<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Radius 9300 in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/radius-9300/m-p/3406602#M548161</link>
    <description>We can ping the radius server, I have pinged from the source vlan which we are using as our management vlan&lt;BR /&gt;</description>
    <pubDate>Wed, 27 Jun 2018 16:02:45 GMT</pubDate>
    <dc:creator>S.mooney12</dc:creator>
    <dc:date>2018-06-27T16:02:45Z</dc:date>
    <item>
      <title>Radius 9300</title>
      <link>https://community.cisco.com/t5/network-access-control/radius-9300/m-p/3406192#M548156</link>
      <description>&lt;P&gt;Hi Guys&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Ran into a small issue when deploying 9300 switches using radius for authentication, my issue is when trying to authenticate the debug show me that the switch cant contact the radius server, which is strange because&amp;nbsp;I have deployed 5 2960x switches using the same commands and radius server. the only difference I see is that I'm&amp;nbsp;using a dedicated management VLAN on these devices.&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Any thoughts ??&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 18:59:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/radius-9300/m-p/3406192#M548156</guid>
      <dc:creator>S.mooney12</dc:creator>
      <dc:date>2020-02-21T18:59:30Z</dc:date>
    </item>
    <item>
      <title>Re: Radius 9300</title>
      <link>https://community.cisco.com/t5/network-access-control/radius-9300/m-p/3406547#M548158</link>
      <description>&lt;P&gt;Are you able to ping the radius server from the switch at all?&amp;nbsp;What is the source address/interface for the radius traffic coming from that switch?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;It could be related to the radius source interface where the switch is trying to contact the radius server from the wrong interface.&lt;/P&gt;</description>
      <pubDate>Wed, 27 Jun 2018 14:51:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/radius-9300/m-p/3406547#M548158</guid>
      <dc:creator>Ben Walters</dc:creator>
      <dc:date>2018-06-27T14:51:51Z</dc:date>
    </item>
    <item>
      <title>Re: Radius 9300</title>
      <link>https://community.cisco.com/t5/network-access-control/radius-9300/m-p/3406602#M548161</link>
      <description>We can ping the radius server, I have pinged from the source vlan which we are using as our management vlan&lt;BR /&gt;</description>
      <pubDate>Wed, 27 Jun 2018 16:02:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/radius-9300/m-p/3406602#M548161</guid>
      <dc:creator>S.mooney12</dc:creator>
      <dc:date>2018-06-27T16:02:45Z</dc:date>
    </item>
    <item>
      <title>Re: Radius 9300</title>
      <link>https://community.cisco.com/t5/network-access-control/radius-9300/m-p/3406822#M548162</link>
      <description>Hi, Has the correct IP address been specified on the RADIUS server for this switch?&lt;BR /&gt;&lt;BR /&gt;Double check the shared secret&lt;BR /&gt;&lt;BR /&gt;On the switch when you attempt authentication is the aaa server up or down? Use the command "show aaa server" and post the output if relevant. Also run the command "debug radius" and post the output&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Wed, 27 Jun 2018 22:03:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/radius-9300/m-p/3406822#M548162</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2018-06-27T22:03:22Z</dc:date>
    </item>
    <item>
      <title>Re: Radius 9300</title>
      <link>https://community.cisco.com/t5/network-access-control/radius-9300/m-p/3407076#M548163</link>
      <description>&lt;P&gt;RADIUS: id 2, priority 1, host 10.x.x.x, auth-port 1812, acct-port 1813&lt;BR /&gt; State: current UP, duration 353s, previous duration 0s&lt;BR /&gt; Dead: total time 0s, count 0&lt;BR /&gt; Platform State from SMD: current UP, duration 353s, previous duration 0s&lt;BR /&gt; SMD Platform Dead: total time 0s, count 0&lt;BR /&gt; Platform State from WNCD: current UP, duration 0s, previous duration 0s&lt;BR /&gt; Platform Dead: total time 0s, count 0&lt;BR /&gt; Quarantined: No&lt;BR /&gt; Authen: request 4, timeouts 4, failover 0, retransmission 3&lt;BR /&gt; Response: accept 0, reject 0, challenge 0&lt;BR /&gt; Response: unexpected 0, server error 0, incorrect 0, time 0ms&lt;BR /&gt; Transaction: success 0, failure 