<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Unknown AAA Authentication attempts on catalyst switch in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/unknown-aaa-authentication-attempts-on-catalyst-switch/m-p/4081372#M560198</link>
    <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/326046"&gt;@Marvin Rhoads&lt;/a&gt;&amp;nbsp;Thanks for the note but you beat me to my reply &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;BR /&gt;&lt;BR /&gt;I have found the issue to be a data cable mistakenly plugged into the console port on the switch. After this cable was moved from the console port to a data port on the switch, the logs went away!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I've turned the console access back on for troubleshooting in the future.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for all of your suggestions, they were helpful.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 07 May 2020 16:30:09 GMT</pubDate>
    <dc:creator>Minnesotakid</dc:creator>
    <dc:date>2020-05-07T16:30:09Z</dc:date>
    <item>
      <title>Unknown AAA Authentication attempts on catalyst switch</title>
      <link>https://community.cisco.com/t5/network-access-control/unknown-aaa-authentication-attempts-on-catalyst-switch/m-p/4079277#M560126</link>
      <description>&lt;P&gt;Wondering if anyone here has seen something like this before.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;I've got a branch office switch that seems to be making some noise in our ISE Radius logs and I'm trying to track down where these goofy auth attempts are coming from. The logs keep saying that the username field is empty.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Model:&amp;nbsp;WS-C2960X-24PS-L&lt;/P&gt;&lt;P&gt;Version:&amp;nbsp;15.2(7)E2&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I can login to this switch with no issue, as can my other admins. This is the only device at this location having this issue.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Local switch Logs I see continuously show up are:&lt;/P&gt;&lt;P&gt;001331: May 4 16:09:03.866 CDT: %SEC_LOGIN-4-LOGIN_FAILED: Login failed [user: ] [Source: UNKNOWN] [localport: 0] [Reason: Login Authentication Failed] at 16:09:03 CDT Mon May 4 2020&lt;BR /&gt;001332: May 4 16:09:03.870 CDT: AAA/AUTHEN/LOGIN (00000109): Pick method list 'default'&lt;BR /&gt;001333: May 4 16:09:08.127 CDT: %SEC_LOGIN-4-LOGIN_FAILED: Login failed [user: ] [Source: UNKNOWN] [localport: 0] [Reason: Login Authentication Failed] at 16:09:08 CDT Mon May 4 2020&lt;BR /&gt;001334: May 4 16:09:08.127 CDT: AAA/AUTHEN/LOGIN (00000109): Pick method list 'default'&lt;BR /&gt;001335: May 4 16:09:12.283 CDT: %SEC_LOGIN-4-LOGIN_FAILED: Login failed [user: ] [Source: UNKNOWN] [localport: 0] [Reason: Login Authentication Failed] at 16:09:12 CDT Mon May 4 2020&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ISE Tacacs logs:&lt;/P&gt;&lt;P&gt;Device Port: tty0&lt;/P&gt;&lt;P&gt;Failure reason:&lt;/P&gt;&lt;TABLE&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;&lt;DIV class="ellipsis"&gt;13030 TACACS+ authentication request missing a User name&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;Remote address: async&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So far I've tried:&lt;/P&gt;&lt;P&gt;- sifting the bugs for this model of switch and couldn't see anything.&amp;nbsp;&lt;/P&gt;&lt;P&gt;- Upgraded the firmware to the current version it's at now&lt;/P&gt;&lt;P&gt;- Moved the switch from RADIUS to TACACS+ to see if that changes behavior (it didn't)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Given it's an almost brand new switch and we've chosen not to SmartNet the device, the only support option I currently have is RMA and that seems a bit drastic..&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'd love to hear any suggestions you folks might have!&lt;/P&gt;</description>
      <pubDate>Mon, 04 May 2020 21:28:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/unknown-aaa-authentication-attempts-on-catalyst-switch/m-p/4079277#M560126</guid>
      <dc:creator>Minnesotakid</dc:creator>
      <dc:date>2020-05-04T21:28:10Z</dc:date>
    </item>
    <item>
      <title>Re: Unknown AAA Authentication attempts on catalyst switch</title>
      <link>https://community.cisco.com/t5/network-access-control/unknown-aaa-authentication-attempts-on-catalyst-switch/m-p/4079364#M560128</link>
