<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Using CHAP with RADIUS authentication in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/using-chap-with-radius-authentication/m-p/1834086#M330107</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Carlos&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for that. I suspected this was the case but I wasn't sure.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I assume that if I were to configure an ASA/PIX for RADIUS authentication from remote VPN clients I could configure this for CHAP?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks again.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;John&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 24 Jan 2012 19:02:24 GMT</pubDate>
    <dc:creator>marraboytear</dc:creator>
    <dc:date>2012-01-24T19:02:24Z</dc:date>
    <item>
      <title>Using CHAP with RADIUS authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/using-chap-with-radius-authentication/m-p/1834082#M329808</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have configured a Cisco 877 router to send RADIUS requests when a user logs in to the console (Line Console or Line VTY) using the following config:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa new-model&lt;/P&gt;&lt;P&gt;aaa authentication login default group radius&lt;/P&gt;&lt;P&gt;aaa authentication ppp default group radius&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;radius-server host 10.0.0.1 auth-port 1812 acct-port 1812 key mysharedkey&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When I log the RADIUS packets I see that the Cisco router is sending the initial AccessRequest using PAP.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;How can I configure the router to send it's inial AccessRequest packet using CHAP?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Apologies if this has already been discussed, I have searched high and low for an answer.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;John&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 01:44:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/using-chap-with-radius-authentication/m-p/1834082#M329808</guid>
      <dc:creator>marraboytear</dc:creator>
      <dc:date>2019-03-11T01:44:58Z</dc:date>
    </item>
    <item>
      <title>Using CHAP with RADIUS authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/using-chap-with-radius-authentication/m-p/1834083#M329896</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello John,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Recently I commented on a similar request for ASA:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="https://community.cisco.com/message/3536900#3536900"&gt;https://supportforums.cisco.com/message/3536900#3536900&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please review the above as it applies for IOS Management Authentication as well.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If this helps please rate.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Best Regards.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 23 Jan 2012 23:46:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/using-chap-with-radius-authentication/m-p/1834083#M329896</guid>
      <dc:creator>camejia</dc:creator>
      <dc:date>2012-01-23T23:46:25Z</dc:date>
    </item>
    <item>
      <title>Using CHAP with RADIUS authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/using-chap-with-radius-authentication/m-p/1834084#M329958</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Carlos&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for your response. I understand what it says in the RFC:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE style="border-collapse: collapse; font-size: 1.2em; list-style-type: none; display: block; overflow-x: auto; overflow-y: auto; width: auto; white-space: pre;"&gt;The NAS then sends an Access-Request
&amp;nbsp;&amp;nbsp; packet to the RADIUS server with the CHAP username as the User-Name
&amp;nbsp;&amp;nbsp; and with the CHAP ID and CHAP response as the CHAP-Password
&amp;nbsp;&amp;nbsp; (Attribute 3).&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But, by default the NAS (in this case the Cisco 877 router) is sending a RADIUS packet with a PAP encoded password by default. As the NAS initiates the AccessRequest I need to configure it to send the correct attributes for the CHAP challenge. This is configured on the RADIUS server so it knows the NAS is going to send CHAP but the NAS initiates the request and I guess needs to be configured to do so.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is this possible on a Cisco 877? How?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;John&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 24 Jan 2012 10:02:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/using-chap-with-radius-authentication/m-p/1834084#M329958</guid>
      <dc:creator>marraboytear</dc:creator>
      <dc:date>2012-01-24T10:02:19Z</dc:date>
    </item>
    <item>
      <title>Using CHAP with RADIUS authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/using-chap-with-radius-authentication/m-p/1834085#M330010</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello John,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PPP connection do support CHAP as there is a configuration command to enable CHAP as the challenge-response protocol. However, Console, VTY and AUX connections will always go over PAP when using RADIUS authentication. There is no such command to enable CHAP for those type of connections.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Best Regards.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 24 Jan 2012 16:11:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/using-chap-with-radius-authentication/m-p/1834085#M330010</guid>
      <dc:creator>camejia</dc:creator>
      <dc:date>2012-01-24T16:11:17Z</dc:date>
    </item>
    <item>
      <title>Using CHAP with RADIUS authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/using-chap-with-radius-authentication/m-p/1834086#M330107</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Carlos&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for that. I suspected this was the case but I wasn't sure.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I assume that if I were to configure an ASA/PIX for RADIUS authentication from remote VPN clients I could configure this for CHAP?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks again.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;John&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 24 Jan 2012 19:02:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/using-chap-with-radius-authentication/m-p/1834086#M330107</guid>
      <dc:creator>marraboytear</dc:creator>
      <dc:date>2012-01-24T19:02:24Z</dc:date>
    </item>
    <item>
      <title>Using CHAP with RADIUS authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/using-chap-with-radius-authentication/m-p/1834087#M330199</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello John,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you enable the command "password-management" under the ASA Tunnel Group configuration the ASA should use MSCHAPv2.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am glad that I was able to help you.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Best Regards.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 24 Jan 2012 19:20:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/using-chap-with-radius-authentication/m-p/1834087#M330199</guid>
      <dc:creator>camejia</dc:creator>
      <dc:date>2012-01-24T19:20:30Z</dc:date>
    </item>
  </channel>
</rss>

