<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Change AD servers switch is using to authenticate in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/change-ad-servers-switch-is-using-to-authenticate/m-p/5251791#M1119035</link>
    <description>&lt;P&gt;OK thank you. Then I create a new key on the NPS server and add it to the new servers in the config. I'm assuming the key shown in the config is encrypted, correct?&lt;/P&gt;</description>
    <pubDate>Thu, 23 Jan 2025 19:47:29 GMT</pubDate>
    <dc:creator>bacjac38</dc:creator>
    <dc:date>2025-01-23T19:47:29Z</dc:date>
    <item>
      <title>Change AD servers switch is using to authenticate</title>
      <link>https://community.cisco.com/t5/network-security/change-ad-servers-switch-is-using-to-authenticate/m-p/5251682#M1119017</link>
      <description>&lt;P&gt;I am not an advanced level SSH tech but can find my way as required but for this I need assistance. I've inherited a switch stack that points to a 2008R2 NPS server to login. Please assist with&amp;nbsp;the commands to change the NPS/RADIUS server it uses to authentication requests. Thank you in advance.&lt;/P&gt;</description>
      <pubDate>Thu, 23 Jan 2025 16:04:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/change-ad-servers-switch-is-using-to-authenticate/m-p/5251682#M1119017</guid>
      <dc:creator>bacjac38</dc:creator>
      <dc:date>2025-01-23T16:04:35Z</dc:date>
    </item>
    <item>
      <title>Re: Change AD servers switch is using to authenticate</title>
      <link>https://community.cisco.com/t5/network-security/change-ad-servers-switch-is-using-to-authenticate/m-p/5251702#M1119018</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1490293"&gt;@bacjac38&lt;/a&gt; Without seeing your current configuration we can only guess how your switch is configured. &lt;/P&gt;
&lt;P&gt;You can run the commands "show run | sec aaa" and "show run | sec radius" to display your current configuration. You will need to create additional RADIUS servers of the new 2019 NPS server, define a shared secret that matches what is configured on the new NPS and then add this new RADIUS server to the AAA group.&lt;/P&gt;
&lt;P&gt;Example if you have configured aaa authentication using a RADIUS group (ignore the ISE names):-&lt;/P&gt;
&lt;PRE&gt;aaa authentication login default group ISE local&lt;BR /&gt;!&lt;BR /&gt;aaa group server radius ISE&lt;BR /&gt;&amp;nbsp;server name ISE1&lt;BR /&gt;&amp;nbsp;server name ISE2&lt;/PRE&gt;
&lt;P&gt;You would then create a new RADIUS server&lt;/P&gt;
&lt;PRE&gt;radius server ISE3&lt;BR /&gt;&amp;nbsp;address ipv4 192.168.10.10 auth-port 1812 acct-port 1813&lt;BR /&gt; key Cisco1234&lt;/PRE&gt;
&lt;P&gt;Then add the new RADIUS server to the existing group and remove the old servers.&lt;/P&gt;
&lt;PRE&gt;aaa group server radius ISE&lt;BR /&gt;&amp;nbsp;server name ISE3&lt;BR /&gt; no server name ISE1&lt;BR /&gt; no server name ISE2&lt;/PRE&gt;
&lt;P&gt;There are other ways of doing this and you may not be using a AAA group, as per the example above. If so provide your configuration - "show run | sec aaa" and "show run | sec radius"&lt;/P&gt;</description>
      <pubDate>Thu, 23 Jan 2025 16:22:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/change-ad-servers-switch-is-using-to-authenticate/m-p/5251702#M1119018</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2025-01-23T16:22:46Z</dc:date>
    </item>
    <item>
      <title>Re: Change AD servers switch is using to authenticate</title>
      <link>https://community.cisco.com/t5/network-security/change-ad-servers-switch-is-using-to-authenticate/m-p/5251747#M1119021</link>
