Cisco AAA/Identity/Nac :: ACS 5.2 VM - Authentication Timeout

Sep 7, 2011

I have several devices on the same subnet and with similar configuration. All of them were entered manually on the ACS server and are configured to authenticate using TACACS+. Some of the devices can authenticate ok, but other will timeout. I did a tcpdump on the firewall port and can see the device sending the SYN to the ACS server but the server sends no reply to the device.

View 3 Replies


ADVERTISEMENT

Cisco AAA/Identity/Nac :: ISE 1.1.3.124 / Machine And User Authentication / MAR / Timeout?

Apr 12, 2013

I am using ISE 1.1.3.124.My first question:I want to know the relation between the attribute "WasMachineAuthenticated" and the MAR (MAchine access restriction in advanced setting for AD).Is-it the same  or not ?Once you time out, you need to do machine auth again. What is the timer ?Using the attribute "WasMachineAuthenticated", is-it the same timer that you configure in MAR ? In a distributed environnement, is the information about machine previously authenticated  replicated to all policy node ?Because, if a swicth has 2 radius-server, we are not sure that it will point everytime to the same server.

View 1 Replies View Related

Cisco AAA/Identity/Nac :: 2960 - 802.1x EAP-TLS With NPS / W2008 Authentication Result Timeout

Jun 21, 2012

[Env on my lab investigation]
supplicant - W7 with cert
authenticator - Catalyst 2960 with IOS 15.0(1)SE2 /newest/
authentication server 2x - W2008/NPS like a RADIUS server
 
The problem is the end station that are still connected to the supplicant port /use a EAP-TLS/ after the reboot supplicant! All of them will be put into the Guest VLAN instead of static VLAN 34!
 
[The question]
What is wrong and how to configure/tune and what authenticator or authentication server to prevent after the reboot to observe a authentication timeouts? Of course the supplicant after 20 minutes /next EAPOL start farmet put into VLAN 34.

[Code] ........

View 1 Replies View Related

Cisco :: 5508 Web Authentication Timeout?

Aug 1, 2011

If any authenticated user uses protocol other than (http, https) within timeout period, that user #is deuthenticated

View 1 Replies View Related

Cisco VPN :: ASA 5520 - Getting AnyConnect Authentication Timeout?

Jul 8, 2012

I have an ASA 5520 and I am having trouble getting the AnyConnect VPN authentication timeout feature to work properly. I thought I did have it working a couple of months ago, but right now it is not giving me more than the default 12 seconds. I have tried intervals of anywhere from 25 seconds up to 120. I am currently runnign version 6.4 on the ASA and AnyConnect 2.5.3055.

View 8 Replies View Related

Wireless Authentication Failed Because Of Timeout

Nov 24, 2012

I've just purchased a second hand laptop for my Hubby and trying to gain access to the internet through my SKY wifi router. It keeps saying its within range but this error of Wireless authentication failed because of timeout!

View 5 Replies View Related

Wireless Authentication Failed Because Of A Timeout?

May 3, 2011

picking up on old thread, but same issue: authentification failed because of a timeout

*previously*! i was able to auto connect fine on this home network via wifi.the line and box recently changed, same provider, and now i'm the only one who can't connect.the SSID changed, but i've done all the usual routines, deleting and re-adding manually, etc. but nothing so far...

i *don't* think this is a case of changing gear, but i don't know enough about internet/connection/configuration to fix this. yet!

NB: when i perform the reset on the box as instructed, using the provider's setup software - i am not the account holder - for the wifi, it shows connected very briefly in the animation, and then goes off again; this is the authentification/verification failing, i conclude.

so: with what is said above, i'm wondering if my antivir is to blame, or the windows firewall settings.or malwarebytes.i'm going to study the info i've got off my system, and looking at the router via the http routine, offline, as i now have to get off the internet(...); i'll get the infos together so i can post something useful.

View 7 Replies View Related

Wireless Authentication Failed Due To A Timeout

Nov 5, 2012

I realize there are a few other threads on this subject. Ive followed some of the advice and I still can not connect. I am currently connected via Ethernet cable but I cannot connect to wireless. I have removed all the stored networks. My event log states: [code]....

View 5 Replies View Related

Cisco Wireless :: Adjust Authentication Timeout WLC 2504?

