<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: http authentication in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/http-authentication/m-p/1752310#M292338</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, my radius server is set to return the privilege level 15 using vendor specific and the value shell:priv-lvl=15.&amp;nbsp; I do not have any issues with this setup, and gaining telnet access to our routers.&amp;nbsp; HTTP access is working, but only grants level 1.&amp;nbsp; &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 29 Aug 2011 21:10:33 GMT</pubDate>
    <dc:creator>rmessina</dc:creator>
    <dc:date>2011-08-29T21:10:33Z</dc:date>
    <item>
      <title>http authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/http-authentication/m-p/1752308#M292297</link>
      <description>&lt;P&gt;Accessing the access point via telnet radius authentication works with no problems.&amp;nbsp; When I access via secure http I can authenticate, but I get level 1 or read access only.&amp;nbsp; Can someone assist.&amp;nbsp; Below is the config for the device.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;no service pad&lt;/P&gt;&lt;P&gt;service tcp-keepalives-in&lt;/P&gt;&lt;P&gt;service timestamps debug datetime msec localtime show-timezone&lt;/P&gt;&lt;P&gt;service timestamps log datetime msec localtime show-timezone&lt;/P&gt;&lt;P&gt;service password-encryption&lt;/P&gt;&lt;P&gt;service sequence-numbers&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname xxxx&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;logging buffered 16000 debugging&lt;/P&gt;&lt;P&gt;no logging console&lt;/P&gt;&lt;P&gt;no logging monitor&lt;/P&gt;&lt;P&gt;enable secret xxxxx&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;aaa new-model&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;aaa authentication login default group radius local&lt;/P&gt;&lt;P&gt;aaa authentication enable default enable&lt;/P&gt;&lt;P&gt;aaa authorization exec default group radius if-authenticated&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;aaa session-id common&lt;/P&gt;&lt;P&gt;clock timezone CST -6&lt;/P&gt;&lt;P&gt;clock summer-time CDT recurring&lt;/P&gt;&lt;P&gt;no ip source-route&lt;/P&gt;&lt;P&gt;no ip gratuitous-arps&lt;/P&gt;&lt;P&gt;ip tcp synwait-time 10&lt;/P&gt;&lt;P&gt;ip domain name xxxxx&lt;/P&gt;&lt;P&gt;ip name-server 10.5.10.20&lt;/P&gt;&lt;P&gt;ip name-server 10.5.10.19&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;dot11 ssid 150Wireless&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; vlan 102&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; authentication open&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; authentication key-management wpa version 2&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; wpa-psk ascii xxxxx&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;power inline negotiation prestandard source&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;crypto pki trustpoint TP-self-signed&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;crypto pki certificate chain TP-self-signed&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;username xxxx privilege 15 secret xxxxx&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;bridge irb&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Dot11Radio0&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt; no ip route-cache&lt;/P&gt;&lt;P&gt; !&lt;/P&gt;&lt;P&gt; encryption vlan 102 mode ciphers aes-ccm&lt;/P&gt;&lt;P&gt; !&lt;/P&gt;&lt;P&gt; ssid xxxx&lt;/P&gt;&lt;P&gt; !