1&lt;BR /&gt; Throttled: transaction 0, timeout 0, failure 0&lt;BR /&gt; Author: request 0, timeouts 0, failover 0, retransmission 0&lt;BR /&gt; Response: accept 0, reject 0, challenge 0&lt;BR /&gt; Response: unexpected 0, server error 0, incorrect 0, time 0ms&lt;BR /&gt; Transaction: success 0, failure 0&lt;BR /&gt; Throttled: transaction 0, timeout 0, failure 0&lt;BR /&gt; Account: request 0, timeouts 0, failover 0, retransmission 0&lt;BR /&gt; Request: start 0, interim 0, stop 0&lt;BR /&gt; Response: start 0, interim 0, stop 0&lt;BR /&gt; Response: unexpected 0, server error 0, incorrect 0, time 0ms&lt;BR /&gt; Transaction: success 0, failure 0&lt;BR /&gt; Throttled: transaction 0, timeout 0, failure 0&lt;BR /&gt; Elapsed time since counters last cleared: 5m&lt;BR /&gt; Estimated Outstanding Access Transactions: 0&lt;BR /&gt; Estimated Outstanding Accounting Transactions: 0&lt;BR /&gt; Estimated Throttled Access Transactions: 0&lt;BR /&gt; Estimated Throttled Accounting Transactions: 0&lt;BR /&gt; Maximum Throttled Transactions: access 0, accounting 0&lt;BR /&gt; Requests per minute past 24 hours:&lt;BR /&gt; high - 0 hours, 5 minutes ago: 4&lt;BR /&gt; low - 0 hours, 6 minutes ago: 0&lt;BR /&gt; average: 0&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;*Jun 28 08:24:34.169: AAA/BIND(0000002C): Bind i/f&lt;BR /&gt;*Jun 28 08:24:34.169: AAA/AUTHEN/LOGIN (0000002C): Pick method list 'default'&lt;BR /&gt;*Jun 28 08:24:34.169: RADIUS/ENCODE(0000002C): ask "Password: "&lt;BR /&gt;*Jun 28 08:24:34.169: RADIUS/ENCODE(0000002C): send packet; GET_PASSWORD&lt;BR /&gt;*Jun 28 08:24:38.176: RADIUS/ENCODE(0000002C):Orig. component type = Exec&lt;BR /&gt;*Jun 28 08:24:38.177: RADIUS/ENCODE(0000002C): dropping service type, "radius-server attribute 6 on-for-login-auth" is off&lt;BR /&gt;*Jun 28 08:24:38.177: RADIUS(0000002C): Config NAS IP: 0.0.0.0&lt;BR /&gt;*Jun 28 08:24:38.177: RADIUS(0000002C): Config NAS IPv6: ::&lt;BR /&gt;*Jun 28 08:24:38.177: RADIUS/ENCODE(0000002C): acct_session_id: 4023&lt;BR /&gt;*Jun 28 08:24:38.177: RADIUS(0000002C): sending&lt;BR /&gt;*Jun 28 08:24:38.177: RADIUS/ENCODE: Best Local IP-Address 10.50.1.1 for Radius-Server 10.50.1.17&lt;BR /&gt;*Jun 28 08:24:38.177: RADIUS(0000002C): Send Access-Request to 10.50.1.17:1812 id 1645/26, len 75&lt;BR /&gt;RADIUS: authenticator AB 70 13 B1 33 50 89 E3 - C4 87 81 E3 7C B7 D2 93&lt;BR /&gt;*Jun 28 08:24:38.177: RADIUS: User-Name [1] 13 "*********"&lt;BR /&gt;*Jun 28 08:24:38.177: RADIUS: User-Password [2] 18 *&lt;BR /&gt;*Jun 28 08:24:38.177: RADIUS: NAS-Port [5] 6 2 &lt;BR /&gt;*Jun 28 08:24:38.177: RADIUS: NAS-Port-Id [87] 6 "tty2"&lt;BR /&gt;*Jun 28 08:24:38.177: RADIUS: NAS-Port-Type [61] 6 Virtual [5]&lt;BR /&gt;*Jun 28 08:24:38.177: RADIUS: NAS-IP-Address [4] 6 ******* &lt;BR /&gt;*Jun 28 08:24:38.177: RADIUS(0000002C): Sending a IPv4 Radius Packet&lt;BR /&gt;*Jun 28 08:24:38.177: RADIUS(0000002C): Started 5 sec timeout&lt;BR /&gt;*Jun 28 08:24:43.215: RADIUS(0000002C): Request timed out!&lt;BR /&gt;*Jun 28 08:24:43.215: RADIUS: Retransmit to (10.50.1.17:1812,1813) for id 1645/26&lt;BR /&gt;*Jun 28 08:24:43.215: RADIUS(0000002C): Started 5 sec timeout&lt;BR /&gt;*Jun 28 08:24:48.246: RADIUS(0000002C): Request timed out!&lt;BR /&gt;*Jun 28 08:24:48.246: RADIUS: Retransmit to (10.50.1.17:1812,1813) for id 1645/26&lt;BR /&gt;*Jun 28 08:24:48.247: RADIUS(0000002C): Started 5 sec timeout&lt;BR /&gt;*Jun 28 08:24:53.310: RADIUS(0000002C): Request timed out!&lt;BR /&gt;*Jun 28 08:24:53.310: RADIUS: Retransmit to (10.50.1.17:1812,1813) for id 1645/26&lt;BR /&gt;*Jun 28 08:24:53.310: RADIUS(0000002C): Started 5 sec timeout&lt;BR /&gt;*Jun 28 08:24:58.346: RADIUS(0000002C): Request timed out!&lt;BR /&gt;*Jun 28 08:24:58.346: RADIUS: No response from (10.50.1.17:1812,1813) for id 1645/26&lt;BR /&gt;*Jun 28 08:24:58.346: RADIUS/DECODE: No response from radius-server; parse response; FAIL&lt;BR /&gt;*Jun 28 08:24:58.346: RADIUS/DECODE: Case error(no response/ bad packet/ op decode);parse response; FAIL&lt;BR /&gt;*Jun 28 08:25:00.363: AAA/AUTHEN/LOGIN (0000002C): Pick method list 'default'&lt;BR /&gt;*Jun 28 08:25:00.363: RADIUS/ENCODE(0000002C): ask "Password: "&lt;BR /&gt;*Jun 28 08:25:00.363: RADIUS/ENCODE(0000002C): send packet; GET_PASSWORD&lt;/P&gt;</description>
      <pubDate>Thu, 28 Jun 2018 08:24:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/radius-9300/m-p/3407076#M548163</guid>
