<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic hmmm, I did not get much in in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/radius-server-accepts-users-only-if-username-equals-password/m-p/2469501#M90647</link>
    <description>&lt;P&gt;hmmm, I did not get much in return ...&lt;/P&gt;&lt;P&gt;this is what was output:&lt;/P&gt;&lt;P&gt;----------------&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Jun&amp;nbsp; 1 06:03:45.791: RADSRV: Client test password failed&lt;BR /&gt;Jun&amp;nbsp; 1 06:03:45.791: RADSRV 10.10.10.2&amp;lt; Code 3 Id 4A Len 88&lt;BR /&gt;Jun&amp;nbsp; 1 06:03:45.791:&amp;nbsp;&amp;nbsp; Auth 22F10EFB 11CDBBDF F415809E B12642DE&lt;BR /&gt;Jun&amp;nbsp; 1 06:03:45.791:&amp;nbsp;&amp;nbsp; 24 - 05 15 63 D0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D9 57 22 E2 0B 63 ED E9 28 E3 A3 89 14 DE 89 86&lt;BR /&gt;Jun&amp;nbsp; 1 06:03:45.791:&amp;nbsp;&amp;nbsp; 80 - FF 4A 85 AD 92 B6 1A 22 C3 02 79 8A DC 06 57 E8&lt;/EM&gt;&lt;BR /&gt;-----------------&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Sun, 01 Jun 2014 05:08:01 GMT</pubDate>
    <dc:creator>andbor600</dc:creator>
    <dc:date>2014-06-01T05:08:01Z</dc:date>
    <item>
      <title>radius server accepts users only if username equals password</title>
      <link>https://community.cisco.com/t5/network-access-control/radius-server-accepts-users-only-if-username-equals-password/m-p/2469491#M90637</link>
      <description>&lt;P&gt;good day collegues,&lt;/P&gt;&lt;P&gt;I must have something wrong with configuration of my cisco devices. my accesspoint which is also a radius server rejects users if the username&amp;nbsp;does not equal password.&lt;/P&gt;&lt;P&gt;did you come accross of that kind of issue before ? could you give me a hand with that ?&lt;/P&gt;&lt;P&gt;so as an example:&amp;nbsp;&lt;/P&gt;&lt;P&gt;the output of the command: "test aaa group rad_eap test test legacy":&lt;/P&gt;&lt;P&gt;a) if username is "&lt;STRONG&gt;test&lt;/STRONG&gt;" and password is set to "&lt;STRONG&gt;test&lt;/STRONG&gt;" , then I got in return the message:&lt;/P&gt;&lt;P&gt;"Attempting authentication test to server-group rad_eap using radius&lt;BR /&gt;&lt;STRONG&gt;User was successfully authenticated&lt;/STRONG&gt;."&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;b) but if username is "&lt;STRONG&gt;test&lt;/STRONG&gt;" and password is set to "&lt;STRONG&gt;test123&lt;/STRONG&gt;", then I got in return the message:&lt;/P&gt;&lt;P&gt;"Attempting authentication test to server-group rad_eap using radius&lt;BR /&gt;&lt;STRONG&gt;User authentication request was rejected by server&lt;/STRONG&gt;"&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;the config of the device trying to connect to a radius-server:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;-------------------------------------&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Current configuration : 7606 bytes&lt;BR /&gt;!&lt;BR /&gt;! Last configuration change at 11:49:13 +0100 Sun May 11 2014&lt;BR /&gt;version 15.2&lt;BR /&gt;no service pad&lt;BR /&gt;service timestamps debug datetime msec&lt;BR /&gt;service timestamps log datetime msec&lt;BR /&gt;service password-encryption&lt;BR /&gt;!&lt;BR /&gt;hostname AP1&lt;BR /&gt;!&lt;BR /&gt;logging buffered 409600 notifications&lt;BR /&gt;logging rate-limit console 9&lt;BR /&gt;enable secret 5 xxx&lt;BR /&gt;!&lt;BR /&gt;aaa new-model&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;aaa group server radius rad_eap&lt;BR /&gt;&amp;nbsp;server 10.10.10.3 auth-port 1812 acct-port 1813&lt;BR /&gt;!&lt;BR /&gt;aaa group server radius rad_mac&lt;BR /&gt;&amp;nbsp;server 10.10.10.3 auth-port 1812 acct-port 1813&lt;BR /&gt;!&lt;BR /&gt;aaa group server radius rad_acct&lt;BR /&gt;!&lt;BR /&gt;aaa group server radius rad_admin&lt;BR /&gt;!&lt;BR /&gt;aaa group server tacacs+ tac_admin&lt;BR /&gt;!&lt;BR /&gt;aaa authentication login eap_methods group rad_eap&lt;BR /&gt;aaa authentication login mac_methods group rad_mac&lt;BR /&gt;aaa authorization exec default local&lt;BR /&gt;aaa accounting network acct_methods start-stop group rad_acct&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;aaa session-id common&lt;BR /&gt;clock timezone +0100 1 0&lt;BR /&gt;clock save interval 8&lt;BR /&gt;no ip routing&lt;BR /&gt;ip domain name xx.xx&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;dot11 syslog&lt;BR /&gt;dot11 activity-timeout unknown default 18000&lt;BR /&gt;dot11 activity-timeout client default 18000 maximum 99999&lt;BR /&gt;dot11 vlan-name DMZ vlan 13&lt;BR /&gt;dot11 vlan-name service vlan 15&lt;BR /&gt;!