      <description>&lt;P&gt;Here is the configuration. The NPS server settings from the old have been imported from the 2 new NPS servers - 143 &amp;amp; 145. I see at the bottom of the sec radius output "key 7 04494D225E34197D5A3A3712064A". Is that specific from the server itself?&lt;BR /&gt;&lt;BR /&gt;NGM1P3750LAN#show run | sec aaa&lt;BR /&gt;aaa new-model&lt;BR /&gt;aaa group server radius ITNetAdmins&lt;BR /&gt;server 10.1.6.141&lt;BR /&gt;server 10.1.6.141 auth-port 1812 acct-port 1813&lt;BR /&gt;server 10.1.6.142&lt;BR /&gt;server 10.1.6.142 auth-port 1812 acct-port 1813&lt;BR /&gt;aaa authentication login default group ITNetAdmins local&lt;BR /&gt;aaa authentication enable default group ITNetAdmins enable&lt;BR /&gt;aaa authentication ppp ITNetAdmins local&lt;BR /&gt;aaa authorization console&lt;BR /&gt;aaa authorization exec default group ITNetAdmins local&lt;BR /&gt;aaa authorization commands 15 ITNetAdmins local&lt;BR /&gt;aaa authorization network ITNetAdmins local&lt;BR /&gt;aaa session-id common&lt;BR /&gt;ip http authentication aaa command-authorization 2 ITNetUsers&lt;BR /&gt;NGM1P3750LAN#show run | sec radius&lt;BR /&gt;aaa group server radius ITNetAdmins&lt;BR /&gt;server 10.1.6.141&lt;BR /&gt;server 10.1.6.141 auth-port 1812 acct-port 1813&lt;BR /&gt;server 10.1.6.142&lt;BR /&gt;server 10.1.6.142 auth-port 1812 acct-port 1813&lt;BR /&gt;ip radius source-interface Vlan4&lt;BR /&gt;radius-server host 10.1.6.141 auth-port 1812 acct-port 1813 key 7 04494D225E34197D5A3A3712064A&lt;BR /&gt;radius-server host 10.1.6.142 auth-port 1812 acct-port 1813 key 7 105C4F3D540247385F27182E3069&lt;BR /&gt;radius-server host 10.1.4.220&lt;/P&gt;</description>
      <pubDate>Thu, 23 Jan 2025 17:44:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/change-ad-servers-switch-is-using-to-authenticate/m-p/5251747#M1119021</guid>
      <dc:creator>bacjac38</dc:creator>
      <dc:date>2025-01-23T17:44:19Z</dc:date>
    </item>
    <item>
      <title>Re: Change AD servers switch is using to authenticate</title>
      <link>https://community.cisco.com/t5/network-security/change-ad-servers-switch-is-using-to-authenticate/m-p/5251751#M1119022</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1490293"&gt;@bacjac38&lt;/a&gt; The shared secret key you configure on the cisco switch must be the exact same shared secret key you configure on the NPS server in order for authentication to work. The key doesn't need to be the same as the other keys of the other RADIUS servers, it just needs to be the same key as you configure on the NPS server to match the switch.&lt;/P&gt;
&lt;P&gt;The RADIUS group called "ITNetAdmins" is used for authentication, so define the shared secret and then add the new RADIUS server to that group.&lt;/P&gt;
&lt;PRE&gt;radius-server host 10.1.4.220 auth-port 1812 acct-port 1813 key &amp;lt;shared secret&amp;gt;&lt;BR /&gt;!&lt;BR /&gt;aaa group server radius ITNetAdmins&lt;BR /&gt;&amp;nbsp;server 10.1.4.220&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 23 Jan 2025 17:57:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/change-ad-servers-switch-is-using-to-authenticate/m-p/5251751#M1119022</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2025-01-23T17:57:43Z</dc:date>
    </item>
    <item>
      <title>Re: Change AD servers switch is using to authenticate</title>
      <link>https://community.cisco.com/t5/network-security/change-ad-servers-switch-is-using-to-authenticate/m-p/5251772#M1119027</link>
      <description>&lt;P&gt;Thank you. I would still need to add 2 new servers as stated above entered separately:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;radius server ISE3
 address ipv4 10.1.6.143 auth-port 1812 acct-port 1813
 key xxxx

radius server ISE4
address ipv4 10.1.6.145 auth-port 1812 acct-port 1813
key xxxx&lt;/LI-CODE&gt;&lt;P&gt;Then add the group to the 2 new servers:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;aaa group server ITNetAdmins
 server name ISE3
 server name ISE4
 no server name ISE1
 no server name ISE2&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 23 Jan 2025 18:57:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/change-ad-servers-switch-is-using-to-authenticate/m-p/5251772#M1119027</guid>
