<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Multiple Radius Requests in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/multiple-radius-requests/m-p/5149063#M590808</link>
    <description>&lt;P&gt;What I am trying to do is get the device to connect to wifi only if the MAC address is in the windows user group. Using the MAC as the username and password. I don't want the user to have to input these. I know this takes a lot more work but that is the goal. We are trying to resolve unwanted devices on our network, that are hogging up bandwidth. I want it to go through windows because I need to use this on three different WLCs.&lt;/P&gt;</description>
    <pubDate>Tue, 23 Jul 2024 13:26:07 GMT</pubDate>
    <dc:creator>tombstone1</dc:creator>
    <dc:date>2024-07-23T13:26:07Z</dc:date>
    <item>
      <title>Multiple Radius Requests</title>
      <link>https://community.cisco.com/t5/network-access-control/multiple-radius-requests/m-p/5148482#M590791</link>
      <description>&lt;P&gt;Hey everyone,&lt;/P&gt;&lt;P&gt;I am setting up a Radius (NPS) server, using MAC address authentication on my WLC 5508. The problem I am having is it is not allowing access. I get the following two events on my NPS.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Event 1:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Network Policy Server granted access to a user.&lt;BR /&gt;User:&lt;BR /&gt;Security ID: Domain\60452e38fb8a&lt;BR /&gt;Account Name: 60452e38fb8a&lt;BR /&gt;Account Domain: Domain&lt;BR /&gt;Fully Qualified Account Name: Domain\60452e38fb8a&lt;BR /&gt;Client Machine:&lt;BR /&gt;Security ID: NULL SID&lt;BR /&gt;Account Name: -&lt;BR /&gt;Fully Qualified Account Name: -&lt;BR /&gt;Called Station Identifier: 10f3119946a0&lt;BR /&gt;Calling Station Identifier: 60452e38fb8a&lt;BR /&gt;NAS:&lt;BR /&gt;NAS IPv4 Address: 10.x.x.12&lt;BR /&gt;NAS IPv6 Address: -&lt;BR /&gt;NAS Identifier: 2504&lt;BR /&gt;NAS Port-Type: Wireless - IEEE 802.11&lt;BR /&gt;NAS Port: 1&lt;BR /&gt;RADIUS Client:&lt;BR /&gt;Client Friendly Name: WLC&lt;BR /&gt;Client IP Address: 10.x.x.12&lt;BR /&gt;Authentication Details:&lt;BR /&gt;Connection Request Policy Name: Secure Wireless Connections&lt;BR /&gt;Network Policy Name: Mac Bypass&lt;BR /&gt;Authentication Provider: Windows&lt;BR /&gt;Authentication Server: SERVER2.Tombstone.k12.az.us&lt;BR /&gt;Authentication Type: PAP&lt;BR /&gt;EAP Type: -&lt;BR /&gt;Account Session Identifier: 36363936383065662F36303A34353A32653A33383A66623A38612F32373134&lt;BR /&gt;Logging Results: Accounting information was written to the local log file.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;STRONG&gt;Event 2:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Network Policy Server denied access to a user.&lt;BR /&gt;Contact the Network Policy Server administrator for more information.&lt;BR /&gt;User:&lt;BR /&gt;Security ID: NULL SID&lt;BR /&gt;Account Name: host/LP-14279&lt;BR /&gt;Account Domain: Domain&lt;BR /&gt;Fully Qualified Account Name: Domain\host/LP-14279&lt;BR /&gt;Client Machine:&lt;BR /&gt;Security ID: NULL SID&lt;BR /&gt;Account Name: -&lt;BR /&gt;Fully Qualified Account Name: -&lt;BR /&gt;Called Station Identifier: 10f3119946a0&lt;BR /&gt;Calling Station Identifier: 60452e38fb8a&lt;BR /&gt;NAS:&lt;BR /&gt;NAS IPv4 Address: 10.x.x.12&lt;BR /&gt;NAS IPv6 Address: -&lt;BR /&gt;NAS Identifier: 2504&lt;BR /&gt;NAS Port-Type: Wireless - IEEE 802.11&lt;BR /&gt;NAS Port: 1&lt;BR /&gt;RADIUS Client:&lt;BR /&gt;Client Friendly Name: WLC&lt;BR /&gt;Client IP Address: 10.x.x.12&lt;BR /&gt;Authentication Details:&lt;BR /&gt;Connection Request Policy Name: Secure Wireless Connections&lt;BR /&gt;Network Policy Name: -&lt;BR /&gt;Authentication Provider: Windows&lt;BR /&gt;Authentication Server: SERVER2.Tombstone.k12.az.us&lt;BR /&gt;Authentication Type: EAP&lt;BR /&gt;EAP Type: -&lt;BR /&gt;Account Session Identifier: 36363936383065662F36303A34353A32653A33383A66623A38612F32373134&lt;BR /&gt;Logging Results: Accounting information was written to the local log file.