<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic WLC with ACS 5.1 (RADIUS) for Management *AND* Network users in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/wlc-with-acs-5-1-radius-for-management-and-network-users/m-p/1454861#M312802</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have setup RADIUS authentication for Management AND network users, on my NM-WLC (running 5.2) against ACS 5.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My Question is :-&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For Admin users to login, I need to return "Service-Type=Administrative-User" in order for it to work.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Since the ACS sees all requests coming in from the same device (WLC) for Admin as well as Network users,&lt;/P&gt;&lt;P&gt;the way I am currently handling this is by creating a filter based on user-name&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; So, users that contain "admin" in their user-id, use one set of&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Network Access Authorization Policy, which has an associated Authorization Profile, with RADIUS attributes.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Normal users, have a different "Network Access Authorization Policy Rule", with another Profile.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;While this DOES WORK fine, I am still left wondering if there is a better way to do this, rather than create a rule,&lt;/P&gt;&lt;P&gt;based on user-name.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; I could use TACACS+ for Management, but I dont think ACS&amp;nbsp; allows the same AAA client (WLC) to use both protocols.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
    <pubDate>Mon, 11 Mar 2019 00:13:52 GMT</pubDate>
    <dc:creator>shahedvoicerite</dc:creator>
    <dc:date>2019-03-11T00:13:52Z</dc:date>
    <item>
      <title>WLC with ACS 5.1 (RADIUS) for Management *AND* Network users</title>
      <link>https://community.cisco.com/t5/network-access-control/wlc-with-acs-5-1-radius-for-management-and-network-users/m-p/1454861#M312802</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have setup RADIUS authentication for Management AND network users, on my NM-WLC (running 5.2) against ACS 5.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My Question is :-&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For Admin users to login, I need to return "Service-Type=Administrative-User" in order for it to work.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Since the ACS sees all requests coming in from the same device (WLC) for Admin as well as Network users,&lt;/P&gt;&lt;P&gt;the way I am currently handling this is by creating a filter based on user-name&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; So, users that contain "admin" in their user-id, use one set of&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Network Access Authorization Policy, which has an associated Authorization Profile, with RADIUS attributes.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Normal users, have a different "Network Access Authorization Policy Rule", with another Profile.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;While this DOES WORK fine, I am still left wondering if there is a better way to do this, rather than create a rule,&lt;/P&gt;&lt;P&gt;based on user-name.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; I could use TACACS+ for Management, but I dont think ACS&amp;nbsp; allows the same AAA client (WLC) to use both protocols.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 00:13:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/wlc-with-acs-5-1-radius-for-management-and-network-users/m-p/1454861#M312802</guid>
      <dc:creator>shahedvoicerite</dc:creator>
      <dc:date>2019-03-11T00:13:52Z</dc:date>
    </item>
    <item>
      <title>Re: WLC with ACS 5.1 (RADIUS) for Management *AND* Network users</title>
      <link>https://community.cisco.com/t5/network-access-control/wlc-with-acs-5-1-radius-for-management-and-network-users/m-p/1454862#M312803</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can use RADIUS and TACACS at the same time, without any problems (I have done it my self several times), you can then use different service selection rules based on whether the request came via RADIUS or TACACS.&amp;nbsp; The limitation of only supporting RADIUS OR TACACS on applies to v4.2 and earlier.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Rgds,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Richard&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 05 Jul 2010 15:30:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/wlc-with-acs-5-1-radius-for-management-and-network-users/m-p/1454862#M312803</guid>
      <dc:creator>Richard Atkin</dc:creator>
      <dc:date>2010-07-05T15:30:33Z</dc:date>
    </item>
    <item>
      <title>Re: WLC with ACS 5.1 (RADIUS) for Management *AND* Network users</title>
      <link>https://community.cisco.com/t5/network-access-control/wlc-with-acs-5-1-radius-for-management-and-network-users/m-p/1454863#M312804</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks. Earlier I was trying to add the same client twice with different protocols.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Just tried checking both checkboxes (radius &amp;amp; tacacs+), for a single aaa client, and it let me do that.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So I guess I *CAN* use TACACS+ for Management and RADIUS for Network users....&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; But is that the way its normally done ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; What if I only wanted to use RADIUS only ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Is there a better way to distinguish between Management and network users ??&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 05 Jul 2010 15:36:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/wlc-with-acs-5-1-radius-for-management-and-network-users/m-p/1454863#M312804</guid>
      <dc:creator>shahedvoicerite</dc:creator>
      <dc:date>2010-07-05T15:36:59Z</dc:date>
    </item>
    <item>
      <title>Re: WLC with ACS 5.1 (RADIUS) for Management *AND* Network users</title>
      <link>https://community.cisco.com/t5/network-access-control/wlc-with-acs-5-1-radius-for-management-and-network-users/m-p/1454864#M312805</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I think this is a very common way for things to be done&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You may notice that out of the box ACS 5 comes preinstalled with a service selection policy that differentiates requests based on the protocol and directs either to a "Default Network Access" or "Default Device Admin" service&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you only want to do RADIUS can either disable or delete the rule for TACACS+ requests or not select TACACS+ in device definitions&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 06 Jul 2010 06:29:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/wlc-with-acs-5-1-radius-for-management-and-network-users/m-p/1454864#M312805</guid>
      <dc:creator>jrabinow</dc:creator>
      <dc:date>2010-07-06T06:29:58Z</dc:date>
    </item>
  </channel>
</rss>

