<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: IOS AAA EAP Authentication. in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ios-aaa-eap-authentication/m-p/5083389#M589117</link>
    <description>&lt;P&gt;I would suggest running a packet capture on the NPS and compare the RADIUS Access-Request of the working device, versus the not working device. NPS runs Windows, so Wireshark (if possible) on that Windows server would be ideal.&lt;/P&gt;
&lt;P&gt;Perhaps the RADIUS Access-Request packet of the non-working device is mal-formed due to a bug or some default that is missing in that version of IOS. You might be able to run a packet capture on the IOS device, or use some variant of the 'debug radius' to see the packet that it spits out.&lt;/P&gt;
&lt;P&gt;In your posting, I don't see the flex configuration that the aaa method list refers to - I assume it's configured. However, that should not prevent the "test aaa" command from working. If the test aaa results in an 'Access-Reject', and IF you got a response from NPS, then the NPS logs must surely give a clue why it rejected the request. However, I have also seen IOS print the "User rejected" message when there was no response from the RADIUS request. It's important to validate that Request/Response in packet form.&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 29 Apr 2024 21:59:20 GMT</pubDate>
    <dc:creator>Arne Bier</dc:creator>
    <dc:date>2024-04-29T21:59:20Z</dc:date>
    <item>
      <title>IOS AAA EAP Authentication.</title>
      <link>https://community.cisco.com/t5/network-access-control/ios-aaa-eap-authentication/m-p/5083078#M589114</link>
      <description>&lt;P&gt;Hi guys,&lt;BR /&gt;I have a bit of an issues. I've got two routers on my bench that I building models for a FlexVPN deployment a couple of customers. Some customer are still running 2900 and others running 4000; we are in the process to replace these older machines however for the time being I need to add a FlexVPN to each platform. I have used the attached guild in each case; the guild indicates minimum IOS of 15.2.&lt;/P&gt;&lt;P&gt;I have the same config in a 2951 and a 4451; the 4451 (isr4400-universalk9.16.09.06.SPA.bin) works as expected. It authenticates to the Active Directory server, connects and can route to the remote network. The 2951 (c2951-universalk9-mz.SPA.155-3.M7.bin) however will not authenticate; I never get past the logon screen.&lt;/P&gt;&lt;P&gt;Both routers are authenticating to the same Active Directory server; each router is a listed as a separate RADIUS client in NPS and each as it's own network policy. Each has the same settings. I have attempted to run&amp;nbsp; test aaa group... but the login is always rejected.&lt;/P&gt;&lt;P&gt;The AAA config for both routers is identical:&lt;/P&gt;&lt;P&gt;From the 4451:&lt;BR /&gt;aaa new-model&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;aaa group server radius flex_group&lt;BR /&gt;server-private 10.244.0.41 key ***********&lt;BR /&gt;!&lt;BR /&gt;aaa authentication login default local&lt;BR /&gt;aaa authentication login flex_list group flex_group&lt;BR /&gt;aaa authorization exec default local&lt;BR /&gt;aaa authorization network flex_list local&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;aaa session-id common&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;From the 2951:&lt;BR /&gt;aaa new-model&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;aaa group server radius flex_group&lt;BR /&gt;server name talic&lt;BR /&gt;!&lt;BR /&gt;aaa authentication login default local&lt;BR /&gt;aaa authentication login flex_list group flex_group&lt;BR /&gt;aaa authorization exec default local&lt;BR /&gt;aaa authorization network flex_list local&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;aaa session-id common&lt;/P&gt;&lt;P&gt;!&lt;BR /&gt;radius server talic&lt;BR /&gt;address ipv4 10.244.0.41 auth-port 1645 acct-port 1646&lt;BR /&gt;key **********&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;I'm sure there is something simple that I'm missing; maybe an IOS upgrade on the 2951 would solve it. I would rather not do that if I don't have to; two customers are running CME.&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Sam&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 29 Apr 2024 19:42:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ios-aaa-eap-authentication/m-p/5083078#M589114</guid>
      <dc:creator>Sam Smiley</dc:creator>
      <dc:date>2024-04-29T19:42:44Z</dc:date>
    </item>
    <item>
      <title>Re: IOS AAA EAP Authentication.</title>
      <link>https://community.cisco.com/t5/network-access-control/ios-aaa-eap-authentication/m-p/5083389#M589117</link>
      <description>&lt;P&gt;I would suggest running a packet capture on the NPS and compare the RADIUS Access-Request of the working device, versus the not working device. NPS runs Windows, so Wireshark (if possible) on that Windows server would be ideal.&lt;/P&gt;
&lt;P&gt;Perhaps the RADIUS Access-Request packet of the non-working device is mal-formed due to a bug or some default that is missing in that version of IOS. You might be able to run a packet capture on the IOS device, or use some variant of the 'debug radius' to see the packet that it spits out.&lt;/P&gt;
&lt;P&gt;In your posting, I don't see the flex configuration that the aaa method list refers to - I assume it's configured. However, that should not prevent the "test aaa" command from working. If the test aaa results in an 'Access-Reject', and IF you got a response from NPS, then the NPS logs must surely give a clue why it rejected the request. However, I have also seen IOS print the "User rejected" message when there was no response from the RADIUS request. It's important to validate that Request/Response in packet form.&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 29 Apr 2024 21:59:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ios-aaa-eap-authentication/m-p/5083389#M589117</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2024-04-29T21:59:20Z</dc:date>
    </item>
    <item>
      <title>Re: IOS AAA EAP Authentication.</title>
      <link>https://community.cisco.com/t5/network-access-control/ios-aaa-eap-authentication/m-p/5083641#M589140</link>
      <description>&lt;P&gt;Thanks Arne,&lt;BR /&gt;The Flex config is present in both routers with identical configs.&lt;/P&gt;&lt;P&gt;Cheers,&lt;BR /&gt;Sam&lt;/P&gt;</description>
      <pubDate>Tue, 30 Apr 2024 06:44:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ios-aaa-eap-authentication/m-p/5083641#M589140</guid>
      <dc:creator>Sam Smiley</dc:creator>
      <dc:date>2024-04-30T06:44:10Z</dc:date>
    </item>
    <item>
      <title>Re: IOS AAA EAP Authentication.</title>
      <link>https://community.cisco.com/t5/network-access-control/ios-aaa-eap-authentication/m-p/5086635#M589190</link>
      <description>&lt;P&gt;Have you compared the RADIUS Access-Request details of working and non-working scenario? I would do that next.&lt;/P&gt;</description>
      <pubDate>Wed, 01 May 2024 20:47:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ios-aaa-eap-authentication/m-p/5086635#M589190</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2024-05-01T20:47:50Z</dc:date>
    </item>
  </channel>
</rss>

