cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
1644
Views
3
Helpful
5
Replies

Cannot login to WLC 9800 GUI using Radius

Moudar
VIP Alumni
VIP Alumni

Hi,

We are currently using RADIUS (ISE) for authentication, and while we can successfully log into the CLI of our Cisco 9800 via the AAA server, we encounter a "Wrong Credentials. Please Login again." message when attempting to log into the GUI.

The logs on ISE indicate "5200 Authentication succeeded."

For reference, logging into the GUI using a local account works without any issues.

 

 

WLC#sh run | in http
ip http server
ip http secure-server
  destination transport-method http

 

so any ideas?

 

1 Accepted Solution

Accepted Solutions

This configuration works well:

aaa authentication login default group RADIUS_AUTH local line
aaa authentication dot1x default group RADIUS_AUTH
aaa authorization exec default-web group RADIUS_AUTH local
aaa authorization network default group RADIUS_AUTH
aaa accounting exec default start-stop group RADIUS_AUTH
 
ip http authentication aaa login-authentication default
ip http authentication aaa exec-authorization default-web

It needed to understand the concept of "Method lists"

View solution in original post

5 Replies 5

Mark Elsen
Hall of Fame
Hall of Fame

 

 - Do you have the radius server configured to return av pair with priv levels 15 ?

 M.



-- Let everything happen to you  
       Beauty and terror
      Just keep going    
       No feeling is final
Reiner Maria Rilke (1899)

cisco1.JPG

do we need to add anything else ? for web auth.

Moudar
VIP Alumni
VIP Alumni

It works now adding "aaa authorization exec default group RADIUS_AUTH" to the aaa configuration

I don't realy understand why adding that line would allow aaa to GUI, when login to CLI it goes directly to #mode

 

Rich R
VIP
VIP

You should have a good read through https://www.cisco.com/c/en/us/support/docs/wireless/catalyst-9800-series-wireless-controllers/214490-configure-radius-and-tacacs-for-gui-and.html

 

------------------------------
Please click Helpful if this post helped you and Accept as Solution (drop down menu at top right of this reply) if this answered your query.
------------------------------
TAC recommended codes for AireOS WLC's   and   TAC recommended codes for 9800 WLC's
Best Practices for AireOS WLC's,   Best Practices for 9800 WLC's   and   Cisco Wireless compatibility matrix
Check your 9800 WLC config with Wireless Config Analyzer using "show tech wireless" output or "config paging disable" then "show run-config" output on AireOS and use Wireless Debug Analyzer to analyze your WLC client debugs
Field Notice: FN63942 APs and WLCs Fail to Create CAPWAP Connections Due to Certificate Expiration
Field Notice: FN72424 Later Versions of WiFi 6 APs Fail to Join WLC - Software Upgrade Required
Field Notice: FN72524 IOS APs stuck in downloading state after 4 Dec 2022 due to Certificate Expired
- Fixed in 8.10.196.0, latest 9800 releases, 8.5.182.12 (8.5.182.13 for 3504) and 8.5.182.109 (IRCM, 8.5.182.111 for 3504)
Field Notice: FN70479 AP Fails to Join or Joins with 1 Radio due to Country Mismatch, RMA needed
Field Notice: FN74383 APs Running 17.12.4/5/6/6a May Run Out of Flash Space Preventing Upgrades
How to avoid boot loop due to corrupted image on Wave 2 and Catalyst 11ax Access Points (CSCvx32806)
Field Notice: FN74035 - Wave2 APs DFS May Not Detect Radar After Channel Availability Check Time
Leo's list of bugs affecting 2800/3800/4800/1560 APs
Default AP console baud rate from 17.12.x is 115200 - introduced by CSCwe88390

This configuration works well:

aaa authentication login default group RADIUS_AUTH local line
aaa authentication dot1x default group RADIUS_AUTH
aaa authorization exec default-web group RADIUS_AUTH local
aaa authorization network default group RADIUS_AUTH
aaa accounting exec default start-stop group RADIUS_AUTH
 
ip http authentication aaa login-authentication default
ip http authentication aaa exec-authorization default-web

It needed to understand the concept of "Method lists"

Review Cisco Networking for a $25 gift card