04-16-2019 06:25 AM
Hi, does anybody know what to fill in in the RADIUS-test (Username / Password)?
Is it an Cisco ISE (RADIUS-server) account? (didn´t work).
Is it an Active Directory account? (didn´t work).
My RADIUS-server Cisco ISE is working well, everything does as it should be.
But I want to know how this test is working.
thanks
04-16-2019 06:43 AM
Try !YOURDOMAIN!/username and password.
04-16-2019 11:37 PM
This is not working. This error message appeared: Authentication failed while testing on one of your APs. This means the RADIUS server was reached but your credentials were incorrect. The test was stopped to prevent this account from being locked out due to multiple failed attempts. Please try again with different username and/or password.
I think it´s not a domain-account.
04-17-2019 02:38 PM
Ok My radius was working perfectly, but I updated my Windows Server 2019 and promoted to Domain Controller. There is a firewall rule allowing NPS but their is a Windows bug in the firewall.
If your Radius server is Windows temporarily disable all firewalls and try to Authenticate again.
you will get Authentication Failed even if you reach radius server.
Firewall bug blocking port 1812
04-20-2019 05:30 AM
The Radius server is not a Windows-server it´s the Cisco ISE.
08-27-2019 02:10 PM
Thank goodness I read this post. It was for sure the firewall. I disabled the firewall and everything passed. I literally resintalled a fresh server 2019 standard and datacenter, checked my 1812-1813 firewall rules and nothing worked. Thank you thank you thank you
08-27-2019 02:11 PM
04-16-2019 08:28 AM
It's whatever that RADIUS server you specified is configured to authenticate against. Check the RADIUS logs to see why it's failing.
04-16-2019 11:14 AM
if the Radius server is running on say "mydomain.com" it already knows the Realm
so you would only put in user/pass in those fields.
you do not need the Realm Domain or @domain.com
03-06-2020 08:23 AM
For anyone still looking, just ran into this issue myself. For some reason the pre-existing firewall rule for port 1812 is garbage and doesn't work. If you disable Windows firewall or make a new rule to allow just port 1812 everything functions as it should.
03-09-2020 11:04 AM
On ISE, have you need to enable weak ciphers option in allowed protocols? Otherwise a test from Meraki dashboard will not hit your ISE rules.
12-21-2021 06:15 AM
So I have the same problem . Where I get obtein the username ?
@redsector did you get acces?
12-21-2021 06:29 AM
-Yes, it´s working.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide