<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Using PEAP) or EAP-MSCHAPv2 cisco switch 2960-X and Radius in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/using-peap-or-eap-mschapv2-cisco-switch-2960-x-and-radius/m-p/5162352#M591274</link>
    <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1228911"&gt;@Amine ZAKARIA&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;here is the Debug log what I get exactly from Switch when I Enable the checkbox :&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Access-Request messages must contain the message-authenticator attribute&lt;/STRONG&gt;&lt;/P&gt;&lt;HR /&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;Aug 18 10:25:49.935: RADIUS/ENCODE(00000014):Orig. component type = EXEC
Aug 18 10:25:49.935: RADIUS:  AAA Unsupported Attr: interface         [174] 5
Aug 18 10:25:49.939: RADIUS:   74 74 79                                         [tty]
Aug 18 10:25:49.939: RADIUS/ENCODE(00000014): dropping service type, "radius-server attribute 6 on-for-login-auth" is off
Aug 18 10:25:49.939: RADIUS(00000014): Config NAS IP: 192.168.174.132
Aug 18 10:25:49.943: RADIUS/ENCODE(00000014): acct_session_id: 20
Aug 18 10:25:49.943: RADIUS(00000014): sending
Aug 18 10:25:49.947: RADIUS(00000014): Send Access-Request to 192.168.174.130:1645 id 1645/28, len 96
QUBC1SW01#
Aug 18 10:25:49.951: RADIUS:  authenticator 02 2F 01 A0 42 56 CB 4F - A7 2C B3 2A E7 41 4F C8
Aug 18 10:25:49.951: RADIUS:  User-Name           [1]   18  "agrm909@kaya.lab"
Aug 18 10:25:49.951: RADIUS:  User-Password       [2]   18  *
Aug 18 10:25:49.951: RADIUS:  NAS-Port            [5]   6   98
Aug 18 10:25:49.955: RADIUS:  NAS-Port-Id         [87]  7   "tty98"
Aug 18 10:25:49.955: RADIUS:  NAS-Port-Type       [61]  6   Virtual                   [5]
Aug 18 10:25:49.955: RADIUS:  Calling-Station-Id  [31]  15  "192.168.174.1"
Aug 18 10:25:49.959: RADIUS:  NAS-IP-Address      [4]   6   192.168.174.132
QUBC1SW01#
Aug 18 10:25:54.795: RADIUS: Retransmit to (192.168.174.130:1645,1646) for id 1645/28
QUBC1SW01#
Aug 18 10:25:59.131: %RADIUS-4-RADIUS_DEAD: RADIUS server 192.168.174.130:1645,1646 is not responding.
Aug 18 10:25:59.135: %RADIUS-4-RADIUS_ALIVE: RADIUS server 192.168.174.130:1645,1646 is being marked alive.
QUBC1SW01#
Aug 18 10:25:59.139: RADIUS: Retransmit to (192.168.174.130:1645,1646) for id 1645/28
QUBC1SW01#
Aug 18 10:26:03.619: RADIUS: Retransmit to (192.168.174.130:1645,1646) for id 1645/28
QUBC1SW01#
Aug 18 10:26:07.987: RADIUS: Fail-over to (192.168.174.130:1812,1813) for id 1645/28
QUBC1SW01#
Aug 18 10:26:12.431: RADIUS: Retransmit to (192.168.174.130:1812,1813) for id 1645/28
QUBC1SW01#
Aug 18 10:26:17.963: RADIUS: Retransmit to (192.168.174.130:1812,1813) for id 1645/28
QUBC1SW01#
Aug 18 10:26:22.567: RADIUS: Retransmit to (192.168.174.130:1812,1813) for id 1645/28
QUBC1SW01#
Aug 18 10:26:27.143: RADIUS: No response from (192.168.174.130:1812,1813) for id 1645/28
Aug 18 10:26:27.147: RADIUS/DECODE: No response from radius-server; parse response; FAIL
Aug 18 10:26:27.147: RADIUS/DECODE: Case error(no response/ bad packet/ op decode);parse response; FAIL
QUBC1SW01#
Aug 18 10:26:29.223: AAA/AUTHEN/LOGIN (00000014): Pick method list 'default'
Aug 18 10:26:29.231: RADIUS/ENCODE(00000014): ask "Password: "
Aug 18 10:26:29.231: RADIUS/ENCODE(00000014): send packet; GET_PASSWORD
QUBC1SW01#&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Sun, 18 Aug 2024 16:23:27 GMT</pubDate>
    <dc:creator>Nenday</dc:creator>
    <dc:date>2024-08-18T16:23:27Z</dc:date>
    <item>
      <title>Using PEAP) or EAP-MSCHAPv2 cisco switch 2960-X and Radius</title>
      <link>https://community.cisco.com/t5/network-access-control/using-peap-or-eap-mschapv2-cisco-switch-2960-x-and-radius/m-p/5162244#M591270</link>
