<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Configuring IOS authentication with Windows IAS in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/configuring-ios-authentication-with-windows-ias/m-p/841384#M407823</link>
    <description>&lt;P&gt;I've successfully configured both a test switch (Catalyst 3560) and Windows Server 2003 IAS to allow RADIUS authentication on the switch. The problem I'm having is that the switch will apparently allow anyone who can authenticate through IAS to access the switch. In testing with a non-admin account, I found that IAS is allowing this account to authenticate through a lower ranked policy which is used for generic VPN access. I thought I could control this by using a named list on the switch in the aaa authentication command, but it doesn't seem to be working.&lt;/P&gt;&lt;P&gt;Relevant switch config:&lt;/P&gt;&lt;P&gt;aaa new-model&lt;/P&gt;&lt;P&gt;aaa authentication login NetworkAdmin group radius local &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;radius-server host 172.16.0.42 auth-port 1645 acct-port 1646 key &amp;lt;key removed&amp;gt;&lt;/P&gt;&lt;P&gt;radius-server source-ports 1645-1646&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;line vty 0 4&lt;/P&gt;&lt;P&gt; login authentication NetworkAdmin&lt;/P&gt;&lt;P&gt;line vty 5 15&lt;/P&gt;&lt;P&gt; login authentication NetworkAdmin&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On the IAS server, NetworkAdmin is the name of a policy, which points to a specific AD group.&lt;/P&gt;&lt;P&gt;Am I missing something in the config? I only want to allow this one group logon access to this test switch.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
    <pubDate>Sun, 10 Mar 2019 22:37:41 GMT</pubDate>
    <dc:creator>jeff.velten</dc:creator>
    <dc:date>2019-03-10T22:37:41Z</dc:date>
    <item>
      <title>Configuring IOS authentication with Windows IAS</title>
      <link>https://community.cisco.com/t5/network-access-control/configuring-ios-authentication-with-windows-ias/m-p/841384#M407823</link>
      <description>&lt;P&gt;I've successfully configured both a test switch (Catalyst 3560) and Windows Server 2003 IAS to allow RADIUS authentication on the switch. The problem I'm having is that the switch will apparently allow anyone who can authenticate through IAS to access the switch. In testing with a non-admin account, I found that IAS is allowing this account to authenticate through a lower ranked policy which is used for generic VPN access. I thought I could control this by using a named list on the switch in the aaa authentication command, but it doesn't seem to be working.&lt;/P&gt;&lt;P&gt;Relevant switch config:&lt;/P&gt;&lt;P&gt;aaa new-model&lt;/P&gt;&lt;P&gt;aaa authentication login NetworkAdmin group radius local &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;radius-server host 172.16.0.42 auth-port 1645 acct-port 1646 key &amp;lt;key removed&amp;gt;&lt;/P&gt;&lt;P&gt;radius-server source-ports 1645-1646&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;line vty 0 4&lt;/P&gt;&lt;P&gt; login authentication NetworkAdmin&lt;/P&gt;&lt;P&gt;line vty 5 15&lt;/P&gt;&lt;P&gt; login authentication NetworkAdmin&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On the IAS server, NetworkAdmin is the name of a policy, which points to a specific AD group.&lt;/P&gt;&lt;P&gt;Am I missing something in the config? I only want to allow this one group logon access to this test switch.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 22:37:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/configuring-ios-authentication-with-windows-ias/m-p/841384#M407823</guid>
      <dc:creator>jeff.velten</dc:creator>
      <dc:date>2019-03-10T22:37:41Z</dc:date>
    </item>
    <item>
      <title>Re: Configuring IOS authentication with Windows IAS</title>
      <link>https://community.cisco.com/t5/network-access-control/configuring-ios-authentication-with-windows-ias/m-p/841385#M407824</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Change the aaa line to "aaa authentication login default group radius line" and add "login authentication connect" command under line vty 0 4. Following link may help you&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/tech/tk827/tk369/technologies_configuration_example09186a0080094501.shtml#windows2000" target="_blank"&gt;http://www.cisco.com/en/US/tech/tk827/tk369/technologies_configuration_example09186a0080094501.shtml#windows2000&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 04 Feb 2008 19:34:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/configuring-ios-authentication-with-windows-ias/m-p/841385#M407824</guid>
      <dc:creator>didyap</dc:creator>
      <dc:date>2008-02-04T19:34:36Z</dc:date>
    </item>
    <item>
      <title>Re: Configuring IOS authentication with Windows IAS</title>
      <link>https://community.cisco.com/t5/network-access-control/configuring-ios-authentication-with-windows-ias/m-p/841386#M407825</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for the reply. This is how I had things set up initially. The problem is that users able to login under a lower-ranking remote access policy for VPN can gain access to the switch. I only want the NetworkAdmin group to have access. I'd also rather not filter by client IP, as we have several switches across multiple VLANs that I would like to roll this out to once it's working.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 05 Feb 2008 16:22:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/configuring-ios-authentication-with-windows-ias/m-p/841386#M407825</guid>
      <dc:creator>jeff.velten</dc:creator>
      <dc:date>2008-02-05T16:22:17Z</dc:date>
    </item>
    <item>
      <title>Re: Configuring IOS authentication with Windows IAS</title>
      <link>https://community.cisco.com/t5/network-access-control/configuring-ios-authentication-with-windows-ias/m-p/841387#M407826</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;you can use the NAR that can solve your need&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 07 Feb 2008 12:55:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/configuring-ios-authentication-with-windows-ias/m-p/841387#M407826</guid>
      <dc:creator>datou1984923</dc:creator>
      <dc:date>2008-02-07T12:55:19Z</dc:date>
    </item>
  </channel>
</rss>