&lt;BR /&gt;Reason Code: 8&lt;BR /&gt;Reason: The specified user account does not exist.&lt;/P&gt;&lt;P&gt;The first event authenticates and grants access, and then seconds later the 2nd event denies access. I want the 1st event not the 2nd. It seems the "AP" is sending two requests. One with the MAC, like I want, and the second with the hostname. How can I stop this from happening?&lt;/P&gt;</description>
      <pubDate>Mon, 22 Jul 2024 19:14:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/multiple-radius-requests/m-p/5148482#M590791</guid>
      <dc:creator>tombstone1</dc:creator>
      <dc:date>2024-07-22T19:14:10Z</dc:date>
    </item>
    <item>
      <title>Re: Multiple Radius Requests</title>
      <link>https://community.cisco.com/t5/network-access-control/multiple-radius-requests/m-p/5148512#M590793</link>
      <description>&lt;P&gt;Looks like your WLAN SSID is an Enterprise one, and has the NPS as the RADIUS server. The client in this case, appears to be configured with an 802.1X supplicant and you must disable that to prevent the client from sending those EAP frames to the network.&lt;/P&gt;
&lt;P&gt;What does your WLAN config look like for that SSID?&lt;/P&gt;
&lt;P&gt;What type of client is connecting and what does its config look like?&lt;/P&gt;</description>
      <pubDate>Mon, 22 Jul 2024 20:22:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/multiple-radius-requests/m-p/5148512#M590793</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2024-07-22T20:22:25Z</dc:date>
    </item>
    <item>
      <title>Re: Multiple Radius Requests</title>
      <link>https://community.cisco.com/t5/network-access-control/multiple-radius-requests/m-p/5148523#M590794</link>
      <description>&lt;P&gt;Arne,&lt;/P&gt;&lt;P&gt;Yes, it is an Enterprise WLAN ID, the NPS is the RADIUS configured on the WLAN. The Device is a laptop which is the Supplicant. It is connecting through the WLC to the RADIUS.&lt;/P&gt;&lt;P&gt;I followed this thread&amp;nbsp;&lt;A href="https://community.cisco.com/t5/switching/switch-startup-mode/td-p/1997038#:~:text=1%20Enter%20the%20Global%20Configuration%20Mode.%20Issue%20the,show%20boot%20%20...%204%20Reload%20the%20switch." target="_blank" rel="noopener"&gt;Solved: switch startup mode - Cisco Community&lt;/A&gt;&amp;nbsp;to setup my WLAN.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;WLAN Identifier.................................. 6
Profile Name..................................... TEST-Mac-Filter
Network Name (SSID).............................. Test
Status........................................... Enabled
MAC Filtering.................................... Enabled
Broadcast SSID................................... Enabled
AAA Policy Override.............................. Disabled
Network Admission Control
Client Profiling Status
    Radius Profiling ............................ Enabled
     DHCP ....................................... Enabled
     HTTP ....................................... Enabled
    Local Profiling ............................. Disabled
     DHCP ....................................... Disabled
     HTTP ....................................... Disabled
  Radius-NAC State............................... Disabled
  SNMP-NAC State................................. Disabled
  Quarantine VLAN................................ 0
Maximum Clients Allowed.......................... Unlimited
Maximum number of Clients per AP Radio........... 200

--More-- or (q)uit
ATF Policy....................................... 0
Number of Active Clients......................... 0
Exclusionlist Timeout............................ 60 seconds
Session Timeout.................................. 1800 seconds
User Idle Timeout................................ Disabled
Sleep Client..................................... disable
Sleep Client Timeout............................. 720 minutes
User Idle Threshold.............................. 0 Bytes
NAS-identifier................................... 2504
CHD per WLAN..................................... Enabled
Webauth DHCP exclusion........................... Disabled
Interface........................................ management
Multicast Interface.............................. Not Configured
WLAN IPv4 ACL.................................... unconfigured
WLAN IPv6 ACL.................................... unconfigured
WLAN Layer2 ACL.................................. unconfigured
WLAN URL ACL..................................... unconfigured
mDNS Status...................................... Enabled
mDNS Profile Name................................ default-mdns-profile
DHCP Server...................................... Default
DHCP Address Assignment Required................. Disabled
Static IP client tunneling....................... Disabled
Tunnel Profile................................... Unconfigured

--More-- or (q)uit
PMIPv6 Mobility Type............................. none
    PMIPv6 MAG Profile........................... Unconfigured
    PMIPv6 Default Realm......................... Unconfigured
    PMIPv6 NAI Type.............................. Hexadecimal
    PMIPv6 MAG location.......................... WLC
Quality of Service............................... Silver
Per-SSID Rate Limits............................. Upstream      Downstream
Average Data Rate................................   0             0
Average Realtime Data Rate.......................   0             0
Burst Data Rate..................................   0             0
Burst Realtime Data Rate.........................   0             0
Per-Client Rate Limits........................... Upstream      Downstream
Average Data Rate................................   0             0
Average Realtime Data Rate.......................   0             0
Burst Data Rate..................................   0             0
Burst Realtime Data Rate.........................   0             0
Scan Defer Priority.............................. 4,5,6
Scan Defer Time.................................. 100 milliseconds
WMM.............................................. Allowed
WMM UAPSD Compliant Client Support............... Disabled
Media Stream Multicast-direct.................... Disabled
CCX - AironetIe Support.......................... Enabled
CCX - Gratuitous ProbeResponse (GPR)............. Disabled

--More-- or (q)uit
CCX - Diagnostics Channel Capability............. Disabled
Dot11-Phone Mode (7920).......................... Disabled
Wired Protocol................................... 802.1P (Tag=0)
Passive Client Feature........................... Disabled
Peer-to-Peer Blocking Action..................... Disabled
Radio Policy..................................... All
DTIM period for 802.11a radio.................... 1
DTIM period for 802.11b radio.................... 1
Radius Servers
   Authentication................................ 10.4.0.2 1812 *
   Accounting.................................... Global Servers
      Interim Update............................. Disabled
      Interim Update Interval.................... 0
      Framed IPv6 Acct AVP ...................... Prefix
   Dynamic Interface............................. Disabled
   Dynamic Interface Priority.................... wlan
Local EAP Authentication......................... Disabled
Radius NAI-Realm................................. Disabled
Mu-Mimo.......................................... Enabled
Security

