<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic AAA Authentication Failure for UserName in Wireless</title>
    <link>https://community.cisco.com/t5/wireless/aaa-authentication-failure-for-username/m-p/2269641#M19189</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I reviewed the doc you attached. The WLAN config part looks fine. I'd like to know what error message are you seeing on the radius server under event viewer. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;~BR &lt;BR /&gt;Jatin Katyal &lt;BR /&gt; &lt;BR /&gt;**Do rate helpful posts**&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 22 Jul 2013 14:51:08 GMT</pubDate>
    <dc:creator>Jatin Katyal</dc:creator>
    <dc:date>2013-07-22T14:51:08Z</dc:date>
    <item>
      <title>AAA Authentication Failure for UserName</title>
      <link>https://community.cisco.com/t5/wireless/aaa-authentication-failure-for-username/m-p/2269640#M19188</link>
      <description>&lt;P&gt;I recently tried to setup an CiscoWLC 4402 ios 7.0.235.0 with RADIUS on Win Serv 2008r2, I set up my security type as wpa2-ent aes encryption, Microsoft PEAP, and exported a certificate from my CA server, and installed on my client machine.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am not sure what I am missing, let me know what information I need to further assist you. I attched some screenshots.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;TABLE border="0" cellpadding="0" cellspacing="1" width="800"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;0&lt;/TD&gt;&lt;TD&gt;Mon Jul 22 10:25:58 2013&lt;/TD&gt;&lt;TD&gt;Client Excluded: MACAddress:8c:70:5a:d2:f6:f8 Base Radio MAC :00:1e:79:d6:25:e0 Slot: 0 User Name: unknown Ip Address: unknown Reason:802.1x Authentication failed 3 times. ReasonCode: 4 &lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;1&lt;/TD&gt;&lt;TD&gt;Mon Jul 22 10:25:58 2013&lt;/TD&gt;&lt;TD&gt;AAA Authentication Failure for UserName:host/106LPT073.itserve.com User Type: WLAN USER&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;2&lt;/TD&gt;&lt;TD&gt;Mon Jul 22 10:25:54 2013&lt;/TD&gt;&lt;TD&gt;AAA Authentication Failure for UserName:host/106LPT073.itserve.com User Type: WLAN USER&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;3&lt;/TD&gt;&lt;TD&gt;Mon Jul 22 10:25:49 2013&lt;/TD&gt;&lt;TD&gt;AAA Authentication Failure for UserName:host/106LPT073.itserve.com User Type: WLAN USER&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;</description>
      <pubDate>Sun, 04 Jul 2021 07:28:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/aaa-authentication-failure-for-username/m-p/2269640#M19188</guid>
      <dc:creator>Chad Campbell</dc:creator>
      <dc:date>2021-07-04T07:28:58Z</dc:date>
    </item>
    <item>
      <title>AAA Authentication Failure for UserName</title>
      <link>https://community.cisco.com/t5/wireless/aaa-authentication-failure-for-username/m-p/2269641#M19189</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I reviewed the doc you attached. The WLAN config part looks fine. I'd like to know what error message are you seeing on the radius server under event viewer. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;~BR &lt;BR /&gt;Jatin Katyal &lt;BR /&gt; &lt;BR /&gt;**Do rate helpful posts**&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 22 Jul 2013 14:51:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/aaa-authentication-failure-for-username/m-p/2269641#M19189</guid>
      <dc:creator>Jatin Katyal</dc:creator>
      <dc:date>2013-07-22T14:51:08Z</dc:date>
    </item>
    <item>
      <title>Re: AAA Authentication Failure for UserName</title>
      <link>https://community.cisco.com/t5/wireless/aaa-authentication-failure-for-username/m-p/2269642#M19190</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I have not seen any errors, only the information in the event viewer below &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt;"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;A LDAP connection with domain controller 106P101.itserve.com for domain ITSERVE is established.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Earlier this morning I was receiving, 2 hours ago. I fixed this already with the shared secret&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt;"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;An Access-Request message was received from RADIUS client 10.110.0.99 with a Message-Authenticator attribute that is not valid.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 22 Jul 2013 14:55:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/aaa-authentication-failure-for-username/m-p/2269642#M19190</guid>
      <dc:creator>Chad Campbell</dc:creator>
      <dc:date>2013-07-22T14:55:04Z</dc:date>
    </item>
    <item>
      <title>Re: AAA Authentication Failure for UserName</title>
      <link>https://community.cisco.com/t5/wireless/aaa-authentication-failure-for-username/m-p/2269643#M19191</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; I'd like you to check under event viewer &amp;gt; custom views &amp;gt; server roles &amp;gt; Network policy and access services. Are we looking down in the same sections. In case there are no hits, please make sure the NPS service is running fine.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG src="https://community.cisco.com/" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If all well, we may need to look at the radius/aaa debugs.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;~BR &lt;BR /&gt;Jatin Katyal &lt;BR /&gt; &lt;BR /&gt;**Do rate helpful posts**&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 22 Jul 2013 15:05:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/aaa-authentication-failure-for-username/m-p/2269643#M19191</guid>
      <dc:creator>Jatin Katyal</dc:creator>
      <dc:date>2013-07-22T15:05:33Z</dc:date>
    </item>
    <item>
      <title>Re: AAA Authentication Failure for UserName</title>
      <link>https://community.cisco.com/t5/wireless/aaa-authentication-failure-for-username/m-p/2269644#M19192</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;STRONG&gt;I attached both username and computer errors.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Username&lt;A&gt;&lt;/A&gt;&lt;A&gt;&lt;/A&gt;&lt;A&gt;&lt;/A&gt;&lt;A&gt;&lt;/A&gt;&lt;A&gt;&lt;/A&gt;&lt;A&gt;&lt;/A&gt;&lt;/STRONG&gt;: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt;"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Network Policy Server denied access to a user.&lt;/P&gt;&lt;P&gt;Contact the Network Policy Server administrator for more information.&lt;/P&gt;&lt;P&gt;User:&lt;/P&gt;&lt;P&gt;Security ID: ITSERVE\ccampbell&lt;/P&gt;&lt;P&gt;Account Name: ITSERVE\ccampbell&lt;/P&gt;&lt;P&gt;Account Domain: ITSERVE&lt;/P&gt;&lt;P&gt;Fully Qualified Account Name: itserve.com/Accounts/Norcross/IT Staff/IT Administrators/Chad Campbell&lt;/P&gt;&lt;P&gt;Client Machine:&lt;/P&gt;&lt;P&gt;Security ID: NULL SID&lt;/P&gt;&lt;P&gt;Account Name: -&lt;/P&gt;&lt;P&gt;Fully Qualified Account Name: -&lt;/P&gt;&lt;P&gt;OS-Version: -&lt;/P&gt;&lt;P&gt;Called Station Identifier: 00-1e-79-d6-25-e0:ARCHWAY&lt;/P&gt;&lt;P&gt;Calling Station Identifier: 8c-70-5a-d2-f6-f8&lt;/P&gt;&lt;P&gt;NAS:&lt;/P&gt;&lt;P&gt;NAS IPv4 Address: 10.110.0.99&lt;/P&gt;&lt;P&gt;NAS IPv6 Address: -&lt;/P&gt;&lt;P&gt;NAS Identifier: WAP106-MM&lt;/P&gt;&lt;P&gt;NAS Port-Type: Wireless - IEEE 802.11&lt;/P&gt;&lt;P&gt;NAS Port: 29&lt;/P&gt;&lt;P&gt;RADIUS Client:&lt;/P&gt;&lt;P&gt;Client Friendly Name: Cisco WAP&lt;/P&gt;&lt;P&gt;Client IP Address: 10.110.0.99&lt;/P&gt;&lt;P&gt;Authentication Details:&lt;/P&gt;&lt;P&gt;Connection Request Policy Name: Secure Wireless Connections&lt;/P&gt;&lt;P&gt;Network Policy Name: Connections to other access servers&lt;/P&gt;&lt;P&gt;Authentication Provider: Windows&lt;/P&gt;&lt;P&gt;Authentication Server: 106P101.itserve.com&lt;/P&gt;&lt;P&gt;Authentication Type: EAP&lt;/P&gt;&lt;P&gt;EAP Type: -&lt;/P&gt;&lt;P&gt;Account Session Identifier: -&lt;/P&gt;&lt;P&gt;Logging Results: Accounting information was written to the local log file.