<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Hi!While trying to reply to in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/telnet-and-vpn-radius-authentication/m-p/2588828#M72156</link>
    <description>&lt;P&gt;Hi!&lt;/P&gt;&lt;P&gt;While trying to reply to your answer, turned on maximum possible debugs for the login and saw this:&lt;/P&gt;&lt;P&gt;Nov 16 10:00:29.186: RADIUS/ENCODE(0000000F): dropping service type, "radius-server attribute 6 on-for-login-auth" is off&lt;/P&gt;&lt;P&gt;so put the command to the config:&lt;/P&gt;&lt;P&gt;radius-server attribute 6 on-for-login-auth&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;and then in every request for authentication i see:&lt;/P&gt;&lt;P&gt;for Login:&amp;nbsp;&lt;/P&gt;&lt;P&gt;Nov 16 11:02:12.303: RADIUS: &amp;nbsp;Service-Type &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;[6] &amp;nbsp; 6 &amp;nbsp; Login &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; [1]&lt;/P&gt;&lt;P&gt;for PPPoE/ PPTP/...&lt;/P&gt;&lt;P&gt;Nov 16 11:02:37.475: RADIUS: &amp;nbsp;Service-Type &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;[6] &amp;nbsp; 6 &amp;nbsp; Framed &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;[2]&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This answers my question.&lt;/P&gt;&lt;P&gt;By the way, this command is mandatory for ISE according to this post&amp;nbsp;&lt;A href="http://www.ajsnetworking.com/switch-configuration-for-ise-integration-part-2-radius-server-config/"&gt;http://www.ajsnetworking.com/switch-configuration-for-ise-integration-part-2-radius-server-config/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for you participating!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Sun, 16 Nov 2014 11:32:11 GMT</pubDate>
    <dc:creator>avorobyev</dc:creator>
    <dc:date>2014-11-16T11:32:11Z</dc:date>
    <item>
      <title>Telnet and VPN RADIUS authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/telnet-and-vpn-radius-authentication/m-p/2588824#M72147</link>
      <description>&lt;P&gt;Hi!&lt;/P&gt;&lt;P&gt;Trying to configure telnet (exec) and VPN&amp;nbsp;authentication via the same RADIUS server.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;How can differentiate EXEC and VPN logins on radius server?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Cisco sends Service-Type when PPPoE or some other type of auth but doesn't send it smth when I login via telnet.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So, I cannot see if client logins via telnet.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Have I missed something?&lt;/P&gt;</description>
      <pubDate>Wed, 13 Mar 2019 00:44:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/telnet-and-vpn-radius-authentication/m-p/2588824#M72147</guid>
      <dc:creator>avorobyev</dc:creator>
      <dc:date>2019-03-13T00:44:44Z</dc:date>
    </item>
    <item>
      <title>What type of Radius server</title>
      <link>https://community.cisco.com/t5/network-access-control/telnet-and-vpn-radius-authentication/m-p/2588825#M72149</link>
      <description>&lt;P&gt;What type of Radius server are you using?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Thank you for rating helpful posts!&amp;nbsp;&lt;/EM&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 12 Nov 2014 01:36:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/telnet-and-vpn-radius-authentication/m-p/2588825#M72149</guid>
      <dc:creator>nspasov</dc:creator>
      <dc:date>2014-11-12T01:36:40Z</dc:date>
    </item>
    <item>
      <title>Using Microsoft NPS.I can</title>
      <link>https://community.cisco.com/t5/network-access-control/telnet-and-vpn-radius-authentication/m-p/2588826#M72151</link>
      <description>&lt;P&gt;Using Microsoft NPS.&lt;/P&gt;&lt;P&gt;I can authenticate both telnet and PPPoE/PPTP, but can't tell that one of the logins is EXEC.&lt;/P&gt;</description>
      <pubDate>Wed, 12 Nov 2014 06:24:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/telnet-and-vpn-radius-authentication/m-p/2588826#M72151</guid>
      <dc:creator>avorobyev</dc:creator>
      <dc:date>2014-11-12T06:24:51Z</dc:date>
    </item>
    <item>
      <title>I have done very little work</title>
      <link>https://community.cisco.com/t5/network-access-control/telnet-and-vpn-radius-authentication/m-p/2588827#M72154</link>
