Radius AAA authentication

I couldn't find anything relevant, but apologies if it has already been answered.
Is there any way of encrypting the traffic between a switch and a radius server when using radius to authenticate switch logins? As far as I can tell the traffic is passed between the switch and the radius server in plain text by default.

Hi,
Please bear in mind that it is not the RADIUS protocol that bings security, but rather the authentication method inside it.
Example, if you use PEAP or EAP-TLS, the authentication is all carried inside a TLS tunnel.
You can sniff the RADIUS packets but you will not be able to get any critical information from the client.
Think on the RADIUS as a transport mechanism for EAP authentication.
HTH,
Tiago
If  this helps you and/or answers your question please mark the question as  "answered" and/or rate it, so other users can easily find it.

Similar Messages

  • Cisco Nexus to use Radius AAA authentication using Microsoft 2008 NPS

    I have a Nexus 7010 running
    Just wondering if you can help me with something. I'm having an issue with command authorization thru our aaa config. We don't have a problem authenticating its command authorization that is not working. From what I have seen and read Nexus NX-OS 6.x does not have any commands for aaa authorization unless you are configuring TACACS+. My basic config is below if you can help it would be much appreciated.
    >>ip radius source-interface mgmt 0
    >>radius-server key XXXXX
    >>radius-server host X.X.X.X key XXXXX authentication accounting
    >>radius-server host X.X.X.X key XXXXX authentication accounting aaa
    >>authentication login default group Radius_Group aaa authentication
    >>login console local aaa group server radius Radius_Group
    >>    server X.X.X.X
    >>    server X.X.X.X
    >>    source-interface mgmt0
    Also does anyone know how to configure Microsoft 2008 NPS as a Raduis server to work with Nexus? I have read a few post that suggest changing the
    shell:roles="vdc-admin" in the  Attribute Value field in the RADIUS server
    Does anyone know if this works????
    Thanks

    I have never done this before with ACS but not with NPS. However, you are in the right path. Nexus uses NX-OS which is different in some regards to regular IOS. One of those differences is the AAA setup. In NX-OS you assign users to roles. So for full access you will need to return the following attributes from your Radius server:
    Attribute: cisco-av-pair
    Requirement: Mandatory
    Value: shell:roles*"network-admin vdc-admin"
    For more information take a look at this link:
    http://www.cisco.com/c/en/us/support/docs/security/secure-access-control-system/115925-nexus-integration-acs-00.html
    Hope this helps
    Thank you for rating helpful posts!

  • AAA Authentication for Traffic Passing through ASA

    I am setting up AAA authentication for traffic that will pass through my ASA. I am having difficulty enabling 'aaa authentication secure-http-client'. Without secure communications enabled access functions as expected. When I enable access, I get prompted for a username/password. The username/password is entered. Authentication passes (show uauth). The requested page (http://www.cisco.com) switches to https://x.x.x.x (a resolved IP address for the site). Eventually (5 seconds), I am asked to accept or deny a certificated. Interestingly, the certificate is for the ASA and not the requested site (http://www.cisco.com).
    Am I missing something?
    firewall# show run aaa
    aaa authentication http console TACACS+ LOCAL
    aaa authentication telnet console TACACS+ LOCAL
    aaa authentication serial console TACACS+ LOCAL
    aaa authentication ssh console TACACS+ LOCAL
    aaa authentication enable console TACACS+ LOCAL
    aaa authentication match guestnetwork_access guestnetwork RADIUS
    aaa authentication secure-http-client
    firewall# show access-li guestnetwork_access
    access-list guestnetwork_access; 2 elements
    access-list guestnetwork_access line 1 extended deny udp 10.255.255.0 255.255.255.0 any eq domain (hitcnt=33)
    access-list guestnetwork_access line 2 extended permit ip 10.255.255.0 255.255.255.0 any (hitcnt=412)
    firewall# show run aaa-s
    aaa-server RADIUS protocol radius
    aaa-server RADIUS (inside) host 192.168.250.14
    key xxxxx
    firewall# show run http
    http server enable

    your definition for the aaa-server is different to the aaa authentication server-group
    try
    aaa authentication http console RADIUS LOCAL
    aaa authentication telnet console RADIUS LOCAL

  • Aaa authentication enable default group tacacs+ enable

    I am implementing CSACS 4.0. First on the client, I will apply aaa authenticatio/ authorization under vty. The issure if I use the followin command
    aaa authentication enable default group tacacs+ enable
    what will happen if I login via console? Will I be required to enter any username/password?
    Below is my configuration
    aaa new-model
    aaa authentication login authvty group TACACS + local
    aaa authentication enable default group tacacs+ enable
    aaa authorization commands 15 authvty TACACS+ local
    TACACS-server host IP
    Tacacs-server key key
    Ip tacacs source-interface VLAN 3
    aaa accounting send stop-record authentication failure
    aaa accounting delay-start
    aaa accounting exec authvty start-stop group tacacs+
    aaa accounting commands 15 authvty start-stop group tacacs+
    aaa accounting connection authvty start-stop group tacacs+
    line vty 0 15
    login authentication authvty
    authorization commands 15 authvty
    accounting connection authvty
    accounting commands 15 authvty
    accunting exec authvty
    Any suggestion will be appreciated!

    It should work because this is a message.banner prompt everytime you try to login (console/vty). I have it configured on my router.
    If you have banner motd, it will be displayed as well (see below). So I ahve to remove it to get only the aaa banner & prompt being displayed:
    *** Username: cisco, Password: cisco (priv 15f - local) ****
    Unauthorized use is prohibited.
    Enter your name here: user1
    Enter your password now:
    Router#
    The config more or less looks like:
    aaa new-model
    aaa authentication banner ^CUnauthorized use is prohibited.^C
    aaa authentication password-prompt "Enter your password now:"
    aaa authentication username-prompt "Enter your name here:"
    aaa authentication login default group radius
    aaa authentication login CONSOLE local
    HTH
    AK

  • AAA authentication / Radius-Servers

                       Hello cisco folks,
    Have a technical question I would like to ask. I'm able to setup my 3750e switch to login through a radius server with my company user id and password but would like to be able to set it up that when I log in it drops me on the enable prompt. Right now I have to type >en.
    Then the enable password.  Thanks in advance.
    Paul

    Hi Bro
    Yes, this can be achieved in Cisco IOS devices but not in Cisco ASA. In Cisco ASA, you still have to type the "enable" command.
    Just ensure you've the configuration shown below, and all should be good;
    enable password cisco
    aaa new-model
    aaa authentication login VTY group radius local
    aaa authentication login CONSOLE local
    aaa authentication enable default group radius enable
    aaa authorization console
    aaa authorization config-commands
    aaa authorization exec VTY group radius local
    username ram privilege 15 password 0 cisco
    username cisco privilege 7 password 0 cisco
    interface FastEthernet0/0
    ip address 10.0.0.2 255.255.255.0
    ip route 0.0.0.0 0.0.0.0 10.0.0.1
    ip radius source-interface FastEthernet0/0
    radius-server host 10.0.0.100 auth-port 1645 acct-port 1646 key cisco
    privilege interface level 7 shutdown
    privilege interface level 7 ip address
    privilege interface level 7 ip
    privilege interface level 7 no shutdown
    privilege interface level 7 no ip address
    privilege interface level 7 no ip
    privilege interface level 7 no
    privilege configure level 7 interface
    privilege configure level 7 shutdown
    privilege configure level 7 ip
    privilege configure level 7 no interface
    privilege configure level 7 no shutdown
    privilege configure level 7 no ip
    privilege configure level 0 no
    privilege exec level 7 configure terminal
    privilege exec level 7 configure
    privilege exec level 7 undebug ip rip
    privilege exec level 7 undebug ip
    privilege exec level 7 undebug all
    privilege exec level 7 undebug
    privilege exec level 7 debug ip rip
    privilege exec level 7 debug ip
    privilege exec level 7 debug all
    privilege exec level 7 debug
    line con 0
    authorization exec VTY
    login authentication VTY
    line aux 0
    line vty 0 4
    authorization exec VTY
    login authentication VTY
    end
    Note: Ensure your user ID in your Radius server has the correct av-pair parameters shell:priv-lvl=15
    P/S: if you think this comment is helpful, please do rate it nicely :-)

  • AAA authentication with RADIUS

    Hi,
    aaa authentication login user-list group radius local
    radius-server host 10.1.1.3 auth-port 1645 acct-port 1646 key xxxx
    radius-server deadtime 10
    If i add more radius-server host such as
    radius-server host 10.1.1.4 auth-port 1645 acct-port 1646 key xxxx
    1. Server 10.1.1.4 will be backup for server 10.1.1.3?
    2. Can i configure to be radius group?
    Thanks

    Hi,
    you can try the following:
    Router(config)# aaa group server radius
    Router(config-sg radius)# server 10.1.1.3
    Router(config-sg radius)# server 10.1.1.4
    when you configure the aaa group like this 10.1.1.3 will be primary and 10.1.1.4 is secondary
    Hope this helps.
    Regards,
    Anisha
    P.S.: please mark this thread as answered if you feel your query is resolved. Do rate helpful posts.