      <description>&lt;P&gt;dear friend,&amp;nbsp;&lt;/P&gt;&lt;P&gt;lately I see a CVE that talking about Radius security issue with cisco running IOS software&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-radius-spoofing-july-2024-87cCDwZ3" target="_self"&gt;(RADIUS Protocol Spoofing Vulnerability (Blast-RADIUS): July 2024)&lt;/A&gt;&lt;/P&gt;&lt;P&gt;so I try&amp;nbsp; to change the authentication Methods in my radius server to Encrypted (CHAP) ou Microsoft Encrypted Authentication v2 MS-Chap V2 but I cannot log to switch when I change&lt;/P&gt;&lt;P&gt;I used self signed certificate using open SSL for PEAP (installed in server and client using to manage switches)&lt;/P&gt;&lt;P&gt;any one please success to do it or any tips&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;thanks a lot&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Nenday_0-1723963747762.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/226587iBE6FAB5DB03A1A00/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Nenday_0-1723963747762.png" alt="Nenday_0-1723963747762.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Nenday_1-1723963793326.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/226588i3D4D9B40AC929E97/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Nenday_1-1723963793326.png" alt="Nenday_1-1723963793326.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 18 Aug 2024 06:52:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/using-peap-or-eap-mschapv2-cisco-switch-2960-x-and-radius/m-p/5162244#M591270</guid>
      <dc:creator>Nenday</dc:creator>
      <dc:date>2024-08-18T06:52:16Z</dc:date>
    </item>
    <item>
      <title>Re: Using PEAP) or EAP-MSCHAPv2 cisco switch 2960-X and Radius</title>
      <link>https://community.cisco.com/t5/network-access-control/using-peap-or-eap-mschapv2-cisco-switch-2960-x-and-radius/m-p/5162287#M591271</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1669890"&gt;@Nenday&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;The reason behind that the Cisco IOS ssh use PAP ASCII as authentication method and AFAIK there is no other option for SSH except the x509 certificate based authentication or you need to use TACACS which is not supported by NPS.&lt;BR /&gt;&lt;BR /&gt;Microsoft Actions to take for this vulnerability :&amp;nbsp;&lt;BR /&gt;&lt;A href="https://support.microsoft.com/en-us/topic/kb5040268-how-to-manage-the-access-request-packets-attack-vulnerability-associated-with-cve-2024-3596-a0e2f0b1-f200-4a7b-844f-48d1d5ab9e66" target="_blank"&gt;https://support.microsoft.com/en-us/topic/kb5040268-how-to-manage-the-access-request-packets-attack-vulnerability-associated-with-cve-2024-3596-a0e2f0b1-f200-4a7b-844f-48d1d5ab9e66&lt;/A&gt;&lt;/P&gt;&lt;P&gt;HTH!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 18 Aug 2024 09:09:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/using-peap-or-eap-mschapv2-cisco-switch-2960-x-and-radius/m-p/5162287#M591271</guid>
      <dc:creator>Amine ZAKARIA</dc:creator>
      <dc:date>2024-08-18T09:09:48Z</dc:date>
    </item>
    <item>
      <title>Re: Using PEAP) or EAP-MSCHAPv2 cisco switch 2960-X and Radius</title>
      <link>https://community.cisco.com/t5/network-access-control/using-peap-or-eap-mschapv2-cisco-switch-2960-x-and-radius/m-p/5162319#M591273</link>
      <description>Thank you Amine for your response, it's a little clear right now, i did&lt;BR /&gt;some update on my radius server and i see new request form in the log file,&lt;BR /&gt;But when i update the radius client side i can't log to the switch without&lt;BR /&gt;any error message .&lt;BR /&gt;Is there a thing that i must update on switch configuration or it's must&lt;BR /&gt;work with the same configuration.&lt;BR /&gt;&lt;BR /&gt;Thanks a lot&lt;BR /&gt;</description>
      <pubDate>Sun, 18 Aug 2024 13:13:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/using-peap-or-eap-mschapv2-cisco-switch-2960-x-and-radius/m-p/5162319#M591273</guid>
      <dc:creator>Nenday</dc:creator>
      <dc:date>2024-08-18T13:13:44Z</dc:date>
    </item>
    <item>
      <title>Re: Using PEAP) or EAP-MSCHAPv2 cisco switch 2960-X and Radius</title>
      <link>https://community.cisco.com/t5/network-access-control/using-peap-or-eap-mschapv2-cisco-switch-2960-x-and-radius/m-p/5162352#M591274</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1228911"&gt;@Amine ZAKARIA&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;here is the Debug log what I get exactly from Switch when I Enable the checkbox :&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Access-Request messages must contain the message-authenticator attribute&lt;/STRONG&gt;&lt;/P&gt;&lt;HR /&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;Aug 18 10:25:49.935: RADIUS/ENCODE(00000014):Orig. component type = EXEC