&lt;BR /&gt;dot11 ssid guests&lt;BR /&gt;&amp;nbsp;&amp;nbsp; vlan 13&lt;BR /&gt;&amp;nbsp;&amp;nbsp; authentication open&lt;BR /&gt;&amp;nbsp;&amp;nbsp; authentication key-management wpa version 2&lt;BR /&gt;&amp;nbsp;&amp;nbsp; mbssid guest-mode&lt;BR /&gt;&amp;nbsp;&amp;nbsp; wpa-psk ascii 7 xxx&lt;BR /&gt;!&lt;BR /&gt;dot11 ssid isa&lt;BR /&gt;&amp;nbsp;&amp;nbsp; vlan 11&lt;BR /&gt;&amp;nbsp;&amp;nbsp; authentication open mac-address mac_methods eap eap_methods&lt;BR /&gt;&amp;nbsp;&amp;nbsp; authentication network-eap eap_methods mac-address mac_methods&lt;BR /&gt;&amp;nbsp;&amp;nbsp; authentication key-management wpa version 2&lt;BR /&gt;&amp;nbsp;&amp;nbsp; mbssid guest-mode dtim-period 100&lt;BR /&gt;!&lt;BR /&gt;dot11 ids mfp distributor&lt;BR /&gt;dot11 ids mfp detector&lt;BR /&gt;dot11 ids mfp generator&lt;BR /&gt;dot11 network-map&lt;BR /&gt;dot11 arp-cache optional&lt;BR /&gt;eap profile leap&lt;BR /&gt;!&lt;BR /&gt;crypto pki token default removal timeout 0&lt;BR /&gt;!&lt;BR /&gt;crypto pki trustpoint TP-self-signed-2817640586&lt;BR /&gt;&amp;nbsp;enrollment selfsigned&lt;BR /&gt;&amp;nbsp;subject-name cn=IOS-Self-Signed-Certificate-2817640586&lt;BR /&gt;&amp;nbsp;revocation-check none&lt;BR /&gt;&amp;nbsp;rsakeypair TP-self-signed-2817640586&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;crypto pki certificate chain TP-self-signed-2817640586&lt;BR /&gt;&amp;nbsp;certificate self-signed 01&lt;BR /&gt;&amp;nbsp; 3082022B 30820194 A0030201 02020101 300D0609 2A864886 F70D0101 05050030&lt;BR /&gt;&amp;nbsp; 31312F30 2D060355 04031326 494F532D 53656C66 2D536967 6E65642D 43657274&lt;BR /&gt;&amp;nbsp; 69666963 6174652D 32383137 36343035 3836301E 170D3134 30343136 32303038&lt;BR /&gt;&amp;nbsp; 30385A17 0D323030 31303130 30303030 305A3031 312F302D 06035504 03132649&lt;BR /&gt;&amp;nbsp; 4F532D53 656C662D 5369676E 65642D43 65727469 66696361 74652D32 38313736&lt;BR /&gt;&amp;nbsp; 34303538 3630819F 300D0609 2A864886 F70D0101 01050003 818D0030 81890281&lt;BR /&gt;&amp;nbsp; 8100A733 79307386 2E8862FE 1146C09E 127D73D7 310EE458 8425BF93 EE61C865&lt;BR /&gt;&amp;nbsp; DCBAE908 237B9211 48DB3EBA 23453C48 6E305E6D AF126A95 FC5F67A7 3CCA44BE&lt;BR /&gt;&amp;nbsp; 2C0F78D9 65107B3C 8A9CEA54 F2CC0F39 9ED4E927 AC5604C2 A6728936 A8292AC2&lt;BR /&gt;&amp;nbsp; 5D5B3C88 66D8CC92 05DEEC82 5FFF7D54 96D336E0 2AA4857E A9D72299 563CA72A&lt;BR /&gt;&amp;nbsp; 84C70203 010001A3 53305130 0F060355 1D130101 FF040530 030101FF 301F0603&lt;BR /&gt;&amp;nbsp; 551D2304 18301680 1427123B 2BFDD69C E735E02F 6EF73C47 DFEE8719 8F301D06&lt;BR /&gt;&amp;nbsp; 03551D0E 04160414 27123B2B FDD69CE7 35E02F6E F73C47DF EE87198F 300D0609&lt;BR /&gt;&amp;nbsp; 2A864886 F70D0101 05050003 81810085 DE81A2AA 8D2C8A8B 776630A9 196792BF&lt;BR /&gt;&amp;nbsp; 9DFC91DC A74A18DF 17F4BD8F 5882CFAD 79807290 E866330B F640FF49 708E636B&lt;BR /&gt;&amp;nbsp; D5DBDE7D 81A10122 EA002533 C70F5FD6 C2571D27 15C4664B B9777D22 937ECF29&lt;BR /&gt;&amp;nbsp; 9F46570A CDA31885 1ADDF8F7 3E0DF4D4 26DCC671 00871029 65DF9B65 0D89B42F&lt;BR /&gt;&amp;nbsp; 95BC2224 BE8C3877 007C3F93 C696DE&lt;BR /&gt;&amp;nbsp; &amp;nbsp;quit&lt;BR /&gt;username admin privilege 15 secret 5 xxx&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;bridge irb&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;interface Dot11Radio0&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;&amp;nbsp;no ip route-cache&lt;BR /&gt;&amp;nbsp;!&lt;BR /&gt;&amp;nbsp;encryption vlan 11 mode ciphers aes-ccm&lt;BR /&gt;&amp;nbsp;!&lt;BR /&gt;&amp;nbsp;encryption vlan 13 mode ciphers aes-ccm&lt;BR /&gt;&amp;nbsp;!&lt;BR /&gt;&amp;nbsp;encryption vlan 15 mode ciphers aes-ccm&lt;BR /&gt;&amp;nbsp;!&lt;BR /&gt;&amp;nbsp;ssid guests&lt;BR /&gt;&amp;nbsp;!&lt;BR /&gt;&amp;nbsp;ssid isa&lt;BR /&gt;&amp;nbsp;!&lt;BR /&gt;&amp;nbsp;antenna gain 0&lt;BR /&gt;&amp;nbsp;stbc&lt;BR /&gt;&amp;nbsp;mbssid&lt;BR /&gt;&amp;nbsp;packet retries 128&lt;BR /&gt;&amp;nbsp;channel least-congested 2412 2417 2422&lt;BR /&gt;&amp;nbsp;station-role root&lt;BR /&gt;&amp;nbsp;rts retries 1&lt;BR /&gt;&amp;nbsp;beacon period 20&lt;BR /&gt;&amp;nbsp;beacon dtim-period 1&lt;BR /&gt;&amp;nbsp;l2-filter bridge-group-acl&lt;BR /&gt;!&lt;BR /&gt;interface Dot11Radio0.1&lt;BR /&gt;&amp;nbsp;encapsulation dot1Q 1 native&lt;BR /&gt;&amp;nbsp;no ip route-cache&lt;BR /&gt;&amp;nbsp;bridge-group 1&lt;BR /&gt;&amp;nbsp;bridge-group 1 subscriber-loop-control&lt;BR /&gt;&amp;nbsp;bridge-group 1 spanning-disabled&lt;BR /&gt;&amp;nbsp;bridge-group 1 block-unknown-source&lt;BR /&gt;&amp;nbsp;no bridge-group 1 source-learning&lt;BR /&gt;&amp;nbsp;no bridge-group 1 unicast-flooding&lt;BR /&gt;!&lt;BR /&gt;interface Dot11Radio0.11&lt;BR /&gt;&amp;nbsp;encapsulation dot1Q 11&lt;BR /&gt;&amp;nbsp;no ip route-cache&lt;BR /&gt;&amp;nbsp;bridge-group 11&lt;BR /&gt;&amp;nbsp;bridge-group 11 subscriber-loop-control&lt;BR /&gt;&amp;nbsp;bridge-group 11 spanning-disabled&lt;BR /&gt;&amp;nbsp;bridge-group 11 block-unknown-source&lt;BR /&gt;&amp;nbsp;no bridge-group 11 source-learning&lt;BR /&gt;&amp;nbsp;no bridge-group 11 unicast-flooding&lt;BR /&gt;!