  • Cisco AAA authentication with windows radius server

    Cisco - Windows Radius problems
    I need to created a limited access group through radius that I can have new network analysts log into
    and not be able to commit changes or get into global config.
    Here are my current radius settings
    aaa new-model
    aaa group server radius IAS
     server name something.corp
    aaa authentication login USERS local group IAS
    aaa authorization exec USERS local group IAS
    radius server something.corp
     address ipv4 1.1.1.1 auth-port 1812 acct-port 1813
     key mypassword
    line vty 0 4
     access-class 1 in
     exec-timeout 0 0
     authorization exec USERS
     logging synchronous
     login authentication USERS
     transport input ssh
    When I log in to the switch, the radius server is passing the corrrect attriubute
    ***Jan 21 13:59:51.897: RADIUS:   Cisco AVpair       [1]   18  "shell:priv-lvl=7"
    The switch is accepting it and putting you in the correct priv level.
    ***Radius-Test#sh priv
       Current privilege level is 7
    I am not sure why it logs you in with the prompt for  privileged EXEC mode when
    you are in priv level 7. This shows that even though it looks like your in priv exec
    mode, you are not.
    ***Radius-Test#sh run
                    ^
       % Invalid input detected at '^' marker.
       Radius-Test#
    Now this is where I am very lost.
    I am in priv level 7, but as soon as I use the enable command It moves me up to 15, and that gives me access to
    global config mode.
    ***Radius-Test#enable
       Radius-Test#
    Debug log -
    Jan 21 14:06:28.689: AAA/MEMORY: free_user (0x2B46E268) user='reynni10'
    ruser='NULL' port='tty390' rem_addr='10.100.158.83' authen_type=ASCII service=ENABLE priv=15 vrf= (id=0)
    Now it doesnt matter that I was given priv level 7 by radius because 'enable' put me into priv 15
    ***Radius-Test#sh priv
       Current privilege level is 15
       Radius-Test#
    I have tried to set
    ***privilege exec level 15 enable
    It works and I am no longer able to use 'enable' when I am at prv level 7, but I also cannot get the commands they will need to work.
    Even if I try to do
    ***privilege exec level 7 show running-config (or other variations)
    It will allow you to type sh run without errors, but it doest actually run the command.
    What am I doing wrong?
    I also want to get PKI working with radius.

    I can run a test on my radius system, will report back accordingly, as it's a different server than where I am currently located.
    Troubleshooting, have you deleted the certificate/network profile on the devices and started from scratch?

  • Cisco 871W as Radius Local Authenticator

    We are tring to configure an Cisco 871w as an access point and also as an local authenticator.The NAS would be the same server. The sample config is as below
    aaa group server radius rad_eap
    server 10.10.200.1 auth-port 1645 acct-port 1646
    aaa group server radius rad_mac
    aaa group server radius rad_acct
    aaa group server radius rad_admin
    aaa group server tacacs+ tac_admin
    aaa group server radius rad_pmip
    aaa group server radius dummy
    aaa authentication login eap_methods group rad_eap
    aaa authentication login mac_methods local
    aaa authorization ipmobile default group rad_pmip
    aaa accounting network acct_methods start-stop group rad_acct
    aaa session-id common
    ip dhcp excluded-address 10.10.200.1
    ip dhcp excluded-address 10.10.200.31 10.10.200.254
    ip dhcp pool <pool_name>
    import all
    network 10.10.200.0 255.255.255.0
    dns-server 141.x.x.6 141.198.136.12
    default-router 10.10.200.1
    lease 0 2
    interface Dot11Radio0
    ip address 10.10.200.1 255.255.255.0
    ssid <SSID Name>
    authentication network-eap eap_methods
    speed basic-1.0 basic-2.0 basic-5.5 6.0 9.0 basic-11.0 12.0 18.0 24.0 36.0 48.0 54.0
    station-role root
    ip classless
    ip http server
    ip http secure-server
    radius-server local
    nas 10.10.200.1 key 0 <key>
    user test nthash xxx
    radius-server attribute 32 include-in-access-req format %h
    radius-server host 10.10.200.1 auth-port 1645 acct-port 1646 key <key>
    radius-server vsa send accounting
    By the above config, we are trying to make the clients to authenticate with username created in the RADIUS which is this router and get an ip address through DHCP pool configured for the same. Will the above config does the same. Kindly let me know.
    Thanking You
    Regards
    Anantha Subramanian Natarajan

    Hi,
    Thanks .
    Worked with cipher mode tkip and used WPA for key management.
    Once again,Thanks for the repsonse
    Regards
    Anantha Subramanian Natarajan

  • AAA authentication for networking devices using ACS 4.1 SE

    Hi!!!
    I want to perform AAA authentication for networking devices using ACS 4.1 SE.
    I do have Cisco 4500, 6500,2960, 3750, 3560, ASA, CSMARS, routers (2821) etc in my network. I want to have radius based authentication for the same.
    I want telnet, ssh has,console attempt to be verified by radius server & if ACS goes down then it will be via local enable passwordf.
    For all users i need to have different privilege levels based upon which access will be granted.
    could u plz send me the config that is required to be done in the active devices as well as ACS!!!!

