<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Defining unique radius servers per VRF for different customers in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/defining-unique-radius-servers-per-vrf-for-different-customers/m-p/4629725#M575395</link>
    <description>&lt;P&gt;Good afternoon, does anyone know if it is possible to define unique radius servers per VRF on a Cisco 9606 (17.3.4)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I respect that you can create a radius group, and attached it to a VRF, but for reachability only from source.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have a situation where a customer wants to support multiple tenants on a pair of 9606 core switches (Stackwise virtual)&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Each tenant is assigned their own unique VRF, but operates their own AAA environment and still wishes to use 802.1x wired authentication.&lt;BR /&gt;&lt;BR /&gt;Example:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Customer A (VRF A) - Customer A Radius Server - 802.1x/MAB&lt;/P&gt;&lt;P&gt;Customer B (VRF B) - Customer B Radius Server - 802.1x/MAB&lt;/P&gt;&lt;P&gt;Customer C (VRF C) - Customer C Radius Server - 802.1x/MAB&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I did find a feature called&amp;nbsp; "Per VRF AAA" but it seems to be aimed at ISP's for PPP servcies, not 802.1x user/device auth.&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/sec_usr_aaa/configuration/xe-16/sec-usr-aaa-xe-16-book/sec-per-vrf-aaa.pdf" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/sec_usr_aaa/configuration/xe-16/sec-usr-aaa-xe-16-book/sec-per-vrf-aaa.pdf&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any assistance would be appreciated!&lt;/P&gt;</description>
    <pubDate>Fri, 10 Jun 2022 15:29:09 GMT</pubDate>
    <dc:creator>DLGNOC</dc:creator>
    <dc:date>2022-06-10T15:29:09Z</dc:date>
    <item>
      <title>Defining unique radius servers per VRF for different customers</title>
      <link>https://community.cisco.com/t5/network-access-control/defining-unique-radius-servers-per-vrf-for-different-customers/m-p/4629725#M575395</link>
      <description>&lt;P&gt;Good afternoon, does anyone know if it is possible to define unique radius servers per VRF on a Cisco 9606 (17.3.4)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I respect that you can create a radius group, and attached it to a VRF, but for reachability only from source.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have a situation where a customer wants to support multiple tenants on a pair of 9606 core switches (Stackwise virtual)&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Each tenant is assigned their own unique VRF, but operates their own AAA environment and still wishes to use 802.1x wired authentication.&lt;BR /&gt;&lt;BR /&gt;Example:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Customer A (VRF A) - Customer A Radius Server - 802.1x/MAB&lt;/P&gt;&lt;P&gt;Customer B (VRF B) - Customer B Radius Server - 802.1x/MAB&lt;/P&gt;&lt;P&gt;Customer C (VRF C) - Customer C Radius Server - 802.1x/MAB&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I did find a feature called&amp;nbsp; "Per VRF AAA" but it seems to be aimed at ISP's for PPP servcies, not 802.1x user/device auth.&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/sec_usr_aaa/configuration/xe-16/sec-usr-aaa-xe-16-book/sec-per-vrf-aaa.pdf" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/sec_usr_aaa/configuration/xe-16/sec-usr-aaa-xe-16-book/sec-per-vrf-aaa.pdf&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any assistance would be appreciated!&lt;/P&gt;</description>
      <pubDate>Fri, 10 Jun 2022 15:29:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/defining-unique-radius-servers-per-vrf-for-different-customers/m-p/4629725#M575395</guid>
      <dc:creator>DLGNOC</dc:creator>
      <dc:date>2022-06-10T15:29:09Z</dc:date>
    </item>
    <item>
      <title>Re: Defining unique radius servers per VRF for different customers</title>
      <link>https://community.cisco.com/t5/network-access-control/defining-unique-radius-servers-per-vrf-for-different-customers/m-p/4629809#M575396</link>
      <description>&lt;P&gt;&lt;SPAN&gt;try this way&lt;BR /&gt;aaa group server radius &amp;lt;any name&amp;gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;server-private x.x.x.x key xxxx&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;SPAN class=""&gt;&amp;nbsp;&lt;/SPAN&gt;ip vrf forwarding XXX&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;SPAN class=""&gt;&amp;nbsp;&lt;/SPAN&gt;ip radius source-interface XXXX&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;STRONG&gt;&lt;FONT color="#FF0000"&gt;please note that&amp;nbsp;&lt;/FONT&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;FONT color="#FF0000"&gt;source-interface is config with same VRF you use for this server&lt;/FONT&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;FONT color="#FF0000"&gt;the radius server must reachable via VRF source-interface&amp;nbsp;&lt;/FONT&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;FONT color="#FF0000"&gt;use ping x.x.x.x source &amp;lt;source-interface&amp;gt; &amp;lt;&amp;lt;--to check the&amp;nbsp;reachability.&lt;/FONT&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 13 Jun 2022 21:19:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/defining-unique-radius-servers-per-vrf-for-different-customers/m-p/4629809#M575396</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2022-06-13T21:19:44Z</dc:date>
