06-03-2015 03:53 AM - edited 03-10-2019 10:46 PM
Hello Dears,
I have switch 2960G-48TC-L , its connected to a radius server and i have configure it as bellow
version 15.0 no service pad service timestamps debug datetime msec service timestamps log datetime msec no service password-encryption service sequence-numbers ! hostname SWICH ! boot-start-marker boot-end-marker ! ! username cisco privilege 15 password 0 pass aaa new-model ! ! aaa group server radius RadiusActiveDirectory server name DCP ! aaa authentication login default group RadiusActiveDirectory local aaa authentication enable default none aaa authorization exec default group RadiusActiveDirectory local ! aaa session-id common no ip domain-lookup ip domain-name lab.com vtp mode transparent udld aggressive
spanning-tree mode rapid-pvst spanning-tree portfast default spanning-tree extend system-id ! system mtu jumbo 9198 ! vlan internal allocation policy ascending ! vlan 100 name Training ! vlan 110 name iSCSI ! ip ssh version 2 ! ! ! ! ! interface Loopback0 no ip address ! interface FastEthernet0 no ip address shutdown !
interface range GigabitEthernet1/0/9 -48 description Clients switchport access vlan 100 switchport mode access switchport nonegotiate ! i interface Vlan1 no ip address shutdown ! interface Vlan100 ip address 10.5.1.1 255.255.255.0 no shut ! no ip http server no ip http secure-server ! ip access-list extended ACL_MGMT permit tcp 10.5.1.0 0.0.255.255 any eq 22 deny ip any any log ip radius source-interface Vlan185 access-list 10 remark SNMP Management access-list 10 permit 10.5.1.23 access-list 10 remark SNMP Management ! snmp-server group v3group v3 priv read v3view snmp-server view v3view iso included snmp-server view v3view internet included snmp-server view v3view cisco excluded snmp-server view v3view ip.21 excluded snmp-server view v3view ipForward excluded snmp-server view v3view local excluded snmp-server view v3view ciscoConfig included snmp-server view v3view ciscoEnvMonMIB included snmp-server view v3view ciscoCdpMIB included snmp-server view v3view ciscoImageMIB included snmp-server view v3view ciscoConfigManMIB included snmp-server view v3view ciscoVtpMIB included snmp-server view v3view ciscoMemoryPoolMIB included snmp-server view v3view ciscoVlanMembershipMIB included snmp-server view v3view ciscoStpExtensionsMIB included snmp-server view v3view ciscoPagpMIB included snmp-server view v3view ciscoEntityFRUControlMIB included snmp-server view v3view ciscoVlanIfTableRelationshipMIB included snmp-server view v3view ciscoIfExtensionMIB included snmp-server view v3view lip.2 excluded snmp-server view v3view ciscoProcessMIB.1.1 included ! ! radius server DCP address ipv4 10.5.1.16 auth-port 1645 acct-port 1646 automate-tester username radiustest idle-time 10 key pass ! ! line con 0 line vty 0 4 access-class ACL_MGMT in transport input ssh transport output ssh line vty 5 15 access-class ACL_MGMT in transport input ssh transport output ssh ! #######################################################
so when i access as ssh i receive the message ((Access denied )) i have test the aaa by the command test aaa group radius Administrator password legacy
and i got the message
Attempting authentication test to server-group radius using radius
but when delete this commands
aaa authentication login default group RadiusActiveDirectory local aaa authorization exec default group RadiusActiveDirectory local
could access via SSH and the test command working properly as well
what's a possible wrongs in my configuration ?
Thanks in advance for your cooperation.
|
06-03-2015 07:13 AM
Hi,
I use following configuration to authenticate against radius:
(just change the auth ports to whatever you use in your environment. Looks like you have 1645 and 1646)
username <username> password <password>
aaa new-model
radius server RADIUS-1
address ipv4 <IP address Radius-1> auth-port 1812 acct-port 1813
timeout 5
retransmit 3
non-standard
key <shared secret>
radius server RADIUS-2
address ipv4 <IP address Radius-2> auth-port 1812 acct-port 1813
timeout 5
retransmit 3
non-standard
key <shared secret>
aaa group server radius RADIUS-SERVERS
server name RADIUS-1
server name RADIUS-2
subscriber mac-filtering security-mode mac
aaa authentication login default group RADIUS-SERVERS local
aaa authentication enable default group RADIUS-SERVERS local
aaa authentication dot1x default group RADIUS-SERVERS
aaa authorization console
aaa authorization exec default group RADIUS-SERVERS local
aaa authorization network default group RADIUS-SERVERS
line vty 0 15
logging synchronous
exec-timeout 20 0
transport input ssh
login authentication default
Give it a try...
Regards,
Markus
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide