<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Authentication problem using test aa command in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/authentication-problem-using-test-aa-command/m-p/5163511#M591321</link>
    <description>&lt;P&gt;&lt;SPAN&gt;Authen: request &lt;STRONG&gt;3&lt;/STRONG&gt;, timeouts 0, failover 0, retransmission 0&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Response: accept 0, reject 0, challenge 0&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Response: unexpected &lt;STRONG&gt;3&lt;/STRONG&gt;, server error 0, incorrect 0, time 762220ms&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;these counter with misconfig network device count 1 appear in ISE log point to one thing&amp;nbsp;&lt;BR /&gt;you dont config&amp;nbsp;&lt;BR /&gt;1- correct key between ISE and SW&amp;nbsp;&lt;BR /&gt;2- correct UDP port&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;MHM&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Tue, 20 Aug 2024 21:39:33 GMT</pubDate>
    <dc:creator>MHM Cisco World</dc:creator>
    <dc:date>2024-08-20T21:39:33Z</dc:date>
    <item>
      <title>Authentication problem using test aa command</title>
      <link>https://community.cisco.com/t5/network-access-control/authentication-problem-using-test-aa-command/m-p/5163271#M591306</link>
      <description>&lt;P&gt;I have a simple gns3 architecture :&amp;nbsp;&lt;/P&gt;&lt;P&gt;Ethernet2 has the ise and the windows server2012 of my architecture , i used the sw1 as a NAD but when i try to test the authentication and authorization i have this :&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;sw1#test aaa group radius MyRadiusGroup abcd legacy&lt;BR /&gt;Attempting authentication test to server-group radius using radius&lt;BR /&gt;User authentication request was rejected by server.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;here is the switch config : sw1#sh run&lt;BR /&gt;Building configuration...&lt;/P&gt;&lt;P&gt;Current configuration : 2488 bytes&lt;BR /&gt;!&lt;BR /&gt;! Last configuration change at 14:38:35 UTC Tue Aug 20 2024&lt;BR /&gt;!&lt;BR /&gt;version 15.2&lt;BR /&gt;service timestamps debug datetime msec&lt;BR /&gt;service timestamps log datetime msec&lt;BR /&gt;no service password-encryption&lt;BR /&gt;service compress-config&lt;BR /&gt;!&lt;BR /&gt;hostname sw1&lt;BR /&gt;!&lt;BR /&gt;boot-start-marker&lt;BR /&gt;boot-end-marker&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;logging discriminator EXCESS severity drops 6 msg-body drops EXCESSCOLL&lt;BR /&gt;logging buffered 50000&lt;BR /&gt;logging console discriminator EXCESS&lt;BR /&gt;!&lt;BR /&gt;aaa new-model&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;aaa group server radius MyRadiusGroup&lt;BR /&gt;server name MyRadiusGroup&lt;BR /&gt;!&lt;BR /&gt;aaa authentication dot1x default group MyRadiusGroup&lt;BR /&gt;aaa authorization network default group MyRadiusGroup&lt;BR /&gt;aaa accounting dot1x default start-stop group MyRadiusGroup&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;aaa server radius dynamic-author&lt;BR /&gt;client 10.0.2.28 server-key abcd&lt;BR /&gt;!&lt;BR /&gt;aaa session-id common&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;no ip icmp rate-limit unreachable&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;no ip domain-lookup&lt;BR /&gt;no ip cef&lt;BR /&gt;no ipv6 cef&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;dot1x system-auth-control&lt;BR /&gt;!&lt;BR /&gt;spanning-tree mode rapid-pvst&lt;BR /&gt;spanning-tree extend system-id&lt;BR /&gt;!&lt;BR /&gt;vlan internal allocation policy ascending&lt;BR /&gt;!&lt;BR /&gt;ip tcp synwait-time 5&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt;switchport access vlan 200&lt;BR /&gt;switchport trunk encapsulation dot1q&lt;BR /&gt;switchport mode access&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt;switchport access vlan 10&lt;BR /&gt;switchport mode access&lt;BR /&gt;authentication host-mode multi-domain&lt;BR /&gt;authentication order dot1x mab&lt;BR /&gt;authentication priority dot1x mab&lt;BR /&gt;mab&lt;BR /&gt;dot1x pae authenticator&lt;BR /&gt;spanning-tree portfast edge&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt;switchport access vlan 20&lt;BR /&gt;switchport mode access&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt;switchport access vlan 30&lt;BR /&gt;switchport mode access&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet1/0&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet1/1&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet1/2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet1/3&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet2/0&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet2/1&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet2/2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet2/3&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet3/0&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet3/1&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet3/2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet3/3&lt;BR /&gt;!