&lt;/P&gt;&lt;P&gt;Reason Code: 65&lt;/P&gt;&lt;P&gt;Reason: The Network Access Permission setting in the dial-in properties of the user account in Active Directory is set to Deny access to the user. To change the Network Access Permission setting to either Allow access or Control access through NPS Network Policy, obtain the properties of the user account in Active Directory Users and Computers, click the Dial-in tab, and change Network Access Permission.&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style="font-size: 8pt; "&gt;Computer&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; "&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt;"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Network Policy Server denied access to a user.&lt;/P&gt;&lt;P&gt;Contact the Network Policy Server administrator for more information.&lt;/P&gt;&lt;P&gt;User:&lt;/P&gt;&lt;P&gt;Security ID: ITSERVE\106LPT073$&lt;/P&gt;&lt;P&gt;Account Name: host/106LPT073.itserve.com&lt;/P&gt;&lt;P&gt;Account Domain: ITSERVE&lt;/P&gt;&lt;P&gt;Fully Qualified Account Name: ITSERVE\106LPT073$&lt;/P&gt;&lt;P&gt;Client Machine:&lt;/P&gt;&lt;P&gt;Security ID: NULL SID&lt;/P&gt;&lt;P&gt;Account Name: -&lt;/P&gt;&lt;P&gt;Fully Qualified Account Name: -&lt;/P&gt;&lt;P&gt;OS-Version: -&lt;/P&gt;&lt;P&gt;Called Station Identifier: 00-1e-79-d6-25-e0:ARCHWAY&lt;/P&gt;&lt;P&gt;Calling Station Identifier: 8c-70-5a-d2-f6-f8&lt;/P&gt;&lt;P&gt;NAS:&lt;/P&gt;&lt;P&gt;NAS IPv4 Address: 10.110.0.99&lt;/P&gt;&lt;P&gt;NAS IPv6 Address: -&lt;/P&gt;&lt;P&gt;NAS Identifier: WAP106-MM&lt;/P&gt;&lt;P&gt;NAS Port-Type: Wireless - IEEE 802.11&lt;/P&gt;&lt;P&gt;NAS Port: 29&lt;/P&gt;&lt;P&gt;RADIUS Client:&lt;/P&gt;&lt;P&gt;Client Friendly Name: Cisco WAP&lt;/P&gt;&lt;P&gt;Client IP Address: 10.110.0.99&lt;/P&gt;&lt;P&gt;Authentication Details:&lt;/P&gt;&lt;P&gt;Connection Request Policy Name: Secure Wireless Connections&lt;/P&gt;&lt;P&gt;Network Policy Name: Secure Wireless Connections&lt;/P&gt;&lt;P&gt;Authentication Provider: Windows&lt;/P&gt;&lt;P&gt;Authentication Server: 106P101.itserve.com&lt;/P&gt;&lt;P&gt;Authentication Type: PEAP&lt;/P&gt;&lt;P&gt;EAP Type: -&lt;/P&gt;&lt;P&gt;Account Session Identifier: -&lt;/P&gt;&lt;P&gt;Logging Results: Accounting information was written to the local log file.&lt;/P&gt;&lt;P&gt;Reason Code: 23&lt;/P&gt;&lt;P&gt;Reason: An error occurred during the Network Policy Server use of the Extensible Authentication Protocol (EAP). Check EAP log files for EAP errors.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 22 Jul 2013 15:15:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/aaa-authentication-failure-for-username/m-p/2269644#M19192</guid>
      <dc:creator>Chad Campbell</dc:creator>
      <dc:date>2013-07-22T15:15:58Z</dc:date>
    </item>
    <item>
      <title>Re: AAA Authentication Failure for UserName</title>
      <link>https://community.cisco.com/t5/wireless/aaa-authentication-failure-for-username/m-p/2269645#M19193</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;issue most likely with windows radius server... are you using ldap as identity base or radius server on windows?&lt;BR /&gt;&lt;BR /&gt;from log seems eap handshake issue, as log stated you need to get eap log , or more effectively, go to microsoft/msdn for help.&lt;BR /&gt;&lt;BR /&gt;Sent from Cisco Technical Support iPad App&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 22 Jul 2013 15:21:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/aaa-authentication-failure-for-username/m-p/2269645#M19193</guid>
      <dc:creator>Shaoqin Li</dc:creator>
      <dc:date>2013-07-22T15:21:39Z</dc:date>
    </item>
    <item>
      <title>Re: AAA Authentication Failure for UserName</title>
      <link>https://community.cisco.com/t5/wireless/aaa-authentication-failure-for-username/m-p/2269646#M19194</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; RADIUS.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 22 Jul 2013 15:22:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/aaa-authentication-failure-for-username/m-p/2269646#M19194</guid>
      <dc:creator>Chad Campbell</dc:creator>
      <dc:date>2013-07-22T15:22:31Z</dc:date>
    </item>
    <item>
      <title>Re: AAA Authentication Failure for UserName</title>
