<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cisco ACS 4.2 and Radius authentication? in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/cisco-acs-4-2-and-radius-authentication/m-p/1631462#M296026</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000;"&gt;To access network devices for administrative purpose, we have only three methods available :&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000;"&gt;[1] Telnet : Which uses PAP authentication protocol between client and the NAS device. So the communication between Client and NAS is unencrypted,&amp;nbsp; &lt;/SPAN&gt;&lt;SPAN style="color: #800000;"&gt;and when this information flows from NAS to IAS server gets encrypted using the shared secret key configured on device/IAS server.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000;"&gt;[2] SSH : Which uses&amp;nbsp; public-key cryptography for encrypting information between client and the NAS device, i.e, information sent between client&amp;nbsp; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000;"&gt;and NAS is fully secure. And the communication between NAS and IAS is encrypted using shared secret same as above. Good point on SSH side is that commincation channel is secure all the time.&lt;/SPAN&gt;&lt;SPAN style="color: #800000;"&gt;Again the authentication type would remain same that is PAP.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000;"&gt;[3] Console:Which is also the same it will not allow to use MSCHAP as there is no need to secure it as you laptop is connected directly to the NAS and then if you are using TACACS it will encrypt the payload .&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000;"&gt;Summarizing, we cannot use CHAP, MS-CHAP, MS-CHAP V2 for communication between client and NAS device or administrative access.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000;"&gt;And the most secure way to administer a&amp;nbsp; device is to use SSH.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000;"&gt;Rgds, Jatin&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000;"&gt;Do rate helpful post~&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 17 Feb 2011 03:00:11 GMT</pubDate>
    <dc:creator>Jatin Katyal</dc:creator>
    <dc:date>2011-02-17T03:00:11Z</dc:date>
    <item>
      <title>Cisco ACS 4.2 and Radius authentication?</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-acs-4-2-and-radius-authentication/m-p/1631459#M295972</link>
      <description>&lt;P&gt;Hi, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a Cisco ACS 4.2 installed and using it to authenticate users that log on to switches using TACACS+, when I use local password database, everything is working. But if i try to use external database authentication using a windows 2008 radius server, I have problem that I can only use PAP, not CHAP. Anyone who know if it's possible to use CHAP with external radius authentication?&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 00:49:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-acs-4-2-and-radius-authentication/m-p/1631459#M295972</guid>
      <dc:creator>f-persson</dc:creator>
      <dc:date>2019-03-11T00:49:59Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ACS 4.2 and Radius authentication?</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-acs-4-2-and-radius-authentication/m-p/1631460#M295987</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi F-Persson:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I think you are little confused.&lt;/P&gt;&lt;P&gt;The ACS uses RADIUS and TACACS+ to authenticate users and in general to do AAA.&lt;/P&gt;&lt;P&gt;I understand that your are integrating the ACS with a Window 2008 Server. This is called External Database (I guest this is what you call external raduis).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As I know, theres is no problem to use PAP or CHAP for Extenal Windows Authentication.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I recommend the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am asuming you have already installed the Remote Agent. And you have configured the External Database configuration for Windows Authentication.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. Check if you are able to read the Windows Groups from the ACS&lt;/P&gt;&lt;P&gt;2. When testing the users authenticatión, look into the Remote Agent logs for a specific "Windows Error" o integration error.&lt;/P&gt;&lt;P&gt;3. In System Configuration-&amp;gt;Global Authentication Setup, verify what options you have checked in "MS-CHAP Configuration" section&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 16 Feb 2011 17:04:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-acs-4-2-and-radius-authentication/m-p/1631460#M295987</guid>
      <dc:creator>marcohernandez</dc:creator>
      <dc:date>2011-02-16T17:04:06Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ACS 4.2 and Radius authentication?</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-acs-4-2-and-radius-authentication/m-p/1631461#M296004</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I'm using external database authentication, but not windows authentication, I've set up Radius Authentication. And there you cab only specify radius server etc, but not choose PAP/CHAP etc.. So I can se in my radiusserver that it uses PAP (unencrypted) and I dont want these accounts to travel unencrypted on my network. But how can I use CHAP instead of PAP when using a Radius server as external database?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 16 Feb 2011 19:13:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-acs-4-2-and-radius-authentication/m-p/1631461#M296004</guid>
      <dc:creator>f-persson</dc:creator>
      <dc:date>2011-02-16T19:13:25Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ACS 4.2 and Radius authentication?</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-acs-4-2-and-radius-authentication/m-p/1631462#M296026</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000;"&gt;To access network devices for administrative purpose, we have only three methods available :&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000;"&gt;[1] Telnet : Which uses PAP authentication protocol between client and the NAS device. So the communication between Client and NAS is unencrypted,&amp;nbsp; &lt;/SPAN&gt;&lt;SPAN style="color: #800000;"&gt;and when this information flows from NAS to IAS server gets encrypted using the shared secret key configured on device/IAS server.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000;"&gt;[2] SSH : Which uses&amp;nbsp; public-key cryptography for encrypting information between client and the NAS device, i.e, information sent between client&amp;nbsp; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000;"&gt;and NAS is fully secure. And the communication between NAS and IAS is encrypted using shared secret same as above. Good point on SSH side is that commincation channel is secure all the time.&lt;/SPAN&gt;&lt;SPAN style="color: #800000;"&gt;Again the authentication type would remain same that is PAP.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000;"&gt;[3] Console:Which is also the same it will not allow to use MSCHAP as there is no need to secure it as you laptop is connected directly to the NAS and then if you are using TACACS it will encrypt the payload .&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000;"&gt;Summarizing, we cannot use CHAP, MS-CHAP, MS-CHAP V2 for communication between client and NAS device or administrative access.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000;"&gt;And the most secure way to administer a&amp;nbsp; device is to use SSH.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000;"&gt;Rgds, Jatin&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000;"&gt;Do rate helpful post~&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 17 Feb 2011 03:00:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-acs-4-2-and-radius-authentication/m-p/1631462#M296026</guid>
      <dc:creator>Jatin Katyal</dc:creator>
      <dc:date>2011-02-17T03:00:11Z</dc:date>
    </item>
  </channel>
</rss>