      <description>&lt;P&gt;Have you tried to reload/reboot the switch?&amp;nbsp; I have ran into funky issues with some of the newer code, rebooted, and then everything was fine.&amp;nbsp; It is worth a try.&amp;nbsp; Also, are you sure that no one or nothing is attempting to connect to the switch and authenticate?&amp;nbsp; Do you have ACLs protecting your VTY lines?&amp;nbsp; Are you using a terminal server to connect to this switch?&lt;/P&gt;</description>
      <pubDate>Mon, 04 May 2020 23:49:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/unknown-aaa-authentication-attempts-on-catalyst-switch/m-p/4079364#M560128</guid>
      <dc:creator>Colby LeMaire</dc:creator>
      <dc:date>2020-05-04T23:49:26Z</dc:date>
    </item>
    <item>
      <title>Re: Unknown AAA Authentication attempts on catalyst switch</title>
      <link>https://community.cisco.com/t5/network-access-control/unknown-aaa-authentication-attempts-on-catalyst-switch/m-p/4079406#M560130</link>
      <description>&lt;P&gt;Based on the output, it looks like the noise is from tty0 line on your router. These asynchronous serial ports on the router are used for serial printers, serial modems, or dumb ASCII text terminals.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Check the output of " show line" to confirm which all lines are making noise.&lt;/P&gt;
&lt;P&gt;If you are sure that nothing is attached on these ports, then you can configure "transport input none" and "no exec" on the tty0 line.&lt;/P&gt;</description>
      <pubDate>Tue, 05 May 2020 01:20:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/unknown-aaa-authentication-attempts-on-catalyst-switch/m-p/4079406#M560130</guid>
      <dc:creator>poongarg</dc:creator>
      <dc:date>2020-05-05T01:20:43Z</dc:date>
    </item>
    <item>
      <title>Re: Unknown AAA Authentication attempts on catalyst switch</title>
      <link>https://community.cisco.com/t5/network-access-control/unknown-aaa-authentication-attempts-on-catalyst-switch/m-p/4079695#M560141</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/624773"&gt;@Colby LeMaire&lt;/a&gt;&amp;nbsp;Appreciate the tip. I've also seen issues fixed by reboot on this model in the past. I've rebooted this morning and it appears to still be happening. To answer your questions, yes we do have an access list in place protecting the vty lines and no we are not using a terminal server.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/66272"&gt;@poongarg&lt;/a&gt;&amp;nbsp; Here's the result from a&amp;nbsp;&lt;STRONG&gt;show line.&amp;nbsp;&lt;/STRONG&gt;It does appear to show Overruns and Noise. I ran a&amp;nbsp;&lt;STRONG&gt;clear line console 0&lt;/STRONG&gt; a few times but it doesn't seem to do anything.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="showLine.png" style="width: 798px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/73704i375D6842D0D5A16A/image-size/large?v=v2&amp;amp;px=999" role="button" title="showLine.png" alt="showLine.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 05 May 2020 13:23:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/unknown-aaa-authentication-attempts-on-catalyst-switch/m-p/4079695#M560141</guid>
      <dc:creator>Minnesotakid</dc:creator>
      <dc:date>2020-05-05T13:23:41Z</dc:date>
    </item>
    <item>
      <title>Re: Unknown AAA Authentication attempts on catalyst switch</title>
      <link>https://community.cisco.com/t5/network-access-control/unknown-aaa-authentication-attempts-on-catalyst-switch/m-p/4079762#M560144</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/66272"&gt;@poongarg&lt;/a&gt;&amp;nbsp;I just tried your option of doing a&amp;nbsp;&lt;STRONG&gt;no exec&amp;nbsp;&lt;/STRONG&gt; on line 0 and that actually resolved the issue.&lt;BR /&gt;The odd part though, and maybe I'm just rusty on my vty/console line configurations but when I adjust &lt;STRONG&gt;line 0&lt;/STRONG&gt; config, it adjusts the&amp;nbsp;console line configuration, which is OK for now, but if we ever need console access to troubleshoot we might be out of luck. Am I correct in that thought? Here's what the configuration looks like after I adjust it:&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;line con 0&lt;BR /&gt;exec-timeout 240 15&lt;BR /&gt;privilege level 15&lt;BR /&gt;stopbits 1&lt;BR /&gt;line vty 0 4&lt;BR /&gt;access-class 1 in vrf-also&lt;BR /&gt;exec-timeout 240 15&lt;BR /&gt;privilege level 15&lt;BR /&gt;logging synchronous&lt;BR /&gt;transport input ssh&lt;BR /&gt;line vty 5 15&lt;BR /&gt;access-class 1 in vrf-also&lt;BR /&gt;exec-timeout 240 15&lt;BR /&gt;privilege level 15&lt;BR /&gt;transport input ssh&lt;BR /&gt;!&lt;BR /&gt;&lt;BR /&gt;I am double-checking with the location if there is anything physically connected to that console port. I'll report back when I get that answer.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 05 May 2020 14:39:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/unknown-aaa-authentication-attempts-on-catalyst-switch/m-p/4079762#M560144</guid>
