<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ASA 5525 - Radius server REJECT in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-5525-radius-server-reject/m-p/4074098#M1069515</link>
    <description>&lt;P&gt;Hey everyone,&lt;/P&gt;&lt;P&gt;I am in the middle of an issue from a simple scenario.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;FW1 -----FW2-----Radius server&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I set up FW1 to authenticate to the radius server, (FW2 is allowing traffic to/from radius server)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;aaa-server radserver protocol radius&lt;BR /&gt;aaa-server radserver (management) host 192.168.1.1&lt;BR /&gt;key secretkey&lt;BR /&gt;authentication port 1645&lt;BR /&gt;aaa authentication ssh console radserver LOCAL&lt;BR /&gt;aaa authentication enable console radserver LOCAL&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;FW1 is added to the server with the correct IP radius traffic is flowing between them without a problem&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;However I get message REJECT&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Its a pretty simple scenario and its not working.&lt;/P&gt;&lt;P&gt;FW1 is connected to FW2 through a mgmt sw in the management interface, there is connectivity, radius traffic is flowing.&lt;/P&gt;&lt;P&gt;Server side looks fine, I dont have access to the server, but verified some points with the server admin, and I cant figure out where the issue is&lt;/P&gt;&lt;P&gt;Any suggestions???????&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;DEBUG OUTPUT:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;INFO: Attempting Authentication test to IP address (192.168.1.1) (timeout: 10 seconds)&lt;/P&gt;&lt;P&gt;radius mkreq: 0x80000004&lt;/P&gt;&lt;P&gt;alloc_rip 0x00002aaac9b1b6c0&lt;/P&gt;&lt;P&gt;new request 0x80000004 --&amp;gt; 217 (0x00002aaac9b1b6c0)&lt;/P&gt;&lt;P&gt;got user 'myuser'&lt;/P&gt;&lt;P&gt;add_req 0x00002aaac9b1b6c0 session 0x80000004 id 217&lt;/P&gt;&lt;P&gt;RADIUS_REQUEST&lt;/P&gt;&lt;P&gt;radius.c: rad_mkpkt&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;RADIUS packet decode (authentication request)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;--------------------------------------&lt;/P&gt;&lt;P&gt;Raw packet data (length = 88).....&lt;/P&gt;&lt;P&gt;01 d9 00 58 f2 19 c7 73 93 19 2f b6 17 00 03 e1 | ...X...s../.....&lt;/P&gt;&lt;P&gt;39 8f bd 6e 01 0b 6a 67 6f 6e 7a 61 6c 65 7a 02 | 9..n..testuser.&lt;/P&gt;&lt;P&gt;12 e6 a1 f5 1f af c3 0b 73 a1 66 df 3f 4a 50 8c | ........s.f.?JP.&lt;/P&gt;&lt;P&gt;0c 04 06 0a 7d fe 22 05 06 00 00 02 b9 3d 06 00 | ....}."......=..&lt;/P&gt;&lt;P&gt;00 00 05 1a 15 00 00 00 09 01 0f 63 6f 61 2d 70 | ...........coa-p&lt;/P&gt;&lt;P&gt;75 73 68 3d 74 72 75 65 | ush=true&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Parsed packet data.....&lt;/P&gt;&lt;P&gt;Radius: Code = 1 (0x01)&lt;/P&gt;&lt;P&gt;Radius: Identifier = 217 (0xD9)&lt;/P&gt;&lt;P&gt;Radius: Length = 88 (0x0058)&lt;/P&gt;&lt;P&gt;Radius: Vector: F219C77393192FB6170003E1398FBD6E&lt;/P&gt;&lt;P&gt;Radius: Type = 1 (0x01) User-Name&lt;/P&gt;&lt;P&gt;Radius: Length = 11 (0x0B)&lt;/P&gt;&lt;P&gt;Radius: Value (String) =&lt;/P&gt;&lt;P&gt;6a 67 6f 6e 7a 61 6c 65 7a | myuser&lt;/P&gt;&lt;P&gt;Radius: Type = 2 (0x02) User-Password&lt;/P&gt;&lt;P&gt;Radius: Length = 18 (0x12)&lt;/P&gt;&lt;P&gt;Radius: Value (String) =&lt;/P&gt;&lt;P&gt;e6 a1 f5 1f af c3 0b 73 a1 66 df 3f 4a 50 8c 0c | .......s.f.?JP..&lt;/P&gt;&lt;P&gt;Radius: Type = 4 (0x04) NAS-IP-Address&lt;/P&gt;&lt;P&gt;Radius: Length = 6 (0x06)&lt;/P&gt;&lt;P&gt;Radius: Value (IP Address) = 192.168.2.30&lt;/P&gt;&lt;P&gt;Radius: Type = 5 (0x05) NAS-Port&lt;/P&gt;&lt;P&gt;Radius: Length = 6 (0x06)&lt;/P&gt;&lt;P&gt;Radius: Value (Hex) = 0x2B9&lt;/P&gt;&lt;P&gt;Radius: Type = 61 (0x3D) NAS-Port-Type&lt;/P&gt;&lt;P&gt;Radius: Length = 6 (0x06)&lt;/P&gt;&lt;P&gt;Radius: Value (Hex) = 0x5&lt;/P&gt;&lt;P&gt;Radius: Type = 26 (0x1A) Vendor-Specific&lt;/P&gt;&lt;P&gt;Radius: Length = 21 (0x15)&lt;/P&gt;&lt;P&gt;Radius: Vendor ID = 9 (0x00000009)&lt;/P&gt;&lt;P&gt;Radius: Type = 1 (0x01) Cisco-AV-pair&lt;/P&gt;&lt;P&gt;Radius: Length = 15 (0x0F)&lt;/P&gt;&lt;P&gt;Radius: Value (String) =&lt;/P&gt;&lt;P&gt;63 6f 61 2d 70 75 73 68 3d 74 72 75 65 | coa-push=true&lt;/P&gt;&lt;P&gt;send pkt 192.168.1.1/1645&lt;/P&gt;&lt;P&gt;rip 0x00002aaac9b1b6c0 state 7 id 217&lt;/P&gt;&lt;P&gt;rad_vrfy() : response message verified&lt;/P&gt;&lt;P&gt;rip 0x00002aaac9b1b6c0&lt;/P&gt;&lt;P&gt;: chall_state ''&lt;/P&gt;&lt;P&gt;: state 0x7&lt;/P&gt;&lt;P&gt;: reqauth:&lt;/P&gt;&lt;P&gt;f2 19 c7 73 93 19 2f b6 17 00 03 e1 39 8f bd 6e&lt;/P&gt;&lt;P&gt;: info 0x00002aaac9b1b800&lt;/P&gt;&lt;P&gt;session_id 0x80000004&lt;/P&gt;&lt;P&gt;request_id 0xd9&lt;/P&gt;&lt;P&gt;user 'myuser'&lt;/P&gt;&lt;P&gt;response '***'&lt;/P&gt;&lt;P&gt;app 0&lt;/P&gt;&lt;P&gt;reason 0&lt;/P&gt;&lt;P&gt;skey 'secretkey'&lt;/P&gt;&lt;P&gt;sip 192.168.1.1&lt;/P&gt;&lt;P&gt;type 1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;RADIUS packet decode (response)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;--------------------------------------&lt;/P&gt;&lt;P&gt;Raw packet data (length = 20).....&lt;/P&gt;&lt;P&gt;03 d9 00 14 14 06 dc ee e7 0a 65 e2 1f fb b1 4b | ..........e....K&lt;/P&gt;&lt;P&gt;78 ce b9 23 | x..#&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Parsed packet data.....&lt;/P&gt;&lt;P&gt;Radius: Code = 3 (0x03)&lt;/P&gt;&lt;P&gt;Radius: Identifier = 217 (0xD9)&lt;/P&gt;&lt;P&gt;Radius: Length = 20 (0x0014)&lt;/P&gt;&lt;P&gt;Radius: Vector: 1406DCEEE70A65E21FFBB14B78CEB923&lt;/P&gt;&lt;P&gt;rad_procpkt: REJECT&lt;/P&gt;&lt;P&gt;RADIUS_DELETE&lt;/P&gt;&lt;P&gt;remove_req 0x00002aaac9b1b6c0 session 0x80000004 id 217&lt;/P&gt;&lt;P&gt;free_rip 0x00002aaac9b1b6c0&lt;/P&gt;&lt;P&gt;radius: send queue empty&lt;/P&gt;&lt;P&gt;ERROR: Authentication Rejected: AAA failure&lt;/P&gt;</description>
    <pubDate>Sat, 25 Apr 2020 21:06:06 GMT</pubDate>
    <dc:creator>1uplink</dc:creator>
    <dc:date>2020-04-25T21:06:06Z</dc:date>
    <item>
      <title>ASA 5525 - Radius server REJECT</title>