&lt;BR /&gt;interface Dot11Radio0.13&lt;BR /&gt;&amp;nbsp;encapsulation dot1Q 13&lt;BR /&gt;&amp;nbsp;no ip route-cache&lt;BR /&gt;&amp;nbsp;bridge-group 13&lt;BR /&gt;&amp;nbsp;bridge-group 13 subscriber-loop-control&lt;BR /&gt;&amp;nbsp;bridge-group 13 spanning-disabled&lt;BR /&gt;&amp;nbsp;bridge-group 13 block-unknown-source&lt;BR /&gt;&amp;nbsp;no bridge-group 13 source-learning&lt;BR /&gt;&amp;nbsp;no bridge-group 13 unicast-flooding&lt;BR /&gt;!&lt;BR /&gt;interface Dot11Radio0.15&lt;BR /&gt;&amp;nbsp;encapsulation dot1Q 15&lt;BR /&gt;&amp;nbsp;no ip route-cache&lt;BR /&gt;&amp;nbsp;bridge-group 15&lt;BR /&gt;&amp;nbsp;bridge-group 15 subscriber-loop-control&lt;BR /&gt;&amp;nbsp;bridge-group 15 spanning-disabled&lt;BR /&gt;&amp;nbsp;bridge-group 15 block-unknown-source&lt;BR /&gt;&amp;nbsp;no bridge-group 15 source-learning&lt;BR /&gt;&amp;nbsp;no bridge-group 15 unicast-flooding&lt;BR /&gt;!&lt;BR /&gt;interface Dot11Radio1&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;&amp;nbsp;no ip route-cache&lt;BR /&gt;&amp;nbsp;!&lt;BR /&gt;&amp;nbsp;encryption vlan 11 mode ciphers aes-ccm&lt;BR /&gt;&amp;nbsp;!&lt;BR /&gt;&amp;nbsp;ssid isa&lt;BR /&gt;&amp;nbsp;!&lt;BR /&gt;&amp;nbsp;antenna gain 0&lt;BR /&gt;&amp;nbsp;no dfs band block&lt;BR /&gt;&amp;nbsp;stbc&lt;BR /&gt;&amp;nbsp;mbssid&lt;BR /&gt;&amp;nbsp;packet retries 128&lt;BR /&gt;&amp;nbsp;channel 5200&lt;BR /&gt;&amp;nbsp;station-role root&lt;BR /&gt;&amp;nbsp;rts retries 1&lt;BR /&gt;&amp;nbsp;beacon period 20&lt;BR /&gt;&amp;nbsp;beacon dtim-period 1&lt;BR /&gt;&amp;nbsp;l2-filter bridge-group-acl&lt;BR /&gt;&amp;nbsp;bridge-group 1&lt;BR /&gt;&amp;nbsp;bridge-group 1 subscriber-loop-control&lt;BR /&gt;&amp;nbsp;bridge-group 1 spanning-disabled&lt;BR /&gt;&amp;nbsp;bridge-group 1 block-unknown-source&lt;BR /&gt;&amp;nbsp;no bridge-group 1 source-learning&lt;BR /&gt;&amp;nbsp;no bridge-group 1 unicast-flooding&lt;BR /&gt;!&lt;BR /&gt;interface Dot11Radio1.11&lt;BR /&gt;&amp;nbsp;encapsulation dot1Q 11&lt;BR /&gt;&amp;nbsp;no ip route-cache&lt;BR /&gt;&amp;nbsp;bridge-group 11&lt;BR /&gt;&amp;nbsp;bridge-group 11 subscriber-loop-control&lt;BR /&gt;&amp;nbsp;bridge-group 11 spanning-disabled&lt;BR /&gt;&amp;nbsp;bridge-group 11 block-unknown-source&lt;BR /&gt;&amp;nbsp;no bridge-group 11 source-learning&lt;BR /&gt;&amp;nbsp;no bridge-group 11 unicast-flooding&lt;BR /&gt;!&lt;BR /&gt;interface Dot11Radio1.13&lt;BR /&gt;&amp;nbsp;encapsulation dot1Q 13&lt;BR /&gt;&amp;nbsp;no ip route-cache&lt;BR /&gt;&amp;nbsp;bridge-group 13&lt;BR /&gt;&amp;nbsp;bridge-group 13 subscriber-loop-control&lt;BR /&gt;&amp;nbsp;bridge-group 13 spanning-disabled&lt;BR /&gt;&amp;nbsp;bridge-group 13 block-unknown-source&lt;BR /&gt;&amp;nbsp;no bridge-group 13 source-learning&lt;BR /&gt;&amp;nbsp;no bridge-group 13 unicast-flooding&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;&amp;nbsp;no ip route-cache&lt;BR /&gt;&amp;nbsp;duplex auto&lt;BR /&gt;&amp;nbsp;speed auto&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0.1&lt;BR /&gt;&amp;nbsp;encapsulation dot1Q 1 native&lt;BR /&gt;&amp;nbsp;no ip route-cache&lt;BR /&gt;&amp;nbsp;bridge-group 1&lt;BR /&gt;&amp;nbsp;bridge-group 1 spanning-disabled&lt;BR /&gt;&amp;nbsp;no bridge-group 1 source-learning&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0.11&lt;BR /&gt;&amp;nbsp;encapsulation dot1Q 11&lt;BR /&gt;&amp;nbsp;no ip route-cache&lt;BR /&gt;&amp;nbsp;bridge-group 11&lt;BR /&gt;&amp;nbsp;bridge-group 11 spanning-disabled&lt;BR /&gt;&amp;nbsp;no bridge-group 11 source-learning&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0.13&lt;BR /&gt;&amp;nbsp;encapsulation dot1Q 13&lt;BR /&gt;&amp;nbsp;no ip route-cache&lt;BR /&gt;&amp;nbsp;bridge-group 13&lt;BR /&gt;&amp;nbsp;bridge-group 13 spanning-disabled&lt;BR /&gt;&amp;nbsp;no bridge-group 13 source-learning&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0.15&lt;BR /&gt;&amp;nbsp;encapsulation dot1Q 15&lt;BR /&gt;&amp;nbsp;no ip route-cache&lt;BR /&gt;&amp;nbsp;bridge-group 15&lt;BR /&gt;&amp;nbsp;bridge-group 15 spanning-disabled&lt;BR /&gt;&amp;nbsp;no bridge-group 15 source-learning&lt;BR /&gt;!&lt;BR /&gt;interface BVI1&lt;BR /&gt;&amp;nbsp;ip address 10.10.10.2 255.255.255.0&lt;BR /&gt;&amp;nbsp;no ip route-cache&lt;BR /&gt;!