    Pradeep,
    Are you planning MAC authentication for some users while using EAP for others?
    For MAC authentication, just use the following in your AP.
    aaa authentication login mac_methods group radius
    In your AP, select the radius server for mac authentication. You must have already defined your ACS as a radius server.
    In your SSID configuration, under client authentication settings,
    check "open authentication" and also select "MAC Authentication" from the drop-down list.
    If you want both MAC or EAP, then select "MAC Authentication or EAP" from the dropdown.
    Define the mac address as the username and password in ACS. Make sure the format of the mac is without any spaces.
    You will not need to change anything in XP.
    NOTE: XP normally does not require user authentication if machine has already authenticated but it might behave differently. If it does, I can let you know the registry settings to force the behaviour change.
    HTH

  • AAA Authentication and VRF-Lite

    Hi!
    I've run into a strange problem, when using AAA Radius authentication and VRF-Lite.
    The setting is as follows. A /31 linknet is setup between PE and CE (7206/g1 and C1812), where PE sub-if is a part of an MPLS VPN, and CE uses VRF-Lite to keep the local services seperated (where more than one VPN is used..).
    Access to the CE, via telnet, console etc, will be authenticated by our RADIUS servers, based on the following setup:
    --> Config Begins <---
    aaa new-model
    aa group server radius radius-auth
    server x.x.4.23 auth-port 1645 acct-port 1646
    server x.x.7.139 auth-port 1645 acct-port 1646
    aaa authentication login default group radius-auth local
    aaa authentication enable default group radius-auth enable
    radius-server host x.x.4.23 auth-port 1645 acct-port 1646 key <key>
    radius-server host x.x.7.139 auth-port 1645 acct-port 1646 key <key>
    ip radius source-interface <outside-if> vrf 10
    ---> Config Ends <---
    The VRF-Lite instance is configured like this:
    ---> Config Begins <---
    ip vrf 10
    rd 65001:10
    ---> Config Ends <---
    Now - if I remove the VRF-Lite setup, and use global routing on the CE (which is okey for a single-vpn setup), the AAA/RADIUS authentication works just fine. When I enable "ip vrf forwarding 10" on the outside and inside interface, the AAA/RADIUS service is unable to reach the two defined servers.
    I compared the routing table when using VRF-Lite and global routing, and they are identical. All routes are imported via BGP correctly, and the service as a whole works without problems, in other words, the AAA/RADIUS part is the only service not working.

    Just wanted to help future people as some of the answers I found here were confusing.
    This is all you need from the AAA perspective:
    aaa new-model
    aaa group server radius RADIUS-VRF-X
    server-private 192.168.1.10 auth-port 1812 acct-port 1813 key 7 003632222D6E3839240475
    ip vrf forwarding X
    aaa authentication login default group RADIUS-VRF-X local
    aaa authorization exec default group X local if-authenticated
    Per VRF AAA reference:
    http://www.cisco.com/c/en/us/td/docs/ios/12_2/12_2b/12_2b4/feature/guide/12b_perv.html#wp1024168

  • PIX 525 aaa authentication with both tacacs and local

    Hi,
    I have configured the aaa authentication for the PIX with tacacs protocol (ACS Server).
    It works fine, now i would like to add the back up authentication, as follows:
    - If the ACS goes down i can to be authenticated with the local database.
    Is it possible with PIX, if yes how?

    Hi,
    I am trying to configure aaa using TACACS+ , i am not able to close.Problems are
    1.It dosent ask for username /password in first level.
    2.on second level it asks for user name it dosent authenticate the user .
    Cud u pls let me know if the following config is correct.If not cud u help me .
    aaa-server TACACS+ protocol tacacs+
    aaa-server TACACS+ (outside) host ip.ip.ip.ip key timeout 15
    aaa-server RADIUS protocol radius
    aaa-server LOCAL protocol local
    aaa authentication include tcp/0 inside 0.0.0.0 0.0.0.0 0.0.0.0 0.0.0.0 TACACS+
    aaa authentication include tcp/0 outside 0.0.0.0 0.0.0.0 0.0.0.0 0.0.0.0 TACACS+
    aaa authen enable console TACACS+

  • Radius Inaccessible Authentication Bypass

    Hello,
    I'd like to know if it's possible to implement a such mechanism on a Cisco 2950 platform.
    I'd like to avoid that my clients ports are unauthorized in case of a failure of my radius servers. Is there a way to implement it on a 2950G.

    gildas
    Would I be correct to assume that you have your 2950G configured with a backup authentication method if the Radius server is not available and that your issue is what to do about authorization?
    I have not done this on a 2950G and can not know that it works, but this solution generally works in IOS and I assume that it will work on your 2950G:
    aaa authorization exec default group radius if-authenticated
    Give it a try and let us know if it works.
    HTH
    Rick

  • RADIUS AAA Config - can't console or exec

    Greetings,
    Been trying to get RADIUS working on our network. All Cisco devices running 12.1(13)EA1a or 12.2(20)EW.
    Config -
    aaa new-model
    aaa authentication login default local group radius
    aaa authorization network default group radius
    The server is all set up and I can log in with radius authentication no problem. I can not get it to enable with out using the default enable password. I also can not get into the switches using the console port with the RADIUS server down. Not good.
    I tried the following commands for a back door to no avail -
    aaa authentication login console line
    aaa authentication login locale enable
    aaa authentication login default local line - this just uses all defaults
    aaa authentication login local line none - wide open
    I am using Funk Software Steel Belted Radius on Solaris, Version 4.52.497.

    Thanks for the posts.
    I have searched CISCO for so much, I don't know how I missed these documents. Did you search by IOS? Basically, is there a trick to searching the CISCO site?
    I will read them and update tomorrow. I will also try that commnad. I think I tried it before but can't remember what happened. I don't think it worked, but I will let you all know.
    Thanks so much for the replies.
    JT

  • Aaa authentication

    I'm trying to set up authentication using a PIX 525 for some of our web servers. In preparation, I'm testing it on a PIX 515. For testing purposes, I'm not using a RADIUS or TACACS server.
    I've implemented the following commands:
    aaa-server LOCAL protocol local
    access-list authlist permit tcp any any eq www
    aaa authentication match authlist outside LOCAL
    When these commands are used, authentication works as advertised. When I change the access-list to:
    access-list authlist permit tcp any host 192.168.1.2 eq www
    where 192.168.1.2 is a webserver, authentication does not occur. (We want to require authentication for some web servers but not others.) I've tried variations of the commmand but none has worked. The PIX just passes all traffic.
    Any ideas?
    Noah

    Hi,
    Solution lies in, from where you are trying to access the server? and where you have applied the authentication to occur?
    192.168.1.2 definitely doesn't appears to be a global ip (if you are not working in a test scenario)
    outside in the authentication statement means that we want authentication to happen for all the traffic coming in on Outside interface to authenticate.
    Little topology detail will help.
    Regards,
    Prem

  • Help in command aaa authentication

    Hi,
    Could someone explain this command
    aaa authentication login default
    what does the authentication default to when we are not providing any authentication such as local or group radius.
    Thanks
    Jason

    Hi Jason,
    This command would generate a error such as :-
    R(config)#aaa authentication login default
    % Incomplete command.
    we need to specify an auth method.
    Regards,
    Vivek

Maybe you are looking for

  • Backup software for 10.2.8

    OK, now that I have an external hard drive - I am trying to backup my Mac on OS 10.2.8. Per input here, I checked out Super Duper. This program does not seem to support OS 10.2.8. I want to back up, but really do not have time to fool with a complica

  • Report on condition type & vendor

    I guyes can you help me please In imports purchase order -Conditions we are using customs vendor I need a report based on the condition type and vendor Say for Eg : I am using condition type jcdb & vendor assingment -200 so is there any report based

  • HDMI issues on a M72e Tiny

    I upgraded the hard drive to a SSD and installed Windows 7 Ultimate 64-bit. Audio through HDMI works as long as I do not upgrade the Intel HD video driver. With the Intel HD video driver installed the HD audio device shows up as a playback device but

  • IDOCS  TRANSPORTING

    Hi,      I had  a doubt on idoc communication,before i worked on reports and scripts & now i got requirement on idocs : Plz clarify this doubt 1.I have gone through several materials and blogs on idocs, while testing idoc using we19, by filling contr

  • IBM X41 USB ports unable to work

    An IBM X41 that I have is having problems with the USB ports. None of them is working, neither the ones in the laptop nor the ones in the docking station. I have tried to reinstall the drivers but they don't become available at all. I have disabled a