<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Microsft RADIUS in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/microsft-radius/m-p/299130#M434267</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The MS IAS Radius server runs fine with our routers and switches, you shouldn't have any issues.  &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sun, 30 May 2004 03:52:28 GMT</pubDate>
    <dc:creator>gfullage</dc:creator>
    <dc:date>2004-05-30T03:52:28Z</dc:date>
    <item>
      <title>Microsft RADIUS</title>
      <link>https://community.cisco.com/t5/network-access-control/microsft-radius/m-p/299129#M434264</link>
      <description>&lt;P&gt;Has any one used the RADIUS server that comes with Windows 2000 Server?  I have a small network 15+ switches, and a router.  I want to increase security a little and have user name and password, but I can't justify the money for the Cisco server.  I&amp;#146;m just looking for any thoughts on the matter.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank You&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 14:50:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/microsft-radius/m-p/299129#M434264</guid>
      <dc:creator>jeff.cook</dc:creator>
      <dc:date>2019-03-10T14:50:41Z</dc:date>
    </item>
    <item>
      <title>Re: Microsft RADIUS</title>
      <link>https://community.cisco.com/t5/network-access-control/microsft-radius/m-p/299130#M434267</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The MS IAS Radius server runs fine with our routers and switches, you shouldn't have any issues.  &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 30 May 2004 03:52:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/microsft-radius/m-p/299130#M434267</guid>
      <dc:creator>gfullage</dc:creator>
      <dc:date>2004-05-30T03:52:28Z</dc:date>
    </item>
    <item>
      <title>Re: Microsft RADIUS</title>
      <link>https://community.cisco.com/t5/network-access-control/microsft-radius/m-p/299131#M434268</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Some time ago I used MS IAS to authenticate clients on a VPN RAS. I don´t have problems. It´s work fine. But if you want more features then autentications, like shell authorization and command account, try use some tacacs freeware like tacacs+. Freshmeat have some good projects.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Kratz&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 30 May 2004 12:17:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/microsft-radius/m-p/299131#M434268</guid>
      <dc:creator>d.kratz</dc:creator>
      <dc:date>2004-05-30T12:17:14Z</dc:date>
    </item>
  </channel>
</rss>