   802.11 Authentication:........................ Open System
   FT Support.................................... Disabled

--More-- or (q)uit
   Static WEP Keys............................... Disabled
   802.1X........................................ Disabled
   Wi-Fi Protected Access (WPA/WPA2)............. Enabled
      WPA (SSN IE)............................... Enabled
         TKIP Cipher............................. Disabled
         AES Cipher.............................. Enabled
      WPA2 (RSN IE).............................. Enabled
         TKIP Cipher............................. Disabled
         AES Cipher.............................. Enabled
         CCMP256 Cipher.......................... Disabled
         GCMP128 Cipher.......................... Disabled
         GCMP256 Cipher.......................... Disabled
      OSEN IE.................................... Disabled
      Auth Key Management
         802.1x.................................. Enabled
         PSK..................................... Disabled
         CCKM.................................... Disabled
         FT-1X(802.11r).......................... Disabled
         FT-PSK(802.11r)......................... Disabled
         PMF-1X(802.11w)......................... Disabled
         PMF-PSK(802.11w)........................ Disabled
         OSEN-1X................................. Disabled
         SUITEB-1X............................... Disabled

--More-- or (q)uit
         SUITEB192-1X............................ Disabled
      FT Reassociation Timeout................... 20
      FT Over-The-DS mode........................ Disabled
      GTK Randomization.......................... Disabled
      SKC Cache Support.......................... Disabled
      CCKM TSF Tolerance......................... 1000
   Wi-Fi Direct policy configured................ Disabled
   EAP-Passthrough............................... Disabled
   CKIP ......................................... Disabled
   Web Based Authentication...................... Disabled
   Web Authentication Timeout.................... 300
   Web-Passthrough............................... Disabled
   Mac-auth-server............................... 0.0.0.0
   Web-portal-server............................. 0.0.0.0
   Conditional Web Redirect...................... Disabled
   Splash-Page Web Redirect...................... Disabled
   Auto Anchor................................... Disabled
   FlexConnect Local Switching................... Disabled
   FlexConnect Central Association............... Disabled
   flexconnect Central Dhcp Flag................. Disabled
   flexconnect nat-pat Flag...................... Disabled
   flexconnect Dns Override Flag................. Disabled
   flexconnect PPPoE pass-through................ Disabled

--More-- or (q)uit
   flexconnect local-switching IP-source-guar.... Disabled
   FlexConnect Vlan based Central Switching ..... Disabled
   FlexConnect Local Authentication.............. Disabled
   FlexConnect Learn IP Address.................. Enabled
   Client MFP.................................... Optional
   PMF........................................... Disabled
   PMF Association Comeback Time................. 1
   PMF SA Query RetryTimeout..................... 200
   Tkip MIC Countermeasure Hold-down Timer....... 60
   Eap-params.................................... Disabled
AVC Visibilty.................................... Disabled
AVC Profile Name................................. None
Flow Monitor Name................................ None
Split Tunnel Configuration
    Split Tunnel................................. Disabled
Call Snooping.................................... Disabled
Roamed Call Re-Anchor Policy..................... Disabled
SIP CAC Fail Send-486-Busy Policy................ Enabled
SIP CAC Fail Send Dis-Association Policy......... Disabled
KTS based CAC Policy............................. Disabled
Assisted Roaming Prediction Optimization......... Disabled
802.11k Neighbor List............................ Enabled
802.11k Neighbor List Dual Band.................. Disabled

--More-- or (q)uit
802.11v Directed Multicast Service............... Enabled
802.11v BSS Max Idle Service..................... Enabled
802.11v BSS Transition Service................... Enabled
802.11v BSS Transition Disassoc Imminent......... Disabled
802.11v BSS Transition Disassoc Timer............ 200
802.11v BSS Transition OpRoam Disassoc Timer..... 40
DMS DB is empty
Band Select...................................... Disabled
Load Balancing................................... Disabled
Multicast Buffer................................. Disabled
Universal Ap Admin............................... Disabled
Broadcast Tagging................................ Disabled

 Mobility Anchor List
 WLAN ID     IP Address            Status                             Priority
 -------     ---------------       ------                             --------

