<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: RADIUS over VRF in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/radius-over-vrf/m-p/4416281#M567776</link>
    <description>&lt;P&gt;Not sure if you ever got your answer but in our environment I found that I needed the following command in the global configuration to get Radius over VRF to work.&lt;/P&gt;&lt;P class="lia-indent-padding-left-30px"&gt;ip radius source-interface GigabitEthernet0/0 vrf Mgmt-vrf&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 10 Jun 2021 17:09:55 GMT</pubDate>
    <dc:creator>Louis Gonzales</dc:creator>
    <dc:date>2021-06-10T17:09:55Z</dc:date>
    <item>
      <title>RADIUS over VRF</title>
      <link>https://community.cisco.com/t5/network-access-control/radius-over-vrf/m-p/4106242#M561319</link>
      <description>&lt;P&gt;Seems like i got something wrong, only i cannot find what's going sideways.&lt;/P&gt;&lt;P&gt;I can ping my ISE RADIUS servers in the default Mgmt-vrf but still, authentication requests are not reaching ISE.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Strangely enough i can ping these RADIUS servers within the default Mgmt-vrf, but when look at the "show AAA servers" believing there seems to be something not ok because of the DEAD, i have no clue what this Platform State from SMD means.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="show aaa.jpg" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/77178i56557B5340FD5AFA/image-size/large?v=v2&amp;amp;px=999" role="button" title="show aaa.jpg" alt="show aaa.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;In addition, "test aaa group radius server 192.168.255.49 auth-port 1812 acct-port 1813 test-user test legacy" throws an "access reject" response on the console, from which i would conclude that all is working fine, but checking the RADIUS live logs in ISE i don't see any failed authentication.&lt;/P&gt;&lt;P&gt;If i test with "test aaa group radius server 192.168.255.49 auth-port 1812 acct-port 1813 test-user test new-code", it again throws an "access reject" response on the console, and now RADIUS live logs in ISE display the failed authentication!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;TCP dump on ISE during the legacy test doesn't show any RADIUS packets, during new-code test, RADIUS packets are visible.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hope someone can help me troubleshoot en eventually solve this issue.&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;</description>
      <pubDate>Fri, 19 Jun 2020 10:49:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/radius-over-vrf/m-p/4106242#M561319</guid>
      <dc:creator>Darkmatter</dc:creator>
      <dc:date>2020-06-19T10:49:51Z</dc:date>
    </item>
    <item>
      <title>Re: RADIUS over VRF</title>
      <link>https://community.cisco.com/t5/network-access-control/radius-over-vrf/m-p/4106301#M561323</link>
      <description>You have the ability to configure per vrf AAA server groups.  Make sure that whichever server group you reference in your AAA commands has the specified vrf fowarding under the server group.  To me your situation sounds like you may be missing this, and your NAD is using a global config which is how you are sourcing from mgmt-vrf.  Then make sure in the vrf you wish to use that you have routes back to ISE.  &lt;BR /&gt;Brief example:&lt;BR /&gt;aaa group server radius ISE_Group&lt;BR /&gt; server name abcd1&lt;BR /&gt; server name abcd2&lt;BR /&gt; ip vrf forwarding VRF1&lt;BR /&gt; ip radius source-interface Loopback0&lt;BR /&gt;....&lt;BR /&gt;radius server abcd1&lt;BR /&gt; address ipv4 xxxx auth-port 1812 acct-port 1813&lt;BR /&gt; timeout 2&lt;BR /&gt; retransmit 1&lt;BR /&gt;....&lt;BR /&gt;radius server abcd2&lt;BR /&gt; address ipv4 xxxx auth-port 1812 acct-port 1813&lt;BR /&gt; timeout 2&lt;BR /&gt; retransmit 1&lt;BR /&gt;&lt;BR /&gt;Good luck &amp;amp; HTH!&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Fri, 19 Jun 2020 12:40:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/radius-over-vrf/m-p/4106301#M561323</guid>
      <dc:creator>Mike.Cifelli</dc:creator>
      <dc:date>2020-06-19T12:40:34Z</dc:date>
    </item>
    <item>
      <title>Re: RADIUS over VRF</title>
      <link>https://community.cisco.com/t5/network-access-control/radius-over-vrf/m-p/4106538#M561327</link>
      <description>&lt;P&gt;Thanks for the suggestion but I gave multiple info that connectivity inside the VRF is fine, i read the Cisco docs on AAA per VRF, so i don't think that's the issue.&lt;/P&gt;&lt;P&gt;Moreover i have the exact same config you posted with the only difference that my source interface is Gi0/0 - which is a management interface on the switch and in the same VRF ofcourse - it's a Catalyst 3850&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Again, "test aaa group radius server 192.168.255.49 auth-port 1812 acct-port 1813 test-user test legacy" throws an "access reject" response on the console which is the expected behaviour, from which i would conclude that all is working fine, but checking the RADIUS live logs in ISE i don't see any failed authentication.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If i test with "test aaa group radius server 192.168.255.49 auth-port 1812 acct-port 1813 test-user test new-code", it again throws an "access reject" response on the console, and now RADIUS live logs in ISE display the failed authentication!&lt;/P&gt;</description>
      <pubDate>Fri, 19 Jun 2020 22:22:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/radius-over-vrf/m-p/4106538#M561327</guid>
      <dc:creator>Darkmatter</dc:creator>
      <dc:date>2020-06-19T22:22:35Z</dc:date>
    </item>
    <item>
      <title>Re: RADIUS over VRF</title>
      <link>https://community.cisco.com/t5/network-access-control/radius-over-vrf/m-p/4416281#M567776</link>
      <description>&lt;P&gt;Not sure if you ever got your answer but in our environment I found that I needed the following command in the global configuration to get Radius over VRF to work.&lt;/P&gt;&lt;P class="lia-indent-padding-left-30px"&gt;ip radius source-interface GigabitEthernet0/0 vrf Mgmt-vrf&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 10 Jun 2021 17:09:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/radius-over-vrf/m-p/4416281#M567776</guid>
      <dc:creator>Louis Gonzales</dc:creator>
      <dc:date>2021-06-10T17:09:55Z</dc:date>
    </item>
  </channel>
</rss>