&lt;BR /&gt;interface Vlan1&lt;BR /&gt;no ip address&lt;BR /&gt;shutdown&lt;BR /&gt;!&lt;BR /&gt;interface Vlan10&lt;BR /&gt;ip address 10.1.10.100 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Vlan200&lt;BR /&gt;ip address 10.0.2.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;ip forward-protocol nd&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;no ip http server&lt;BR /&gt;no ip http secure-server&lt;BR /&gt;ip route 0.0.0.0 0.0.0.0 10.1.10.1&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;radius-server attribute 6 on-for-login-auth&lt;BR /&gt;radius-server attribute 8 include-in-access-req&lt;BR /&gt;radius-server attribute 25 access-request include&lt;BR /&gt;radius-server host 10.0.2.28 auth-port 1812 acct-port 1813 key abcd&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;control-plane&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;line con 0&lt;BR /&gt;exec-timeout 0 0&lt;BR /&gt;privilege level 15&lt;BR /&gt;logging synchronous&lt;BR /&gt;line aux 0&lt;BR /&gt;exec-timeout 0 0&lt;BR /&gt;privilege level 15&lt;BR /&gt;logging synchronous&lt;BR /&gt;line vty 0 4&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;end&lt;/P&gt;&lt;P&gt;sw1#&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;i dont know if i have a problem in the rules i used or what but this is what i have right now and my windows 10 is supposed to be authenticated using AD&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="pooo.PNG" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/226719i7B5263744CC3A28A/image-size/large?v=v2&amp;amp;px=999" role="button" title="pooo.PNG" alt="pooo.PNG" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="po.PNG" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/226720iC5E7FBA8C6138EE9/image-size/large?v=v2&amp;amp;px=999" role="button" title="po.PNG" alt="po.PNG" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="arc.PNG" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/226718i9C19688AA5F724BA/image-size/large?v=v2&amp;amp;px=999" role="button" title="arc.PNG" alt="arc.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 20 Aug 2024 14:59:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/authentication-problem-using-test-aa-command/m-p/5163271#M591306</guid>
      <dc:creator>WafaaK21</dc:creator>
      <dc:date>2024-08-20T14:59:57Z</dc:date>
    </item>
    <item>
      <title>Re: Authentication problem using test aa command</title>
      <link>https://community.cisco.com/t5/network-access-control/authentication-problem-using-test-aa-command/m-p/5163273#M591307</link>
      <description>&lt;P&gt;I think it gns3 issue'&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Try use mab if not work&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The&amp;nbsp; sorry you need to use other emulate programs (to be honest all same I never see one work correctly)&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Sorry again&amp;nbsp;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Tue, 20 Aug 2024 15:04:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/authentication-problem-using-test-aa-command/m-p/5163273#M591307</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-08-20T15:04:09Z</dc:date>
    </item>
    <item>
      <title>Re: Authentication problem using test aa command</title>
      <link>https://community.cisco.com/t5/network-access-control/authentication-problem-using-test-aa-command/m-p/5163275#M591308</link>
      <description>&lt;P&gt;what can I use other than gns3?&amp;nbsp; does eve ng work better? and how can I use mab? normally I am using them both as I added the windows10 mac address ad an endpoint&lt;/P&gt;</description>
      <pubDate>Tue, 20 Aug 2024 15:06:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/authentication-problem-using-test-aa-command/m-p/5163275#M591308</guid>
      <dc:creator>WafaaK21</dc:creator>
      <dc:date>2024-08-20T15:06:42Z</dc:date>
    </item>
    <item>
      <title>Re: Authentication problem using test aa command</title>
      <link>https://community.cisco.com/t5/network-access-control/authentication-problem-using-test-aa-command/m-p/5163279#M591309</link>
