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR align="left" style="border-bottom: #8499a2 thin; border-left: #8499a2 thin solid; padding-bottom: 1pt; padding-left: 2pt; padding-right: 2pt; color: #000000; border-top: #8499a2 thin; font-weight: normal; border-right: #8499a2 thin solid; padding-top: 1pt;" valign="middle"&gt;&lt;TD style="padding-bottom: 2pt; padding-left: 4pt; padding-right: 4pt; padding-top: 2pt;" valign="middle"&gt;&lt;DIV style="margin-top: 0pt;"&gt;15013&amp;nbsp; Selected Identity Store - Token Server&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR align="left" style="border-bottom: #8499a2 thin; border-left: #8499a2 thin solid; padding-bottom: 1pt; padding-left: 2pt; padding-right: 2pt; color: #000000; border-top: #8499a2 thin; font-weight: normal; border-right: #8499a2 thin solid; padding-top: 1pt;" valign="middle"&gt;&lt;TD style="padding-bottom: 2pt; padding-left: 4pt; padding-right: 4pt; padding-top: 2pt;" valign="middle"&gt;&lt;DIV style="margin-top: 0pt;"&gt;24609&amp;nbsp; RADIUS token identity store is authenticating against the primary server.&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR align="left" style="border-bottom: #8499a2 thin; border-left: #8499a2 thin solid; padding-bottom: 1pt; padding-left: 2pt; padding-right: 2pt; color: #000000; border-top: #8499a2 thin; font-weight: normal; border-right: #8499a2 thin solid; padding-top: 1pt;" valign="middle"&gt;&lt;TD style="padding-bottom: 2pt; padding-left: 4pt; padding-right: 4pt; padding-top: 2pt;" valign="middle"&gt;&lt;DIV style="margin-top: 0pt;"&gt;11100&amp;nbsp; RADIUS-Client about to send request&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR align="left" style="border-bottom: #8499a2 thin; border-left: #8499a2 thin solid; padding-bottom: 1pt; padding-left: 2pt; padding-right: 2pt; color: #000000; border-top: #8499a2 thin; font-weight: normal; border-right: #8499a2 thin solid; padding-top: 1pt;" valign="middle"&gt;&lt;TD style="padding-bottom: 2pt; padding-left: 4pt; padding-right: 4pt; padding-top: 2pt;" valign="middle"&gt;&lt;DIV style="margin-top: 0pt;"&gt;11101&amp;nbsp; RADIUS-Client received response&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR align="left" style="border-bottom: #8499a2 thin; border-left: #8499a2 thin solid; padding-bottom: 1pt; padding-left: 2pt; padding-right: 2pt; color: #ff0000; border-top: #8499a2 thin; font-weight: normal; border-right: #8499a2 thin solid; padding-top: 1pt;" valign="middle"&gt;&lt;TD style="padding-bottom: 2pt; padding-left: 4pt; padding-right: 4pt; padding-top: 2pt;" valign="middle"&gt;&lt;DIV style="margin-top: 0pt;"&gt;24613&amp;nbsp; Authentication against the RADIUS token server failed.&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR align="left" style="border-bottom: #8499a2 thin; border-left: #8499a2 thin solid; padding-bottom: 1pt; padding-left: 2pt; padding-right: 2pt; color: #ff0000; border-top: #8499a2 thin; font-weight: normal; border-right: #8499a2 thin solid; padding-top: 1pt;" valign="middle"&gt;&lt;TD style="padding-bottom: 2pt; padding-left: 4pt; padding-right: 4pt; padding-top: 2pt;" valign="middle"&gt;&lt;DIV style="margin-top: 0pt;"&gt;22057&amp;nbsp; The advanced option that is configured for a failed authentication request is used.&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR align="left" style="border-bottom: #8499a2 thin; border-left: #8499a2 thin solid; padding-bottom: 1pt; padding-left: 2pt; padding-right: 2pt; color: #ff0000; border-top: #8499a2 thin; font-weight: normal; border-right: #8499a2 thin solid; padding-top: 1pt;" valign="middle"&gt;&lt;TD style="padding-bottom: 2pt; padding-left: 4pt; padding-right: 4pt; padding-top: 2pt;" valign="middle"&gt;&lt;DIV style="margin-top: 0pt;"&gt;22061&amp;nbsp; The 'Reject' advanced option is configured in case of a failed authentication request.&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR align="left" style="border-bottom: #8499a2 thin; border-left: #8499a2 thin solid; padding-bottom: 1pt; padding-left: 2pt; padding-right: 2pt; color: #ff0000; border-top: #8499a2 thin; font-weight: normal; border-right: #8499a2 thin solid; padding-top: 1pt;" valign="middle"&gt;&lt;TD style="padding-bottom: 2pt; padding-left: 4pt; padding-right: 4pt; padding-top: 2pt;" valign="middle"&gt;&lt;DIV style="margin-top: 0pt;"&gt;11003&amp;nbsp; Returned RADIUS Access-Reject&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 27 Oct 2010 08:22:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-2-with-different-radius-authentication-servers/m-p/1526861#M263558</guid>