Aug 18 10:25:49.935: RADIUS:  AAA Unsupported Attr: interface         [174] 5
Aug 18 10:25:49.939: RADIUS:   74 74 79                                         [tty]
Aug 18 10:25:49.939: RADIUS/ENCODE(00000014): dropping service type, "radius-server attribute 6 on-for-login-auth" is off
Aug 18 10:25:49.939: RADIUS(00000014): Config NAS IP: 192.168.174.132
Aug 18 10:25:49.943: RADIUS/ENCODE(00000014): acct_session_id: 20
Aug 18 10:25:49.943: RADIUS(00000014): sending
Aug 18 10:25:49.947: RADIUS(00000014): Send Access-Request to 192.168.174.130:1645 id 1645/28, len 96
QUBC1SW01#
Aug 18 10:25:49.951: RADIUS:  authenticator 02 2F 01 A0 42 56 CB 4F - A7 2C B3 2A E7 41 4F C8
Aug 18 10:25:49.951: RADIUS:  User-Name           [1]   18  "agrm909@kaya.lab"
Aug 18 10:25:49.951: RADIUS:  User-Password       [2]   18  *
Aug 18 10:25:49.951: RADIUS:  NAS-Port            [5]   6   98
Aug 18 10:25:49.955: RADIUS:  NAS-Port-Id         [87]  7   "tty98"
Aug 18 10:25:49.955: RADIUS:  NAS-Port-Type       [61]  6   Virtual                   [5]
Aug 18 10:25:49.955: RADIUS:  Calling-Station-Id  [31]  15  "192.168.174.1"
Aug 18 10:25:49.959: RADIUS:  NAS-IP-Address      [4]   6   192.168.174.132
QUBC1SW01#
Aug 18 10:25:54.795: RADIUS: Retransmit to (192.168.174.130:1645,1646) for id 1645/28
QUBC1SW01#
Aug 18 10:25:59.131: %RADIUS-4-RADIUS_DEAD: RADIUS server 192.168.174.130:1645,1646 is not responding.
Aug 18 10:25:59.135: %RADIUS-4-RADIUS_ALIVE: RADIUS server 192.168.174.130:1645,1646 is being marked alive.
QUBC1SW01#
Aug 18 10:25:59.139: RADIUS: Retransmit to (192.168.174.130:1645,1646) for id 1645/28
QUBC1SW01#
Aug 18 10:26:03.619: RADIUS: Retransmit to (192.168.174.130:1645,1646) for id 1645/28
QUBC1SW01#
Aug 18 10:26:07.987: RADIUS: Fail-over to (192.168.174.130:1812,1813) for id 1645/28
QUBC1SW01#
Aug 18 10:26:12.431: RADIUS: Retransmit to (192.168.174.130:1812,1813) for id 1645/28
QUBC1SW01#
Aug 18 10:26:17.963: RADIUS: Retransmit to (192.168.174.130:1812,1813) for id 1645/28
QUBC1SW01#
Aug 18 10:26:22.567: RADIUS: Retransmit to (192.168.174.130:1812,1813) for id 1645/28
QUBC1SW01#
Aug 18 10:26:27.143: RADIUS: No response from (192.168.174.130:1812,1813) for id 1645/28
Aug 18 10:26:27.147: RADIUS/DECODE: No response from radius-server; parse response; FAIL
Aug 18 10:26:27.147: RADIUS/DECODE: Case error(no response/ bad packet/ op decode);parse response; FAIL
QUBC1SW01#
Aug 18 10:26:29.223: AAA/AUTHEN/LOGIN (00000014): Pick method list 'default'
Aug 18 10:26:29.231: RADIUS/ENCODE(00000014): ask "Password: "
Aug 18 10:26:29.231: RADIUS/ENCODE(00000014): send packet; GET_PASSWORD
QUBC1SW01#&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 18 Aug 2024 16:23:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/using-peap-or-eap-mschapv2-cisco-switch-2960-x-and-radius/m-p/5162352#M591274</guid>
      <dc:creator>Nenday</dc:creator>
      <dc:date>2024-08-18T16:23:27Z</dc:date>
    </item>
    <item>
      <title>Re: Using PEAP) or EAP-MSCHAPv2 cisco switch 2960-X and Radius</title>
      <link>https://community.cisco.com/t5/network-access-control/using-peap-or-eap-mschapv2-cisco-switch-2960-x-and-radius/m-p/5162415#M591286</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1669890"&gt;@Nenday&lt;/a&gt;&amp;nbsp;,&lt;BR /&gt;&lt;BR /&gt;If you check event viewer on NPS it will show that the switch did not send Message Authenticator, and based on what i read on the RFC it is sent in EAP or CHAP authentication method which not in your case, unfortunately last time i tried to change it from PAP to other method i found it's not possible on IOS.&lt;BR /&gt;&lt;BR /&gt;You can uncheck that option, and make sure atleast the switch management network/NPS network not accessible by other users and the communication between network devices management network and the NPS separated from user traffic logically. or as i said you can use tacacs.&lt;BR /&gt;&lt;BR /&gt;Regards!&lt;/P&gt;&lt;P&gt;--&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;Don't forget to rate helpful posts.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 19 Aug 2024 01:09:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/using-peap-or-eap-mschapv2-cisco-switch-2960-x-and-radius/m-p/5162415#M591286</guid>
