<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Authentication Configuration in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/authentication-configuration/m-p/682140#M422703</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;ah, you didnt mention TACACS.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sounds like you need to config the device to do CHAP or MSCHAP. Its either doing SENDPASS or plain old ASCII.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 10 Oct 2006 19:25:37 GMT</pubDate>
    <dc:creator>darpotter</dc:creator>
    <dc:date>2006-10-10T19:25:37Z</dc:date>
    <item>
      <title>Authentication Configuration</title>
      <link>https://community.cisco.com/t5/network-access-control/authentication-configuration/m-p/682137#M422697</link>
      <description>&lt;P&gt;Hello all,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We are a recent addition to the ACS 4.0 crowd and had a concern about router/switch user authentication using AAA and ACS with an external database.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We have several routers and switches working just fine with ACS using an external database (Windows AD).  I also have EAP-PEAP and MSCHAP (V1 &amp;amp; 2) enabled in the Global Policy.   However, we seem to be able to clear text sniff user IDs and Passwords.  This appears to be the exchange between the router/switch and the ACS box.  What have I misconfigured or not configured correctly?  I do have a correct and difficult authentication password for the tacacs key and the Network Device. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As of now, we are running this on a limitied number of network devices as we figure it all out and get it running as desired.  So deployment has not left us vulnerable.  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any assistance will be very welcomed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I rate posts!&lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 21:47:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/authentication-configuration/m-p/682137#M422697</guid>
      <dc:creator>jphilope</dc:creator>
      <dc:date>2019-03-10T21:47:12Z</dc:date>
    </item>
    <item>
      <title>Re: Authentication Configuration</title>
      <link>https://community.cisco.com/t5/network-access-control/authentication-configuration/m-p/682138#M422699</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Are you sure?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;RADIUS never sends passwords in the clear. Even if you had PAP authentication the password is masked with the shared secret.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you use a sniffer that knows RADIUS you will see password attributes... however their content  will not be plain text.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Unless your device is doing something mental!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Darran&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 10 Oct 2006 15:52:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/authentication-configuration/m-p/682138#M422699</guid>
      <dc:creator>darpotter</dc:creator>
      <dc:date>2006-10-10T15:52:45Z</dc:date>
    </item>
    <item>
      <title>Re: Authentication Configuration</title>
      <link>https://community.cisco.com/t5/network-access-control/authentication-configuration/m-p/682139#M422701</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sniffer does not know RADIUS, but we are using TACACS for AAA.  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I was under the impression the shared secret between the client (Cisco IOS router/switch) and the ACS would have been used to hash the authentication exchange.  However, the sniffer traces show this to be untrue...&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 10 Oct 2006 16:52:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/authentication-configuration/m-p/682139#M422701</guid>
      <dc:creator>jphilope</dc:creator>
      <dc:date>2006-10-10T16:52:31Z</dc:date>
    </item>
    <item>
      <title>Re: Authentication Configuration</title>
      <link>https://community.cisco.com/t5/network-access-control/authentication-configuration/m-p/682140#M422703</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;ah, you didnt mention TACACS.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sounds like you need to config the device to do CHAP or MSCHAP. Its either doing SENDPASS or plain old ASCII.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 10 Oct 2006 19:25:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/authentication-configuration/m-p/682140#M422703</guid>
      <dc:creator>darpotter</dc:creator>
      <dc:date>2006-10-10T19:25:37Z</dc:date>
    </item>
  </channel>
</rss>