802.11u........................................ Disabled

MSAP Services.................................. Disabled

Local Policy
----------------

--More-- or (q)uit
Priority  Policy Name
--------  ---------------

Lync State ...................................... Disabled
Audio QoS Policy................................. Silver
Video QoS Policy................................. Silver
App-Share QoS Policy............................. Silver
File Transfer QoS Policy......................... Silver
QoS Fastlane Status.............................. Disable
Selective Reanchoring Status..................... Disable&lt;/LI-CODE&gt;&lt;P&gt;The client is a standard Windows Laptop trying to connect to Wi-fi. No special config.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 22 Jul 2024 20:36:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/multiple-radius-requests/m-p/5148523#M590794</guid>
      <dc:creator>tombstone1</dc:creator>
      <dc:date>2024-07-22T20:36:25Z</dc:date>
    </item>
    <item>
      <title>Re: Multiple Radius Requests</title>
      <link>https://community.cisco.com/t5/network-access-control/multiple-radius-requests/m-p/5148550#M590797</link>
      <description>&lt;P&gt;In your initial posting you say that Event 1 is good (PAP .. i.e. the MAB event) but you don't want Event 2 (EAP) - well that's expected behaviour of an 802.1X supplicant to sent EAPOL Identify frame when it initialises. If you don't want to see EAP, then you must disable the client supplicant.&lt;/P&gt;
&lt;P&gt;What is your use case and what are you hoping to achieve?&lt;/P&gt;
&lt;P&gt;Is it iPSK?&amp;nbsp; In that case, you don't use an Enterprise SSID. You use an PSK SSID with MAC Filtering (MAB) configured. That means the clients must be configured with a PSK, and the WLC will also send the MAC address to the RADIUS server - RADIUS server can decide whether or not to accept the client, and also which PSK to use (using a Cisco AVPair).&lt;/P&gt;</description>
      <pubDate>Mon, 22 Jul 2024 21:25:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/multiple-radius-requests/m-p/5148550#M590797</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2024-07-22T21:25:47Z</dc:date>
    </item>
    <item>
      <title>Re: Multiple Radius Requests</title>
      <link>https://community.cisco.com/t5/network-access-control/multiple-radius-requests/m-p/5149063#M590808</link>
      <description>&lt;P&gt;What I am trying to do is get the device to connect to wifi only if the MAC address is in the windows user group. Using the MAC as the username and password. I don't want the user to have to input these. I know this takes a lot more work but that is the goal. We are trying to resolve unwanted devices on our network, that are hogging up bandwidth. I want it to go through windows because I need to use this on three different WLCs.&lt;/P&gt;</description>
      <pubDate>Tue, 23 Jul 2024 13:26:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/multiple-radius-requests/m-p/5149063#M590808</guid>
      <dc:creator>tombstone1</dc:creator>
      <dc:date>2024-07-23T13:26:07Z</dc:date>
    </item>
    <item>
      <title>Re: Multiple Radius Requests</title>
      <link>https://community.cisco.com/t5/network-access-control/multiple-radius-requests/m-p/5149270#M590812</link>
      <description>&lt;P&gt;Arne,&lt;/P&gt;&lt;P&gt;I get what you are saying now. I set the SSID to PSK instead of 802.1x, and now it seems to be connecting great on the one client I have registered, and not connecting on anyother device. Thank you for clarifying that for me.&lt;/P&gt;</description>
      <pubDate>Tue, 23 Jul 2024 19:22:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/multiple-radius-requests/m-p/5149270#M590812</guid>
      <dc:creator>tombstone1</dc:creator>
      <dc:date>2024-07-23T19:22:03Z</dc:date>
    </item>
    <item>
      <title>Re: Multiple Radius Requests</title>
      <link>https://community.cisco.com/t5/network-access-control/multiple-radius-requests/m-p/5149292#M590814</link>
      <description>&lt;P&gt;Glad that resolved it.&amp;nbsp; You can mark the question as resolved if this answered your question.&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Cheers&lt;/P&gt;</description>
      <pubDate>Tue, 23 Jul 2024 20:27:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/multiple-radius-requests/m-p/5149292#M590814</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2024-07-23T20:27:38Z</dc:date>
    </item>
  </channel>
</rss>