      <dc:creator>bacjac38</dc:creator>
      <dc:date>2025-01-23T18:57:23Z</dc:date>
    </item>
    <item>
      <title>Re: Change AD servers switch is using to authenticate</title>
      <link>https://community.cisco.com/t5/network-security/change-ad-servers-switch-is-using-to-authenticate/m-p/5251773#M1119028</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1490293"&gt;@bacjac38&lt;/a&gt; yes, define the RADIUS server(s) and then add to the AAA group "ITNetAdmins" AND configure the new NPS server with the IP address and shared secret key (as configured on the switch).&lt;/P&gt;</description>
      <pubDate>Thu, 23 Jan 2025 18:59:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/change-ad-servers-switch-is-using-to-authenticate/m-p/5251773#M1119028</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2025-01-23T18:59:14Z</dc:date>
    </item>
    <item>
      <title>Re: Change AD servers switch is using to authenticate</title>
      <link>https://community.cisco.com/t5/network-security/change-ad-servers-switch-is-using-to-authenticate/m-p/5251777#M1119029</link>
      <description>&lt;P&gt;You add server under server-group and as standalone'&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Under server-group you dont use key ?&lt;/P&gt;
&lt;P&gt;And you use server-group for authc login&amp;nbsp;&lt;/P&gt;
&lt;P&gt;So I dont think SW ever send any requests to server-group' it use local database.&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Thu, 23 Jan 2025 19:08:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/change-ad-servers-switch-is-using-to-authenticate/m-p/5251777#M1119029</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2025-01-23T19:08:42Z</dc:date>
    </item>
    <item>
      <title>Re: Change AD servers switch is using to authenticate</title>
      <link>https://community.cisco.com/t5/network-security/change-ad-servers-switch-is-using-to-authenticate/m-p/5251791#M1119035</link>
      <description>&lt;P&gt;OK thank you. Then I create a new key on the NPS server and add it to the new servers in the config. I'm assuming the key shown in the config is encrypted, correct?&lt;/P&gt;</description>
      <pubDate>Thu, 23 Jan 2025 19:47:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/change-ad-servers-switch-is-using-to-authenticate/m-p/5251791#M1119035</guid>
      <dc:creator>bacjac38</dc:creator>
      <dc:date>2025-01-23T19:47:29Z</dc:date>
    </item>
    <item>
      <title>Re: Change AD servers switch is using to authenticate</title>
      <link>https://community.cisco.com/t5/network-security/change-ad-servers-switch-is-using-to-authenticate/m-p/5251793#M1119036</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1490293"&gt;@bacjac38&lt;/a&gt; your key above is a type 7 key and hidden, FYI this is easily decryptable - there are websites on the internet to do that. I would suggest you don't use the same keys above.&lt;/P&gt;
&lt;P&gt;Enter the key in plaintext on the switch and ensure it's the exact same key on the NPS server.&lt;/P&gt;</description>
      <pubDate>Thu, 23 Jan 2025 19:52:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/change-ad-servers-switch-is-using-to-authenticate/m-p/5251793#M1119036</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2025-01-23T19:52:36Z</dc:date>
    </item>
    <item>
      <title>Re: Change AD servers switch is using to authenticate</title>
      <link>https://community.cisco.com/t5/network-security/change-ad-servers-switch-is-using-to-authenticate/m-p/5252274#M1119073</link>
      <description>&lt;P&gt;Made these changes - and cannot log in. 10.1.6.143 is showing the login attempts but I get locked out&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;radius server ISE3
 address ipv4 10.1.6.143 auth-port 1812 acct-port 1813
 key &amp;lt;new shared secret on NPS&amp;gt;

radius server ISE4
address ipv4 10.1.6.145 auth-port 1812 acct-port 1813
key &amp;lt;new shared secret on NPS&amp;gt;

aaa group server ITNetAdmins
 server name ISE3
 server name ISE4
 no server name ISE1
 no server name ISE2

write memory
copy running-config startup-config

exit&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 24 Jan 2025 16:35:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/change-ad-servers-switch-is-using-to-authenticate/m-p/5252274#M1119073</guid>
      <dc:creator>bacjac38</dc:creator>
      <dc:date>2025-01-24T16:35:59Z</dc:date>
    </item>
    <item>
      <title>Re: Change AD servers switch is using to authenticate</title>
      <link>https://community.cisco.com/t5/network-security/change-ad-servers-switch-is-using-to-authenticate/m-p/5252325#M1119074</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1490293"&gt;@bacjac38&lt;/a&gt;&amp;nbsp;what do the NPS logs say?&lt;/P&gt;
&lt;P&gt;Provide the output of "show AAA server"&lt;/P&gt;</description>
      <pubDate>Fri, 24 Jan 2025 17:35:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/change-ad-servers-switch-is-using-to-authenticate/m-p/5252325#M1119074</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2025-01-24T17:35:42Z</dc:date>
    </item>
    <item>
      <title>Re: Change AD servers switch is using to authenticate</title>
      <link>https://community.cisco.com/t5/network-security/change-ad-servers-switch-is-using-to-authenticate/m-p/5252338#M1119075</link>
      <description>&lt;P&gt;NPS login attempt below. Can't log into switch to get the "show AAA server"&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;&amp;lt;Event&amp;gt;&amp;lt;Timestamp data_type="4"&amp;gt;01/24/2025 10:43:00.777&amp;lt;/Timestamp&amp;gt;&amp;lt;Computer-Name data_type="1"&amp;gt;NPS_Server&amp;lt;/Computer-Name&amp;gt;&amp;lt;Event-Source data_type="1"&amp;gt;IAS&amp;lt;/Event-Source&amp;gt;&amp;lt;Class data_type="1"&amp;gt;311 1 10.1.6.143 01/24/2025 15:36:34 1&amp;lt;/Class&amp;gt;&amp;lt;Authentication-Type data_type="0"&amp;gt;1&amp;lt;/Authentication-Type&amp;gt;&amp;lt;Fully-Qualifed-User-Name data_type="1"&amp;gt;DOMAIN\bacjac38&amp;lt;/Fully-Qualifed-User-Name&amp;gt;&amp;lt;SAM-Account-Name data_type="1"&amp;gt;DOMAIN\bacjac38&amp;lt;/SAM-Account-Name&amp;gt;&amp;lt;Client-IP-Address data_type="3"&amp;gt;10.1.4.220&amp;lt;/Client-IP-Address&amp;gt;&amp;lt;Client-Vendor data_type="0"&amp;gt;0&amp;lt;/Client-Vendor&amp;gt;&amp;lt;Client-Friendly-Name data_type="1"&amp;gt;NGM1P3750D&amp;lt;/Client-Friendly-Name&amp;gt;&amp;lt;Proxy-Policy-Name data_type="1"&amp;gt;Use Windows authentication for all users&amp;lt;/Proxy-Policy-Name&amp;gt;&amp;lt;Provider-Type data_type="0"&amp;gt;1&amp;lt;/Provider-Type&amp;gt;&amp;lt;Packet-Type data_type="0"&amp;gt;3&amp;lt;/Packet-Type&amp;gt;&amp;lt;Reason-Code data_type="0"&amp;gt;36&amp;lt;/Reason-Code&amp;gt;&amp;lt;/Event&amp;gt;&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Looking for a console cable to telnet into the stack now&lt;/P&gt;</description>
      <pubDate>Fri, 24 Jan 2025 17:51:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/change-ad-servers-switch-is-using-to-authenticate/m-p/5252338#M1119075</guid>
      <dc:creator>bacjac38</dc:creator>
      <dc:date>2025-01-24T17:51:38Z</dc:date>
    </item>
    <item>
      <title>Re: Change AD servers switch is using to authenticate</title>
      <link>https://community.cisco.com/t5/network-security/change-ad-servers-switch-is-using-to-authenticate/m-p/5252342#M1119076</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1490293"&gt;@bacjac38&lt;/a&gt;&amp;nbsp;have you modified the new NPS server to add the switch IP and shared secret? Does the connection match the correct policy? Any errors?&lt;/P&gt;</description>
      <pubDate>Fri, 24 Jan 2025 17:54:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/change-ad-servers-switch-is-using-to-authenticate/m-p/5252342#M1119076</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2025-01-24T17:54:23Z</dc:date>
    </item>
    <item>
      <title>Re: Change AD servers switch is using to authenticate</title>
      <link>https://community.cisco.com/t5/network-security/change-ad-servers-switch-is-using-to-authenticate/m-p/5252343#M1119077</link>
      <description>&lt;P&gt;Everything matches - IP, policy, shared secret in the event log... I made the changes as shown when stating I got locked out. The event shown is from the new NPS server&lt;/P&gt;</description>
      <pubDate>Fri, 24 Jan 2025 18:00:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/change-ad-servers-switch-is-using-to-authenticate/m-p/5252343#M1119077</guid>
      <dc:creator>bacjac38</dc:creator>
      <dc:date>2025-01-24T18:00:09Z</dc:date>
    </item>
    <item>
      <title>Re: Change AD servers switch is using to authenticate</title>
      <link>https://community.cisco.com/t5/network-security/change-ad-servers-switch-is-using-to-authenticate/m-p/5252385#M1119078</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1490293"&gt;@bacjac38&lt;/a&gt; that event output is not clear, please provide a screenshot of the event (success or failure) and a screenshot of your NPS policies.&lt;/P&gt;</description>
      <pubDate>Fri, 24 Jan 2025 18:56:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/change-ad-servers-switch-is-using-to-authenticate/m-p/5252385#M1119078</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2025-01-24T18:56:55Z</dc:date>
    </item>
    <item>
      <title>Re: Change AD servers switch is using to authenticate</title>
      <link>https://community.cisco.com/t5/network-security/change-ad-servers-switch-is-using-to-authenticate/m-p/5252387#M1119079</link>
      <description>&lt;P&gt;You use local in end of your authc login'&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This make SW try use local username/password&lt;/P&gt;
&lt;P&gt;To force SW to use local remove SW from NPS (as NAD)&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Then try access use local&amp;nbsp;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Fri, 24 Jan 2025 19:01:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/change-ad-servers-switch-is-using-to-authenticate/m-p/5252387#M1119079</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2025-01-24T19:01:39Z</dc:date>
    </item>
    <item>
      <title>Re: Change AD servers switch is using to authenticate</title>
      <link>https://community.cisco.com/t5/network-security/change-ad-servers-switch-is-using-to-authenticate/m-p/5252430#M1119082</link>
      <description>&lt;P&gt;Interesting. To gather screen shot and events, I tried to log back in again and noticed that the new NPS server logs (.143) was not registering the attempt, but I did get locked out. I then checked the original server NPS logs (.141) and there it was.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Then I decrypted the original key (at your suggestion THANKS) which saved the day. I entered it back to the shared secret on the original NPS server and successfully logged in.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Here's the latest config which looks like I've made several errors:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;NGM1P3750LAN#show run | sec aaa
aaa new-model
aaa group server radius ITNetAdmins
 server 10.1.6.141
 server 10.1.6.141 auth-port 1812 acct-port 1813
 server 10.1.6.142
 server 10.1.6.142 auth-port 1812 acct-port 1813
 server name ISE3
 server name ISE4
aaa authentication login default group ITNetAdmins local
aaa authentication enable default group ITNetAdmins enable
aaa authentication ppp ITNetAdmins local
aaa authorization console
aaa authorization exec default group ITNetAdmins local
aaa authorization commands 15 ITNetAdmins local
aaa authorization network ITNetAdmins local
aaa session-id common
ip http authentication aaa command-authorization 2 ITNetUsers


NGM1P3750LAN#show run | sec radius
aaa group server radius ITNetAdmins
 server 10.1.6.141
 server 10.1.6.141 auth-port 1812 acct-port 1813
 server 10.1.6.142
 server 10.1.6.142 auth-port 1812 acct-port 1813
 server name ISE3
 server name ISE4
ip radius source-interface Vlan4
radius-server host 10.1.6.141 auth-port 1812 acct-port 1813 key 7 04494D225E3419         7D5A3A3712064A
radius-server host 10.1.6.142 auth-port 1812 acct-port 1813 key 7 105C4F3D540247         385F27182E3069
radius-server host 10.1.4.220
radius server ISE3
 address ipv4 10.1.6.143 auth-port 1812 acct-port 1813
 key 7 10195C493644311909307E05141B7730300502044D530409
radius server ISE4
 address ipv4 10.1.6.145 auth-port 1812 acct-port 1813
 key 7 055C535F121F6D1B1C31433C3B3F402F39322D217B704157&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 24 Jan 2025 20:29:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/change-ad-servers-switch-is-using-to-authenticate/m-p/5252430#M1119082</guid>
      <dc:creator>bacjac38</dc:creator>
      <dc:date>2025-01-24T20:29:23Z</dc:date>
    </item>
    <item>
      <title>Re: Change AD servers switch is using to authenticate</title>
      <link>https://community.cisco.com/t5/network-security/change-ad-servers-switch-is-using-to-authenticate/m-p/5252432#M1119083</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1490293"&gt;@bacjac38&lt;/a&gt; as you've still got the original RADIUS servers defined in the AAA group, the connection request would be sent to the first RADIUS server, which is why you aren't seeing the connection request on the new NPS server (.143). Authentications would only be sent to the .143 and .145 servers if the .141 and .142 are unavailable.&lt;/P&gt;
&lt;P&gt;Perhaps use the "test aaa group radius server....." command to test authentications to the new RADIUS server work before you remove the old NPS servers from the AAA group.&lt;/P&gt;</description>
      <pubDate>Fri, 24 Jan 2025 20:40:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/change-ad-servers-switch-is-using-to-authenticate/m-p/5252432#M1119083</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2025-01-24T20:40:07Z</dc:date>
    </item>
    <item>
      <title>Re: Change AD servers switch is using to authenticate</title>
      <link>https://community.cisco.com/t5/network-security/change-ad-servers-switch-is-using-to-authenticate/m-p/5252454#M1119085</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1065752"&gt;@MHM Cisco World&lt;/a&gt;&amp;nbsp; - are you referring to:&lt;/P&gt;&lt;PRE&gt;aaa authorization commands 15 ITNetAdmins local&lt;/PRE&gt;&lt;P&gt;My apologies - don't know what this means:&lt;/P&gt;&lt;P&gt;This make SW try use local username/password&lt;BR /&gt;To force SW to use local remove SW from NPS (as NAD)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 24 Jan 2025 21:58:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/change-ad-servers-switch-is-using-to-authenticate/m-p/5252454#M1119085</guid>
      <dc:creator>bacjac38</dc:creator>
      <dc:date>2025-01-24T21:58:10Z</dc:date>
    </item>
    <item>
      <title>Re: Change AD servers switch is using to authenticate</title>
      <link>https://community.cisco.com/t5/network-security/change-ad-servers-switch-is-using-to-authenticate/m-p/5252458#M1119086</link>
      <description>&lt;P&gt;The config now is a mess and have to figure out how to clean it up before I add testing statements. The new NPS does have logs when I attempted to connect earlier today. After several hours when coming back it, it reverted back. (?) Log from the new server is attached.&lt;/P&gt;</description>
      <pubDate>Fri, 24 Jan 2025 22:24:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/change-ad-servers-switch-is-using-to-authenticate/m-p/5252458#M1119086</guid>
      <dc:creator>bacjac38</dc:creator>
      <dc:date>2025-01-24T22:24:16Z</dc:date>
    </item>
  </channel>
</rss>