      <link>https://community.cisco.com/t5/network-security/asa-5525-radius-server-reject/m-p/4074098#M1069515</link>
      <description>&lt;P&gt;Hey everyone,&lt;/P&gt;&lt;P&gt;I am in the middle of an issue from a simple scenario.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;FW1 -----FW2-----Radius server&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I set up FW1 to authenticate to the radius server, (FW2 is allowing traffic to/from radius server)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;aaa-server radserver protocol radius&lt;BR /&gt;aaa-server radserver (management) host 192.168.1.1&lt;BR /&gt;key secretkey&lt;BR /&gt;authentication port 1645&lt;BR /&gt;aaa authentication ssh console radserver LOCAL&lt;BR /&gt;aaa authentication enable console radserver LOCAL&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;FW1 is added to the server with the correct IP radius traffic is flowing between them without a problem&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;However I get message REJECT&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Its a pretty simple scenario and its not working.&lt;/P&gt;&lt;P&gt;FW1 is connected to FW2 through a mgmt sw in the management interface, there is connectivity, radius traffic is flowing.&lt;/P&gt;&lt;P&gt;Server side looks fine, I dont have access to the server, but verified some points with the server admin, and I cant figure out where the issue is&lt;/P&gt;&lt;P&gt;Any suggestions???????&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;DEBUG OUTPUT:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;INFO: Attempting Authentication test to IP address (192.168.1.1) (timeout: 10 seconds)&lt;/P&gt;&lt;P&gt;radius mkreq: 0x80000004&lt;/P&gt;&lt;P&gt;alloc_rip 0x00002aaac9b1b6c0&lt;/P&gt;&lt;P&gt;new request 0x80000004 --&amp;gt; 217 (0x00002aaac9b1b6c0)&lt;/P&gt;&lt;P&gt;got user 'myuser'&lt;/P&gt;&lt;P&gt;add_req 0x00002aaac9b1b6c0 session 0x80000004 id 217&lt;/P&gt;&lt;P&gt;RADIUS_REQUEST&lt;/P&gt;&lt;P&gt;radius.c: rad_mkpkt&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;RADIUS packet decode (authentication request)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;--------------------------------------&lt;/P&gt;&lt;P&gt;Raw packet data (length = 88).....&lt;/P&gt;&lt;P&gt;01 d9 00 58 f2 19 c7 73 93 19 2f b6 17 00 03 e1 | ...X...s../.....&lt;/P&gt;&lt;P&gt;39 8f bd 6e 01 0b 6a 67 6f 6e 7a 61 6c 65 7a 02 | 9..n..testuser.&lt;/P&gt;&lt;P&gt;12 e6 a1 f5 1f af c3 0b 73 a1 66 df 3f 4a 50 8c | ........s.f.?JP.&lt;/P&gt;&lt;P&gt;0c 04 06 0a 7d fe 22 05 06 00 00 02 b9 3d 06 00 | ....}."......=..&lt;/P&gt;&lt;P&gt;00 00 05 1a 15 00 00 00 09 01 0f 63 6f 61 2d 70 | ...........coa-p&lt;/P&gt;&lt;P&gt;75 73 68 3d 74 72 75 65 | ush=true&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Parsed packet data.....