&lt;BR /&gt;ip default-gateway 10.10.10.1&lt;BR /&gt;ip http server&lt;BR /&gt;ip http secure-server&lt;BR /&gt;ip http timeout-policy idle 600 life 86400 requests 86400&lt;BR /&gt;ip http help-path &lt;A href="http://www.cisco.com/warp/public/779/smbiz/prodconfig/help/eag" target="_blank"&gt;&lt;U&gt;http://www.cisco.com/warp/public/779/smbiz/prodconfig/help/eag&lt;/U&gt;&lt;/A&gt;&lt;BR /&gt;logging history size 500&lt;BR /&gt;logging trap notifications&lt;BR /&gt;access-list 701 permit c8f7.3301.7f43&amp;nbsp;&amp;nbsp; 0000.0000.0000&lt;BR /&gt;access-list 701 deny&amp;nbsp;&amp;nbsp; 0000.0000.0000&amp;nbsp;&amp;nbsp; ffff.ffff.ffff&lt;BR /&gt;radius-server local&lt;BR /&gt;&amp;nbsp; nas 10.10.10.1 key 7&amp;nbsp;xxx&lt;BR /&gt;&amp;nbsp; nas 10.10.10.253 key 7&amp;nbsp;xxx&lt;BR /&gt;&amp;nbsp; nas 10.10.10.3 key 7 xxx&lt;BR /&gt;!&lt;BR /&gt;radius-server host 10.10.10.3 auth-port 1812 acct-port 1813 key 7 xxx&lt;BR /&gt;radius-server vsa send accounting&lt;BR /&gt;!&lt;BR /&gt;bridge 1 route ip&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;line con 0&lt;BR /&gt;&amp;nbsp;length 34&lt;BR /&gt;line vty 0 4&lt;BR /&gt;&amp;nbsp;session-timeout 35791&lt;BR /&gt;&amp;nbsp;exec-timeout 35791 0&lt;BR /&gt;&amp;nbsp;length 34&lt;BR /&gt;&amp;nbsp;transport input all&lt;BR /&gt;!&lt;BR /&gt;sntp server 10.10.10.1&lt;BR /&gt;end&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;---------------------------------&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;and below the config of the cisco Ap, which is a radius-server:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;------------------------&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;EM&gt;Building configuration...&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Current configuration : 7677 bytes&lt;BR /&gt;!&lt;BR /&gt;! Last configuration change at 11:49:09 +0100 Sun May 11 2014&lt;BR /&gt;version 15.2&lt;BR /&gt;no service pad&lt;BR /&gt;service timestamps debug datetime msec&lt;BR /&gt;service timestamps log datetime msec localtime show-timezone&lt;BR /&gt;service password-encryption&lt;BR /&gt;!&lt;BR /&gt;hostname APx&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;logging rate-limit console 9&lt;BR /&gt;enable secret 5 xxx&lt;BR /&gt;!&lt;BR /&gt;aaa new-model&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;aaa group server radius rad_eap&lt;BR /&gt;&amp;nbsp;server 10.10.10.3 auth-port 1812 acct-port 1813&lt;BR /&gt;!&lt;BR /&gt;aaa group server radius rad_mac&lt;BR /&gt;&amp;nbsp;server 10.10.10.3 auth-port 1812 acct-port 1813&lt;BR /&gt;!&lt;BR /&gt;aaa group server radius rad_acct&lt;BR /&gt;!&lt;BR /&gt;aaa group server tacacs+ tac_admin&lt;BR /&gt;!&lt;BR /&gt;aaa authentication login eap_methods group rad_eap&lt;BR /&gt;aaa authentication login mac_methods group rad_mac&lt;BR /&gt;aaa authorization exec default local&lt;BR /&gt;aaa accounting network acct_methods start-stop group rad_acct&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;aaa session-id common&lt;BR /&gt;clock timezone +0100 1 0&lt;BR /&gt;no ip routing&lt;BR /&gt;no ip cef&lt;BR /&gt;ip domain name ml-ab.pl&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;dot11 syslog&lt;BR /&gt;dot11 vlan-name HOME vlan 11&lt;BR /&gt;dot11 vlan-name service vlan 15&lt;BR /&gt;!&lt;BR /&gt;dot11 ssid isa&lt;BR /&gt;&amp;nbsp;&amp;nbsp; vlan 11&lt;BR /&gt;&amp;nbsp;&amp;nbsp; authentication open mac-address mac_methods eap eap_methods&lt;BR /&gt;&amp;nbsp;&amp;nbsp; authentication network-eap eap_methods mac-address mac_methods&lt;BR /&gt;&amp;nbsp;&amp;nbsp; authentication key-management wpa version 2&lt;BR /&gt;&amp;nbsp;&amp;nbsp; mbssid guest-mode&lt;BR /&gt;!&lt;BR /&gt;dot11 ssid service&lt;BR /&gt;&amp;nbsp;&amp;nbsp; vlan 15&lt;BR /&gt;&amp;nbsp;&amp;nbsp; authentication open eap eap_methods&lt;BR /&gt;&amp;nbsp;&amp;nbsp; authentication network-eap eap_methods&lt;BR /&gt;&amp;nbsp;&amp;nbsp; authentication key-management wpa version 2&lt;BR /&gt;&amp;nbsp;&amp;nbsp; mbssid guest-mode&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;dot11 network-map&lt;BR /&gt;dot11 arp-cache&lt;BR /&gt;eap profile leap&lt;BR /&gt;!&lt;BR /&gt;eap profile tls&lt;BR /&gt;!&lt;BR /&gt;eap profile fast&lt;BR /&gt;!&lt;BR /&gt;crypto pki token default removal timeout 0&lt;BR /&gt;!