<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: MFA for Cisco switches and routers in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/mfa-for-cisco-switches-and-routers/m-p/3849718#M519260</link>
    <description>&lt;P&gt;Chad did you get this working? I'm using ISE and Azure but never get a prompt for my PIN.&lt;/P&gt;&lt;P&gt;TIA&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Steve&lt;/P&gt;</description>
    <pubDate>Fri, 03 May 2019 10:47:08 GMT</pubDate>
    <dc:creator>steve.woods3</dc:creator>
    <dc:date>2019-05-03T10:47:08Z</dc:date>
    <item>
      <title>MFA for Cisco switches and routers</title>
      <link>https://community.cisco.com/t5/network-access-control/mfa-for-cisco-switches-and-routers/m-p/3425695#M519256</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We currently use ISE 2.2 and the radius protocol to SSH into our network gear.&amp;nbsp; We now have a requirement to make that access multi-factor authentication.&amp;nbsp; We are also standing up an azure multi-factor authentication server for Cisco anyconnect.&amp;nbsp; Is there a way i could use that azure multi-factor server to get the desired results?&amp;nbsp; Also I have been messing around with DUO auth proxy.&amp;nbsp; has anyone had success using this.&amp;nbsp; I am getting some traffic to ISE and seeing some info on the log of the DUO authproxy.&amp;nbsp; I am getting either a failed password or invalid key on ISE and the log states [RadiusClient (UDP)] dropping packet from 10.200.1.30:1812 - response packet has invalid authenticator.&amp;nbsp; DUO says the following.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 12.0pt; font-family: 'Arial',sans-serif; color: black;"&gt;It looks like the primary authentication to the radius server is timing out because it looks like its looks for a specific authetnicator that is sending back ''response packet has invalid authenticator'' which means..&lt;BR /&gt; &lt;BR /&gt; This usually occurs at the later stage when the EAP message is attached. The first RADIUS packet of the 802.1x session does not include the EAP message; there is no Message-Authenticator field and it is not possible to verify the request, but at that stage, the client is able to validate the response with the use of the Authenticator field.&lt;BR /&gt; &lt;BR /&gt; I would check the radius server settings to see if this might be enabled and looking for anykind of EAP or 802.1x information.&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 07 Dec 2017 21:07:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/mfa-for-cisco-switches-and-routers/m-p/3425695#M519256</guid>
      <dc:creator>Richard Lucht</dc:creator>
      <dc:date>2017-12-07T21:07:57Z</dc:date>
    </item>
    <item>
      <title>Re: MFA for Cisco switches and routers</title>
      <link>https://community.cisco.com/t5/network-access-control/mfa-for-cisco-switches-and-routers/m-p/3425696#M519257</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Here is a link detailing different MFA efforts for ISE&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://community.cisco.com/docs/DOC-71528"&gt;Two Factor Authentication on ISE – 2FA on ISE&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For Device Administration, we do 2 factor through the use of CAC/PIV cards and the Pragma SSH Client&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.pragmasys.com/products/support/cisco-2-factor" title="https://www.pragmasys.com/products/support/cisco-2-factor"&gt;https://www.pragmasys.com/products/support/cisco-2-factor&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 08 Dec 2017 16:14:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/mfa-for-cisco-switches-and-routers/m-p/3425696#M519257</guid>
      <dc:creator>Charlie Moreton</dc:creator>
      <dc:date>2017-12-08T16:14:11Z</dc:date>
    </item>
    <item>
      <title>Re: MFA for Cisco switches and routers</title>
      <link>https://community.cisco.com/t5/network-access-control/mfa-for-cisco-switches-and-routers/m-p/3425697#M519258</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I found my issue, i was not using DUO correctly.&amp;nbsp; I set it up as a Radius Token server and then used it as an identity store in my authentication profile.&amp;nbsp; I was not quite please with the process of the MFA with DUO so i tried to use Microsoft Azure MFA the same way.&amp;nbsp; the results were exactly what I was looking for.&amp;nbsp; On Cisco devices that I tried to SSH into I would either get a prompt for my token or a push notification.&amp;nbsp; This was based on how I wanted my MFA to do.&amp;nbsp; Even tried it with a phone call, the timeout for radius will need to be longer for that.&amp;nbsp; No extra configuration for my network devices or anyconnect VPN.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 12 Jan 2018 19:51:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/mfa-for-cisco-switches-and-routers/m-p/3425697#M519258</guid>
