<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: FIPS Enabled ISE SSH Authentication with RADIUS in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/fips-enabled-ise-ssh-authentication-with-radius/m-p/4742849#M578925</link>
    <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/632778"&gt;@Rodrigo Diaz&lt;/a&gt;&amp;nbsp;, I have looked into the STIG requirement to have FIPS enabled on the ISE server.&amp;nbsp; If you don't have it enabled on the ISE server but configure a FIPS 140-2/3 validated HMAC or other FIPS 140-2/3 approved methods, the finding is lowered by 1 category/severity level.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So, I am going to disable FIPS and move forward.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for your assistance.&amp;nbsp; Much appreciated.&lt;/P&gt;&lt;P&gt;Matt&lt;/P&gt;</description>
    <pubDate>Tue, 20 Dec 2022 19:27:19 GMT</pubDate>
    <dc:creator>matthew.rand</dc:creator>
    <dc:date>2022-12-20T19:27:19Z</dc:date>
    <item>
      <title>FIPS Enabled ISE SSH Authentication with RADIUS</title>
      <link>https://community.cisco.com/t5/network-access-control/fips-enabled-ise-ssh-authentication-with-radius/m-p/4741960#M578904</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;I have not been able to find a solution to my problem. Hopefully someone will be able to assist or point me in the right direction.&lt;/P&gt;&lt;P&gt;I am needing to use RADIUS as my SSH authentication using an ISE server running 3.1 and is FIPS enabled. So, TACACS is not an option and I am not allowed to use PAP/ASCII authentication. I have EAP-FAST, EAP-TLS, and everything else allowed under Policy &amp;gt; Results.&lt;/P&gt;&lt;P&gt;Everything I have read and researched indicates that my ISE server is configured correctly, however, when I try to login using a C3850-48T running 16.12 - the ISE Operations &amp;gt; RADIUS &amp;gt; Live Logs show&lt;/P&gt;&lt;P&gt;Overview: Event 5400 Authentication failed&lt;/P&gt;&lt;P&gt;Authentication Details:&lt;BR /&gt;Event - 5400 Authentication Failed&lt;BR /&gt;Failure Reason - 15024 PAP is not allowed&lt;BR /&gt;Resolution - Enable PAP/ASCII protocol for the selected service&lt;BR /&gt;Root Cause - PAP is not allowed&lt;/P&gt;&lt;P&gt;My switch aaa configuration:&lt;BR /&gt;aaa group server radius iseLocalLogin&lt;BR /&gt;server name ISE&lt;BR /&gt;key-wrap enable&lt;BR /&gt;ip radius source-interface Vlan985&lt;BR /&gt;deadtime 10&lt;BR /&gt;!&lt;BR /&gt;aaa authentication login Auth_User_List group iseLocalLogin local&lt;BR /&gt;aaa authentication enable default group iseLocalLogin group radius&lt;BR /&gt;aaa authentication eou Auth_User_List group iseLocalLogin local&lt;BR /&gt;aaa authorization exec Auth_User_List group iseLocalLogin if-authenticated&lt;BR /&gt;aaa accounting exec Auth_User_List start-stop group iseLocalLogin&lt;BR /&gt;!&lt;BR /&gt;radius server ISE&lt;BR /&gt;address ipv4 192.16.34.32 auth-port 1231 acct-port 1232&lt;BR /&gt;timeout 10&lt;BR /&gt;key-wrap encryption-key 7 ascii16 message-auth-code-key 7 ascii20 format ascii&lt;BR /&gt;key 7 ascii2432&lt;/P&gt;&lt;P&gt;Debug Logs:&lt;/P&gt;&lt;P&gt;AAA/AUTHEN/LOGIN (0000139D): Pick method list 'Auth_User_List'&lt;BR /&gt;RADIUS/ENCODE(0000139D): ask "Password: "&lt;BR /&gt;RADIUS/ENCODE(0000139D): send packet; GET_PASSWORD&lt;BR /&gt;RADIUS/ENCODE(0000139D):Orig. component type = Exec&lt;BR /&gt;Unsupported AAA attribute clid&lt;BR /&gt;RADIUS(0000139D): Config NAS IP:192.16.55.17&lt;BR /&gt;vrfid: [65535] ipv6 tableid : [0]&lt;BR /&gt;idb is NULL&lt;BR /&gt;RADIUS(0000139D): Config NAS IPv6: ::&lt;BR /&gt;%SEC_LOGIN-4-LOGIN_FAILED: Login failed [user: ad_username] [Source: 192.16.75.72] [localport: 22] [Reason: Login Authentication Failed] at 14:11:04 EST Mon Dec 19 2022&lt;/P&gt;&lt;P&gt;Any assistance will be greatly appreciated.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 19 Dec 2022 19:31:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/fips-enabled-ise-ssh-authentication-with-radius/m-p/4741960#M578904</guid>