      <description>&lt;P&gt;I have done very little work with Microsoft's NPS but from what I can recall it was very limited when it came to its functionality.&amp;nbsp;&lt;/P&gt;&lt;P&gt;For instance, in ISE and/or ACS, you can distinguish between the two via the following attributes:&lt;/P&gt;&lt;P&gt;1. EndpointID &amp;nbsp; &amp;gt; &amp;gt; &amp;gt; For SSH&amp;nbsp;this would look like this&amp;nbsp;&lt;STRONG&gt;ip:source-ip=x.x.x.x.&amp;nbsp;&lt;/STRONG&gt;While for VPNs this field would just be populated with the public IP address of the client&lt;/P&gt;&lt;P&gt;2.&amp;nbsp;CVPN3000/ASA/PIX7x-Tunnel-Group-Name &amp;gt; &amp;gt; &amp;gt; This field will only populate when doing VPNs and will reflect the name of the&amp;nbsp;&lt;STRONG&gt;tunnel-group&amp;nbsp;&lt;/STRONG&gt;configured on the ASA&lt;/P&gt;&lt;P&gt;You can check and see if NPS has these either one of those attributes from I highly doubt it. I think you can create custom based Radius attributes in NPS but from what I remember it was not an easy task &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; However, google.com should be able to point you in the right direction&lt;/P&gt;&lt;P&gt;Hope this helps!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;I&gt;Thank you for rating helpful posts!&lt;/I&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 12 Nov 2014 07:30:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/telnet-and-vpn-radius-authentication/m-p/2588827#M72154</guid>
      <dc:creator>nspasov</dc:creator>
      <dc:date>2014-11-12T07:30:41Z</dc:date>
    </item>
    <item>
      <title>Hi!While trying to reply to</title>
      <link>https://community.cisco.com/t5/network-access-control/telnet-and-vpn-radius-authentication/m-p/2588828#M72156</link>
      <description>&lt;P&gt;Hi!&lt;/P&gt;&lt;P&gt;While trying to reply to your answer, turned on maximum possible debugs for the login and saw this:&lt;/P&gt;&lt;P&gt;Nov 16 10:00:29.186: RADIUS/ENCODE(0000000F): dropping service type, "radius-server attribute 6 on-for-login-auth" is off&lt;/P&gt;&lt;P&gt;so put the command to the config:&lt;/P&gt;&lt;P&gt;radius-server attribute 6 on-for-login-auth&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;and then in every request for authentication i see:&lt;/P&gt;&lt;P&gt;for Login:&amp;nbsp;&lt;/P&gt;&lt;P&gt;Nov 16 11:02:12.303: RADIUS: &amp;nbsp;Service-Type &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;[6] &amp;nbsp; 6 &amp;nbsp; Login &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; [1]&lt;/P&gt;&lt;P&gt;for PPPoE/ PPTP/...&lt;/P&gt;&lt;P&gt;Nov 16 11:02:37.475: RADIUS: &amp;nbsp;Service-Type &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;[6] &amp;nbsp; 6 &amp;nbsp; Framed &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;[2]&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This answers my question.&lt;/P&gt;&lt;P&gt;By the way, this command is mandatory for ISE according to this post&amp;nbsp;&lt;A href="http://www.ajsnetworking.com/switch-configuration-for-ise-integration-part-2-radius-server-config/"&gt;http://www.ajsnetworking.com/switch-configuration-for-ise-integration-part-2-radius-server-config/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for you participating!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 16 Nov 2014 11:32:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/telnet-and-vpn-radius-authentication/m-p/2588828#M72156</guid>
      <dc:creator>avorobyev</dc:creator>
      <dc:date>2014-11-16T11:32:11Z</dc:date>
    </item>
    <item>
      <title>Ah good catch and good job</title>
      <link>https://community.cisco.com/t5/network-access-control/telnet-and-vpn-radius-authentication/m-p/2588829#M72159</link>
      <description>&lt;P&gt;Ah good catch and good job solving your own problem!! Also, thank you for coming back and taking the time to post the solution!!!&amp;nbsp;(+5 from me).&amp;nbsp;&lt;/P&gt;&lt;P&gt;If your issue is resolved, please mark the thread as "answered" &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 17 Nov 2014 17:29:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/telnet-and-vpn-radius-authentication/m-p/2588829#M72159</guid>
      <dc:creator>nspasov</dc:creator>
      <dc:date>2014-11-17T17:29:41Z</dc:date>
    </item>
  </channel>
</rss>

