<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Radius Integration with Nexus in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/radius-integration-with-nexus/m-p/1548557#M267252</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Rakesh,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i have noticed one thing in debug logs that this is for Auth privilege 3 user. that has to be for lvl 7 for sucess. so let's try one thing:-&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;PRE&gt;2010 Nov 19 13:45:16 C15F0DCCODS3 %AUTHPRIV-7-SYSTEM_MSG: pam_aaa:Authenticationfailed for user 
ankur4888 from 172.18.1.12 - login
&lt;/PRE&gt;&lt;/P&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;PRE&gt;
what can be done is t
o set logging level for authpriv to 7. at that point you will see logs
 that look like this:

%AUTHPRIV-7-SYSTEM_MSG: user test authenticated&amp;nbsp; - login

This is the best that can be done for aaa local login authentication 
logging.

How:

&amp;nbsp;&amp;nbsp; logging level authpriv 7
&amp;nbsp;&amp;nbsp; logging level auth 7

&lt;/PRE&gt;&lt;/P&gt;&lt;DIV&gt;Please try that and share the results.&lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt;thanks,&lt;/DIV&gt;&lt;DIV&gt;Vinay&lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;-----&lt;DIV&gt;If&amp;nbsp; this helps you and/or answers your question please mark the question as&amp;nbsp; "answered" and/or rate it, so other users can easily find it.&lt;/DIV&gt;&lt;DIV&gt;----------&lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 19 Nov 2010 11:43:54 GMT</pubDate>
    <dc:creator>Vinay Sharma</dc:creator>
    <dc:date>2010-11-19T11:43:54Z</dc:date>
    <item>
      <title>Radius Integration with Nexus</title>
      <link>https://community.cisco.com/t5/network-access-control/radius-integration-with-nexus/m-p/1548556#M267251</link>
      <description>&lt;P&gt;&lt;SPAN style="background-color: #f8fafd;"&gt;Hi,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="background-color: #f8fafd;"&gt;I have configured Nexus 7000 for Radius authentication. Login is being shown successfull on RSA server However login on Nexus is not successful giving the below error.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;C15F0DCCODS3# 2010 Nov 19 13:44:01 C15F0DCCODS3 %AUTHPRIV-3-SYSTEM_MSG: pam_aaa:Authentication failed for user ankur4888 from 172.18.1.12 - login.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Below is the output of debug aaa aaa-requests :&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;C15F0DCCODS3# 2010 Nov 19 13:45:14.750183 aaa: mts_aaa_req_process&lt;BR /&gt;2010 Nov 19 13:45:14.750244 aaa: aaa_req_process for authentication. session no&lt;BR /&gt;0&lt;BR /&gt;2010 Nov 19 13:45:14.750283 aaa: aaa_req_process: General AAA request from appln&lt;BR /&gt;: login appln_subtype: default&lt;BR /&gt;2010 Nov 19 13:45:14.750310 aaa: try_next_aaa_method&lt;BR /&gt;2010 Nov 19 13:45:14.750351 aaa: total methods configured is 1, current index to&lt;BR /&gt; be tried is 0&lt;BR /&gt;2010 Nov 19 13:45:14.750379 aaa: handle_req_using_method&lt;BR /&gt;2010 Nov 19 13:45:14.750404 aaa: AAA_METHOD_SERVER_GROUP&lt;BR /&gt;2010 Nov 19 13:45:14.750429 aaa: aaa_sg_method_handler group = EXL-RADIUS&lt;BR /&gt;2010 Nov 19 13:45:14.750454 aaa: Using sg_protocol which is passed to this funct&lt;BR /&gt;ion&lt;BR /&gt;2010 Nov 19 13:45:14.750483 aaa: Sending request to RADIUS service&lt;BR /&gt;2010 Nov 19 13:45:14.750553 aaa: Configured method group Succeeded&lt;BR /&gt;2010 Nov 19 13:45:16.788367 aaa: prot_daemon_reponse_handler&lt;BR /&gt;2010 Nov 19 13:45:16.788468 aaa: is_aaa_resp_status_success status = 1&lt;BR /&gt;2010 Nov 19 13:45:16.788496 aaa: is_aaa_resp_status_success is TRUE&lt;BR /&gt;2010 Nov 19 13:45:16.788523 aaa: aaa_send_client_response for authentication. session-&amp;gt;flags=21. aaa_resp-&amp;gt;flags=0.&lt;BR /&gt;2010 Nov 19 13:45:16.788549 aaa: AAA_REQ_FLAG_NORMAL&lt;BR /&gt;2010 Nov 19 13:45:16.788592 aaa: mts_send_response Successful&lt;BR /&gt;2010 Nov 19 13:45:16.788628 aaa: aaa_cleanup_session&lt;BR /&gt;2010 Nov 19 13:45:16.788655 aaa: mts_drop of request msg&lt;BR /&gt;2010 Nov 19 13:45:16.788683 aaa: aaa_req should be freed.&lt;BR /&gt;2010 Nov 19 13:45:16 C15F0DCCODS3 %AUTHPRIV-3-SYSTEM_MSG: pam_aaa:Authenticationfailed for user ankur4888 from 172.18.1.12 - login&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Rakesh&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 00:35:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/radius-integration-with-nexus/m-p/1548556#M267251</guid>
      <dc:creator>rakesh.dutt</dc:creator>
      <dc:date>2019-03-11T00:35:35Z</dc:date>
    </item>
    <item>
      <title>Re: Radius Integration with Nexus</title>
      <link>https://community.cisco.com/t5/network-access-control/radius-integration-with-nexus/m-p/1548557#M267252</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Rakesh,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i have noticed one thing in debug logs that this is for Auth privilege 3 user. that has to be for lvl 7 for sucess. so let's try one thing:-&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;PRE&gt;2010 Nov 19 13:45:16 C15F0DCCODS3 %AUTHPRIV-7-SYSTEM_MSG: pam_aaa:Authenticationfailed for user 
ankur4888 from 172.18.1.12 - login
&lt;/PRE&gt;&lt;/P&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;PRE&gt;
what can be done is t
o set logging level for authpriv to 7. at that point you will see logs
 that look like this:

%AUTHPRIV-7-SYSTEM_MSG: user test authenticated&amp;nbsp; - login

This is the best that can be done for aaa local login authentication 
logging.

How:

&amp;nbsp;&amp;nbsp; logging level authpriv 7
&amp;nbsp;&amp;nbsp; logging level auth 7

&lt;/PRE&gt;&lt;/P&gt;&lt;DIV&gt;Please try that and share the results.&lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt;thanks,&lt;/DIV&gt;&lt;DIV&gt;Vinay&lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;-----&lt;DIV&gt;If&amp;nbsp; this helps you and/or answers your question please mark the question as&amp;nbsp; "answered" and/or rate it, so other users can easily find it.&lt;/DIV&gt;&lt;DIV&gt;----------&lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 19 Nov 2010 11:43:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/radius-integration-with-nexus/m-p/1548557#M267252</guid>
      <dc:creator>Vinay Sharma</dc:creator>
      <dc:date>2010-11-19T11:43:54Z</dc:date>
    </item>
    <item>
      <title>Re: Radius Integration with Nexus</title>
      <link>https://community.cisco.com/t5/network-access-control/radius-integration-with-nexus/m-p/1548558#M267255</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It din work work. However i applied the command aaa user default-role &amp;amp; it started to login. Nexus expects the AAA server to send the autorization for the user &amp;amp; if that is not there in reply from the RSA, the login is failed. This was the problem is my case so as soon as i applied "aaa user default-role ". The user is able to login with default role i.e operator.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am using RSA as AAA server. I am not able to find any option in RSA wherein i can enable to to send network-admin role with auhentication.&lt;/P&gt;&lt;P&gt;Is there any compatiablity problem in integrating Nexus with RSA as AAA srver&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Rakesh&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 22 Nov 2010 08:20:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/radius-integration-with-nexus/m-p/1548558#M267255</guid>
      <dc:creator>rakesh.dutt</dc:creator>
      <dc:date>2010-11-22T08:20:13Z</dc:date>
    </item>
    <item>
      <title>Re: Radius Integration with Nexus</title>
      <link>https://community.cisco.com/t5/network-access-control/radius-integration-with-nexus/m-p/1548559#M267259</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN style="background-color: #f8fafd;"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="background-color: #f8fafd;"&gt;Traditional IOS needs only user and password.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="background-color: #f8fafd;"&gt;On the other hand, Nexus, Cisco ACE and Cisco CRS are very different. They have "users and passwords" but also "roles" and "domains". If you don't specify a role or a domain you will get default role and default domain.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="background-color: #f8fafd;"&gt;Your radius server should be customizable enough to set these attributes. Cisco ACS 5.x is a great AAA server. I have configured&amp;nbsp; AAA between Cisco ACE and Cisco ACS using customized roles without problems.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="background-color: #f8fafd;"&gt;In your scenario I would recommend to use TACACS+ between Nexus and ACS 5.x and SecurID protocol between ACS 5.x and RSA server.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="background-color: #f8fafd;"&gt;But if you want to use RADIUS between Nexus and RSA server then you will have to find and set the right attributes in your RSA server.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="background-color: #f8fafd;"&gt;A packet capture from Cisco ACE shows the following attribute:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="background-color: #f8fafd;"&gt;AVP: L=39&amp;nbsp; t=vendor-specific(26) v=Cisco(9)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="background-color: #f8fafd;"&gt;&amp;nbsp;&amp;nbsp; VSA: L=33 t=Cisco-AVPair(1)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="background-color: #f8fafd;"&gt;I'm taking is something similar for Cisco Nexus. If you find the right attribute you have to set that attribute to something like the following:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="background-color: #f8fafd;"&gt;"shell:Cnt1=admin default-domain"&amp;nbsp; , &lt;/SPAN&gt;&lt;SPAN style="background-color: #f8fafd;"&gt;where "Cnt1" is the ACE context, "admin" is the role, and default-domain is the domain.&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 24 Nov 2010 16:03:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/radius-integration-with-nexus/m-p/1548559#M267259</guid>
      <dc:creator>Eduardo Aliaga</dc:creator>
      <dc:date>2010-11-24T16:03:49Z</dc:date>
    </item>
  </channel>
</rss>

