<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Radius authentication in Wireless</title>
    <link>https://community.cisco.com/t5/wireless/radius-authentication/m-p/655424#M69797</link>
    <description>&lt;P&gt;hello there,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;someone could you tell me how it works?&lt;/P&gt;&lt;P&gt;aaa group server radius infrastructure&lt;/P&gt;&lt;P&gt; server 10.236.0.163 auth-port 1645 acct-port 1646&lt;/P&gt;&lt;P&gt; server 10.238.2.8 auth-port 1812 acct-port 1813&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;10.236.0.163 is my ACS&lt;/P&gt;&lt;P&gt;10.238.2.8 is my AP root bridge&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;my dout is, why are they using differents ports and why I scanned 10.238.2.8, I don' t sse any port opened.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;kind Regards&lt;/P&gt;</description>
    <pubDate>Sat, 03 Jul 2021 20:25:44 GMT</pubDate>
    <dc:creator>santos.alberto</dc:creator>
    <dc:date>2021-07-03T20:25:44Z</dc:date>
    <item>
      <title>Radius authentication</title>
      <link>https://community.cisco.com/t5/wireless/radius-authentication/m-p/655424#M69797</link>
      <description>&lt;P&gt;hello there,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;someone could you tell me how it works?&lt;/P&gt;&lt;P&gt;aaa group server radius infrastructure&lt;/P&gt;&lt;P&gt; server 10.236.0.163 auth-port 1645 acct-port 1646&lt;/P&gt;&lt;P&gt; server 10.238.2.8 auth-port 1812 acct-port 1813&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;10.236.0.163 is my ACS&lt;/P&gt;&lt;P&gt;10.238.2.8 is my AP root bridge&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;my dout is, why are they using differents ports and why I scanned 10.238.2.8, I don' t sse any port opened.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;kind Regards&lt;/P&gt;</description>
      <pubDate>Sat, 03 Jul 2021 20:25:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/radius-authentication/m-p/655424#M69797</guid>
      <dc:creator>santos.alberto</dc:creator>
      <dc:date>2021-07-03T20:25:44Z</dc:date>
    </item>
    <item>
      <title>Re: Radius authentication</title>
      <link>https://community.cisco.com/t5/wireless/radius-authentication/m-p/655425#M69798</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ports 1645 &amp;amp; 1646 and ports 1812 and 1813 are all valid RADIUS ports. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1645 and 1812 are authentication / authorization ports &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1646 and 1813 are accounting ports (who's on, how long, what did they do)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The two servers may be using the different port ranges to split the load, offer more authentication / accounting options ... no telling why, but it appears to be valid.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Scanning the AP/Root bridge would be the same effect as scanning a switch (or a chunk of wire) ... it's only infrastructure. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If anything, you'd scan 10.238.2.8 (the ACS server) or one of the RADIUS boxes; they are platforms and would have the open ports).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;An AP or bridge is a Layer two device (at best) and don't know anything about Layer 3 ports. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Good Luck&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Scott&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 28 Dec 2006 17:53:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/radius-authentication/m-p/655425#M69798</guid>
      <dc:creator>scottmac</dc:creator>
      <dc:date>2006-12-28T17:53:58Z</dc:date>
    </item>
    <item>
      <title>Re: Radius authentication</title>
      <link>https://community.cisco.com/t5/wireless/radius-authentication/m-p/655426#M69799</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ACS default Auth/Acct ports for RADIUS are 1645/1646.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Aironet AP running IOS that supports "Local RADIUS" default Auth/Acct ports are 1812/1813.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My guess is that your AP was configured (at least partially) to support LEAP authentication of 'infrastructure' devices (e.g. AP's in a WDS infrastructure).  Hence the server group named "infrastructure" and the configuration of the AP itself as a RADIUS Server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The full configuration of the AP and details of your infrastructure might help.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Ben&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 29 Dec 2006 20:30:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/radius-authentication/m-p/655426#M69799</guid>
      <dc:creator>Benjamin Solero</dc:creator>
      <dc:date>2006-12-29T20:30:08Z</dc:date>
    </item>
    <item>
      <title>Re: Radius authentication</title>
      <link>https://community.cisco.com/t5/wireless/radius-authentication/m-p/655427#M69800</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The original RFC for radius issued ports 1645/1646 which conflicted with the datametrics service. Because of this RFC 2865 officially assigned port numbers 1812/1813 for RADIUS.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So, what you have here is simply two radius servers (probably for redundancy) listening on different ports.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The following tech note has more detail:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/tech/tk59/technologies_tech_note09186a00800945cc.shtml" target="_blank"&gt;http://www.cisco.com/en/US/tech/tk59/technologies_tech_note09186a00800945cc.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;Andrew.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 02 Jan 2007 12:48:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/radius-authentication/m-p/655427#M69800</guid>
      <dc:creator>andrew.burns</dc:creator>
      <dc:date>2007-01-02T12:48:12Z</dc:date>
    </item>
    <item>
      <title>Re: Radius authentication</title>
      <link>https://community.cisco.com/t5/wireless/radius-authentication/m-p/655428#M69801</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;radius works via udp.  Most port scanners only handle TCP.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 30 Aug 2007 19:14:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/radius-authentication/m-p/655428#M69801</guid>
      <dc:creator>brent-miller</dc:creator>
      <dc:date>2007-08-30T19:14:34Z</dc:date>
    </item>
  </channel>
</rss>

