<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: 802.1x Port Authentication via RADIUS in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/802-1x-port-authentication-via-radius/m-p/445615#M428399</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;These are dot1x event debugs, so you wouldn't see this with that debug. The closest thing to seeing it would be to debug radius on the switch, and the password would be contained in RADIUS Attribute[79]. The switch uses this attribute to replay the EAP message (unmodified) to a RADIUS server. You might see it, but it's encrytped, so it might not buy you much. I'm sure you can imagine from a security point of view why the switch won't/shouldn't have this much visibility into this ;-).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would recommend either:&lt;/P&gt;&lt;P&gt;a) Double-checking your RADIUS setup and logs to find out why the user failed. (double-check the RADIUS key  configured on the switch too .. it must match).&lt;/P&gt;&lt;P&gt;b) Downloading a third-party supplicant from Meetinghouse or Funk to use as a control.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Eval copies are available on their websites.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps,&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 28 Sep 2005 02:34:39 GMT</pubDate>
    <dc:creator>jafrazie</dc:creator>
    <dc:date>2005-09-28T02:34:39Z</dc:date>
    <item>
      <title>802.1x Port Authentication via RADIUS</title>
      <link>https://community.cisco.com/t5/network-access-control/802-1x-port-authentication-via-radius/m-p/445614#M428398</link>
      <description>&lt;P&gt;I am investigating implementing 802.1x port authentication on our network.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a test LAN with a Catalyst 2950 switch and 2 Win XP workstations, (I know its pretty basic, but should be enough for testing purposes). One of these XP PCs is running a Win32 RADIUS server and the other has been configured for 802.1x authentication with MD5-Challenge.  Both switch ports are configured for the default vlan and can ping each other.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have configured the switch with the following commands&lt;/P&gt;&lt;P&gt;	aaa new-model&lt;/P&gt;&lt;P&gt;	aaa authentication dot1x default group radius&lt;/P&gt;&lt;P&gt;	dot1x system-auth-control&lt;/P&gt;&lt;P&gt;	radius-server host x.x.x.x key test&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and the port to be authorised has been configured with&lt;/P&gt;&lt;P&gt;	dot1x port-control auto&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As far as I can tell this is all I need to configure on the switch, please correct me if I am wrong.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When I plug the PC into the port I get the request to enter login details, which I do, the RADIUS server sees the request but rejects it, because 'the password wasn&amp;#146;t available'. Here is the output from the request, but there isnt any password field and I know there should be as the RADIUS server comes with a test utility and the output from that is similar to below, but the password field is included. I have removed IP/MAC addresses.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;	Client address [x.x.x.x]&lt;/P&gt;&lt;P&gt;	NAS address [x.x.x.x]&lt;/P&gt;&lt;P&gt;	UniqueID=3&lt;/P&gt;&lt;P&gt;	Realm = def&lt;/P&gt;&lt;P&gt;	User = Administrator&lt;/P&gt;&lt;P&gt;	Code = Access request&lt;/P&gt;&lt;P&gt;	ID = 26&lt;/P&gt;&lt;P&gt;	Length = 169&lt;/P&gt;&lt;P&gt;	Authenticator = 0xCCD65F510764D2B2635563104D0C2601&lt;/P&gt;&lt;P&gt;	NAS-IP-Address = x.x.x.x&lt;/P&gt;&lt;P&gt;	NAS-Port = 50024&lt;/P&gt;&lt;P&gt;	NAS-Port-Type = Ethernet&lt;/P&gt;&lt;P&gt;	User-Name = Administrator&lt;/P&gt;&lt;P&gt;	Called-Station-Id = 00-11-00-11-00-11&lt;/P&gt;&lt;P&gt;	Calling-Station-Id = 11-00-11-00-11-00&lt;/P&gt;&lt;P&gt;	Service-Type = Framed&lt;/P&gt;&lt;P&gt;	Framed-MTU = 1500&lt;/P&gt;&lt;P&gt;	State = 0x3170020000FCB47C00&lt;/P&gt;&lt;P&gt;	EAP-Message = 0x0201002304106424F60D765905F614983F30504A87BA41646D696E6973747261746F72&lt;/P&gt;&lt;P&gt;	Message-Authenticator = 0xA119F2FD6E7384F093A5EE1BF4F761EC&lt;/P&gt;&lt;P&gt;	&lt;/P&gt;&lt;P&gt;	Client address [x.x.x.x]&lt;/P&gt;&lt;P&gt;	NAS address [x.x.x.x]&lt;/P&gt;&lt;P&gt;	UniqueID=4&lt;/P&gt;&lt;P&gt;	Realm = def&lt;/P&gt;&lt;P&gt;	User = Administrator&lt;/P&gt;&lt;P&gt;	Code = Access reject&lt;/P&gt;&lt;P&gt;	ID = 26&lt;/P&gt;&lt;P&gt;	Length = 0&lt;/P&gt;&lt;P&gt;	Authenticator = 0xCCD65F510764D2B2635563104D0C2601&lt;/P&gt;&lt;P&gt;	EAP-Message = 0x04010004&lt;/P&gt;&lt;P&gt;	Message-Authenticator = 0x00000000000000000000000000000000&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On the 2950 I have turned on debugging with 'debug dot1x all' and part of the output is below:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; 	*Mar  2 01:58:38: dot1x-ev:Username is Administrator&lt;/P&gt;&lt;P&gt;	*Mar  2 01:58:38: dot1x-ev:MAC Address is 0011.0011.0011&lt;/P&gt;&lt;P&gt;	*Mar  2 01:58:38: dot1x-ev:RemAddr is 00-11-00-11-00-11/00-11-00-11-00-11&lt;/P&gt;&lt;P&gt;	*Mar  2 01:58:38: dot1x-ev:going to send to backend on SP, length = 26&lt;/P&gt;&lt;P&gt;	*Mar  2 01:58:38: dot1x-ev:Received VLAN is No Vlan&lt;/P&gt;&lt;P&gt;	*Mar  2 01:58:38: dot1x-ev:Enqueued the response to BackEnd&lt;/P&gt;&lt;P&gt;	*Mar  2 01:58:38: dot1x-ev:Sent to Bend&lt;/P&gt;&lt;P&gt;	*Mar  2 01:58:38: dot1x-ev:Received QUEUE EVENT in response to AAA Request&lt;/P&gt;&lt;P&gt;	*Mar  2 01:58:38: dot1x-ev:Dot1x matching request-response found&lt;/P&gt;&lt;P&gt;	*Mar  2 01:58:38: dot1x-ev:Length of recv eap packet from radius = 26&lt;/P&gt;&lt;P&gt;	*Mar  2 01:58:38: dot1x-ev:Received VLAN Id -1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Again there doesn&amp;#146;t appear to be a password, shouldn't I see one?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ultimately we will be using a Unix RADIUS server but for testing purposes I have just configured an eval version of Clearbox's RADIUS server. I've tried others as I thought the problem maybe the software, but I get similar problems regardless. If anyone can recommend better Win32 software, please do so.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm struggling to figure out where the problem is, the XP machine, the switch or the RADIUS server. Any advice would be appreciated as it's getting quite frustrating.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 21:19:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/802-1x-port-authentication-via-radius/m-p/445614#M428398</guid>
      <dc:creator>cameron.stephens</dc:creator>
      <dc:date>2019-03-10T21:19:49Z</dc:date>
    </item>
    <item>
      <title>Re: 802.1x Port Authentication via RADIUS</title>
      <link>https://community.cisco.com/t5/network-access-control/802-1x-port-authentication-via-radius/m-p/445615#M428399</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;These are dot1x event debugs, so you wouldn't see this with that debug. The closest thing to seeing it would be to debug radius on the switch, and the password would be contained in RADIUS Attribute[79]. The switch uses this attribute to replay the EAP message (unmodified) to a RADIUS server. You might see it, but it's encrytped, so it might not buy you much. I'm sure you can imagine from a security point of view why the switch won't/shouldn't have this much visibility into this ;-).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would recommend either:&lt;/P&gt;&lt;P&gt;a) Double-checking your RADIUS setup and logs to find out why the user failed. (double-check the RADIUS key  configured on the switch too .. it must match).&lt;/P&gt;&lt;P&gt;b) Downloading a third-party supplicant from Meetinghouse or Funk to use as a control.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Eval copies are available on their websites.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps,&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 28 Sep 2005 02:34:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/802-1x-port-authentication-via-radius/m-p/445615#M428399</guid>
      <dc:creator>jafrazie</dc:creator>
      <dc:date>2005-09-28T02:34:39Z</dc:date>
    </item>
  </channel>
</rss>