    </item>
    <item>
      <title>Re: Defining unique radius servers per VRF for different customers</title>
      <link>https://community.cisco.com/t5/network-access-control/defining-unique-radius-servers-per-vrf-for-different-customers/m-p/4630460#M575414</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/912761"&gt;@DLGNOC&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I can confirm that RADIUS can be VRF-aware - but I would also caution that I had to &lt;STRONG&gt;upgrade to 17.6.3 to allow COA to be VRF specific too. Don't forget that!&amp;nbsp;&lt;/STRONG&gt; The problem was that the switch was receiving the CoA from ISE (UDP/1700), it's re-auth'd the session, and then tried sending the CoA ACK back to ISE. That's where the problem started in versions prior to 17.4.x (it was trying to send the response by using the global routing table, and not the VRF).&lt;/P&gt;
&lt;P&gt;I originally found the problem in 16.9 - then upgraded to 16.12 - then finally upgrade to 17.6.3 and now it works.&amp;nbsp; All the of the RADIUS traffic is now VRF aware and the config is all done in the aaa group (no need for the global ip radius server source-interface&amp;nbsp; command)&lt;/P&gt;</description>
      <pubDate>Mon, 13 Jun 2022 00:20:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/defining-unique-radius-servers-per-vrf-for-different-customers/m-p/4630460#M575414</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2022-06-13T00:20:15Z</dc:date>
    </item>
    <item>
      <title>Re: Defining unique radius servers per VRF for different customers</title>
      <link>https://community.cisco.com/t5/network-access-control/defining-unique-radius-servers-per-vrf-for-different-customers/m-p/4630691#M575430</link>
      <description>&lt;P&gt;Thank you&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/158532"&gt;@Arne Bier&lt;/a&gt;&amp;nbsp;would you happen to have a sample configuration please? And is this based on the "Per VRF AAA" feature?&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Regards&lt;/P&gt;</description>
      <pubDate>Mon, 13 Jun 2022 10:58:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/defining-unique-radius-servers-per-vrf-for-different-customers/m-p/4630691#M575430</guid>
      <dc:creator>DLGNOC</dc:creator>
      <dc:date>2022-06-13T10:58:27Z</dc:date>
    </item>
    <item>
      <title>Re: Defining unique radius servers per VRF for different customers</title>
      <link>https://community.cisco.com/t5/network-access-control/defining-unique-radius-servers-per-vrf-for-different-customers/m-p/4630693#M575431</link>
      <description>&lt;P&gt;Yes please Mr&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/158532"&gt;@Arne Bier&lt;/a&gt;&amp;nbsp;&lt;BR /&gt;I interest to see the config of AAA vrf aware.&lt;BR /&gt;thanks a lot for your answer.&lt;/P&gt;</description>
      <pubDate>Mon, 13 Jun 2022 11:06:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/defining-unique-radius-servers-per-vrf-for-different-customers/m-p/4630693#M575431</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2022-06-13T11:06:26Z</dc:date>
    </item>
    <item>
      <title>Re: Defining unique radius servers per VRF for different customers</title>
      <link>https://community.cisco.com/t5/network-access-control/defining-unique-radius-servers-per-vrf-for-different-customers/m-p/4631074#M575447</link>
      <description>&lt;P&gt;Ok - this VRF aware is not too tricky - in my case I have a L3 switch that has VRFs and the RADIUS traffic runs in a VRF called VRF123. All the other user traffic etc runs in different VRFs&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Below is how the RADIUS is handled on the C9300 running 17.6.3&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;aaa new-model
!
aaa group server radius ISE-GROUP
 server name ISE01
 ip vrf forwarding VRF123
 ip radius source-interface Vlan123&lt;BR /&gt;!
aaa server radius dynamic-author
 client 172.16.1.10 vrf VRF123 server-key **************&lt;BR /&gt;!
radius-server attribute 6 on-for-login-auth
radius-server attribute 8 include-in-access-req
radius-server attribute 25 access-request include
radius-server attribute 31 mac format ietf upper-case
radius-server attribute 31 send nas-port-detail mac-only
radius-server dead-criteria time 10 tries 2
radius-server deadtime 10
radius server ISE01
 address ipv4 172.16.1.10 auth-port 1812 acct-port 1813
 timeout 10
 retransmit 2
 automate-tester username RADIUS-TEST ignore-acct-port probe-on
 key *****************
!