      <dc:creator>Minnesotakid</dc:creator>
      <dc:date>2020-05-05T14:39:56Z</dc:date>
    </item>
    <item>
      <title>Re: Unknown AAA Authentication attempts on catalyst switch</title>
      <link>https://community.cisco.com/t5/network-access-control/unknown-aaa-authentication-attempts-on-catalyst-switch/m-p/4079778#M560145</link>
      <description>Yes you are right with the understanding. I have seen this issue earlier with the faulty cable connected to the console port.</description>
      <pubDate>Tue, 05 May 2020 15:00:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/unknown-aaa-authentication-attempts-on-catalyst-switch/m-p/4079778#M560145</guid>
      <dc:creator>poongarg</dc:creator>
      <dc:date>2020-05-05T15:00:58Z</dc:date>
    </item>
    <item>
      <title>Re: Unknown AAA Authentication attempts on catalyst switch</title>
      <link>https://community.cisco.com/t5/network-access-control/unknown-aaa-authentication-attempts-on-catalyst-switch/m-p/4080199#M560149</link>
      <description>&lt;P&gt;It is possible it could be faulty hardware on the console port. Especially given that it cleared up when you adjusted the console port config despite there being nothing physically connected to it.&lt;/P&gt;
&lt;P&gt;If you are in a high threat environment, there is the possibility of malicious actors physically plugging something in while no authorized staff are present. Are your physical access controls in order?&lt;/P&gt;</description>
      <pubDate>Wed, 06 May 2020 04:41:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/unknown-aaa-authentication-attempts-on-catalyst-switch/m-p/4080199#M560149</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2020-05-06T04:41:18Z</dc:date>
    </item>
    <item>
      <title>Re: Unknown AAA Authentication attempts on catalyst switch</title>
      <link>https://community.cisco.com/t5/network-access-control/unknown-aaa-authentication-attempts-on-catalyst-switch/m-p/4081372#M560198</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/326046"&gt;@Marvin Rhoads&lt;/a&gt;&amp;nbsp;Thanks for the note but you beat me to my reply &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;BR /&gt;&lt;BR /&gt;I have found the issue to be a data cable mistakenly plugged into the console port on the switch. After this cable was moved from the console port to a data port on the switch, the logs went away!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I've turned the console access back on for troubleshooting in the future.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for all of your suggestions, they were helpful.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 07 May 2020 16:30:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/unknown-aaa-authentication-attempts-on-catalyst-switch/m-p/4081372#M560198</guid>
      <dc:creator>Minnesotakid</dc:creator>
      <dc:date>2020-05-07T16:30:09Z</dc:date>
    </item>
    <item>
      <title>Re: Unknown AAA Authentication attempts on catalyst switch</title>
      <link>https://community.cisco.com/t5/network-access-control/unknown-aaa-authentication-attempts-on-catalyst-switch/m-p/4315497#M566507</link>
      <description>&lt;P&gt;I had a similar issue with IR829,&lt;/P&gt;&lt;P&gt;Try reset by tapping instead of long press the reset button.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Then try saving the config file in a notepad and upload via tftp to start-up,then upload from start-up to run config.&lt;/P&gt;</description>
      <pubDate>Mon, 29 Mar 2021 14:54:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/unknown-aaa-authentication-attempts-on-catalyst-switch/m-p/4315497#M566507</guid>
      <dc:creator>John Godwyll Jnr</dc:creator>
      <dc:date>2021-03-29T14:54:00Z</dc:date>
    </item>
  </channel>
</rss>