&lt;BR /&gt;crypto pki trustpoint TP-self-signed-4134675474&lt;BR /&gt;&amp;nbsp;enrollment selfsigned&lt;BR /&gt;&amp;nbsp;subject-name cn=IOS-Self-Signed-Certificate-4134675474&lt;BR /&gt;&amp;nbsp;revocation-check none&lt;BR /&gt;&amp;nbsp;rsakeypair TP-self-signed-4134675474&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;crypto pki certificate chain TP-self-signed-4134675474&lt;BR /&gt;&amp;nbsp;certificate self-signed 01&lt;BR /&gt;&amp;nbsp; 3082022B 30820194 A0030201 02020101 300D0609 2A864886 F70D0101 05050030&lt;BR /&gt;&amp;nbsp; 31312F30 2D060355 04031326 494F532D 53656C66 2D536967 6E65642D 43657274&lt;BR /&gt;&amp;nbsp; 69666963 6174652D 34313334 36373534 3734301E 170D3933 30333031 30303236&lt;BR /&gt;&amp;nbsp; 31335A17 0D323030 31303130 30303030 305A3031 312F302D 06035504 03132649&lt;BR /&gt;&amp;nbsp; 4F532D53 656C662D 5369676E 65642D43 65727469 66696361 74652D34 31333436&lt;BR /&gt;&amp;nbsp; 37353437 3430819F 300D0609 2A864886 F70D0101 01050003 818D0030 81890281&lt;BR /&gt;&amp;nbsp; 8100B2D8 A7342171 9FC96AEE 51CD6F6F D8E84484 EB582B9F B4F650FD 023ADF2E&lt;BR /&gt;&amp;nbsp; 415EE3DF 2F267472 D11459D9 4373B2AC B46CFB6E FC095340 2262B97F E0CC377C&lt;BR /&gt;&amp;nbsp; B31151A9 D5E97960 21BE9E67 CF9CF4FA F5190FA1 D118E812 BD7750EE BC59D5DB&lt;BR /&gt;&amp;nbsp; EA96FC3B 5C17D2C1 AE9F24B2 2DEE330F 8F5322ED B4E3836F D4AC80E0 9FB34080&lt;BR /&gt;&amp;nbsp; 19D50203 010001A3 53305130 0F060355 1D130101 FF040530 030101FF 301F0603&lt;BR /&gt;&amp;nbsp; 551D2304 18301680 140659F1 243DBE3B B47C785A 2739F683 483820C7 52301D06&lt;BR /&gt;&amp;nbsp; 03551D0E 04160414 0659F124 3DBE3BB4 7C785A27 39F68348 3820C752 300D0609&lt;BR /&gt;&amp;nbsp; 2A864886 F70D0101 05050003 8181004B 64716D8B 85FACCA2 79D9322C 239A792A&lt;BR /&gt;&amp;nbsp; E0B88C94 8C6A75F6 BB04298F E65494BA 389A0F91 17A4F8B9 41C14D8C 3CEBD373&lt;BR /&gt;&amp;nbsp; DAEF6275 ACE89E6F 2D5B8DE1 41C64497 9744D53D B7A6171A 893BF5C9 E0C0EBB0&lt;BR /&gt;&amp;nbsp; 4E067B0A 5354B063 9390FB16 C7E3F09C ECD25412 CADB4B02 4426B879 FE504D42&lt;BR /&gt;&amp;nbsp; 56B37D9D A75ED6C8 1D8AE81F B8E1F4&lt;BR /&gt;&amp;nbsp; &amp;nbsp;quit&lt;BR /&gt;username admin privilege 15 secret 5 $xxx.&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;bridge irb&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;interface Dot11Radio0&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;&amp;nbsp;no ip route-cache&lt;BR /&gt;&amp;nbsp;!&lt;BR /&gt;&amp;nbsp;encryption vlan 11 mode ciphers aes-ccm&lt;BR /&gt;&amp;nbsp;!&lt;BR /&gt;&amp;nbsp;encryption vlan 15 mode ciphers aes-ccm&lt;BR /&gt;&amp;nbsp;!&lt;BR /&gt;&amp;nbsp;ssid isa&lt;BR /&gt;&amp;nbsp;!&lt;BR /&gt;&amp;nbsp;ssid service&lt;BR /&gt;&amp;nbsp;!&lt;BR /&gt;&amp;nbsp;antenna gain 0&lt;BR /&gt;&amp;nbsp;stbc&lt;BR /&gt;&amp;nbsp;mbssid&lt;BR /&gt;&amp;nbsp;channel least-congested 2462 2467 2472&lt;BR /&gt;&amp;nbsp;station-role root&lt;BR /&gt;&amp;nbsp;bridge-group 1&lt;BR /&gt;&amp;nbsp;bridge-group 1 subscriber-loop-control&lt;BR /&gt;&amp;nbsp;bridge-group 1 spanning-disabled&lt;BR /&gt;&amp;nbsp;bridge-group 1 block-unknown-source&lt;BR /&gt;&amp;nbsp;no bridge-group 1 source-learning&lt;BR /&gt;&amp;nbsp;no bridge-group 1 unicast-flooding&lt;BR /&gt;!&lt;BR /&gt;interface Dot11Radio0.11&lt;BR /&gt;&amp;nbsp;encapsulation dot1Q 11&lt;BR /&gt;&amp;nbsp;no ip route-cache&lt;BR /&gt;&amp;nbsp;bridge-group 11&lt;BR /&gt;&amp;nbsp;bridge-group 11 subscriber-loop-control&lt;BR /&gt;&amp;nbsp;bridge-group 11 spanning-disabled&lt;BR /&gt;&amp;nbsp;bridge-group 11 block-unknown-source&lt;BR /&gt;&amp;nbsp;no bridge-group 11 source-learning&lt;BR /&gt;&amp;nbsp;no bridge-group 11 unicast-flooding&lt;BR /&gt;!&lt;BR /&gt;interface Dot11Radio0.15&lt;BR /&gt;&amp;nbsp;encapsulation dot1Q 15&lt;BR /&gt;&amp;nbsp;no ip route-cache&lt;BR /&gt;&amp;nbsp;bridge-group 15&lt;BR /&gt;&amp;nbsp;bridge-group 15 subscriber-loop-control&lt;BR /&gt;&amp;nbsp;bridge-group 15 spanning-disabled&lt;BR /&gt;&amp;nbsp;bridge-group 15 block-unknown-source&lt;BR /&gt;&amp;nbsp;no bridge-group 15 source-learning&lt;BR /&gt;&amp;nbsp;no bridge-group 15 unicast-flooding&lt;BR /&gt;!&lt;BR /&gt;interface Dot11Radio1&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;&amp;nbsp;no ip route-cache&lt;BR /&gt;&amp;nbsp;!&lt;BR /&gt;&amp;nbsp;encryption vlan 11 mode ciphers aes-ccm&lt;BR /&gt;&amp;nbsp;!&lt;BR /&gt;&amp;nbsp;ssid isa&lt;BR /&gt;&amp;nbsp;!&lt;BR /&gt;&amp;nbsp;antenna gain 0&lt;BR /&gt;&amp;nbsp;no dfs band block&lt;BR /&gt;&amp;nbsp;stbc&lt;BR /&gt;&amp;nbsp;mbssid&lt;BR /&gt;&amp;nbsp;channel dfs&lt;BR /&gt;&amp;nbsp;station-role root&lt;BR /&gt;&amp;nbsp;bridge-group 1&lt;BR /&gt;&amp;nbsp;bridge-group 1 subscriber-loop-control&lt;BR /&gt;&amp;nbsp;bridge-group 1 spanning-disabled&lt;BR /&gt;&amp;nbsp;bridge-group 1 block-unknown-source&lt;BR /&gt;&amp;nbsp;no bridge-group 1 source-learning&lt;BR /&gt;&amp;nbsp;no bridge-group 1 unicast-flooding&lt;BR /&gt;!