      <link>https://community.cisco.com/t5/wireless/aaa-authentication-failure-for-username/m-p/2269647#M19195</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The user request showing that it's hitting the wrong network access policy : &lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000;"&gt;Network Policy Name: Connections to other access servers&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;However the machine authentication hitting the right one.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let's do this&lt;/P&gt;&lt;P&gt;Go to network policies&lt;/P&gt;&lt;P&gt;Edit secure wireless connections.&lt;/P&gt;&lt;P&gt;Remove the condition "Machine Groups" equals ITSERVE\Wireless Users&lt;/P&gt;&lt;P&gt;save changes&lt;/P&gt;&lt;P&gt;Try again and check the error if you fail to connect. If we see eap failure we then need to look into eal log files.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;~BR &lt;BR /&gt;Jatin Katyal &lt;BR /&gt; &lt;BR /&gt;**Do rate helpful posts**&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 22 Jul 2013 15:33:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/aaa-authentication-failure-for-username/m-p/2269647#M19195</guid>
      <dc:creator>Jatin Katyal</dc:creator>
      <dc:date>2013-07-22T15:33:11Z</dc:date>
    </item>
    <item>
      <title>Re: AAA Authentication Failure for UserName</title>
      <link>https://community.cisco.com/t5/wireless/aaa-authentication-failure-for-username/m-p/2269648#M19196</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; I edited my dial in properties to allow it in AD, it was controlled by NPS policy previously, which was set to ignore.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I removed the machine groups condition, and now receive a different error.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt;"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Network Policy Server denied access to a user.&lt;/P&gt;&lt;P&gt;Contact the Network Policy Server administrator for more information.&lt;/P&gt;&lt;P&gt;User:&lt;/P&gt;&lt;P&gt;Security ID: ITSERVE\ccampbell&lt;/P&gt;&lt;P&gt;Account Name: ITSERVE\ccampbell&lt;/P&gt;&lt;P&gt;Account Domain: ITSERVE&lt;/P&gt;&lt;P&gt;Fully Qualified Account Name: itserve.com/Accounts/Norcross/IT Staff/IT Administrators/Chad Campbell&lt;/P&gt;&lt;P&gt;Client Machine:&lt;/P&gt;&lt;P&gt;Security ID: NULL SID&lt;/P&gt;&lt;P&gt;Account Name: -&lt;/P&gt;&lt;P&gt;Fully Qualified Account Name: -&lt;/P&gt;&lt;P&gt;OS-Version: -&lt;/P&gt;&lt;P&gt;Called Station Identifier: 00-1e-79-d6-25-e0:ARCHWAY&lt;/P&gt;&lt;P&gt;Calling Station Identifier: 8c-70-5a-d2-f6-f8&lt;/P&gt;&lt;P&gt;NAS:&lt;/P&gt;&lt;P&gt;NAS IPv4 Address: 10.110.0.99&lt;/P&gt;&lt;P&gt;NAS IPv6 Address: -&lt;/P&gt;&lt;P&gt;NAS Identifier: WAP106-MM&lt;/P&gt;&lt;P&gt;NAS Port-Type: Wireless - IEEE 802.11&lt;/P&gt;&lt;P&gt;NAS Port: 29&lt;/P&gt;&lt;P&gt;RADIUS Client:&lt;/P&gt;&lt;P&gt;Client Friendly Name: Cisco WAP&lt;/P&gt;&lt;P&gt;Client IP Address: 10.110.0.99&lt;/P&gt;&lt;P&gt;Authentication Details:&lt;/P&gt;&lt;P&gt;Connection Request Policy Name: Secure Wireless Connections&lt;/P&gt;&lt;P&gt;Network Policy Name: Connections to other access servers&lt;/P&gt;&lt;P&gt;Authentication Provider: Windows&lt;/P&gt;&lt;P&gt;Authentication Server: 106P101.itserve.com&lt;/P&gt;&lt;P&gt;Authentication Type: EAP&lt;/P&gt;&lt;P&gt;EAP Type: -&lt;/P&gt;&lt;P&gt;Account Session Identifier: -&lt;/P&gt;&lt;P&gt;Logging Results: Accounting information was written to the local log file.&lt;/P&gt;&lt;P&gt;Reason Code: 66&lt;/P&gt;&lt;P&gt;Reason: The user attempted to use an authentication method that is not enabled on the matching network policy.&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; "&gt;&lt;IMG src="http://supportforums.cisco.com/sites/default/files/legacy/7/9/7/146797-Capture.PNG" class="jive-image" /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 22 Jul 2013 15:37:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/aaa-authentication-failure-for-username/m-p/2269648#M19196</guid>
      <dc:creator>Chad Campbell</dc:creator>
      <dc:date>2013-07-22T15:37:36Z</dc:date>
    </item>
    <item>
      <title>Re: AAA Authentication Failure for UserName</title>
      <link>https://community.cisco.com/t5/wireless/aaa-authentication-failure-for-username/m-p/2269649#M19197</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You need to select the authentication peap under the "secure wireless connection" network policies. Please refer the screen shot attached.&lt;IMG src="http://supportforums.cisco.com/sites/default/files/legacy/6/0/8/146806-authentication%20method..png" class="jive-image" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Save the changes and try again. Let me know if you see any more errors.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;~BR &lt;BR /&gt;Jatin Katyal &lt;BR /&gt; &lt;BR /&gt;**Do rate helpful posts**&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 22 Jul 2013 15:41:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/aaa-authentication-failure-for-username/m-p/2269649#M19197</guid>
      <dc:creator>Jatin Katyal</dc:creator>
      <dc:date>2013-07-22T15:41:29Z</dc:date>
    </item>
    <item>
      <title>Re: AAA Authentication Failure for UserName</title>
      <link>https://community.cisco.com/t5/wireless/aaa-authentication-failure-for-username/m-p/2269650#M19198</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Jatin I already have it set.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG src="http://supportforums.cisco.com/sites/default/files/legacy/1/1/8/146811-Capture2.PNG" class="jive-image" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 22 Jul 2013 15:50:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/aaa-authentication-failure-for-username/m-p/2269650#M19198</guid>
      <dc:creator>Chad Campbell</dc:creator>
      <dc:date>2013-07-22T15:50:05Z</dc:date>
    </item>
    <item>
      <title>Re: AAA Authentication Failure for UserName</title>
      <link>https://community.cisco.com/t5/wireless/aaa-authentication-failure-for-username/m-p/2269651#M19199</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Not sure if this is related?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG src="http://supportforums.cisco.com/sites/default/files/legacy/2/1/8/146812-Capture3.PNG" class="jive-image" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 22 Jul 2013 15:53:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/aaa-authentication-failure-for-username/m-p/2269651#M19199</guid>
      <dc:creator>Chad Campbell</dc:creator>
      <dc:date>2013-07-22T15:53:57Z</dc:date>
    </item>
    <item>
      <title>Re: AAA Authentication Failure for UserName</title>
      <link>https://community.cisco.com/t5/wireless/aaa-authentication-failure-for-username/m-p/2269652#M19200</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yup, you have it configured however the request is still going to some other policy where it's not checked.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Network Policy Name: Connections to other access servers&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You may try this, go to the policy"secure wireless connection" network policiy and add a condition&lt;/P&gt;&lt;P&gt;NAS IPv4 address equals 10.110.0.99&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This should work fine.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;~BR &lt;BR /&gt;Jatin Katyal &lt;BR /&gt; &lt;BR /&gt;**Do rate helpful posts**&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 22 Jul 2013 16:38:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/aaa-authentication-failure-for-username/m-p/2269652#M19200</guid>
      <dc:creator>Jatin Katyal</dc:creator>
      <dc:date>2013-07-22T16:38:09Z</dc:date>
    </item>
    <item>
      <title>Re: AAA Authentication Failure for UserName</title>
      <link>https://community.cisco.com/t5/wireless/aaa-authentication-failure-for-username/m-p/2269653#M19201</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Still did not work, I am thinking the issue is with the certificate just want to verify it,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I keep receiving the below error, where can I find the log file if it is not in C:\Windows\System32\Logfiles&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt;"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;An error occurred during the Network Policy Server use of the Extensible Authentication Protocol (EAP). Check EAP log files for EAP errors.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 23 Jul 2013 11:36:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/aaa-authentication-failure-for-username/m-p/2269653#M19201</guid>
      <dc:creator>Chad Campbell</dc:creator>
      <dc:date>2013-07-23T11:36:41Z</dc:date>
    </item>
    <item>
      <title>Re: AAA Authentication Failure for UserName</title>
      <link>https://community.cisco.com/t5/wireless/aaa-authentication-failure-for-username/m-p/2269654#M19202</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The issue seems to be with server side certificate. Based on your very first post, I realise you're using a third party certificate. Is that possible that we issue a new certificate and try again. Or please export the certificate and attach it in your next reply.&lt;/P&gt;&lt;H5&gt;Certificate Requirements for PEAP and EAP&lt;/H5&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://technet.microsoft.com/en-us/library/a1ac8d7e-3479-46b4-932b-ab43362e021b" rel="nofollow"&gt;http://technet.microsoft.com/en-us/library/a1ac8d7e-3479-46b4-932b-ab43362e021b&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; By default, these log files are located at&lt;STRONG&gt; %windir%\System32\Logfiles&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://technet.microsoft.com/en-us/library/dd197464%28v=ws.10%29.aspx" rel="nofollow"&gt;http://technet.microsoft.com/en-us/library/dd197464%28v=ws.10%29.aspx&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;~BR &lt;BR /&gt;Jatin Katyal &lt;BR /&gt; &lt;BR /&gt;**Do rate helpful posts**&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 23 Jul 2013 20:16:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/aaa-authentication-failure-for-username/m-p/2269654#M19202</guid>
      <dc:creator>Jatin Katyal</dc:creator>
      <dc:date>2013-07-23T20:16:04Z</dc:date>
    </item>
    <item>
      <title>Re: AAA Authentication Failure for UserName</title>
      <link>https://community.cisco.com/t5/wireless/aaa-authentication-failure-for-username/m-p/2269655#M19203</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Sorry for the delay, certificate are self signed.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 24 Jul 2013 15:28:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/aaa-authentication-failure-for-username/m-p/2269655#M19203</guid>
      <dc:creator>Chad Campbell</dc:creator>
      <dc:date>2013-07-24T15:28:55Z</dc:date>
    </item>
    <item>
      <title>Re: AAA Authentication Failure for UserName</title>
      <link>https://community.cisco.com/t5/wireless/aaa-authentication-failure-for-username/m-p/2269656#M19204</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Jatin,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am still having an issue, I have attache the logs from my most recent connection. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 16 Oct 2013 16:41:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/aaa-authentication-failure-for-username/m-p/2269656#M19204</guid>
      <dc:creator>Chad Campbell</dc:creator>
      <dc:date>2013-10-16T16:41:48Z</dc:date>
    </item>
    <item>
      <title>Re: AAA Authentication Failure for UserName</title>
      <link>https://community.cisco.com/t5/wireless/aaa-authentication-failure-for-username/m-p/2269657#M19205</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I'm unsure how you captured those event viewer because if you go and look at the info...the actual info is missing. I don't see any reason code and rest of the parameters. Can you take it again and confirm it there.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;~BR &lt;BR /&gt;Jatin Katyal &lt;BR /&gt; &lt;BR /&gt;**Do rate helpful posts**&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 17 Oct 2013 07:40:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/aaa-authentication-failure-for-username/m-p/2269657#M19205</guid>
      <dc:creator>Jatin Katyal</dc:creator>
      <dc:date>2013-10-17T07:40:51Z</dc:date>
    </item>
    <item>
      <title>Re: AAA Authentication Failure for UserName</title>
      <link>https://community.cisco.com/t5/wireless/aaa-authentication-failure-for-username/m-p/2269658#M19206</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I got everything working, I followed the below steps. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background: white; margin: 0in 0in 0pt;"&gt;You can install another certificate fairly easily if you want to extend the validity period. It looks like the original problem is that there was something wrong with the server certificate.&lt;/P&gt;&lt;P style="background: white; outline-style: none; margin: 0in 0in 0pt; outline-color: invert;"&gt;A couple things you should know:&lt;/P&gt;&lt;P style="background: white; outline-style: none; margin: 0in 0in 0pt; outline-color: invert;"&gt;1. It isn't necessary to have the client settings configured to &lt;STRONG style="outline-style: none; outline-color: invert;"&gt;validate&lt;/STRONG&gt; the server certificate. This is just for better security.&lt;/P&gt;&lt;P style="background: white; outline-style: none; margin: 0in 0in 0pt; outline-color: invert;"&gt;2. In the link I gave before (&lt;A href="http://support.microsoft.com/kb/814394" style="cursor: pointer; outline-style: none; outline-color: invert;"&gt;http://support.microsoft.com/kb/814394&lt;/A&gt;), there are some requirements for the server certificate. One of the requirements close to the bottom of the page says "For wireless clients, the Subject Alternative Name (SubjectAltName) extension contains the server's fully qualified domain name (FQDN)." This may be why one of the certificates you installed isn't working.&lt;/P&gt;&lt;P style="background: white; outline-style: none; margin: 0in 0in 0pt; outline-color: invert;"&gt;Load up the certificates mmc snap-in for the Computer account on your DC and look at the certificates in the Personal\Certificates container. Double-click the certificates and then click the Details tab. This displays information about the certificate such as the subject alternative name, the enhanced key usage, and the valid from/to dates.&lt;/P&gt;&lt;P style="background: white; outline-style: none; margin: 0in 0in 0pt; outline-color: invert;"&gt;You can delete certificates here if you aren't using them. You might want to re-issue a certificate and then delete the old one.&lt;/P&gt;&lt;P style="background: white; outline-style: none; margin: 0in 0in 0pt; outline-color: invert;"&gt;To re-issue a certificate, first you should review the template for the certificate. Type certtmpl.msc at a command line (click Start, Run, certtmpl.msc, enter) to open the certificate templates console. If you installed an Enterprise CA then you can create and modify templates. The instructions you used did say to create an Enterprise CA, so you should be able to do this.&lt;/P&gt;&lt;P style="background: white; outline-style: none; margin: 0in 0in 0pt; outline-color: invert;"&gt;Try this:&lt;/P&gt;&lt;P style="background: white; outline-style: none; margin: 0in 0in 0pt; outline-color: invert;"&gt;1. In the Certificate Templates Console, under Template Display Name, find Computer. Right-click it, click Duplicate Template, and then click OK.&lt;/P&gt;&lt;P style="background: white; outline-style: none; margin: 0in 0in 0pt; outline-color: invert;"&gt;2. In Properties of New Template, on the General tab, under Template display name, type a name for your new template. You can use something like Wireless Server Auth. While you are on the General tab, you can also set a validity period. By default it will be 1 year. Change this if you wish, but read this first: &lt;A href="http://www.expta.com/2010/08/how-to-create-certificates-with-longer.html" style="cursor: pointer; outline-style: none; outline-color: invert;"&gt;http://www.expta.com/2010/08/how-to-create-certificates-with-longer.html&lt;/A&gt; - if you try to create a validity period longer than 2 years it won't work without some tweaking.&lt;/P&gt;&lt;P style="background: white; outline-style: none; margin: 0in 0in 0pt; outline-color: invert;"&gt;3. Click the Security tab. Here is where you need to add permission for you to enroll. Click Authenticated Users and place a check in Allow for Enroll.&lt;/P&gt;&lt;P style="background: white; outline-style: none; margin: 0in 0in 0pt; outline-color: invert;"&gt;3a. (Added a step here). Click the Subject Name tab, choose Build from this Active Directory information, and then choose Common name from the drop-down list. &lt;/P&gt;&lt;P style="background: white; outline-style: none; margin: 0in 0in 0pt; outline-color: invert;"&gt;4. Click OK and now you'll see the new certificate at the bottom of the list. There is just one more thing to do now to enable the CA to actually issue this certificate.&lt;/P&gt;&lt;P style="background: white; outline-style: none; margin: 0in 0in 0pt; outline-color: invert;"&gt;5. Close the certificate templates console. Click Start, Run, certsrv.msc, enter. This will open the local Certification Authority console.&lt;/P&gt;&lt;P style="background: white; outline-style: none; margin: 0in 0in 0pt; outline-color: invert;"&gt;6. Click Certificate Templates and have a look at the list. This is all the templates that this CA can currently issue if the user and computer has permission to enroll.&lt;/P&gt;&lt;P style="background: white; outline-style: none; margin: 0in 0in 0pt; outline-color: invert;"&gt;7. Now right-click the Certificate Templates folder, point to New, then click Certificate Template to Issue. Scroll down the list and find the new template you created. The name I suggested was Wireless Server Auth but you might have picked something else. Highlight this template and then click OK. Now you should see that it is added to the list of Certificate Templates.&lt;/P&gt;&lt;P style="background: white; outline-style: none; margin: 0in 0in 0pt; outline-color: invert;"&gt;8. While you are in this console, click on the Issued Certificates container. You should see a list here of all the certificates that this CA has issued. You can also view Pending Requests (for certificates that require approval before being issued) and Failed Requests (there was a problem issuing the cert).&lt;/P&gt;&lt;P style="background: white; outline-style: none; margin: 0in 0in 0pt; outline-color: invert;"&gt;9. Now go back to the local computer certificate console (Start, Run, mmc, enter, File... Add/Remove Snap-in, Certificates, Add, &lt;STRONG style="outline-style: none; outline-color: invert;"&gt;Computer account&lt;/STRONG&gt;, Next, Local computer Finish, OK).&amp;nbsp; Right-click the container under Personal\Certificates, point to All Tasks, Request New Certificate, Next, Next. You should now see the Wireless Server Auth certificate.&amp;nbsp; Choose it and click Enroll. At this point you should now see another certificate in the list. You can tell which one is the one you just issued by looking at the details tab and viewing Certificate Template Information.&lt;/P&gt;&lt;P style="background: white; outline-style: none; margin: 0in 0in 0pt; outline-color: invert;"&gt;10. Now go back to PEAP properties in the Network Policy and choose this certificate.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 17 Oct 2013 12:02:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/aaa-authentication-failure-for-username/m-p/2269658#M19206</guid>
      <dc:creator>Chad Campbell</dc:creator>
      <dc:date>2013-10-17T12:02:01Z</dc:date>
    </item>
    <item>
      <title>Re: AAA Authentication Failure for UserName</title>
      <link>https://community.cisco.com/t5/wireless/aaa-authentication-failure-for-username/m-p/2269659#M19207</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Good to know. Thanks for the update.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;~BR &lt;BR /&gt;Jatin Katyal &lt;BR /&gt; &lt;BR /&gt;**Do rate helpful posts**&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 17 Oct 2013 12:11:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/aaa-authentication-failure-for-username/m-p/2269659#M19207</guid>
      <dc:creator>Jatin Katyal</dc:creator>
      <dc:date>2013-10-17T12:11:28Z</dc:date>
    </item>
  </channel>
</rss>