aaa authentication dot1x default group ISE-GROUP
aaa authorization network default group ISE-GROUP 
aaa accounting update newinfo periodic 2880
aaa accounting identity default start-stop group ISE-GROUP&lt;/PRE&gt;</description>
      <pubDate>Mon, 13 Jun 2022 20:54:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/defining-unique-radius-servers-per-vrf-for-different-customers/m-p/4631074#M575447</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2022-06-13T20:54:32Z</dc:date>
    </item>
    <item>
      <title>Re: Defining unique radius servers per VRF for different customers</title>
      <link>https://community.cisco.com/t5/network-access-control/defining-unique-radius-servers-per-vrf-for-different-customers/m-p/4631077#M575448</link>
      <description>&lt;P&gt;sorry but it don't differ than I post before ? or there is some differ ?&lt;/P&gt;</description>
      <pubDate>Mon, 13 Jun 2022 21:00:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/defining-unique-radius-servers-per-vrf-for-different-customers/m-p/4631077#M575448</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2022-06-13T21:00:04Z</dc:date>
    </item>
    <item>
      <title>Re: Defining unique radius servers per VRF for different customers</title>
      <link>https://community.cisco.com/t5/network-access-control/defining-unique-radius-servers-per-vrf-for-different-customers/m-p/4631087#M575450</link>
      <description>&lt;P&gt;Ok ok -&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1065752"&gt;@MHM Cisco World&lt;/a&gt;&amp;nbsp;- can you re-state the question again? What are you guys asking for exactly? If you need more aaa groups (where each aaa group is in a different VRF then this would be a template). Or what exactly is the use-case?&lt;/P&gt;</description>
      <pubDate>Mon, 13 Jun 2022 21:16:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/defining-unique-radius-servers-per-vrf-for-different-customers/m-p/4631087#M575450</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2022-06-13T21:16:00Z</dc:date>
    </item>
    <item>
      <title>Re: Defining unique radius servers per VRF for different customers</title>
      <link>https://community.cisco.com/t5/network-access-control/defining-unique-radius-servers-per-vrf-for-different-customers/m-p/4633283#M575543</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/158532"&gt;@Arne Bier&lt;/a&gt;&amp;nbsp; Thank you for the example Arne, yes was hoping it was possible to define method lists for each unique VRF?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Do you know if this is possible please?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;aaa authentication dot1x default group ISE-GROUP123 - VRF123
aaa authorization network default group ISE-GROUP123 - VRF123&lt;/PRE&gt;&lt;PRE&gt;aaa authentication dot1x default group ISE-GROUP124 - VRF124
aaa authorization network default group ISE-GROUP124 - VRF124&lt;/PRE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 16 Jun 2022 15:37:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/defining-unique-radius-servers-per-vrf-for-different-customers/m-p/4633283#M575543</guid>
      <dc:creator>DLGNOC</dc:creator>
      <dc:date>2022-06-16T15:37:03Z</dc:date>
    </item>
    <item>
      <title>Re: Defining unique radius servers per VRF for different customers</title>
      <link>https://community.cisco.com/t5/network-access-control/defining-unique-radius-servers-per-vrf-for-different-customers/m-p/4633449#M575553</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/912761"&gt;@DLGNOC&lt;/a&gt;&amp;nbsp; and&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1065752"&gt;@MHM Cisco World&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I think what you're referring to is called Differentiated Authentication and it's possible with IBNS 2.0 using a combination of Method Lists and different aaa Groups. The use-case that is mentioned in the &lt;A href="https://community.cisco.com/t5/security-documents/ise-secure-wired-access-prescriptive-deployment-guide/ta-p/3641515#toc-hId--409339797" target="_self"&gt;ISE Secure Wired Access Prescriptive Guide&lt;/A&gt; is if you wanted to send 802.1X to Group A, and MAB to Group B (as an example). I think this can be made to be VRF-aware if you include the vrf commands in the aaa groups as required - and then also create the necessary dynamic author clients too.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Is this what you had in mind?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;BTW,&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/912761"&gt;@DLGNOC&lt;/a&gt;&amp;nbsp;your example in the previous post specifies different aaa groups, but you're always using the 'default' method list. The word 'default' is a reserved method list. If you look at the examples in the link I provided, you can see how Cisco recommends it be done, and how cool IBNS 2.0 is in using those method lists.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The aaa group is just the vehicle to then finally get the RADIUS traffic to the RADIUS servers, after the correct method list has been selected. In older IOS's you could debug the dot1x nicely to see the method list selection algorithm. New IOS-XE SMD debugging is tedious.&lt;/P&gt;</description>
      <pubDate>Thu, 16 Jun 2022 20:20:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/defining-unique-radius-servers-per-vrf-for-different-customers/m-p/4633449#M575553</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2022-06-16T20:20:25Z</dc:date>
    </item>
    <item>
      <title>Re: Defining unique radius servers per VRF for different customers</title>
      <link>https://community.cisco.com/t5/network-access-control/defining-unique-radius-servers-per-vrf-for-different-customers/m-p/4637642#M575686</link>
      <description>&lt;P&gt;Thank you&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/158532"&gt;@Arne Bier&lt;/a&gt;&amp;nbsp;Thats exactly what i was looking for! &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 23 Jun 2022 15:29:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/defining-unique-radius-servers-per-vrf-for-different-customers/m-p/4637642#M575686</guid>
      <dc:creator>DLGNOC</dc:creator>
      <dc:date>2022-06-23T15:29:42Z</dc:date>
    </item>
  </channel>
</rss>

