<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Radius Authentication via MS NPS/Active Directory - ASR9k in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/radius-authentication-via-ms-nps-active-directory-asr9k/m-p/4786012#M1098302</link>
    <description>&lt;P&gt;&lt;SPAN class="keyword kwd"&gt;radius-server attribute list&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;KBD class="ph sep"&gt;&lt;/KBD&gt;&lt;VAR&gt;listname &amp;lt;&amp;lt;- you can try attribute filter to accept deny some VSA&amp;nbsp;&lt;/VAR&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 02 Mar 2023 15:35:33 GMT</pubDate>
    <dc:creator>MHM Cisco World</dc:creator>
    <dc:date>2023-03-02T15:35:33Z</dc:date>
    <item>
      <title>Radius Authentication via MS NPS/Active Directory - ASR9k</title>
      <link>https://community.cisco.com/t5/network-security/radius-authentication-via-ms-nps-active-directory-asr9k/m-p/4785217#M1098276</link>
      <description>&lt;P&gt;Hello...this is the second time I'm posting about this issue, but I do have more info now.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have been trying for over a week to get 2 ASR9k's to authenticate logins via our company's existing Microsoft NPS server via Active directory.&amp;nbsp; I have standard ios routers working fine with this (on the same subnet, pointed to the same NPS), but cannot get our 2 ASR9k's to do the same.&lt;/P&gt;&lt;P&gt;I did install wireshark on the NPS server to try and figure out what was going on there.&amp;nbsp; Both routers are getting access-accept packets from the NPS, so I know the issue is not with the AD authentication. Regardless of this, I still get access denied on the routers.&lt;/P&gt;&lt;P&gt;I have an existing TAC case open on this but so far that has yielded no help.&amp;nbsp; This morning I decided to take a look at the log on the router after a login attempt and saw this message:&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;RP/0/RSP0/CPU0:Mar 1 10:21:38 : radiusd[1136]: %SECURITY-RADIUSD-3-BAD_VSA_TYPE : Bad non-cisco VSA type 14 with vendor_id 311 encountered, possibily out of range&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;I think I have found the issue.&amp;nbsp; Can anyone tell me what this message is indicating?&amp;nbsp; This is a microsoft VSA.&amp;nbsp; Here's a screenshot from the wireshark capture of the access-accept packet.&amp;nbsp; This feels like a bug?&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Dadbaud73_0-1677693080987.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/177848iDADE5A9BDC2D3127/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Dadbaud73_0-1677693080987.png" alt="Dadbaud73_0-1677693080987.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 01 Mar 2023 17:54:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/radius-authentication-via-ms-nps-active-directory-asr9k/m-p/4785217#M1098276</guid>
      <dc:creator>Dadbaud73</dc:creator>
      <dc:date>2023-03-01T17:54:28Z</dc:date>
    </item>
    <item>
      <title>Re: Radius Authentication via MS NPS/Active Directory - ASR9k</title>
      <link>https://community.cisco.com/t5/network-security/radius-authentication-via-ms-nps-active-directory-asr9k/m-p/4785368#M1098280</link>
      <description>&lt;P&gt;As per i know some bugs around Windows Version and NPS (there is some knowledge base)&lt;/P&gt;
&lt;P&gt;what is the Windows Servers version that NPS running? what is the Windows Server version which has AD ?&lt;/P&gt;
&lt;P&gt;i will simulate this issue over weekend, since moved to ISE we no longer using NPS,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 02 Mar 2023 00:22:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/radius-authentication-via-ms-nps-active-directory-asr9k/m-p/4785368#M1098280</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2023-03-02T00:22:00Z</dc:date>
    </item>
    <item>
      <title>Re: Radius Authentication via MS NPS/Active Directory - ASR9k</title>
      <link>https://community.cisco.com/t5/network-security/radius-authentication-via-ms-nps-active-directory-asr9k/m-p/4786002#M1098301</link>
      <description>&lt;P&gt;Both servers: Server 19 Datacenter&lt;/P&gt;&lt;P&gt;version: 1809&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 02 Mar 2023 15:11:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/radius-authentication-via-ms-nps-active-directory-asr9k/m-p/4786002#M1098301</guid>
      <dc:creator>Dadbaud73</dc:creator>
      <dc:date>2023-03-02T15:11:09Z</dc:date>
    </item>
    <item>
      <title>Re: Radius Authentication via MS NPS/Active Directory - ASR9k</title>
      <link>https://community.cisco.com/t5/network-security/radius-authentication-via-ms-nps-active-directory-asr9k/m-p/4786012#M1098302</link>
      <description>&lt;P&gt;&lt;SPAN class="keyword kwd"&gt;radius-server attribute list&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;KBD class="ph sep"&gt;&lt;/KBD&gt;&lt;VAR&gt;listname &amp;lt;&amp;lt;- you can try attribute filter to accept deny some VSA&amp;nbsp;&lt;/VAR&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 02 Mar 2023 15:35:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/radius-authentication-via-ms-nps-active-directory-asr9k/m-p/4786012#M1098302</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-03-02T15:35:33Z</dc:date>
    </item>
    <item>
      <title>Re: Radius Authentication via MS NPS/Active Directory - ASR9k</title>
      <link>https://community.cisco.com/t5/network-security/radius-authentication-via-ms-nps-active-directory-asr9k/m-p/4786240#M1098306</link>
      <description>&lt;P&gt;So once you set up the list, how do you accept or deny off of it?&lt;/P&gt;</description>
      <pubDate>Thu, 02 Mar 2023 22:23:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/radius-authentication-via-ms-nps-active-directory-asr9k/m-p/4786240#M1098306</guid>
      <dc:creator>Dadbaud73</dc:creator>
      <dc:date>2023-03-02T22:23:35Z</dc:date>
    </item>
    <item>
      <title>Re: Radius Authentication via MS NPS/Active Directory - ASR9k</title>
      <link>https://community.cisco.com/t5/network-security/radius-authentication-via-ms-nps-active-directory-asr9k/m-p/4786320#M1098314</link>
      <description>&lt;P&gt;OK, I will share command&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 03 Mar 2023 02:56:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/radius-authentication-via-ms-nps-active-directory-asr9k/m-p/4786320#M1098314</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-03-03T02:56:16Z</dc:date>
    </item>
    <item>
      <title>Re: Radius Authentication via MS NPS/Active Directory - ASR9k</title>
      <link>https://community.cisco.com/t5/network-security/radius-authentication-via-ms-nps-active-directory-asr9k/m-p/4786730#M1098332</link>
      <description>&lt;P&gt;I did this command and the error stopped showing up in the log.&amp;nbsp; I am still not logging in:&lt;/P&gt;&lt;P&gt;config)#radius-server vsa attribute ignore unknown&lt;/P&gt;&lt;P&gt;Now I am seeing this in the log:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Dadbaud73_0-1677856918456.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/178015i2CDAD48170351553/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Dadbaud73_0-1677856918456.png" alt="Dadbaud73_0-1677856918456.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 03 Mar 2023 15:22:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/radius-authentication-via-ms-nps-active-directory-asr9k/m-p/4786730#M1098332</guid>
      <dc:creator>Dadbaud73</dc:creator>
      <dc:date>2023-03-03T15:22:45Z</dc:date>
    </item>
    <item>
      <title>Re: Radius Authentication via MS NPS/Active Directory - ASR9k</title>
      <link>https://community.cisco.com/t5/network-security/radius-authentication-via-ms-nps-active-directory-asr9k/m-p/4787513#M1098366</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE class="pre codeblock"&gt;&lt;CODE&gt;radius-server attribute list MHM
attribute vendor-id 311
vendor-type 26&lt;BR /&gt;!&lt;BR /&gt;aaa&amp;nbsp;group&amp;nbsp;server&amp;nbsp;radius&amp;nbsp;MHM &lt;BR /&gt;authorization&amp;nbsp;reply&amp;nbsp;reject&amp;nbsp;MHM&amp;nbsp;&lt;/CODE&gt;&lt;/PRE&gt;
&lt;P&gt;&lt;SPAN class="ph synph"&gt;&lt;VAR&gt;&amp;nbsp;&lt;/VAR&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 06 Mar 2023 00:03:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/radius-authentication-via-ms-nps-active-directory-asr9k/m-p/4787513#M1098366</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-03-06T00:03:13Z</dc:date>
    </item>
  </channel>
</rss>