&lt;BR /&gt;interface Dot11Radio1.11&lt;BR /&gt;&amp;nbsp;encapsulation dot1Q 11&lt;BR /&gt;&amp;nbsp;no ip route-cache&lt;BR /&gt;&amp;nbsp;bridge-group 11&lt;BR /&gt;&amp;nbsp;bridge-group 11 subscriber-loop-control&lt;BR /&gt;&amp;nbsp;bridge-group 11 spanning-disabled&lt;BR /&gt;&amp;nbsp;bridge-group 11 block-unknown-source&lt;BR /&gt;&amp;nbsp;no bridge-group 11 source-learning&lt;BR /&gt;&amp;nbsp;no bridge-group 11 unicast-flooding&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;&amp;nbsp;no ip route-cache&lt;BR /&gt;&amp;nbsp;duplex auto&lt;BR /&gt;&amp;nbsp;speed auto&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0.1&lt;BR /&gt;&amp;nbsp;encapsulation dot1Q 1 native&lt;BR /&gt;&amp;nbsp;no ip route-cache&lt;BR /&gt;&amp;nbsp;bridge-group 1&lt;BR /&gt;&amp;nbsp;bridge-group 1 spanning-disabled&lt;BR /&gt;&amp;nbsp;no bridge-group 1 source-learning&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0.11&lt;BR /&gt;&amp;nbsp;encapsulation dot1Q 11&lt;BR /&gt;&amp;nbsp;no ip route-cache&lt;BR /&gt;&amp;nbsp;bridge-group 11&lt;BR /&gt;&amp;nbsp;bridge-group 11 spanning-disabled&lt;BR /&gt;&amp;nbsp;no bridge-group 11 source-learning&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0.15&lt;BR /&gt;&amp;nbsp;encapsulation dot1Q 15&lt;BR /&gt;&amp;nbsp;no ip route-cache&lt;BR /&gt;&amp;nbsp;bridge-group 15&lt;BR /&gt;&amp;nbsp;bridge-group 15 spanning-disabled&lt;BR /&gt;&amp;nbsp;no bridge-group 15 source-learning&lt;BR /&gt;!&lt;BR /&gt;interface BVI1&lt;BR /&gt;&amp;nbsp;ip address 10.10.10.3 255.255.255.0&lt;BR /&gt;&amp;nbsp;no ip route-cache&lt;BR /&gt;!&lt;BR /&gt;ip default-gateway 10.10.10.1&lt;BR /&gt;ip forward-protocol nd&lt;BR /&gt;ip http server&lt;BR /&gt;ip http secure-server&lt;BR /&gt;ip http help-path &lt;A href="http://www.cisco.com/warp/public/779/smbiz/prodconfig/help/eag" target="_blank"&gt;&lt;U&gt;http://www.cisco.com/warp/public/779/smbiz/prodconfig/help/eag&lt;/U&gt;&lt;/A&gt;&lt;BR /&gt;ip radius source-interface BVI1&lt;BR /&gt;!&lt;BR /&gt;radius-server local&lt;BR /&gt;&amp;nbsp; nas 10.10.10.3 key 7 xxx&lt;BR /&gt;&amp;nbsp; nas 10.10.10.1 key 7 xxx&lt;BR /&gt;&amp;nbsp; nas 10.10.10.2 key 7 xxx&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&amp;nbsp; user test nthash 7 xxx&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;!&lt;BR /&gt;radius-server attribute 32 include-in-access-req format %h&lt;BR /&gt;radius-server host 10.10.10.3 auth-port 1812 acct-port 1813 key 7 xxx&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;radius-server vsa send accounting&lt;BR /&gt;!&lt;BR /&gt;bridge 1 route ip&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;line con 0&lt;BR /&gt;line vty 0 4&lt;BR /&gt;&amp;nbsp;session-timeout 35791&lt;BR /&gt;&amp;nbsp;exec-timeout 35791 0&lt;BR /&gt;&amp;nbsp;transport input all&lt;BR /&gt;!&lt;BR /&gt;sntp server 10.10.10.1&lt;BR /&gt;sntp broadcast client&lt;BR /&gt;end&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 04:42:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/radius-server-accepts-users-only-if-username-equals-password/m-p/2469491#M90637</guid>
      <dc:creator>andbor600</dc:creator>
      <dc:date>2019-03-11T04:42:29Z</dc:date>
    </item>
    <item>
      <title>Hey,What Radius server are</title>
      <link>https://community.cisco.com/t5/network-access-control/radius-server-accepts-users-only-if-username-equals-password/m-p/2469492#M90638</link>
      <description>&lt;P&gt;Hey,&lt;/P&gt;&lt;P&gt;What Radius server are you using?&lt;/P&gt;&lt;P&gt;Rate if Useful &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Sharing knowledge makes you Immortal.&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Ed&lt;/P&gt;</description>
      <pubDate>Tue, 20 May 2014 06:58:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/radius-server-accepts-users-only-if-username-equals-password/m-p/2469492#M90638</guid>
      <dc:creator>edwardcollins7</dc:creator>
      <dc:date>2014-05-20T06:58:18Z</dc:date>
    </item>
    <item>
      <title>radius server located within</title>
      <link>https://community.cisco.com/t5/network-access-control/radius-server-accepts-users-only-if-username-equals-password/m-p/2469493#M90639</link>
      <description>&lt;P&gt;radius server located within my access-point.&lt;/P&gt;</description>
      <pubDate>Thu, 22 May 2014 20:11:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/radius-server-accepts-users-only-if-username-equals-password/m-p/2469493#M90639</guid>
      <dc:creator>andbor600</dc:creator>
      <dc:date>2014-05-22T20:11:14Z</dc:date>
    </item>
    <item>
      <title>The Cisco AP cannot be a</title>
      <link>https://community.cisco.com/t5/network-access-control/radius-server-accepts-users-only-if-username-equals-password/m-p/2469494#M90640</link>
      <description>&lt;P&gt;The Cisco AP cannot be a Radius server, it can send radius requests as a client to an external server.&lt;/P&gt;&lt;P&gt;Which SSID are you using ?&lt;/P&gt;&lt;P&gt;Could you share the configuration within "rad_eap test" radius group?&lt;/P&gt;&lt;P&gt;Rate if Useful &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Sharing knowledge makes you Immortal.&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Ed&lt;/P&gt;</description>
