09-19-2024 01:20 AM
The management function of 240ac Wifi accesspoints does periodic radius requests with a user named "cisco-probe". Part of "Active Fallback" radius mode.
Currently these requests fail, and fill up my logs.
Which password does this "cisco-probe" user have? How can i set one?
Or is there some other recommended radius config for this probe user?
09-19-2024 05:14 AM
- Look it up here : https://www.cisco.com/c/en/us/support/docs/smb/wireless/CB-Wireless-Mesh/2077-Configure-RADIUS-CBW.html
and or following instructions for modifying 'cisco-probe' accordingly
M.
09-19-2024 06:03 AM
ok, then i have a different user name.
But how do i set a password?
Radius in use here is Microsoft NPS. I dont think i can have a user without a password.
09-19-2024 06:11 AM
- What do you mean by password and user(s) ; - are you talking about the admin user ?
- do you want to create users ?
- are you referring to the Shared Secret for radius ?
M.
09-19-2024 06:27 AM
no, i am talking about the cisco-probe user.
240AC periodically tries a login to the configured radius server (here Microsoft NPS) using this username. This login attempts fail and create security log entries.
09-19-2024 09:39 AM
- Apparently and according to the document this is only used when configuring Active Fallback mode when using (or detecting) standby radius servers , I think it's safe to disable this Active Fallback mode , especially if only one radius server is used ; and it will have no impact otherwise neither ,
M.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide