<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Firepower 1010 FDM and Windows RADIUS in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/firepower-1010-fdm-and-windows-radius/m-p/4625435#M1090669</link>
    <description>&lt;P&gt;Its seems due to the administrator role disabled&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Please follow the below document if its help you..&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/asa/asa91/configuration/general/asa_91_general_config/aaa_radius.html" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/asa/asa91/configuration/general/asa_91_general_config/aaa_radius.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Jitendra&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 06 Jun 2022 06:18:13 GMT</pubDate>
    <dc:creator>Jitendra Kumar</dc:creator>
    <dc:date>2022-06-06T06:18:13Z</dc:date>
    <item>
      <title>Firepower 1010 FDM and Windows RADIUS</title>
      <link>https://community.cisco.com/t5/network-security/firepower-1010-fdm-and-windows-radius/m-p/4623611#M1090592</link>
      <description>&lt;P&gt;Been working on ASA for a long time, and I have my first firepower 1010 appliance that I'm running the Firepower image on. Can't seem to get the RADIUS authentication for logging into web GUI working.&lt;/P&gt;&lt;P&gt;I've configured the RADIUS server group and RADIUS server. Tested access to the server OK. However, when I try to utilize my AD credentials, it keeps failing with "unable to authorize access". The windows NPS logs appears to show a successful authentication:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Network Policy Server granted full access to a user because the host met the defined health policy.&lt;/P&gt;&lt;P&gt;User:&lt;BR /&gt;Security ID: ADMINS\jdoe&lt;BR /&gt;Account Name: jdoe&lt;BR /&gt;Account Domain: ADMINS&lt;BR /&gt;Fully Qualified Account Name: xxxx.com/Users/John Doe&lt;/P&gt;&lt;P&gt;Client Machine:&lt;BR /&gt;Security ID: NULL SID&lt;BR /&gt;Account Name: -&lt;BR /&gt;Fully Qualified Account Name: -&lt;BR /&gt;OS-Version: -&lt;BR /&gt;Called Station Identifier: -&lt;BR /&gt;Calling Station Identifier: -&lt;/P&gt;&lt;P&gt;NAS:&lt;BR /&gt;NAS IPv4 Address: 192.168.2.18&lt;BR /&gt;NAS IPv6 Address: -&lt;BR /&gt;NAS Identifier: -&lt;BR /&gt;NAS Port-Type: Virtual&lt;BR /&gt;NAS Port: -&lt;/P&gt;&lt;P&gt;RADIUS Client:&lt;BR /&gt;Client Friendly Name: RT-OFFICE-FW01&lt;BR /&gt;Client IP Address: 192.168.2.18&lt;/P&gt;&lt;P&gt;Authentication Details:&lt;BR /&gt;Connection Request Policy Name: Use Windows authentication for all users&lt;BR /&gt;Network Policy Name: Cisco admin auth network policy&lt;BR /&gt;Authentication Provider: Windows&lt;BR /&gt;Authentication Server: RADIUS-SERV.xxxx.com&lt;BR /&gt;Authentication Type: PAP&lt;BR /&gt;EAP Type: -&lt;BR /&gt;Account Session Identifier: -&lt;/P&gt;&lt;P&gt;Quarantine Information:&lt;BR /&gt;Result: Full Access&lt;BR /&gt;Extended-Result: -&lt;BR /&gt;Session Identifier: -&lt;BR /&gt;Help URL: -&lt;BR /&gt;System Health Validator Result(s): -&lt;/P&gt;</description>
      <pubDate>Thu, 02 Jun 2022 21:50:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-1010-fdm-and-windows-radius/m-p/4623611#M1090592</guid>
      <dc:creator>RANT</dc:creator>
      <dc:date>2022-06-02T21:50:21Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower 1010 FDM and Windows RADIUS</title>
      <link>https://community.cisco.com/t5/network-security/firepower-1010-fdm-and-windows-radius/m-p/4624653#M1090622</link>
      <description>&lt;P&gt;You need to grant a specific role to the user when they are authenticated via a RADIUS server. For admin access, it's the cisco-av-pair (attribute-value) &lt;SPAN class="ph uicontrol"&gt;fdm.userrole.authority.admin&lt;/SPAN&gt;.&lt;/P&gt;
&lt;P&gt;Reference: &lt;A href="https://www.cisco.com/c/en/us/td/docs/security/firepower/70/fdm/fptd-fdm-config-guide-700/fptd-fdm-mgmt.html#id_73793" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/firepower/70/fdm/fptd-fdm-config-guide-700/fptd-fdm-mgmt.html#id_73793&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 04 Jun 2022 11:33:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-1010-fdm-and-windows-radius/m-p/4624653#M1090622</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2022-06-04T11:33:53Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower 1010 FDM and Windows RADIUS</title>
      <link>https://community.cisco.com/t5/network-security/firepower-1010-fdm-and-windows-radius/m-p/4625435#M1090669</link>
      <description>&lt;P&gt;Its seems due to the administrator role disabled&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Please follow the below document if its help you..&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/asa/asa91/configuration/general/asa_91_general_config/aaa_radius.html" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/asa/asa91/configuration/general/asa_91_general_config/aaa_radius.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Jitendra&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 06 Jun 2022 06:18:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-1010-fdm-and-windows-radius/m-p/4625435#M1090669</guid>
      <dc:creator>Jitendra Kumar</dc:creator>
      <dc:date>2022-06-06T06:18:13Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower 1010 FDM and Windows RADIUS</title>
      <link>https://community.cisco.com/t5/network-security/firepower-1010-fdm-and-windows-radius/m-p/5282838#M1120644</link>
      <description>&lt;P&gt;Hello Marvin, Thanks for your contributions. It has been several years since the original posting but here is where I am at:&lt;BR /&gt;&lt;BR /&gt;&lt;STRONG&gt;Powershell SSH&lt;/STRONG&gt;&lt;BR /&gt;When I use powershell to log into the FPR running FDM, I use RADIUS credentials that work. The error I get is:&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;"Successful login attempts for user 'Username-1' : 10&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;! ! ! Your username is not defined with a service type that is valid for this system. You are not authorized to access the system. ! ! !"&lt;BR /&gt;&lt;/EM&gt;&lt;STRONG&gt;FDM WEB GUI&lt;/STRONG&gt;&lt;BR /&gt;When checking my objects for Authentication, I run a RADIUS test and it returns &lt;EM&gt;SUCCESS&lt;/EM&gt;.&lt;BR /&gt;&lt;BR /&gt;&lt;STRONG&gt;In the NPS Server:&lt;/STRONG&gt;&lt;BR /&gt;NPS Policy is configured with Service-Type: Administrator and the Cisco-AV-Pair configured with "fdm.userrole.authority.admin".&lt;BR /&gt;The Event logs for the NPS and have a similar message as RANT's post above.&lt;BR /&gt;&lt;BR /&gt;This issue has been observed on multiple FDM versions. We have verified RADIUS secret keys, multiple known working usernames, and reviewed Event logs for confirmation.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 18 Apr 2025 21:26:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-1010-fdm-and-windows-radius/m-p/5282838#M1120644</guid>
      <dc:creator>jrharmdx</dc:creator>
      <dc:date>2025-04-18T21:26:44Z</dc:date>
    </item>
  </channel>
</rss>

