<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Radius-Server Failure in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/radius-server-failure/m-p/1352890#M342588</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN style="color: #800000;"&gt;Hi Dan,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: Arial; color: #800000;"&gt;when radius server is not available and you want to allow everyone to the network for that we need to configure IAB on the switch:&lt;BR /&gt; &lt;BR /&gt; Configuring 802.1X with Inaccessible Authentication Bypass:&lt;BR /&gt; &lt;BR /&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/switches/lan/catalyst4500/12.2/40sg/configuration/guide/dot1x.html#wp1203805"&gt;http://www.cisco.com/en/US/docs/switches/lan/catalyst4500/12.2/40sg/configuration/guide/dot1x.html#wp1203805&lt;/A&gt;&lt;BR /&gt; &lt;BR /&gt; Please ensure that you DO configure,&lt;BR /&gt; &lt;BR /&gt; # RADIUS test username&lt;BR /&gt; # Radius idle-time&lt;BR /&gt; # Radius deadtime, and&lt;BR /&gt; # Radius dead-criteria.&lt;BR /&gt; &lt;BR /&gt; For IAB to work properly.&lt;BR /&gt; &lt;BR /&gt; The configuration details can be found from,&lt;BR /&gt; &lt;BR /&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/switches/lan/catalyst4500/12.2/40sg/configuration/guide/dot1x.html#wp1143560"&gt;http://www.cisco.com/en/US/docs/switches/lan/catalyst4500/12.2/40sg/configuration/guide/dot1x.html#wp1143560&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000;"&gt;HTH&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000;"&gt;Regards,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000;"&gt;JK&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000;"&gt;Plz rate helpful posts-&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 11 Jan 2010 22:14:46 GMT</pubDate>
    <dc:creator>Jatin Katyal</dc:creator>
    <dc:date>2010-01-11T22:14:46Z</dc:date>
    <item>
      <title>Radius-Server Failure</title>
      <link>https://community.cisco.com/t5/network-access-control/radius-server-failure/m-p/1352889#M342563</link>
      <description>&lt;P&gt;Can anyone help me with the command that acts as a failsafe for dot1x.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If the both radius servers go down, what is the command to automatically authorize everyone into there native vlan?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Kind Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Dan&lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 23:53:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/radius-server-failure/m-p/1352889#M342563</guid>
      <dc:creator>hellspire69_2</dc:creator>
      <dc:date>2019-03-10T23:53:03Z</dc:date>
    </item>
    <item>
      <title>Re: Radius-Server Failure</title>
      <link>https://community.cisco.com/t5/network-access-control/radius-server-failure/m-p/1352890#M342588</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN style="color: #800000;"&gt;Hi Dan,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: Arial; color: #800000;"&gt;when radius server is not available and you want to allow everyone to the network for that we need to configure IAB on the switch:&lt;BR /&gt; &lt;BR /&gt; Configuring 802.1X with Inaccessible Authentication Bypass:&lt;BR /&gt; &lt;BR /&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/switches/lan/catalyst4500/12.2/40sg/configuration/guide/dot1x.html#wp1203805"&gt;http://www.cisco.com/en/US/docs/switches/lan/catalyst4500/12.2/40sg/configuration/guide/dot1x.html#wp1203805&lt;/A&gt;&lt;BR /&gt; &lt;BR /&gt; Please ensure that you DO configure,&lt;BR /&gt; &lt;BR /&gt; # RADIUS test username&lt;BR /&gt; # Radius idle-time&lt;BR /&gt; # Radius deadtime, and&lt;BR /&gt; # Radius dead-criteria.&lt;BR /&gt; &lt;BR /&gt; For IAB to work properly.&lt;BR /&gt; &lt;BR /&gt; The configuration details can be found from,&lt;BR /&gt; &lt;BR /&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/switches/lan/catalyst4500/12.2/40sg/configuration/guide/dot1x.html#wp1143560"&gt;http://www.cisco.com/en/US/docs/switches/lan/catalyst4500/12.2/40sg/configuration/guide/dot1x.html#wp1143560&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000;"&gt;HTH&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000;"&gt;Regards,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000;"&gt;JK&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000;"&gt;Plz rate helpful posts-&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 11 Jan 2010 22:14:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/radius-server-failure/m-p/1352890#M342588</guid>
      <dc:creator>Jatin Katyal</dc:creator>
      <dc:date>2010-01-11T22:14:46Z</dc:date>
    </item>
  </channel>
</rss>