      <dc:creator>Richard Lucht</dc:creator>
      <dc:date>2018-01-12T19:51:03Z</dc:date>
    </item>
    <item>
      <title>Re: MFA for Cisco switches and routers</title>
      <link>https://community.cisco.com/t5/network-access-control/mfa-for-cisco-switches-and-routers/m-p/3830993#M519259</link>
      <description>&lt;P&gt;I am also interested in getting all of my Cisco routers and Switches (with IOS &amp;lt;= 12.2) to use Azure MFA for SSH login. It seems that you have done this successfully.&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Does it require any extra configuration on the Cisco switch, other than authenticating against RADIUS?&lt;/LI&gt;&lt;LI&gt;Do you have to configure NPS as a RADIUS proxy?&lt;/LI&gt;&lt;LI&gt;Is this possible without ISE?&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;I would be grateful if you could share the details of your experience here. Thanks&lt;/P&gt;</description>
      <pubDate>Tue, 02 Apr 2019 22:23:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/mfa-for-cisco-switches-and-routers/m-p/3830993#M519259</guid>
      <dc:creator>chad patterson</dc:creator>
      <dc:date>2019-04-02T22:23:14Z</dc:date>
    </item>
    <item>
      <title>Re: MFA for Cisco switches and routers</title>
      <link>https://community.cisco.com/t5/network-access-control/mfa-for-cisco-switches-and-routers/m-p/3849718#M519260</link>
      <description>&lt;P&gt;Chad did you get this working? I'm using ISE and Azure but never get a prompt for my PIN.&lt;/P&gt;&lt;P&gt;TIA&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Steve&lt;/P&gt;</description>
      <pubDate>Fri, 03 May 2019 10:47:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/mfa-for-cisco-switches-and-routers/m-p/3849718#M519260</guid>
      <dc:creator>steve.woods3</dc:creator>
      <dc:date>2019-05-03T10:47:08Z</dc:date>
    </item>
    <item>
      <title>Re: MFA for Cisco switches and routers</title>
      <link>https://community.cisco.com/t5/network-access-control/mfa-for-cisco-switches-and-routers/m-p/4082422#M560233</link>
      <description>&lt;P&gt;Hey hi Did you get any information on Direct MFA with Cisco Switches without ISE.&lt;/P&gt;&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/249557"&gt;@chad patterson&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;P&gt;I am also interested in getting all of my Cisco routers and Switches (with IOS &amp;lt;= 12.2) to use Azure MFA for SSH login. It seems that you have done this successfully.&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Does it require any extra configuration on the Cisco switch, other than authenticating against RADIUS?&lt;/LI&gt;&lt;LI&gt;Do you have to configure NPS as a RADIUS proxy?&lt;/LI&gt;&lt;LI&gt;Is this possible without ISE?&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;I would be grateful if you could share the details of your experience here. Thanks&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 09 May 2020 07:48:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/mfa-for-cisco-switches-and-routers/m-p/4082422#M560233</guid>
      <dc:creator>info@maplesimaging.com</dc:creator>
      <dc:date>2020-05-09T07:48:27Z</dc:date>
    </item>
    <item>
      <title>Re: MFA for Cisco switches and routers</title>
      <link>https://community.cisco.com/t5/network-access-control/mfa-for-cisco-switches-and-routers/m-p/4975756#M585652</link>
      <description>&lt;P&gt;There have been many requests to make Cisco MFA &amp;amp; Pragma Fortress CL work with Microsoft NPS Radius and Active Directory as the AAA without needing Cisco ISE for sites that do not have ISE. Pragma support team have just published a document describing the entire setup process at&amp;nbsp;&lt;A href="https://www.pragmasys.com/downloads/cisco_fortresscl_ms_npsradius.pdf" target="_blank"&gt;https://www.pragmasys.com/downloads/cisco_fortresscl_ms_npsradius.pdf&lt;/A&gt;&amp;nbsp;. Thanks.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Dec 2023 20:13:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/mfa-for-cisco-switches-and-routers/m-p/4975756#M585652</guid>
      <dc:creator>quamrul</dc:creator>
      <dc:date>2023-12-11T20:13:54Z</dc:date>
    </item>
  </channel>
</rss>