      <dc:creator>dominikhug</dc:creator>
      <dc:date>2010-10-27T08:22:33Z</dc:date>
    </item>
    <item>
      <title>Re: ACS 5.2 with different RADIUS authentication servers</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-2-with-different-radius-authentication-servers/m-p/1526862#M263559</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Yoda &lt;SPAN __jive_emoticon_name="wink" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/wink.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for your help!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 27 Oct 2010 08:24:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-2-with-different-radius-authentication-servers/m-p/1526862#M263559</guid>
      <dc:creator>dominikhug</dc:creator>
      <dc:date>2010-10-27T08:24:49Z</dc:date>
    </item>
    <item>
      <title>Re: ACS 5.2 with different RADIUS authentication servers</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-2-with-different-radius-authentication-servers/m-p/1526863#M263560</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You need to select "Continue" under the Advanced Options of the Identity section.&lt;/P&gt;&lt;P&gt;Please take a look into the screenshot.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH,&lt;/P&gt;&lt;P&gt;Tiago&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;DIV class="jive-rendered-content"&gt;&lt;DIV class="jive-rendered-content"&gt;&lt;P&gt;--&lt;/P&gt;&lt;P&gt;If&amp;nbsp; this helps you and/or answers your question please mark the question as&amp;nbsp; "answered" and/or rate it, so other users can easily find it.&lt;/P&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;P&gt;&lt;IMG src="https://community.cisco.com/" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 27 Oct 2010 08:31:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-2-with-different-radius-authentication-servers/m-p/1526863#M263560</guid>
      <dc:creator>Tiago Antunes</dc:creator>
      <dc:date>2010-10-27T08:31:22Z</dc:date>
    </item>
    <item>
      <title>Re: ACS 5.2 with different RADIUS authentication servers</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-2-with-different-radius-authentication-servers/m-p/1526864#M263561</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;There is an option in the Advanced tab of th "RADIUS Identity server" definition:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This Identity Store does not differentiate between 'authentication failed' and 'user not found' when an authentication attempt is rejected. From the options below, select how such an authentication reject from the Identity Store should be interpreted by ACS for Identity Policy processing and reporting . &lt;BR /&gt;&lt;INPUT maxlength="2147483647" name="onReject" size="20" type="radio" value="fail" /&gt;Treat Rejects as 'authentication failed' &lt;INPUT maxlength="2147483647" name="onReject" size="20" type="radio" value="unknown" /&gt;Treat Rejects as 'user not found'&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In order to continue in the sequence I think you need to select the "user not found" option&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 27 Oct 2010 08:35:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-2-with-different-radius-authentication-servers/m-p/1526864#M263561</guid>
      <dc:creator>jrabinow</dc:creator>
      <dc:date>2010-10-27T08:35:52Z</dc:date>
    </item>
    <item>
      <title>Re: ACS 5.2 with different RADIUS authentication servers</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-2-with-different-radius-authentication-servers/m-p/1526865#M263562</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hey jrabinow&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That's exactly what I was looking for!!! Thanks a lot. Now everything is working.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Have a nice day!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 27 Oct 2010 09:26:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-2-with-different-radius-authentication-servers/m-p/1526865#M263562</guid>
      <dc:creator>dominikhug</dc:creator>
      <dc:date>2010-10-27T09:26:35Z</dc:date>
    </item>
  </channel>
</rss>

