cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
13723
Views
36
Helpful
13
Replies

ISE RADIUS VSA question

christensen
Level 1
Level 1

I am trying to integrate an APC PDU to authenticate with RADIUS on ISE. This requires a vendor-specific attribute to be set. I created an APC dictionary with the attributes, and an APC profile that uses the APC dictionary. The PDU network device is set to use the APC profile. On ACS, there was a spot to set the attribute, but I haven't figured out how on ISE. Can anyone tell me what steps I am missing? 

The RADIUS LiveLog shows the login successful, but the PDU doesn't allow the login.

Thanks

1 Accepted Solution

Accepted Solutions

hslai
Cisco Employee
Cisco Employee

I used How do I configure my RADIUS server to authenticate my APC Network Enabled device? to come up with the attached dictionary file, which you may import to ISE per RADIUS-Vendor Dictionaries

Screen Shot 2018-05-11 at 12.35.57 PM.png

Then, use it in an AuthZ profile using the advanced attribute settings.

Screen Shot 2018-05-11 at 12.37.02 PM.png

View solution in original post

13 Replies 13

hslai
Cisco Employee
Cisco Employee

I used How do I configure my RADIUS server to authenticate my APC Network Enabled device? to come up with the attached dictionary file, which you may import to ISE per RADIUS-Vendor Dictionaries

Screen Shot 2018-05-11 at 12.35.57 PM.png

Then, use it in an AuthZ profile using the advanced attribute settings.

Screen Shot 2018-05-11 at 12.37.02 PM.png

Hello thanks for your post I was able to follow the APC guide to set up radius authentication to the web management. I am now trying to integrate the Netbotz Card access to ISE as well. Has anyone had any success. I have imported the dictionary file from APC and have the attributes set in my authorization profile (AuthZ-APC-Admin) 

Access Type = ACCESS_ACCEPT
APC-ACCPX-Doors = BothDoors
APC-Username = User1
APC-ACCPX-Access4 = Wed,00:00,23:59
APC-ACCPX-Access1 = Sun,00:00,23:59
APC-Service-Type = 1
APC-ACCPX-Access3 = Tue,00:00,23:59
APC-ACCPX-Status = Enabled
APC-ACCPX-Access2 = Mon,00:00,23:59

 

I create the a new use using the local identity store with card number as the user and the password that was setup in the radius config on the netbotz. What I am not sure of is how to apply the APC attributes to each of the new cards(users) I set up.

 

Her is the APC site is used for reference.

https://www.apc.com/us/en/faqs/FA156100/

 

Any help would be greatly appreciated 

This is very useful. It worked perfectly. Thank you for posting.

Can someone assist with ISE radius authentication for APC

 

This is what I have so far

- Imported the dictionary for APC

- created a Authorization Profile

- Added APC as a network device on ISE

- made sure secret key is the same thing on both APC and ISE Box

 still not working 

 

 

 

Can someone assist with ISE radius authentication for APC

 

This is what I have so far

- Imported the dictionary for APC

- created a Authorization Profile

- Added APC as a network device on ISE

- made sure secret key is the same thing on both APC and ISE Box

 still not working 

 

 

 

Craig Hyps
Level 10
Level 10

You would need to...

1) Configure ISE as the RADIUS server in APC with specific secret key.

2) Configure the APC device as a NAD in ISE with correct IP address and matching RADIUS key.

3) Create APC dictionary file - copy the following into text file with .dict extension:

VENDOR APC 318

BEGIN-VENDOR APC

ATTRIBUTE APC-Service-Type 1 integer APC
ATTRIBUTE APC-Outlets 2 string APC

VALUE APC-Service-Type Admin 1
VALUE APC-Service-Type Device 2
VALUE APC-Service-Type ReadOnly 3
VALUE APC-Service-Type Outlet 4

4) Import dictionary into ISE under Policy > Policy Elements > Dictionary > Radius > Radius Vendors

5) As an authorization to access APC, return the desired permission in the Authorization Profile under Advanced Attributes:

More info at How do I configure my RADIUS server to authenticate my APC Network Enabled device?

/Craig

christensen
Level 1
Level 1

Thanks for the answers.  I finally got it to work. ISE 2.3 is picky about for Auth. profiles; I had to try several different things several times before it didn't give me a Auth. Profile not found when trying to authenticate.

Cory,

Is there any way you can post a screen shot of your Advanced Attribute settings for the APC Authorization Profile?  I imported the above VSA file and have tried the above settings and several others with no luck.  Depending on my advanced attribute settings sometimes I get Authorized but still can't login in to the PDU.

I am trying to move from ACS to ISE and my ACS has the same settings as the example above but authentication doesn't work on ISE even though the dictionary and policies are the same on ISE as ACS. Does anyone know if there is something else in ISE that needs to be enabled for this authentication to work?

craiglebutt
Level 4
Level 4

Hi

Would it be possible to share the Policy set for this?

Cheers

R.e..g.
Level 1
Level 1

Just in case anyone is interested, I too had a problem with "15019 Could not find selected Authorization Profiles". I had to delete the Auth(Z) result, and then recreate it. Once I did that it worked. ISE seems to be finicky about the order policies are implemented.

hslai
Cisco Employee
Cisco Employee

Thanks a lot for contributing this info. If you have a specific sequence to recreate this issue and if you have a TAC case open on it, please ask TAC to open a bug. Otherwise, please let me know.

Maybe it is interessting, that it seems this bug CSCvs61423 is still not solved in version 3.1 patch 3.
But the workaround to delete and re-create the authorization result again is working.