06-19-2020 03:49 AM
Seems like i got something wrong, only i cannot find what's going sideways.
I can ping my ISE RADIUS servers in the default Mgmt-vrf but still, authentication requests are not reaching ISE.
Strangely enough i can ping these RADIUS servers within the default Mgmt-vrf, but when look at the "show AAA servers" believing there seems to be something not ok because of the DEAD, i have no clue what this Platform State from SMD means.
In addition, "test aaa group radius server 192.168.255.49 auth-port 1812 acct-port 1813 test-user test legacy" throws an "access reject" response on the console, from which i would conclude that all is working fine, but checking the RADIUS live logs in ISE i don't see any failed authentication.
If i test with "test aaa group radius server 192.168.255.49 auth-port 1812 acct-port 1813 test-user test new-code", it again throws an "access reject" response on the console, and now RADIUS live logs in ISE display the failed authentication!
TCP dump on ISE during the legacy test doesn't show any RADIUS packets, during new-code test, RADIUS packets are visible.
Hope someone can help me troubleshoot en eventually solve this issue.
Thanks!
Solved! Go to Solution.
06-10-2021 10:09 AM
Not sure if you ever got your answer but in our environment I found that I needed the following command in the global configuration to get Radius over VRF to work.
ip radius source-interface GigabitEthernet0/0 vrf Mgmt-vrf
06-19-2020 05:40 AM
06-19-2020 03:17 PM - edited 06-19-2020 03:22 PM
Thanks for the suggestion but I gave multiple info that connectivity inside the VRF is fine, i read the Cisco docs on AAA per VRF, so i don't think that's the issue.
Moreover i have the exact same config you posted with the only difference that my source interface is Gi0/0 - which is a management interface on the switch and in the same VRF ofcourse - it's a Catalyst 3850
Again, "test aaa group radius server 192.168.255.49 auth-port 1812 acct-port 1813 test-user test legacy" throws an "access reject" response on the console which is the expected behaviour, from which i would conclude that all is working fine, but checking the RADIUS live logs in ISE i don't see any failed authentication.
If i test with "test aaa group radius server 192.168.255.49 auth-port 1812 acct-port 1813 test-user test new-code", it again throws an "access reject" response on the console, and now RADIUS live logs in ISE display the failed authentication!
06-10-2021 10:09 AM
Not sure if you ever got your answer but in our environment I found that I needed the following command in the global configuration to get Radius over VRF to work.
ip radius source-interface GigabitEthernet0/0 vrf Mgmt-vrf
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide