<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: AAA Radius Servers in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/aaa-radius-servers/m-p/5144823#M590629</link>
    <description>&lt;P&gt;thanks a lot, I need to know is this applicable for&amp;nbsp;both cisco switches series 2960 and 9200&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 15 Jul 2024 07:56:05 GMT</pubDate>
    <dc:creator>afathi1992</dc:creator>
    <dc:date>2024-07-15T07:56:05Z</dc:date>
    <item>
      <title>AAA Radius Servers</title>
      <link>https://community.cisco.com/t5/network-access-control/aaa-radius-servers/m-p/5144812#M590626</link>
      <description>&lt;P&gt;which configuration should I do to add more than one radius server on cisco switches&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;note that I have to add Primary ISE IP, Secondary ISE IP and the HA IP&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;</description>
      <pubDate>Mon, 15 Jul 2024 07:36:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/aaa-radius-servers/m-p/5144812#M590626</guid>
      <dc:creator>afathi1992</dc:creator>
      <dc:date>2024-07-15T07:36:43Z</dc:date>
    </item>
    <item>
      <title>Re: AAA Radius Servers</title>
      <link>https://community.cisco.com/t5/network-access-control/aaa-radius-servers/m-p/5144817#M590627</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1687053"&gt;@afathi1992&lt;/a&gt; you define multiple RADIUS servers and then add those radius servers to RADIUS group. &lt;/P&gt;
&lt;PRE&gt;radius server ISE-1&lt;BR /&gt;address ipv4 192.168.10.10 auth-port 1812 acct-port 1813&lt;BR /&gt;automate-tester username switch-probe ignore-acct-port probe-on&lt;BR /&gt;key XXXXXXXX&lt;BR /&gt;!&lt;BR /&gt;radius server ISE-2&lt;BR /&gt;address ipv4 192.168.10.11 auth-port 1812 acct-port 1813&lt;BR /&gt;automate-tester username switch-probe ignore-acct-port probe-on&lt;BR /&gt;key XXXXXXXX&lt;BR /&gt;!&lt;BR /&gt;aaa group server radius &lt;STRONG&gt;ISE-RADIUS&lt;/STRONG&gt;&lt;BR /&gt;server name &lt;STRONG&gt;ISE-1&lt;/STRONG&gt;&lt;BR /&gt;server name &lt;STRONG&gt;ISE-2&lt;/STRONG&gt;&lt;/PRE&gt;
&lt;P&gt;You then reference the RADIUS group&lt;/P&gt;
&lt;PRE&gt;aaa authentication dot1x default group &lt;STRONG&gt;ISE-RADIUS&lt;/STRONG&gt;&lt;BR /&gt;aaa authorization network default group &lt;STRONG&gt;ISE-RADIUS&lt;/STRONG&gt;&lt;BR /&gt;aaa accounting update newinfo periodic 2880&lt;BR /&gt;aaa accounting dot1x default start-stop group &lt;STRONG&gt;ISE-RADIUS&lt;/STRONG&gt;&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 15 Jul 2024 07:42:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/aaa-radius-servers/m-p/5144817#M590627</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2024-07-15T07:42:04Z</dc:date>
    </item>
    <item>
      <title>Re: AAA Radius Servers</title>
      <link>https://community.cisco.com/t5/network-access-control/aaa-radius-servers/m-p/5144823#M590629</link>
      <description>&lt;P&gt;thanks a lot, I need to know is this applicable for&amp;nbsp;both cisco switches series 2960 and 9200&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 15 Jul 2024 07:56:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/aaa-radius-servers/m-p/5144823#M590629</guid>
      <dc:creator>afathi1992</dc:creator>
      <dc:date>2024-07-15T07:56:05Z</dc:date>
    </item>
    <item>
      <title>Re: AAA Radius Servers</title>
      <link>https://community.cisco.com/t5/network-access-control/aaa-radius-servers/m-p/5144826#M590631</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1687053"&gt;@afathi1992&lt;/a&gt; yes that should work on both 9200 and probably on the older 2960 hardware, depending on IOS version. If not you would define the RADIUS server using the command "radius-server host &amp;lt;ip address&amp;gt; key &amp;lt;key&amp;gt;" and reference in the RADIUS server group.&lt;/P&gt;</description>
      <pubDate>Mon, 15 Jul 2024 08:05:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/aaa-radius-servers/m-p/5144826#M590631</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2024-07-15T08:05:23Z</dc:date>
    </item>
    <item>
      <title>Re: AAA Radius Servers</title>
      <link>https://community.cisco.com/t5/network-access-control/aaa-radius-servers/m-p/5144831#M590632</link>
      <description>&lt;P&gt;is this applicable for Takac's servers also or there is a different?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 15 Jul 2024 08:25:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/aaa-radius-servers/m-p/5144831#M590632</guid>
      <dc:creator>afathi1992</dc:creator>
      <dc:date>2024-07-15T08:25:10Z</dc:date>
    </item>
    <item>
      <title>Re: AAA Radius Servers</title>
      <link>https://community.cisco.com/t5/network-access-control/aaa-radius-servers/m-p/5144833#M590633</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1687053"&gt;@afathi1992&lt;/a&gt; same logic for TACACS servers, example:&lt;/P&gt;
&lt;PRE&gt;tacacs server ISE01&lt;BR /&gt;&amp;nbsp;address ipv4 10.1.4.205&lt;BR /&gt;&amp;nbsp;key XXXXXXXX&lt;BR /&gt;tacacs server ISE02&lt;BR /&gt;&amp;nbsp;address ipv4 10.1.4.206&lt;BR /&gt;&amp;nbsp;key XXXXXXXX&lt;BR /&gt;!&lt;BR /&gt;aaa group server tacacs+ ISE-TACACS&lt;BR /&gt;&amp;nbsp;server name ISE01&lt;BR /&gt;&amp;nbsp;server name ISE01&lt;BR /&gt;!&lt;BR /&gt;aaa authentication login ISE-MLIST group ISE-TACACS local&lt;BR /&gt;aaa authorization exec ISE-MLIST group ISE-TACACS local if-authenticated &lt;BR /&gt;aaa authorization commands 1 ISE-MLIST group ISE-TACACS local if-authenticated &lt;BR /&gt;aaa authorization commands 15 ISE-MLIST group ISE-TACACS local if-authenticated &lt;BR /&gt;aaa accounting exec default start-stop group ISE-TACACS&lt;BR /&gt;aaa accounting commands 1 default start-stop group ISE-TACACS&lt;BR /&gt;aaa accounting commands 15 default start-stop group ISE-TACACS&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 15 Jul 2024 08:37:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/aaa-radius-servers/m-p/5144833#M590633</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2024-07-15T08:37:40Z</dc:date>
    </item>
  </channel>
</rss>