      <description>&lt;P&gt;Do&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Show aaa server&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This give statistics count for request reject etc.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For mab I see you config it so if 802.1x failed then it auto try mab&lt;/P&gt;
&lt;P&gt;And again sorry I don't know any emulate that work for dot1x&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Tue, 20 Aug 2024 15:09:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/authentication-problem-using-test-aa-command/m-p/5163279#M591309</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-08-20T15:09:29Z</dc:date>
    </item>
    <item>
      <title>Re: Authentication problem using test aa command</title>
      <link>https://community.cisco.com/t5/network-access-control/authentication-problem-using-test-aa-command/m-p/5163280#M591310</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1769286"&gt;@WafaaK21&lt;/a&gt; the RADIUS request is received by ISE, the connection has hit the Default Policy set, is that to be expected? Or do you have a custom policy that was not matched?&lt;/P&gt;
&lt;P&gt;What is the output of the connection request in the ISE Live Logs, that should provide a clue to the error.&lt;/P&gt;
&lt;P&gt;The username is masked, go to Administration &amp;gt;&amp;gt; Settings &amp;gt;&amp;gt; Protocols &amp;gt;&amp;gt; RADIUS &amp;gt;&amp;gt; Disclose invalid usernames and select the checkbox. Then run the test again, the username should appear. Provide the ISE logs.&lt;/P&gt;</description>
      <pubDate>Tue, 20 Aug 2024 15:09:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/authentication-problem-using-test-aa-command/m-p/5163280#M591310</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2024-08-20T15:09:34Z</dc:date>
    </item>
    <item>
      <title>Re: Authentication problem using test aa command</title>
      <link>https://community.cisco.com/t5/network-access-control/authentication-problem-using-test-aa-command/m-p/5163281#M591311</link>
      <description>&lt;P&gt;sw1#Show aaa server&lt;/P&gt;&lt;P&gt;RADIUS: id 1, priority 1, host 10.0.2.28, auth-port 1812, acct-port 1813&lt;BR /&gt;State: current UP, duration 1924s, previous duration 0s&lt;BR /&gt;Dead: total time 0s, count 0&lt;BR /&gt;Quarantined: No&lt;BR /&gt;Authen: request 3, timeouts 0, failover 0, retransmission 0&lt;BR /&gt;Response: accept 0, reject 0, challenge 0&lt;BR /&gt;Response: unexpected 3, server error 0, incorrect 0, time 762220ms&lt;BR /&gt;Transaction: success 3, failure 0&lt;BR /&gt;Throttled: transaction 0, timeout 0, failure 0&lt;BR /&gt;Author: request 0, timeouts 0, failover 0, retransmission 0&lt;BR /&gt;Response: accept 0, reject 0, challenge 0&lt;BR /&gt;Response: unexpected 0, server error 0, incorrect 0, time 0ms&lt;BR /&gt;Transaction: success 0, failure 0&lt;BR /&gt;Throttled: transaction 0, timeout 0, failure 0&lt;BR /&gt;Account: request 0, timeouts 0, failover 0, retransmission 0&lt;BR /&gt;Request: start 0, interim 0, stop 0&lt;BR /&gt;Response: start 0, interim 0, stop 0&lt;BR /&gt;Response: unexpected 0, server error 0, incorrect 0, time 0ms&lt;BR /&gt;Transaction: success 0, failure 0&lt;BR /&gt;Throttled: transaction 0, timeout 0, failure 0&lt;BR /&gt;Elapsed time since counters last cleared: 32m&lt;BR /&gt;Estimated Outstanding Access Transactions: 0&lt;BR /&gt;Estimated Outstanding Accounting Transactions: 0&lt;BR /&gt;Estimated Throttled Access Transactions: 0&lt;BR /&gt;Estimated Throttled Accounting Transactions: 0&lt;BR /&gt;Maximum Throttled Transactions: access 0, accounting 0&lt;BR /&gt;Requests per minute past 24 hours:&lt;BR /&gt;high - 0 hours, 29 minutes ago: 1&lt;BR /&gt;low - 0 hours, 32 minutes ago: 0&lt;BR /&gt;average: 0&lt;BR /&gt;sw1#&lt;/P&gt;</description>
      <pubDate>Tue, 20 Aug 2024 15:10:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/authentication-problem-using-test-aa-command/m-p/5163281#M591311</guid>
      <dc:creator>WafaaK21</dc:creator>
      <dc:date>2024-08-20T15:10:58Z</dc:date>
    </item>
    <item>
      <title>Re: Authentication problem using test aa command</title>
      <link>https://community.cisco.com/t5/network-access-control/authentication-problem-using-test-aa-command/m-p/5163288#M591312</link>
