<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ISE acting as Radius Proxy Client? in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-acting-as-radius-proxy-client/m-p/2492064#M87648</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Aaron,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="margin: 0in 0in 0.0001pt;"&gt;Check the Cisco ISE dashboard (Operations &amp;gt; Authentications) for any indication regarding the nature of RADIUS communication loss. (Look for instances of your specified RADIUS usernames and scan the system messages that are associated with any error message entries.)&lt;/P&gt;&lt;P style="margin: 0in 0in 0.0001pt;"&gt;Log into the Cisco ISE CLI&lt;A href="http://www.cisco.com/c/en/us/td/docs/security/ise/1-2/troubleshooting_guide/ise_tsg.html#pgfId-193016"&gt;5&lt;/A&gt; and enter the following command to produce RADIUS attribute output that may aid in debugging connection issues:&lt;/P&gt;&lt;P style="margin: 0in 0in 0.0001pt;"&gt;test aaa group radius &lt;USERNAME&gt; &lt;PASSWORD&gt; new-code &lt;/PASSWORD&gt;&lt;/USERNAME&gt;&lt;/P&gt;&lt;P style="margin: 0in 0in 0.0001pt;"&gt;If this test command is successful, you should see the following attributes:&lt;/P&gt;&lt;UL style="margin-top: 0in;"&gt;&lt;LI style="margin-bottom: .0001pt; line-height: normal;"&gt;Connect&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; port &lt;/LI&gt;&lt;LI style="margin-bottom: .0001pt; line-height: normal;"&gt;Connect NAD&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; IP address &lt;/LI&gt;&lt;LI style="margin-bottom: .0001pt; line-height: normal;"&gt;Connect&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Policy Service node IP address &lt;/LI&gt;&lt;LI style="margin-bottom: .0001pt; line-height: normal;"&gt;Correct&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; server key &lt;/LI&gt;&lt;LI style="margin-bottom: .0001pt; line-height: normal;"&gt;Recognized&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; username or password &lt;/LI&gt;&lt;LI style="margin-bottom: .0001pt; line-height: normal;"&gt;Connectivity&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; between the NAD and Policy Service node &lt;/LI&gt;&lt;/UL&gt;&lt;P style="margin: 0in 0in 0.0001pt;"&gt;You can also use this command to help narrow the focus of the potential problem with RADIUS communication by deliberately specifying incorrect parameter values in the command line and then returning to the administrator dashboard (Operations &amp;gt; Authentications) to view the type and frequency of error message entries that result from the incorrect command line. For example, to test whether or not user credentials may be the source of the problem, enter a username and or password that you know is incorrect, and then go look for error message entries that are pertinent to that username in the Operations &amp;gt; Authentications page to see what Cisco ISE is reporting.)&lt;/P&gt;&lt;P style="margin-bottom: 0.0001pt; line-height: normal;"&gt;Note This command does not validate whether or not the NAD is configured to use RADIUS, nor does it verify whether the NAD is configured to use the new AAA model.&lt;/P&gt;&lt;P style="margin: 0in 0in 0.0001pt;"&gt;The Cisco ISE network enforcement device (switch) is missing the &lt;STRONG&gt;radius-server vsa send accounting&lt;/STRONG&gt; command.&lt;/P&gt;&lt;P style="margin: 0in 0in 0.0001pt;"&gt;Verify that the switch RADIUS configuration for this device is correct and features the appropriate command(s).&lt;/P&gt;&lt;P style="margin: 0in 0in 0.0001pt;"&gt;For more details please go through the following link:&lt;/P&gt;&lt;P style="margin: 0in 0in 0.0001pt;"&gt;&lt;A href="http://www.cisco.com/c/en/us/td/docs/security/ise/1-2/troubleshooting_guide/ise_tsg.html#pgfId-192989"&gt;http://www.cisco.com/c/en/us/td/docs/security/ise/1-2/troubleshooting_guide/ise_tsg.html#pgfId-192989&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 03 Mar 2014 16:30:00 GMT</pubDate>
    <dc:creator>Muhammad Munir</dc:creator>
    <dc:date>2014-03-03T16:30:00Z</dc:date>
    <item>
      <title>ISE acting as Radius Proxy Client?</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-acting-as-radius-proxy-client/m-p/2492063#M87647</link>
      <description>&lt;P&gt;Hi, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have an issue where a remote company has there internal redius server and I have my ISE radius server. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When there users come to my site, they can authenticate with my wireless and my ISE server proxies the request to there home site to be authenticated and tells me if I should allow them access or not. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So standard radius proxy and it all works well when my ISE server begins the exchange. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;However if my staff go to there site the reverse is not working, they are proxying the requests back OK, and I can see on the firewall and router the incomming radius packets destined to my ISE server. But there is no recourd on the ISE server of ever reciving them and it all times out. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is tehre some thing I need to do to allow ISE to act as the client in a radius proxy set up? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Oh I am running version 1.2&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 04:28:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-acting-as-radius-proxy-client/m-p/2492063#M87647</guid>
