* What position in the password are you inserting the special characters?
I've run into issues before on Cisco equipment (but not necessarily IDS-IPS), where they had issues with certain special characters being used for passwords/shared secrets. I usually try to stay away from using @, #, %, and &. I've also seen problems with using special characters as the first or last character in a password/secret.
Other than that ...
You mention that the password has a problem with "the built in acceptable password policy", and that it's not actually attempting RADIUS authentication. So, the user successfully configures their password via their A/D account to include special characters. Then, when logging in to the IPS, after entering those credentials, it gives some kind of *local* error on the IPS regarding the password?
*Can you provide the error message you're seeing, either from the device logs, or the error given to the user?
I was under the impression that the built-in password policy was only used to verify passwords when they were changed or created. If anything, that policy should not be applied at all when RADIUS authentication is enabled. But, I could be wrong about that.
You might want to check the Bug Toolkit on CCO for any related bugs already opened. The IPS release notes don't include open caveats for each release, only resolved ones.
The purpose of this document is to demonstrate how ISE authenticate / authorize a user that uses a smart card (PIN + Certificate) and password mechanism to login their system. This document describes the components used for this setup, configuration of IS...
For all versions of the Email Security Appliance (ESA) and Security Management Appliance (SMA), some Secure Sockets Link (SSL) certificates issued from the QuoVadis root certificate authority (CA) trust chain before 2021-03-31 cannot b...
Automation and programmability for networking and security are increasingly important topics. Every release since ISE 1.2 has included new REST API capabilities to better automate and integrate ISE with the rest of your network, appli...
The latest iteration (v2.3.4) of the Cisco Secure Firewall Migration Tool adds public beta support for S2S VPN migrations from ASA:
Policy-based (crypto map) Pre-Shared key authentication type VPN configuration to Firepower Management Center
Cisco Defense Orchestrator (CDO) is a cloud-based, multi-device manager that manages security products like Adaptive Security Appliance (ASA), Firepower Threat Defense next-generation firewall, and Meraki devices, to name a few.
We make improvement...