<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Issues getting radius authentication working on switch with vrf in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/issues-getting-radius-authentication-working-on-switch-with-vrf/m-p/4964163#M585341</link>
    <description>&lt;P&gt;Use&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Server-private instead of server name&lt;/P&gt;
&lt;P&gt;If tge server reachable via mgmt vrf rib&lt;/P&gt;</description>
    <pubDate>Tue, 21 Nov 2023 22:55:58 GMT</pubDate>
    <dc:creator>MHM Cisco World</dc:creator>
    <dc:date>2023-11-21T22:55:58Z</dc:date>
    <item>
      <title>Issues getting radius authentication working on switch with vrf</title>
      <link>https://community.cisco.com/t5/network-access-control/issues-getting-radius-authentication-working-on-switch-with-vrf/m-p/4964159#M585340</link>
      <description>&lt;P&gt;Hello,&lt;BR /&gt;&lt;BR /&gt;I've been on a project to point all our cisco network switches to our new NPS servers, so that multi factor authentication is done when someone logs in. I've been able to do all the switches except 2 which happen to have a vrf configuration on it.&lt;/P&gt;&lt;P&gt;From my troubleshooting (looking at a firewall between the switch and the nps), it doesn't look like it even attempts to send a radius packet out of the switch. It's like it's looking at it's local AAA instead.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;I just get a failed authentication error when trying to ssh in.&lt;BR /&gt;&lt;BR /&gt;I've tested icmp connectivity between the switch and the NPS server, that's working fine.&lt;BR /&gt;&lt;BR /&gt;I've attached the switch configuration&lt;/P&gt;</description>
      <pubDate>Tue, 21 Nov 2023 22:44:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/issues-getting-radius-authentication-working-on-switch-with-vrf/m-p/4964159#M585340</guid>
      <dc:creator>Gallain</dc:creator>
      <dc:date>2023-11-21T22:44:07Z</dc:date>
    </item>
    <item>
      <title>Re: Issues getting radius authentication working on switch with vrf</title>
      <link>https://community.cisco.com/t5/network-access-control/issues-getting-radius-authentication-working-on-switch-with-vrf/m-p/4964163#M585341</link>
      <description>&lt;P&gt;Use&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Server-private instead of server name&lt;/P&gt;
&lt;P&gt;If tge server reachable via mgmt vrf rib&lt;/P&gt;</description>
      <pubDate>Tue, 21 Nov 2023 22:55:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/issues-getting-radius-authentication-working-on-switch-with-vrf/m-p/4964163#M585341</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-11-21T22:55:58Z</dc:date>
    </item>
    <item>
      <title>Re: Issues getting radius authentication working on switch with vrf</title>
      <link>https://community.cisco.com/t5/network-access-control/issues-getting-radius-authentication-working-on-switch-with-vrf/m-p/4964215#M585344</link>
      <description>&lt;P&gt;i added your command so the group server radius config looks like this:&lt;BR /&gt;&lt;BR /&gt;aaa group server radius RadiusServerGroup&lt;BR /&gt;server-private 10.4.85.31&lt;BR /&gt;ip vrf forwarding Mgmt-vrf&lt;BR /&gt;ip radius source-interface GigabitEthernet0/0&lt;BR /&gt;&lt;BR /&gt;Here are pings showing the accessibility:&lt;BR /&gt;&lt;BR /&gt;ord-hl2s-1#ping vrf Mgmt-vrf 10.4.85.31 sourc gigabitEthernet 0/0&lt;BR /&gt;Type escape sequence to abort.&lt;BR /&gt;Sending 5, 100-byte ICMP Echos to 10.4.85.31, timeout is 2 seconds:&lt;BR /&gt;Packet sent with a source address of 10.1.130.132&lt;BR /&gt;!!!!!&lt;BR /&gt;Success rate is 100 percent (5/5), round-trip min/avg/max = 1/1/1 ms&lt;BR /&gt;&lt;BR /&gt;However, it still looks like no radius attempt is made. I still get a&amp;nbsp;Access denied when putting in my normal credentials.&lt;/P&gt;</description>
      <pubDate>Wed, 22 Nov 2023 04:11:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/issues-getting-radius-authentication-working-on-switch-with-vrf/m-p/4964215#M585344</guid>
      <dc:creator>Gallain</dc:creator>
      <dc:date>2023-11-22T04:11:34Z</dc:date>
    </item>
    <item>
      <title>Re: Issues getting radius authentication working on switch with vrf</title>
      <link>https://community.cisco.com/t5/network-access-control/issues-getting-radius-authentication-working-on-switch-with-vrf/m-p/4964222#M585345</link>
      <description>&lt;P&gt;I check config again&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Under vty&lt;/P&gt;
&lt;P&gt;You dont specify the aaa auth method VTY so it use defualt.&lt;/P&gt;
&lt;P&gt;Add&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Login authentication VTY&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Under vty 0 4 and check access again.&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Wed, 22 Nov 2023 04:34:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/issues-getting-radius-authentication-working-on-switch-with-vrf/m-p/4964222#M585345</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-11-22T04:34:31Z</dc:date>
    </item>
    <item>
      <title>Re: Issues getting radius authentication working on switch with vrf</title>
      <link>https://community.cisco.com/t5/network-access-control/issues-getting-radius-authentication-working-on-switch-with-vrf/m-p/4964716#M585353</link>
      <description>&lt;P&gt;Yep - your aaa authentication login contains the method list name "VTY" - therefore you must match that to the relevant vty lines as MHM said. Same goes for authorization. If you had left this as keyword "default" in your aaa statements, then the vty lines would have worked by default. It's generally a good idea to use method lists, but they can cause for extra confusion&lt;/P&gt;
&lt;P&gt;Buty in general, you can also send RADIUS test authentication requests using this IOS command&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;test aaa group RadiusServerGroup somename somepassword new-code&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 22 Nov 2023 22:20:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/issues-getting-radius-authentication-working-on-switch-with-vrf/m-p/4964716#M585353</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2023-11-22T22:20:51Z</dc:date>
    </item>
    <item>
      <title>Re: Issues getting radius authentication working on switch with vrf</title>
      <link>https://community.cisco.com/t5/network-access-control/issues-getting-radius-authentication-working-on-switch-with-vrf/m-p/4964725#M585355</link>
      <description>&lt;P&gt;Thank you so much. This worked!&lt;/P&gt;</description>
      <pubDate>Wed, 22 Nov 2023 22:36:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/issues-getting-radius-authentication-working-on-switch-with-vrf/m-p/4964725#M585355</guid>
      <dc:creator>Gallain</dc:creator>
      <dc:date>2023-11-22T22:36:29Z</dc:date>
    </item>
  </channel>
</rss>