      <dc:creator>matthew.rand</dc:creator>
      <dc:date>2022-12-19T19:31:05Z</dc:date>
    </item>
    <item>
      <title>Re: FIPS Enabled ISE SSH Authentication with RADIUS</title>
      <link>https://community.cisco.com/t5/network-access-control/fips-enabled-ise-ssh-authentication-with-radius/m-p/4742708#M578918</link>
      <description>&lt;P&gt;hello&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/176556"&gt;@matthew.rand&lt;/a&gt;&amp;nbsp;, as you mentioned when you enable FIPS ISE this will disable a set of protocols and among them you will not be allowed to use PAP-ASCII and TACACS , unfortunately those are the only ways in which you can use ISE to manage access within your network devices , hence such deployment is not possible .&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 20 Dec 2022 15:57:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/fips-enabled-ise-ssh-authentication-with-radius/m-p/4742708#M578918</guid>
      <dc:creator>Rodrigo Diaz</dc:creator>
      <dc:date>2022-12-20T15:57:20Z</dc:date>
    </item>
    <item>
      <title>Re: FIPS Enabled ISE SSH Authentication with RADIUS</title>
      <link>https://community.cisco.com/t5/network-access-control/fips-enabled-ise-ssh-authentication-with-radius/m-p/4742725#M578919</link>
      <description>&lt;P&gt;Thanks&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/632778"&gt;@Rodrigo Diaz&lt;/a&gt;&amp;nbsp;for the update.&amp;nbsp; I was getting the picture that it wasn't going to be possible.&lt;/P&gt;&lt;P&gt;What are some alternatives to get authentication working with FIPS enabled devices?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 20 Dec 2022 16:20:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/fips-enabled-ise-ssh-authentication-with-radius/m-p/4742725#M578919</guid>
      <dc:creator>matthew.rand</dc:creator>
      <dc:date>2022-12-20T16:20:23Z</dc:date>
    </item>
    <item>
      <title>Re: FIPS Enabled ISE SSH Authentication with RADIUS</title>
      <link>https://community.cisco.com/t5/network-access-control/fips-enabled-ise-ssh-authentication-with-radius/m-p/4742824#M578922</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/176556"&gt;@matthew.rand&lt;/a&gt;&amp;nbsp;, the only viable options that I see are either configure local password authentication in such NAD with the model you have with FIPS, or in its defect to have a dedicated ISE set of nodes without the FIPS enabled to use TACACS or Radius based authentication with PAP to grant access to the device .&amp;nbsp;&lt;/P&gt;
&lt;P&gt;H&lt;/P&gt;</description>
      <pubDate>Tue, 20 Dec 2022 18:39:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/fips-enabled-ise-ssh-authentication-with-radius/m-p/4742824#M578922</guid>
      <dc:creator>Rodrigo Diaz</dc:creator>
      <dc:date>2022-12-20T18:39:37Z</dc:date>
    </item>
    <item>
      <title>Re: FIPS Enabled ISE SSH Authentication with RADIUS</title>
      <link>https://community.cisco.com/t5/network-access-control/fips-enabled-ise-ssh-authentication-with-radius/m-p/4742849#M578925</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/632778"&gt;@Rodrigo Diaz&lt;/a&gt;&amp;nbsp;, I have looked into the STIG requirement to have FIPS enabled on the ISE server.&amp;nbsp; If you don't have it enabled on the ISE server but configure a FIPS 140-2/3 validated HMAC or other FIPS 140-2/3 approved methods, the finding is lowered by 1 category/severity level.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So, I am going to disable FIPS and move forward.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for your assistance.&amp;nbsp; Much appreciated.&lt;/P&gt;&lt;P&gt;Matt&lt;/P&gt;</description>
      <pubDate>Tue, 20 Dec 2022 19:27:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/fips-enabled-ise-ssh-authentication-with-radius/m-p/4742849#M578925</guid>
      <dc:creator>matthew.rand</dc:creator>
      <dc:date>2022-12-20T19:27:19Z</dc:date>
    </item>
  </channel>
</rss>