      <dc:creator>Aaron Street</dc:creator>
      <dc:date>2019-03-11T04:28:16Z</dc:date>
    </item>
    <item>
      <title>ISE acting as Radius Proxy Client?</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-acting-as-radius-proxy-client/m-p/2492064#M87648</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Aaron,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="margin: 0in 0in 0.0001pt;"&gt;Check the Cisco ISE dashboard (Operations &amp;gt; Authentications) for any indication regarding the nature of RADIUS communication loss. (Look for instances of your specified RADIUS usernames and scan the system messages that are associated with any error message entries.)&lt;/P&gt;&lt;P style="margin: 0in 0in 0.0001pt;"&gt;Log into the Cisco ISE CLI&lt;A href="http://www.cisco.com/c/en/us/td/docs/security/ise/1-2/troubleshooting_guide/ise_tsg.html#pgfId-193016"&gt;5&lt;/A&gt; and enter the following command to produce RADIUS attribute output that may aid in debugging connection issues:&lt;/P&gt;&lt;P style="margin: 0in 0in 0.0001pt;"&gt;test aaa group radius &lt;USERNAME&gt; &lt;PASSWORD&gt; new-code &lt;/PASSWORD&gt;&lt;/USERNAME&gt;&lt;/P&gt;&lt;P style="margin: 0in 0in 0.0001pt;"&gt;If this test command is successful, you should see the following attributes:&lt;/P&gt;&lt;UL style="margin-top: 0in;"&gt;&lt;LI style="margin-bottom: .0001pt; line-height: normal;"&gt;Connect&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; port &lt;/LI&gt;&lt;LI style="margin-bottom: .0001pt; line-height: normal;"&gt;Connect NAD&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; IP address &lt;/LI&gt;&lt;LI style="margin-bottom: .0001pt; line-height: normal;"&gt;Connect&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Policy Service node IP address &lt;/LI&gt;&lt;LI style="margin-bottom: .0001pt; line-height: normal;"&gt;Correct&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; server key &lt;/LI&gt;&lt;LI style="margin-bottom: .0001pt; line-height: normal;"&gt;Recognized&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; username or password &lt;/LI&gt;&lt;LI style="margin-bottom: .0001pt; line-height: normal;"&gt;Connectivity&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; between the NAD and Policy Service node &lt;/LI&gt;&lt;/UL&gt;&lt;P style="margin: 0in 0in 0.0001pt;"&gt;You can also use this command to help narrow the focus of the potential problem with RADIUS communication by deliberately specifying incorrect parameter values in the command line and then returning to the administrator dashboard (Operations &amp;gt; Authentications) to view the type and frequency of error message entries that result from the incorrect command line. For example, to test whether or not user credentials may be the source of the problem, enter a username and or password that you know is incorrect, and then go look for error message entries that are pertinent to that username in the Operations &amp;gt; Authentications page to see what Cisco ISE is reporting.)&lt;/P&gt;&lt;P style="margin-bottom: 0.0001pt; line-height: normal;"&gt;Note This command does not validate whether or not the NAD is configured to use RADIUS, nor does it verify whether the NAD is configured to use the new AAA model.&lt;/P&gt;&lt;P style="margin: 0in 0in 0.0001pt;"&gt;The Cisco ISE network enforcement device (switch) is missing the &lt;STRONG&gt;radius-server vsa send accounting&lt;/STRONG&gt; command.&lt;/P&gt;&lt;P style="margin: 0in 0in 0.0001pt;"&gt;Verify that the switch RADIUS configuration for this device is correct and features the appropriate command(s).&lt;/P&gt;&lt;P style="margin: 0in 0in 0.0001pt;"&gt;For more details please go through the following link:&lt;/P&gt;&lt;P style="margin: 0in 0in 0.0001pt;"&gt;&lt;A href="http://www.cisco.com/c/en/us/td/docs/security/ise/1-2/troubleshooting_guide/ise_tsg.html#pgfId-192989"&gt;http://www.cisco.com/c/en/us/td/docs/security/ise/1-2/troubleshooting_guide/ise_tsg.html#pgfId-192989&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 03 Mar 2014 16:30:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-acting-as-radius-proxy-client/m-p/2492064#M87648</guid>
      <dc:creator>Muhammad Munir</dc:creator>
      <dc:date>2014-03-03T16:30:00Z</dc:date>
    </item>
    <item>
      <title>ISE acting as Radius Proxy Client?</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-acting-as-radius-proxy-client/m-p/2492065#M87649</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;but this is ISE working as a proxy server, I need to test ISE working as the client, IE reciving radisu requests that are gettign proxied from other radius server. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also in ISE 1.2 I dont see the ability to run &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;test aaa group radius &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;is get &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ISE1/admin# test aaa group radius &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ^&lt;/P&gt;&lt;P&gt;% invalid command detected at '^' marker.&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 03 Mar 2014 17:02:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-acting-as-radius-proxy-client/m-p/2492065#M87649</guid>