      <pubDate>Fri, 23 May 2014 06:02:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/radius-server-accepts-users-only-if-username-equals-password/m-p/2469494#M90640</guid>
      <dc:creator>edwardcollins7</dc:creator>
      <dc:date>2014-05-23T06:02:46Z</dc:date>
    </item>
    <item>
      <title>ok. I did not know that.SSID</title>
      <link>https://community.cisco.com/t5/network-access-control/radius-server-accepts-users-only-if-username-equals-password/m-p/2469495#M90641</link>
      <description>&lt;P&gt;ok. I did not know that.&lt;/P&gt;&lt;P&gt;SSID "isa" is used for Radius authentication.&lt;/P&gt;&lt;P&gt;"rad_eap" radius group is shown above (AP config)&lt;/P&gt;</description>
      <pubDate>Tue, 27 May 2014 17:57:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/radius-server-accepts-users-only-if-username-equals-password/m-p/2469495#M90641</guid>
      <dc:creator>andbor600</dc:creator>
      <dc:date>2014-05-27T17:57:47Z</dc:date>
    </item>
    <item>
      <title>After correlating your</title>
      <link>https://community.cisco.com/t5/network-access-control/radius-server-accepts-users-only-if-username-equals-password/m-p/2469496#M90642</link>
      <description>&lt;P&gt;After correlating your configuration, this is what is relevant:&lt;/P&gt;&lt;P&gt;aaa group server radius rad_eap&lt;BR /&gt;&amp;nbsp;server 10.10.10.3 auth-port 1812 acct-port 1813&lt;/P&gt;&lt;P&gt;dot11 ssid isa&lt;BR /&gt;&amp;nbsp;&amp;nbsp; vlan 11&lt;BR /&gt;&amp;nbsp;&amp;nbsp; authentication open mac-address mac_methods eap eap_methods&lt;BR /&gt;&amp;nbsp;&amp;nbsp; authentication network-eap eap_methods mac-address mac_methods&lt;BR /&gt;&amp;nbsp;&amp;nbsp; authentication key-management wpa version 2&lt;BR /&gt;&amp;nbsp;&amp;nbsp; mbssid guest-mode&lt;/P&gt;&lt;P&gt;aaa authentication login eap_methods group rad_eap&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Now, the question is , which device is "10.10.10.3" ?&lt;/P&gt;&lt;P&gt;Rate if Useful &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Sharing knowledge makes you Immortal.&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Ed&lt;/P&gt;</description>
      <pubDate>Wed, 28 May 2014 07:04:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/radius-server-accepts-users-only-if-username-equals-password/m-p/2469496#M90642</guid>
      <dc:creator>edwardcollins7</dc:creator>
      <dc:date>2014-05-28T07:04:09Z</dc:date>
    </item>
    <item>
      <title>ok. now I am with you. right.</title>
      <link>https://community.cisco.com/t5/network-access-control/radius-server-accepts-users-only-if-username-equals-password/m-p/2469497#M90643</link>
      <description>&lt;P&gt;ok. now I am with you. right. this is the same device. "10.10.10.3" is an AP.&lt;/P&gt;</description>
      <pubDate>Thu, 29 May 2014 17:37:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/radius-server-accepts-users-only-if-username-equals-password/m-p/2469497#M90643</guid>
      <dc:creator>andbor600</dc:creator>
      <dc:date>2014-05-29T17:37:46Z</dc:date>
    </item>
    <item>
      <title>Now its starting to make</title>
      <link>https://community.cisco.com/t5/network-access-control/radius-server-accepts-users-only-if-username-equals-password/m-p/2469498#M90644</link>
      <description>&lt;P&gt;Now its starting to make sense.&lt;/P&gt;&lt;P&gt;Let us try to work this out together, could you tell me AP model?&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: rgb(119, 119, 119); font-size: 14px;"&gt;"10.10.10.3"&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Ed&lt;/P&gt;</description>
      <pubDate>Fri, 30 May 2014 07:04:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/radius-server-accepts-users-only-if-username-equals-password/m-p/2469498#M90644</guid>
      <dc:creator>edwardcollins7</dc:creator>
      <dc:date>2014-05-30T07:04:25Z</dc:date>
    </item>
    <item>
      <title>AP2602i SAP (stand alone)</title>
      <link>https://community.cisco.com/t5/network-access-control/radius-server-accepts-users-only-if-username-equals-password/m-p/2469499#M90645</link>
      <description>&lt;P&gt;AP2602i SAP (stand alone)&lt;/P&gt;</description>
      <pubDate>Fri, 30 May 2014 08:23:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/radius-server-accepts-users-only-if-username-equals-password/m-p/2469499#M90645</guid>
      <dc:creator>andbor600</dc:creator>
      <dc:date>2014-05-30T08:23:32Z</dc:date>
    </item>
    <item>
      <title>Could you collect "debug</title>
      <link>https://community.cisco.com/t5/network-access-control/radius-server-accepts-users-only-if-username-equals-password/m-p/2469500#M90646</link>