&lt;/P&gt;&lt;P&gt;Radius: Code = 1 (0x01)&lt;/P&gt;&lt;P&gt;Radius: Identifier = 217 (0xD9)&lt;/P&gt;&lt;P&gt;Radius: Length = 88 (0x0058)&lt;/P&gt;&lt;P&gt;Radius: Vector: F219C77393192FB6170003E1398FBD6E&lt;/P&gt;&lt;P&gt;Radius: Type = 1 (0x01) User-Name&lt;/P&gt;&lt;P&gt;Radius: Length = 11 (0x0B)&lt;/P&gt;&lt;P&gt;Radius: Value (String) =&lt;/P&gt;&lt;P&gt;6a 67 6f 6e 7a 61 6c 65 7a | myuser&lt;/P&gt;&lt;P&gt;Radius: Type = 2 (0x02) User-Password&lt;/P&gt;&lt;P&gt;Radius: Length = 18 (0x12)&lt;/P&gt;&lt;P&gt;Radius: Value (String) =&lt;/P&gt;&lt;P&gt;e6 a1 f5 1f af c3 0b 73 a1 66 df 3f 4a 50 8c 0c | .......s.f.?JP..&lt;/P&gt;&lt;P&gt;Radius: Type = 4 (0x04) NAS-IP-Address&lt;/P&gt;&lt;P&gt;Radius: Length = 6 (0x06)&lt;/P&gt;&lt;P&gt;Radius: Value (IP Address) = 192.168.2.30&lt;/P&gt;&lt;P&gt;Radius: Type = 5 (0x05) NAS-Port&lt;/P&gt;&lt;P&gt;Radius: Length = 6 (0x06)&lt;/P&gt;&lt;P&gt;Radius: Value (Hex) = 0x2B9&lt;/P&gt;&lt;P&gt;Radius: Type = 61 (0x3D) NAS-Port-Type&lt;/P&gt;&lt;P&gt;Radius: Length = 6 (0x06)&lt;/P&gt;&lt;P&gt;Radius: Value (Hex) = 0x5&lt;/P&gt;&lt;P&gt;Radius: Type = 26 (0x1A) Vendor-Specific&lt;/P&gt;&lt;P&gt;Radius: Length = 21 (0x15)&lt;/P&gt;&lt;P&gt;Radius: Vendor ID = 9 (0x00000009)&lt;/P&gt;&lt;P&gt;Radius: Type = 1 (0x01) Cisco-AV-pair&lt;/P&gt;&lt;P&gt;Radius: Length = 15 (0x0F)&lt;/P&gt;&lt;P&gt;Radius: Value (String) =&lt;/P&gt;&lt;P&gt;63 6f 61 2d 70 75 73 68 3d 74 72 75 65 | coa-push=true&lt;/P&gt;&lt;P&gt;send pkt 192.168.1.1/1645&lt;/P&gt;&lt;P&gt;rip 0x00002aaac9b1b6c0 state 7 id 217&lt;/P&gt;&lt;P&gt;rad_vrfy() : response message verified&lt;/P&gt;&lt;P&gt;rip 0x00002aaac9b1b6c0&lt;/P&gt;&lt;P&gt;: chall_state ''&lt;/P&gt;&lt;P&gt;: state 0x7&lt;/P&gt;&lt;P&gt;: reqauth:&lt;/P&gt;&lt;P&gt;f2 19 c7 73 93 19 2f b6 17 00 03 e1 39 8f bd 6e&lt;/P&gt;&lt;P&gt;: info 0x00002aaac9b1b800&lt;/P&gt;&lt;P&gt;session_id 0x80000004&lt;/P&gt;&lt;P&gt;request_id 0xd9&lt;/P&gt;&lt;P&gt;user 'myuser'&lt;/P&gt;&lt;P&gt;response '***'&lt;/P&gt;&lt;P&gt;app 0&lt;/P&gt;&lt;P&gt;reason 0&lt;/P&gt;&lt;P&gt;skey 'secretkey'&lt;/P&gt;&lt;P&gt;sip 192.168.1.1&lt;/P&gt;&lt;P&gt;type 1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;RADIUS packet decode (response)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;--------------------------------------&lt;/P&gt;&lt;P&gt;Raw packet data (length = 20).....&lt;/P&gt;&lt;P&gt;03 d9 00 14 14 06 dc ee e7 0a 65 e2 1f fb b1 4b | ..........e....K&lt;/P&gt;&lt;P&gt;78 ce b9 23 | x..#&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Parsed packet data.....&lt;/P&gt;&lt;P&gt;Radius: Code = 3 (0x03)&lt;/P&gt;&lt;P&gt;Radius: Identifier = 217 (0xD9)&lt;/P&gt;&lt;P&gt;Radius: Length = 20 (0x0014)&lt;/P&gt;&lt;P&gt;Radius: Vector: 1406DCEEE70A65E21FFBB14B78CEB923&lt;/P&gt;&lt;P&gt;rad_procpkt: REJECT&lt;/P&gt;&lt;P&gt;RADIUS_DELETE&lt;/P&gt;&lt;P&gt;remove_req 0x00002aaac9b1b6c0 session 0x80000004 id 217&lt;/P&gt;&lt;P&gt;free_rip 0x00002aaac9b1b6c0&lt;/P&gt;&lt;P&gt;radius: send queue empty&lt;/P&gt;&lt;P&gt;ERROR: Authentication Rejected: AAA failure&lt;/P&gt;</description>
      <pubDate>Sat, 25 Apr 2020 21:06:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5525-radius-server-reject/m-p/4074098#M1069515</guid>
      <dc:creator>1uplink</dc:creator>
      <dc:date>2020-04-25T21:06:06Z</dc:date>
    </item>
  </channel>
</rss>