      <dc:creator>Aaron Street</dc:creator>
      <dc:date>2014-03-03T17:02:06Z</dc:date>
    </item>
    <item>
      <title>ISE acting as Radius Proxy Client?</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-acting-as-radius-proxy-client/m-p/2492066#M87650</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;ISE can acts as a RADIUS proxy server by proxying the requests from a network&amp;nbsp; access&amp;nbsp; device (NAD) to a RADIUS server. The RADIUS server processes the request&amp;nbsp; and&amp;nbsp; returns the result to Cisco ISE. Cisco ISE then sends the response to the&amp;nbsp;&amp;nbsp; NAD&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;FYI&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;you can use the RADIUS server sequences to proxy the requests to a&amp;nbsp; RADIUS&amp;nbsp; server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The RADIUS server sequence strips the domain name from the&amp;nbsp; RADIUS-Username&amp;nbsp; attribute for RADIUS authentications. This domain stripping is&amp;nbsp; not applicable&amp;nbsp; for EAP authentications, which use the EAP-Identity attribute.&amp;nbsp; The RADIUS proxy&amp;nbsp; server obtains the username from the RADIUS-Username attribute&amp;nbsp; and strips it&amp;nbsp; from the character that you specify when you configure the RADIUS&amp;nbsp; server&amp;nbsp; sequence. For EAP authentications, the RADIUS proxy server obtains the&amp;nbsp; username&amp;nbsp; from the EAP-Identity attribute. EAP authentications that use the&amp;nbsp; RADIUS server&amp;nbsp; sequence will succeed only if the EAP-Identity and RADIUS-Username&amp;nbsp; values are&amp;nbsp; the same.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 06 Mar 2014 10:11:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-acting-as-radius-proxy-client/m-p/2492066#M87650</guid>
      <dc:creator>Naveen Kumar</dc:creator>
      <dc:date>2014-03-06T10:11:35Z</dc:date>
    </item>
    <item>
      <title>Hi Did you ever get a</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-acting-as-radius-proxy-client/m-p/2492067#M87651</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Did you ever get a solution for this? I'm experiencing the exact same problem as you have detailed here. I can see the radius requests hitting the ISE box, but the ISE box isnt responding.&lt;/P&gt;&lt;P&gt;If you could tell me how you solved this it would be great.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks a lot&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 22 Oct 2014 12:53:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-acting-as-radius-proxy-client/m-p/2492067#M87651</guid>
      <dc:creator>noc</dc:creator>
      <dc:date>2014-10-22T12:53:32Z</dc:date>
    </item>
    <item>
      <title>Hi,  Sorry yes, it was</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-acting-as-radius-proxy-client/m-p/2492068#M87652</link>
      <description>&lt;P&gt;Hi,&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Sorry yes, it was actually the reporting on ISE that was the issue. I had a rule set up incorrectly which meant the ISE sever was rejecting the packets.&amp;nbsp;&lt;/P&gt;&lt;P&gt;The rule was basically saying proxy the proxed&amp;nbsp;request back out, and this was happening but there was no record of it on the ISE server.&amp;nbsp;&lt;/P&gt;&lt;P&gt;I would start right at the start, if possible with a test ISE server out of the box.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;External radius server are set up as network devices with correct share passwords.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Then I have an authentication policy that says "if request from these devices then authenticate it by ....."&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;for me it was a basic user error, but ISE was not good at showing it &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 22 Oct 2014 13:08:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-acting-as-radius-proxy-client/m-p/2492068#M87652</guid>
      <dc:creator>Aaron Street</dc:creator>
      <dc:date>2014-10-22T13:08:00Z</dc:date>
    </item>
    <item>
      <title>Thanks for the speedy</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-acting-as-radius-proxy-client/m-p/2492069#M87653</link>
      <description>&lt;P&gt;Thanks for the speedy response.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm still struggling to find the right way to format the &amp;nbsp;authentication condition.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What's the correct attribute to select and how do you point it to the proxy sequence?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks again.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;John&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 22 Oct 2014 13:58:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-acting-as-radius-proxy-client/m-p/2492069#M87653</guid>
      <dc:creator>noc</dc:creator>
      <dc:date>2014-10-22T13:58:51Z</dc:date>
    </item>
  </channel>
</rss>

