<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: RADIUS server and 802.1x on switch Cisco Packet Tracer in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/radius-server-and-802-1x-on-switch-cisco-packet-tracer/m-p/5070584#M588765</link>
    <description>&lt;P&gt;About the first point, there is a direct link between the server and the switch. That is, I should specify the ip address 192.168.1.253 through vlan 1 and specify it as a client to the RADIUS server, and then the router won't be needed, right?&lt;BR /&gt;&lt;BR /&gt;3) in CPT you can't select any other authentication type than MD5, in the YouTube example of similar work it was also used &lt;A href="https://www.youtube.com/watch?v=8SlbCPFgVhY" target="_blank"&gt;https://www.youtube.com/watch?v=8SlbCPFgVhY&lt;/A&gt;.&lt;/P&gt;&lt;P&gt;4)I will check this solution, but in the video above nothing changed either.&lt;/P&gt;&lt;P&gt;5) I need to make the simplest authentication, could you give me an example of a simplified version of your configuration like mine, thanks in advance!&lt;/P&gt;</description>
    <pubDate>Tue, 16 Apr 2024 10:35:50 GMT</pubDate>
    <dc:creator>maksunity</dc:creator>
    <dc:date>2024-04-16T10:35:50Z</dc:date>
    <item>
      <title>RADIUS server and 802.1x on switch Cisco Packet Tracer</title>
      <link>https://community.cisco.com/t5/network-access-control/radius-server-and-802-1x-on-switch-cisco-packet-tracer/m-p/5070216#M588757</link>
      <description>&lt;P&gt;Good afternoon, Cisco community. I faced a problem when configuring RADIUS server using switch as authenticator. When using router everything was not complicated and worked, example below.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="maksunity_0-1713247899286.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/215839i65704463F594A8D5/image-size/large?v=v2&amp;amp;px=999" role="button" title="maksunity_0-1713247899286.png" alt="maksunity_0-1713247899286.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="maksunity_2-1713247934569.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/215841iBBE6DD28815E516D/image-size/medium?v=v2&amp;amp;px=400" role="button" title="maksunity_2-1713247934569.png" alt="maksunity_2-1713247934569.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;But my supervisor said that it is wrong to do it this way and in modern networks it is necessary to do authentication on switch. And that's where the problems started.&lt;/P&gt;&lt;P&gt;Immediately a question on topology, is a router needed if a switch is used to connect to a RADIUS server? What will change from this?&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="maksunity_3-1713247957777.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/215842iB195FECD20C28607/image-size/large?v=v2&amp;amp;px=999" role="button" title="maksunity_3-1713247957777.png" alt="maksunity_3-1713247957777.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;About configuring the switch. I did the following commands:&lt;/P&gt;&lt;P&gt;Interface vlan 1&lt;/P&gt;&lt;P&gt;No shutdown&lt;/P&gt;&lt;P&gt;Ip address 192.168.1.253 255.255.255.255.0&lt;/P&gt;&lt;P&gt;Exit&lt;/P&gt;&lt;P&gt;(ip default-gateway 192.168.1.254) #if a router is still needed in the topology&lt;/P&gt;&lt;P&gt;Interface range Fastethernet 0/1 - 24&lt;/P&gt;&lt;P&gt;Switchport mode access&lt;/P&gt;&lt;P&gt;Switchport access vlan 1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;With these settings everything still works (you can ping the router from PC2)&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="maksunity_4-1713247989709.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/215843i3B317777651BD097/image-size/large?v=v2&amp;amp;px=999" role="button" title="maksunity_4-1713247989709.png" alt="maksunity_4-1713247989709.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Now on to configuring the aaa itself on the switch.&lt;/P&gt;&lt;P&gt;Here are the commands I used:&lt;/P&gt;&lt;P&gt;Aaa new-model&lt;/P&gt;&lt;P&gt;Radius-server host 192.168.88.8 key cisco&lt;/P&gt;&lt;P&gt;aaa authentication dot1x default group radius&lt;/P&gt;&lt;P&gt;dot1x system-auth-control&lt;/P&gt;&lt;P&gt;exit&lt;/P&gt;&lt;P&gt;interface range fastethernet 0/23 – 24&lt;/P&gt;&lt;P&gt;authentication port-control auto&lt;/P&gt;&lt;P&gt;dot1x pae authenticator&lt;/P&gt;&lt;P&gt;exit&lt;/P&gt;&lt;P&gt;copy run startup-config&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I then added user data (user: root, password: root) to computers 1 and 2, which are connected to ports 23 and 24 respectively. And after that they become unavailable at all, orange. Although it seems that if 802.1x is enabled on them and user data has been added, then the port should allow the computer in question into the network. You can see this in the picture below&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="maksunity_5-1713248041874.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/215844i93C50E079B07F2E3/image-size/large?v=v2&amp;amp;px=999" role="button" title="maksunity_5-1713248041874.png" alt="maksunity_5-1713248041874.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Configuring 802.1x on a computer&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="maksunity_6-1713248065877.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/215845i3AB5F49A54557159/image-size/medium?v=v2&amp;amp;px=400" role="button" title="maksunity_6-1713248065877.png" alt="maksunity_6-1713248065877.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;RADIUS server settings (Services - Radius EAP - EAP-MD5 enable):&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="maksunity_7-1713248077314.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/215846i10451B4FB84448B5/image-size/large?v=v2&amp;amp;px=999" role="button" title="maksunity_7-1713248077314.png" alt="maksunity_7-1713248077314.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Which default gateway should I specify for the router or switch? (And if there is no router in the topology, what should I do?)&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="maksunity_9-1713248122705.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/215848iCBADC3D9355B06ED/image-size/large?v=v2&amp;amp;px=999" role="button" title="maksunity_9-1713248122705.png" alt="maksunity_9-1713248122705.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Also a question what default Gateway to specify in the computer settings if there should be no router in the topology?&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="maksunity_10-1713248140645.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/215849i61FAB8D260AD7789/image-size/large?v=v2&amp;amp;px=999" role="button" title="maksunity_10-1713248140645.png" alt="maksunity_10-1713248140645.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Thank you very much in advance, I hope you can help me!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;P.S. as I have already dug through a lot of cisco documentation and not only, but everything does not work. When configuring 802.1x on the router there were no such problems and everything worked almost immediately.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 16 Apr 2024 06:20:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/radius-server-and-802-1x-on-switch-cisco-packet-tracer/m-p/5070216#M588757</guid>
      <dc:creator>maksunity</dc:creator>
      <dc:date>2024-04-16T06:20:50Z</dc:date>
    </item>
    <item>
      <title>Re: RADIUS server and 802.1x on switch Cisco Packet Tracer</title>
      <link>https://community.cisco.com/t5/network-access-control/radius-server-and-802-1x-on-switch-cisco-packet-tracer/m-p/5070280#M588759</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; - FYI :&amp;nbsp;&lt;A href="https://learningnetwork.cisco.com/s/topic/0TO6e000000WEorGAG/packet-tracer" target="_blank"&gt;Community group for Packet Tracer project questions&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp; M.&lt;/P&gt;</description>
      <pubDate>Tue, 16 Apr 2024 06:56:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/radius-server-and-802-1x-on-switch-cisco-packet-tracer/m-p/5070280#M588759</guid>
      <dc:creator>Mark Elsen</dc:creator>
      <dc:date>2024-04-16T06:56:15Z</dc:date>
    </item>
    <item>
      <title>Re: RADIUS server and 802.1x on switch Cisco Packet Tracer</title>
      <link>https://community.cisco.com/t5/network-access-control/radius-server-and-802-1x-on-switch-cisco-packet-tracer/m-p/5070396#M588762</link>
      <description>&lt;P&gt;I'm sorry. I wrote where you indicated, but I want to believe that someone here can help with this problem.&lt;/P&gt;</description>
      <pubDate>Tue, 16 Apr 2024 07:54:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/radius-server-and-802-1x-on-switch-cisco-packet-tracer/m-p/5070396#M588762</guid>
      <dc:creator>maksunity</dc:creator>
      <dc:date>2024-04-16T07:54:13Z</dc:date>
    </item>
    <item>
      <title>Re: RADIUS server and 802.1x on switch Cisco Packet Tracer</title>
      <link>https://community.cisco.com/t5/network-access-control/radius-server-and-802-1x-on-switch-cisco-packet-tracer/m-p/5070468#M588763</link>
      <description>&lt;P&gt;Couple of things here:&lt;/P&gt;
&lt;P&gt;1) You would need the router if there is no direct comms between the switch and the RADIUS server. For instance, if the switch needs to route the RADIUS packets out of the interface 192.168.1.253, then yes the router is needed because the traffic flow would go this way Switch (192.168.1.253) &amp;gt; Router (192.168.1.254) &amp;gt; Router (192.168.88.2) &amp;gt; RADIUS Server (192.168.88.8), and it should return via the same path.&lt;/P&gt;
&lt;P&gt;2) On the server configs it is showing the 192.168.1.254 as its default gateway? that should be adjusted to be the 192.168.88.2 which is the router interface in the same VLAN as the server interface.&lt;/P&gt;
&lt;P&gt;3) The dot1x config on the PC it is showing MD5 as the authentication type? I think that should be changed to be EAP-PEAP which will rely on username and password for authentication.&lt;/P&gt;
&lt;P&gt;4) The RADIUS port shown on the server configs is 1645, maybe the switch is using port 1812?, you can either set the port on the switch config to be port 1812 or change the port on the server configs to be 1812.&lt;/P&gt;
&lt;P&gt;5) The dot1x config you shared seems to be minimum and I think you need to add more commands, please use the below template, maybe not all commands will be supported on PT.&lt;/P&gt;
&lt;P&gt;aaa new-model &lt;BR /&gt;dot1x system-auth-control&lt;/P&gt;
&lt;P&gt;aaa authentication dot1x default group &amp;lt; group name &amp;gt; &lt;BR /&gt;aaa authorization network default group &amp;lt; group name &amp;gt;&lt;BR /&gt;aaa accounting dot1x default start-stop group &amp;lt; group name &amp;gt;&lt;/P&gt;
&lt;P&gt;radius server &amp;lt; server name &amp;gt;&lt;BR /&gt;address ipv4 x.x.x.x auth-port 1645 acct-port 1646 (you can use the 1812 and 1813 if you change them on the server config in PT)&lt;BR /&gt;key xxxxx&lt;/P&gt;
&lt;P&gt;radius-server dead-criteria time 5 tries 3 &lt;BR /&gt;radius-server deadtime 3&lt;/P&gt;
&lt;P&gt;aaa group server radius &amp;lt; group name &amp;gt;&lt;BR /&gt;server name &amp;lt; server name &amp;gt;&lt;BR /&gt;ip radius source-interface Vlan1&lt;/P&gt;
&lt;P&gt;radius-server vsa send authentication &lt;BR /&gt;radius-server vsa send accounting&lt;/P&gt;
&lt;P&gt;radius-server attribute 6 on-for-login-auth &lt;BR /&gt;radius-server attribute 8 include-in-access-req &lt;BR /&gt;radius-server attribute 25 access-request include&lt;/P&gt;
&lt;P&gt;interface &amp;lt; interface ID &amp;gt;&lt;BR /&gt;switchport mode access &lt;BR /&gt;authentication host-mode multi-auth&lt;BR /&gt;authentication order dot 1x mab &lt;BR /&gt;authentication priority dot1x mab &lt;BR /&gt;authentication event fail action next-method &lt;BR /&gt;authentication port-control auto &lt;BR /&gt;authentication periodic &lt;BR /&gt;authentication timer reauthenticate server &lt;BR /&gt;mab &lt;BR /&gt;dot1x pae authenticator &lt;BR /&gt;authentication event server dead action authorize vlan xx &lt;BR /&gt;authentication event server dead action authorize voice &lt;BR /&gt;authentication event server alive action reinitialize &lt;BR /&gt;spanning-tree portfast&lt;/P&gt;</description>
      <pubDate>Tue, 16 Apr 2024 08:37:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/radius-server-and-802-1x-on-switch-cisco-packet-tracer/m-p/5070468#M588763</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2024-04-16T08:37:13Z</dc:date>
    </item>
    <item>
      <title>Re: RADIUS server and 802.1x on switch Cisco Packet Tracer</title>
      <link>https://community.cisco.com/t5/network-access-control/radius-server-and-802-1x-on-switch-cisco-packet-tracer/m-p/5070584#M588765</link>
      <description>&lt;P&gt;About the first point, there is a direct link between the server and the switch. That is, I should specify the ip address 192.168.1.253 through vlan 1 and specify it as a client to the RADIUS server, and then the router won't be needed, right?&lt;BR /&gt;&lt;BR /&gt;3) in CPT you can't select any other authentication type than MD5, in the YouTube example of similar work it was also used &lt;A href="https://www.youtube.com/watch?v=8SlbCPFgVhY" target="_blank"&gt;https://www.youtube.com/watch?v=8SlbCPFgVhY&lt;/A&gt;.&lt;/P&gt;&lt;P&gt;4)I will check this solution, but in the video above nothing changed either.&lt;/P&gt;&lt;P&gt;5) I need to make the simplest authentication, could you give me an example of a simplified version of your configuration like mine, thanks in advance!&lt;/P&gt;</description>
      <pubDate>Tue, 16 Apr 2024 10:35:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/radius-server-and-802-1x-on-switch-cisco-packet-tracer/m-p/5070584#M588765</guid>
      <dc:creator>maksunity</dc:creator>
      <dc:date>2024-04-16T10:35:50Z</dc:date>
    </item>
    <item>
      <title>Re: RADIUS server and 802.1x on switch Cisco Packet Tracer</title>
      <link>https://community.cisco.com/t5/network-access-control/radius-server-and-802-1x-on-switch-cisco-packet-tracer/m-p/5070638#M588769</link>
      <description>&lt;P&gt;On the topology you shared, the RADIUS server seems to be on subnet 192.168.88.x and the switch Vlan1 interface is on 192.168.1.x, hence I'd thought the are not on the same subnet.&lt;/P&gt;
&lt;P&gt;The configs I pasted was taken from a template I have, I would try to apply all the commands, I wouldn't worry much if any of the advance commands wouldn't be supported by PT, for instance the RADIUS VSA, attributes, dead server detection, those wouldn't be essentials in your case.&lt;/P&gt;</description>
      <pubDate>Tue, 16 Apr 2024 11:12:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/radius-server-and-802-1x-on-switch-cisco-packet-tracer/m-p/5070638#M588769</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2024-04-16T11:12:24Z</dc:date>
    </item>
  </channel>
</rss>