&lt;/P&gt;&lt;P&gt; station-role root&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Dot11Radio0.102&lt;/P&gt;&lt;P&gt; encapsulation dot1Q 102 native&lt;/P&gt;&lt;P&gt; no ip route-cache&lt;/P&gt;&lt;P&gt; bridge-group 1&lt;/P&gt;&lt;P&gt; bridge-group 1 subscriber-loop-control&lt;/P&gt;&lt;P&gt; bridge-group 1 block-unknown-source&lt;/P&gt;&lt;P&gt; no bridge-group 1 source-learning&lt;/P&gt;&lt;P&gt; no bridge-group 1 unicast-flooding&lt;/P&gt;&lt;P&gt; bridge-group 1 spanning-disabled&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Dot11Radio1&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt; no ip route-cache&lt;/P&gt;&lt;P&gt; !&lt;/P&gt;&lt;P&gt; encryption vlan 102 mode ciphers aes-ccm&lt;/P&gt;&lt;P&gt; !&lt;/P&gt;&lt;P&gt; ssid xxxx&lt;/P&gt;&lt;P&gt; !&lt;/P&gt;&lt;P&gt; dfs band 3 block&lt;/P&gt;&lt;P&gt; channel dfs&lt;/P&gt;&lt;P&gt; station-role root&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Dot11Radio1.102&lt;/P&gt;&lt;P&gt; encapsulation dot1Q 102 native&lt;/P&gt;&lt;P&gt; no ip route-cache&lt;/P&gt;&lt;P&gt; bridge-group 1&lt;/P&gt;&lt;P&gt; bridge-group 1 subscriber-loop-control&lt;/P&gt;&lt;P&gt; bridge-group 1 block-unknown-source&lt;/P&gt;&lt;P&gt; no bridge-group 1 source-learning&lt;/P&gt;&lt;P&gt; no bridge-group 1 unicast-flooding&lt;/P&gt;&lt;P&gt; bridge-group 1 spanning-disabled&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface FastEthernet0&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt; no ip route-cache&lt;/P&gt;&lt;P&gt; duplex auto&lt;/P&gt;&lt;P&gt; speed auto&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface FastEthernet0.102&lt;/P&gt;&lt;P&gt; encapsulation dot1Q 102 native&lt;/P&gt;&lt;P&gt; no ip route-cache&lt;/P&gt;&lt;P&gt; bridge-group 1&lt;/P&gt;&lt;P&gt; no bridge-group 1 source-learning&lt;/P&gt;&lt;P&gt; bridge-group 1 spanning-disabled&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface BVI1&lt;/P&gt;&lt;P&gt; ip address 10.5.102.6 255.255.255.0&lt;/P&gt;&lt;P&gt; no ip route-cache&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ip default-gateway 10.5.102.1&lt;/P&gt;&lt;P&gt;no ip http server&lt;/P&gt;&lt;P&gt;ip http authentication aaa&lt;/P&gt;&lt;P&gt;ip http secure-server&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;ip http help-path &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/warp/public/779/smbiz/prodconfig/help/eag" target="_blank"&gt;http://www.cisco.com/warp/public/779/smbiz/prodconfig/help/eag&lt;/A&gt;&lt;/P&gt;&lt;P&gt;ip radius source-interface BVI1&lt;/P&gt;&lt;P&gt;logging trap debugging&lt;/P&gt;&lt;P&gt;logging 10.20.1.5&lt;/P&gt;&lt;P&gt;access-list 1 remark VTY Access&lt;/P&gt;&lt;P&gt;access-list 1 permit 10.20.0.0 0.0.3.255&lt;/P&gt;&lt;P&gt;access-list 1 permit 10.20.4.0 0.0.0.255&lt;/P&gt;&lt;P&gt;access-list 1 permit 10.20.100.0 0.0.0.255&lt;/P&gt;&lt;P&gt;access-list 1 permit 10.20.128.0 0.0.3.255&lt;/P&gt;&lt;P&gt;access-list 2 remark SNMP to NOC&lt;/P&gt;&lt;P&gt;access-list 2 permit 10.20.1.5&lt;/P&gt;&lt;P&gt;access-list 2 deny&amp;nbsp;&amp;nbsp; any log&lt;/P&gt;&lt;P&gt;snmp-server community xxxxx RO 2&lt;/P&gt;&lt;P&gt;snmp-server community xxxxx RW 2&lt;/P&gt;&lt;P&gt;snmp-server enable traps tty&lt;/P&gt;&lt;P&gt;radius-server host xx auth-port 1645 acct-port 1646&lt;/P&gt;&lt;P&gt;radius-server host xx auth-port 1645 acct-port 1646&lt;/P&gt;&lt;P&gt;radius-server key xxxxxx&lt;/P&gt;&lt;P&gt;bridge 1 route ip&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;line con 0&lt;/P&gt;&lt;P&gt; exec-timeout 5 0&lt;/P&gt;&lt;P&gt; logging synchronous&lt;/P&gt;&lt;P&gt; transport output all&lt;/P&gt;&lt;P&gt;line vty 0 4&lt;/P&gt;&lt;P&gt; access-class 1 in&lt;/P&gt;&lt;P&gt; exec-timeout 9 0&lt;/P&gt;&lt;P&gt; transport input telnet&lt;/P&gt;&lt;P&gt; transport output all&lt;/P&gt;&lt;P&gt;line vty 5 15&lt;/P&gt;&lt;P&gt; access-class 1 in&lt;/P&gt;&lt;P&gt; exec-timeout 9 0&lt;/P&gt;&lt;P&gt; transport input telnet&lt;/P&gt;&lt;P&gt; transport output all&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;scheduler interval 500&lt;/P&gt;&lt;P&gt;sntp server 10.20.0.1&lt;/P&gt;&lt;P&gt;sntp broadcast client&lt;/P&gt;&lt;P&gt;end&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 01:19:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/http-authentication/m-p/1752308#M292297</guid>