      <description>&lt;P&gt;I've done some basic policies just so that he knows that my user is in my AD and in users folders, these are my policies, also can you please explain for me how to disclose invalid usernames and select what exactly?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="enre1.PNG" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/226722i1AC02AEA603463C3/image-size/large?v=v2&amp;amp;px=999" role="button" title="enre1.PNG" alt="enre1.PNG" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="enre.PNG" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/226724iC2F8F56F5E7BECA6/image-size/large?v=v2&amp;amp;px=999" role="button" title="enre.PNG" alt="enre.PNG" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="enre2.PNG" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/226723iC69F067B37D09C81/image-size/large?v=v2&amp;amp;px=999" role="button" title="enre2.PNG" alt="enre2.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 20 Aug 2024 15:14:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/authentication-problem-using-test-aa-command/m-p/5163288#M591312</guid>
      <dc:creator>WafaaK21</dc:creator>
      <dc:date>2024-08-20T15:14:54Z</dc:date>
    </item>
    <item>
      <title>Re: Authentication problem using test aa command</title>
      <link>https://community.cisco.com/t5/network-access-control/authentication-problem-using-test-aa-command/m-p/5163292#M591313</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1769286"&gt;@WafaaK21&lt;/a&gt; the AAA test test won't match that policy as the connection request won't be a "Wired_802.1X" connection, so won't match the conditions in your rule. Either test with a 802.1X client, change your conditions in your policy set or create another policy set.&amp;nbsp;The ISE Live Logs will tell you the authentication method/protocol (PAP_ASCII) and from there you can modify the policy set accordingly.&lt;/P&gt;
&lt;P&gt;That command has moved, go to Adminsitration &amp;gt; Settings &amp;gt; Security Settings &amp;gt; Disclose invalid usernames.&lt;/P&gt;</description>
      <pubDate>Tue, 20 Aug 2024 15:22:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/authentication-problem-using-test-aa-command/m-p/5163292#M591313</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2024-08-20T15:22:38Z</dc:date>
    </item>
    <item>
      <title>Re: Authentication problem using test aa command</title>
      <link>https://community.cisco.com/t5/network-access-control/authentication-problem-using-test-aa-command/m-p/5163511#M591321</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Authen: request &lt;STRONG&gt;3&lt;/STRONG&gt;, timeouts 0, failover 0, retransmission 0&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Response: accept 0, reject 0, challenge 0&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Response: unexpected &lt;STRONG&gt;3&lt;/STRONG&gt;, server error 0, incorrect 0, time 762220ms&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;these counter with misconfig network device count 1 appear in ISE log point to one thing&amp;nbsp;&lt;BR /&gt;you dont config&amp;nbsp;&lt;BR /&gt;1- correct key between ISE and SW&amp;nbsp;&lt;BR /&gt;2- correct UDP port&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;MHM&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 20 Aug 2024 21:39:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/authentication-problem-using-test-aa-command/m-p/5163511#M591321</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-08-20T21:39:33Z</dc:date>
    </item>
    <item>
      <title>Re: Authentication problem using test aa command</title>
      <link>https://community.cisco.com/t5/network-access-control/authentication-problem-using-test-aa-command/m-p/5163772#M591327</link>
      <description>&lt;P&gt;As&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/97036"&gt;@Rob Ingram&lt;/a&gt;&amp;nbsp;said, the "test aaa" command is only there to test basic RADIUS connectivity between the NAS and the AAA server, using PAP authentication. If you want to test your switch's NAC configuration, then you will need a real supplicant connected to a NAC configured interface. In the lab you can get away with a VM running an OS such as Windows, connected to the switch. But if you are learning how to write ISE Policy Sets, then you don't need any NAS devices. You can use software to send 802.1X EAP requests to ISE. Examples of such software is wpa_supplicant (linux) and on MAC there is EAPTest.&amp;nbsp; if this is what you're after, watch &lt;A href="https://www.youtube.com/watch?v=UFjzPFqCkaI" target="_self"&gt;Thomas Howard's Youtube video&lt;/A&gt; on this.&amp;nbsp; I have also written a three part guide on how to use radtest and wpa_supplicant (what I call, "Lab in a Laptop")&lt;/P&gt;</description>
      <pubDate>Wed, 21 Aug 2024 11:47:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/authentication-problem-using-test-aa-command/m-p/5163772#M591327</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2024-08-21T11:47:11Z</dc:date>
    </item>
  </channel>
</rss>