      <dc:creator>Amine ZAKARIA</dc:creator>
      <dc:date>2024-08-19T01:09:29Z</dc:date>
    </item>
    <item>
      <title>Re: Using PEAP) or EAP-MSCHAPv2 cisco switch 2960-X and Radius</title>
      <link>https://community.cisco.com/t5/network-access-control/using-peap-or-eap-mschapv2-cisco-switch-2960-x-and-radius/m-p/5162834#M591297</link>
      <description>&lt;P&gt;This bug may sound serious, but for most enterprise network, this is not possible until a attacker ha s access to network path from switch to radius server. If somebody has access to that, then you have more serious issues you need to worry than this vulnerability &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;some have radius servers in the cloud or go over the internet, there may be chance if ISP etc can glean into it.&lt;/P&gt;
&lt;P&gt;my 2 cents &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;**Please rate as useful if this was helpful*&lt;/P&gt;</description>
      <pubDate>Mon, 19 Aug 2024 21:04:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/using-peap-or-eap-mschapv2-cisco-switch-2960-x-and-radius/m-p/5162834#M591297</guid>
      <dc:creator>ccieexpert</dc:creator>
      <dc:date>2024-08-19T21:04:10Z</dc:date>
    </item>
    <item>
      <title>Re: Using PEAP) or EAP-MSCHAPv2 cisco switch 2960-X and Radius</title>
      <link>https://community.cisco.com/t5/network-access-control/using-peap-or-eap-mschapv2-cisco-switch-2960-x-and-radius/m-p/5163361#M591318</link>
      <description>&lt;P&gt;thank you&amp;nbsp;&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1481123"&gt;@ccieexpert&lt;/a&gt;&amp;nbsp; &amp;nbsp;&amp;amp;&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1228911"&gt;@Amine ZAKARIA&lt;/a&gt;&amp;nbsp; for your response,&amp;nbsp;&lt;/P&gt;&lt;P&gt;I think I have a serious issue because my network is not secured and many person can see the Radius server,&amp;nbsp;&lt;BR /&gt;I try to apply what Microsoft suggest to do on the Radius server but I didn't work, In radius server I capture packets and I didn't see the authenticator message send by the client,&amp;nbsp;&lt;BR /&gt;do I need to do something on the switch or another side !!!!!&amp;nbsp;&lt;BR /&gt;I feel that I turn around the solution but can't touch it &lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;sinc 1 week now and I can't see the light in the whole darkness !!!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 20 Aug 2024 17:35:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/using-peap-or-eap-mschapv2-cisco-switch-2960-x-and-radius/m-p/5163361#M591318</guid>
      <dc:creator>Nenday</dc:creator>
      <dc:date>2024-08-20T17:35:33Z</dc:date>
    </item>
    <item>
      <title>Re: Using PEAP) or EAP-MSCHAPv2 cisco switch 2960-X and Radius</title>
      <link>https://community.cisco.com/t5/network-access-control/using-peap-or-eap-mschapv2-cisco-switch-2960-x-and-radius/m-p/5166554#M591434</link>
      <description>&lt;P&gt;Hello,&amp;nbsp;&lt;/P&gt;&lt;P&gt;When I enable the message authenticator on the client configuration on NPS&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Nenday_0-1724767949581.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/227128i4F2627E8DDF45F7A/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Nenday_0-1724767949581.png" alt="Nenday_0-1724767949581.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;I cannot connect using SSH and when I check my Radius log I found that the switch didn't send the message authenticator in the paquet,&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any one can help me to correct this issue, at least it will resolve a part of problem&lt;/P&gt;</description>
      <pubDate>Tue, 27 Aug 2024 14:14:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/using-peap-or-eap-mschapv2-cisco-switch-2960-x-and-radius/m-p/5166554#M591434</guid>
      <dc:creator>Nenday</dc:creator>
      <dc:date>2024-08-27T14:14:20Z</dc:date>
    </item>
  </channel>
</rss>

