Heads Up :
The post you are writing will appear in a public forum. Please ensure all content is appropriate for public consumption. Review the employee guidelines for the community here.
Concept:Hi, just to mention: I tested 802.1X fallback method WebAuth successfully on a Catalyst 3750, 12.2(55)SE3, while using Microsoft NPS Windows Server 2008R2 as the RADIUS-Server. You can step straight forward http://www.cisco.com/en/US/prod/col...
Hi,according to http://www.cisco.com/en/US/prod/collateral/iosswrel/ps6537/ps6586/ps6638/config_guide_c17-663759.pdf (MAC Authentication Bypass Deployment Guide as of May 2011), when you use Microsoft NPS, you cannot simply add MAC-Adresses as Active...
Scott, I just found your eventlog on the Cisco site. It says Reason: The Network Access Permission setting in the dial-in properties of the user account in Active Directory is set to Deny access to the user. To change the Network Access Permission se...
Scott, I’ve attached screenshots of my NPS configuration. It’s quite simple, and doesn’t use MD5 (when I was trying to get it running, I read some articles on the web that said that MD5 is not necessary (supported?) because it does not offer addition...
Scott, I’m going to email some examples within the next few days. Stefan Von: scottlian Gesendet: Donnerstag, 29. September 2011 10:02An: Moser, Stefan (SIDB)Betreff: - Re: 802.1x MAB with Microsoft NPS ieee802Device object group Cisco Support Com...
Update:I got it running in my lab with Active Directory fine-grained password policies.Steps required:1.) Raise functional domain level to Windows 2008 2.) Follow the step-by-step guide http://technet.microsoft.com/en-us/library/cc770842(WS.10).aspx ...
Update:I opened an official case with Microsoft Support. They worked out that the ieee802Device class can NOT be used with NPS/IAS, because the class does not contain a username attribute. The existence of the username attribute is required by NPS/IA...