      <dc:creator>rmessina</dc:creator>
      <dc:date>2019-03-11T01:19:29Z</dc:date>
    </item>
    <item>
      <title>http authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/http-authentication/m-p/1752309#M292320</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Randy,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;does your RADIUS server return the privilege level 15 as part of the authorization info? ([009\001] cisco-av-pair : "shell:priv-lvl=15")&lt;/P&gt;&lt;P&gt;You will need for this in order to authorize access to the GUI,&amp;nbsp; as the commands used to compile the web page output require high&amp;nbsp; privilege.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I hope this helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Federico&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 29 Aug 2011 10:37:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/http-authentication/m-p/1752309#M292320</guid>
      <dc:creator>Federico Lovison</dc:creator>
      <dc:date>2011-08-29T10:37:06Z</dc:date>
    </item>
    <item>
      <title>Re: http authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/http-authentication/m-p/1752310#M292338</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, my radius server is set to return the privilege level 15 using vendor specific and the value shell:priv-lvl=15.&amp;nbsp; I do not have any issues with this setup, and gaining telnet access to our routers.&amp;nbsp; HTTP access is working, but only grants level 1.&amp;nbsp; &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 29 Aug 2011 21:10:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/http-authentication/m-p/1752310#M292338</guid>
      <dc:creator>rmessina</dc:creator>
      <dc:date>2011-08-29T21:10:33Z</dc:date>
    </item>
    <item>
      <title>Re: http authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/http-authentication/m-p/1752311#M292364</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Have you tried:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip http secure-server aaa&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Fabio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 30 Aug 2011 04:47:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/http-authentication/m-p/1752311#M292364</guid>
      <dc:creator>Fabio Francisco</dc:creator>
      <dc:date>2011-08-30T04:47:44Z</dc:date>
    </item>
    <item>
      <title>Re: http authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/http-authentication/m-p/1752312#M292389</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;That is not a valid command in my IOS version.&amp;nbsp; &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 30 Aug 2011 13:06:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/http-authentication/m-p/1752312#M292389</guid>
      <dc:creator>rmessina</dc:creator>
      <dc:date>2011-08-30T13:06:33Z</dc:date>
    </item>
    <item>
      <title>http authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/http-authentication/m-p/1752313#M292407</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Add to your configuration:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa authorization exec web group radius local&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip http authentication aaa exec-authorization web&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;See if that helps.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 31 Aug 2011 14:08:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/http-authentication/m-p/1752313#M292407</guid>
      <dc:creator>Javier Henderson</dc:creator>
      <dc:date>2011-08-31T14:08:42Z</dc:date>
    </item>
  </channel>
</rss>