      <description>&lt;P&gt;Could you collect "&lt;B style="color: rgb(0, 0, 0); font-family: arial, helvetica, sans-serif; font-size: 12px; line-height: normal;"&gt;debug radius authentication" and "&amp;nbsp;debug radius local-server client" from the Radius server AP?&lt;/B&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#000000" face="arial, helvetica, sans-serif"&gt;&lt;SPAN style="font-size: 12px; line-height: normal;"&gt;&lt;B&gt;Regards&lt;/B&gt;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#000000" face="arial, helvetica, sans-serif"&gt;&lt;SPAN style="font-size: 12px; line-height: normal;"&gt;&lt;B&gt;Ed&lt;/B&gt;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 30 May 2014 14:34:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/radius-server-accepts-users-only-if-username-equals-password/m-p/2469500#M90646</guid>
      <dc:creator>edwardcollins7</dc:creator>
      <dc:date>2014-05-30T14:34:27Z</dc:date>
    </item>
    <item>
      <title>hmmm, I did not get much in</title>
      <link>https://community.cisco.com/t5/network-access-control/radius-server-accepts-users-only-if-username-equals-password/m-p/2469501#M90647</link>
      <description>&lt;P&gt;hmmm, I did not get much in return ...&lt;/P&gt;&lt;P&gt;this is what was output:&lt;/P&gt;&lt;P&gt;----------------&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Jun&amp;nbsp; 1 06:03:45.791: RADSRV: Client test password failed&lt;BR /&gt;Jun&amp;nbsp; 1 06:03:45.791: RADSRV 10.10.10.2&amp;lt; Code 3 Id 4A Len 88&lt;BR /&gt;Jun&amp;nbsp; 1 06:03:45.791:&amp;nbsp;&amp;nbsp; Auth 22F10EFB 11CDBBDF F415809E B12642DE&lt;BR /&gt;Jun&amp;nbsp; 1 06:03:45.791:&amp;nbsp;&amp;nbsp; 24 - 05 15 63 D0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D9 57 22 E2 0B 63 ED E9 28 E3 A3 89 14 DE 89 86&lt;BR /&gt;Jun&amp;nbsp; 1 06:03:45.791:&amp;nbsp;&amp;nbsp; 80 - FF 4A 85 AD 92 B6 1A 22 C3 02 79 8A DC 06 57 E8&lt;/EM&gt;&lt;BR /&gt;-----------------&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 01 Jun 2014 05:08:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/radius-server-accepts-users-only-if-username-equals-password/m-p/2469501#M90647</guid>
      <dc:creator>andbor600</dc:creator>
      <dc:date>2014-06-01T05:08:01Z</dc:date>
    </item>
    <item>
      <title>Was this on the server side</title>
      <link>https://community.cisco.com/t5/network-access-control/radius-server-accepts-users-only-if-username-equals-password/m-p/2469502#M90648</link>
      <description>&lt;P&gt;Was this on the server side or client side AP?&lt;/P&gt;&lt;P&gt;http://www.cisco.com/c/en/us/support/docs/wireless/aironet-1100-series/44100-leaplocalauth.html#configproc&lt;/P&gt;&lt;P&gt;I am referring this.&lt;/P&gt;&lt;P&gt;Rate if Useful &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Sharing knowledge makes you Immortal.&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Ed&lt;/P&gt;</description>
      <pubDate>Mon, 02 Jun 2014 07:15:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/radius-server-accepts-users-only-if-username-equals-password/m-p/2469502#M90648</guid>
      <dc:creator>edwardcollins7</dc:creator>
      <dc:date>2014-06-02T07:15:54Z</dc:date>
    </item>
    <item>
      <title>this is of course on server</title>
      <link>https://community.cisco.com/t5/network-access-control/radius-server-accepts-users-only-if-username-equals-password/m-p/2469503#M90649</link>
      <description>&lt;P&gt;this is of course on server side.&lt;/P&gt;</description>
      <pubDate>Mon, 02 Jun 2014 16:34:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/radius-server-accepts-users-only-if-username-equals-password/m-p/2469503#M90649</guid>
      <dc:creator>andbor600</dc:creator>
      <dc:date>2014-06-02T16:34:57Z</dc:date>
    </item>
    <item>
      <title>I have the same problem. I</title>
      <link>https://community.cisco.com/t5/network-access-control/radius-server-accepts-users-only-if-username-equals-password/m-p/2469504#M90650</link>
      <description>&lt;P&gt;I have the same problem.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I read and followed the following link in order to configure an AP as a local Radius server.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;http://www.cisco.com/c/en/us/td/docs/wireless/access_point/12-2_15_JA/configuration/guide/i12215sc/s15local.html&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;It should be possible.&lt;/P&gt;</description>
      <pubDate>Mon, 16 Feb 2015 19:40:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/radius-server-accepts-users-only-if-username-equals-password/m-p/2469504#M90650</guid>
      <dc:creator>Ramon Jimenez</dc:creator>
      <dc:date>2015-02-16T19:40:14Z</dc:date>
    </item>
  </channel>
</rss>