      <dc:creator>S.mooney12</dc:creator>
      <dc:date>2018-06-28T08:24:33Z</dc:date>
    </item>
    <item>
      <title>Re: Radius 9300</title>
      <link>https://community.cisco.com/t5/network-access-control/radius-9300/m-p/3407115#M548164</link>
      <description>&lt;P&gt;So did you check the NAD IP address is correctly defined on the RADIUS server? And the shared secret?&lt;BR /&gt;&lt;BR /&gt;How about taking a packet capture on the radius server end, post the output if you still require help.&lt;/P&gt;</description>
      <pubDate>Thu, 28 Jun 2018 09:37:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/radius-9300/m-p/3407115#M548164</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2018-06-28T09:37:10Z</dc:date>
    </item>
    <item>
      <title>Re: Radius 9300</title>
      <link>https://community.cisco.com/t5/network-access-control/radius-9300/m-p/3407125#M548165</link>
      <description>&lt;P&gt;so the radius server is 10.50.1.17 and the switch is 10.50.8.1, I can't see anything except the following&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Best Local IP-Address 10.50.1.1 for Radius-Server 10.50.1.17&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 28 Jun 2018 09:48:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/radius-9300/m-p/3407125#M548165</guid>
      <dc:creator>S.mooney12</dc:creator>
      <dc:date>2018-06-28T09:48:40Z</dc:date>
    </item>
    <item>
      <title>Re: Radius 9300</title>
      <link>https://community.cisco.com/t5/network-access-control/radius-9300/m-p/3407129#M548166</link>
      <description>I don't understand the information you've provided there.&lt;BR /&gt;&lt;BR /&gt;On the RADIUS server (I assume ISE), have you defined a Network Device with the IP address of the switch (10.50.8.1)? With the correct pre shared key? Have you confirmed the key is correct on both ends (switch and radius server).&lt;BR /&gt;&lt;BR /&gt;Can you provide screenshots from the radius server of the configuration and any errors etc.&lt;BR /&gt;</description>
      <pubDate>Thu, 28 Jun 2018 09:53:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/radius-9300/m-p/3407129#M548166</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2018-06-28T09:53:25Z</dc:date>
    </item>
    <item>
      <title>Re: Radius 9300</title>
      <link>https://community.cisco.com/t5/network-access-control/radius-9300/m-p/3407148#M548168</link>
      <description>&lt;P&gt;Sorry, the radius server is a window box, yes I have defined IP address of the switch 10.50.8.1 and the secret key is the same on both ends. all the other switches I have configured have worked with no issues, but these devices are layer 2 rather than layer 3.&lt;/P&gt;</description>
      <pubDate>Thu, 28 Jun 2018 10:23:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/radius-9300/m-p/3407148#M548168</guid>
      <dc:creator>S.mooney12</dc:creator>
      <dc:date>2018-06-28T10:23:33Z</dc:date>
    </item>
    <item>
      <title>Re: Radius 9300</title>
      <link>https://community.cisco.com/t5/network-access-control/radius-9300/m-p/3407622#M548170</link>
      <description>&lt;P&gt;Resolved this issue by applying the&amp;nbsp;&lt;STRONG class="cCN_CmdName"&gt;ip radius source-interface&lt;SPAN&gt;&amp;nbsp;vlan&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt;command globally.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Thnaks&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 28 Jun 2018 22:32:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/radius-9300/m-p/3407622#M548170</guid>
      <dc:creator>mooney1111</dc:creator>
      <dc:date>2018-06-28T22:32:47Z</dc:date>
    </item>
    <item>
      <title>Re: Radius 9300</title>
      <link>https://community.cisco.com/t5/network-access-control/radius-9300/m-p/5328262#M598073</link>
      <description>&lt;P&gt;This worked for me too! I spent hours trying to fix radius issues on my core switches and running this command globally fixed it. I didn't have to run this for my access switches which made it very frustrating.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you!&lt;/P&gt;</description>
      <pubDate>Mon, 08 Sep 2025 19:07:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/radius-9300/m-p/5328262#M598073</guid>
      <dc:creator>qjamil001</dc:creator>
      <dc:date>2025-09-08T19:07:29Z</dc:date>
    </item>
  </channel>
</rss>