Jun 12, 2013

I have 2504 WLC with a few access points. the problem is when the PC's go in sleep mode, the users have to re-authenticate when they log in again Is there any way to let the PC's automatically re-authenticate without the user having to type in the credentials again?I have web authentication configured for this SSID and authentication is using the WLC local Data base.

View 6 Replies View Related

Cisco :: WLC 5508 External Web Authentication Mismatch With Session Timeout?

Aug 27, 2012

For guest clients , we have configured guest vlan and applied external web authenication on WLC 5508 , the session timeout value is 2700secons . When a client open a browser to internet page , wlc will redirect to URL and get the login page . After completed the login , he can go to internet page .

We find the iPhone and ipad clients will get the login page again ahfter ~ 5 mins , it is mismatch with session timeout value 2700 sec (45 mins) .

View 5 Replies View Related

Cisco AAA/Identity/Nac :: ACS 5.3 MAR Timeout With Windows XP?

Sep 9, 2012

my current setup:  Windows XP machines authenticating wireless using 802.1X to a Cisco ACS 5.3 that redirects the request to Microsoft Active Directory.  All the statements that I make below are what I have gathered from reading on forums, some of them might be incorrect.
 
In the ACS Under “External Identity Stores” and  “Active Directory”, there is a check box called “Enable Machine Access Restrictions” if it is checked and  the Aging time is set to 8 hours and a Windows XP machine authenticates using  it’s Domain credentials it will gain access to the network but if that computer  is not rebooted after the 8 hours is up, Windows XP will not send it machine  credentials again, it will only send the user/pass of the user and will loose  access to the network.  The problem we have is that most of the users do not  shutdown their computers when they go home, they hibernate the computers thus  when they come back to the school the 8 hours aging time on the ACS has  expired.  The ACS expects to see the Windows XP machine send it’s domain  credentials again but from every forum I have read on, Windows XP will not send  it again until it get rebooted (FYI, Windows 7 will send the proper info, thus  they work just fine).  In the mean time I have changed the aging time to 8760  hours but this should only be temporary because it is a security risk to have  the aging time set so high.  Moving forward what are my options to make this  work properly?
   
-Is there a way to fix  Windows XP?
 
-Is there a recommendation on how to bypass this issue but still give us decent  security?
 
-Is setting the aging time so high, a non security issue?
 
-I guess worst case  scenario, the customer can try to educate all the students and staff to reboot  their machines every morning?

View 4 Replies View Related

Cisco AAA/Identity/Nac :: 5411 EAP Session Timeout With ACS In WAN

Jan 19, 2012

We're having trouble trying to deploy 802.1x authentication on a brand new site.
Our primary and secondary ACS are located in Paris and the new site located in Toulouse, France. Both sites are connected through the WAN. Everytime a computer/user connects to this new site in Toulouse, ACS 5.2 sends a "5411 EAP session timeout" error message.

View 9 Replies View Related

AAA/Identity/Nac :: ACS V5.3 Timeout For Connection Is Not Working?

Feb 14, 2012

I'm trying to configure a timeout for network connection, but when it suppose to disconnect client, it's not working.  Is it possible to do this??
 
Only works when the client is connecting and is denied if the time is not valid.  But how could I do this if the client is already connected, enable re-authentication?

View 2 Replies View Related

Cisco AAA/Identity/Nac :: ACS 1120 Running 5.0.0.21 RADIUS Timeout With WLC 7.0?

Aug 29, 2011

i am configuring a Cisco Secure ACS 1120 appliance running ACS 5.0.0.21 to handle RADIUS request from a Cisco WLC 5508 appliance running version 7.0.116.0.these devices have open communication on all ports - no firewalls or ACL'sthey have successful ping communication The following statements illustrate some but not all the debugging I have done to ensure each device functions as it should in isolation.Using a simple windows RADIUS server (radserv2.exe) instead of the Cisco ACS  This works and the WLC gets RADIUS response from my makeshift serverUsing a simple windows EAP client to query the ACS using RADIUS protocol   this works and the ACS processes the RADIUS request and sends a responsePlaced a wireshark client on the network to inspect timeout. Wireshark logs the packet from the WLC to the ACS using port 1812 but doesn't see any packet  responses from the ACS At the moment I have the WLC accepting the association from the wireless client and sending the RADIUS (PEAP, EAP-FAST or EAP-TLS) request to the ACS, the WLC receives no response and generates a timeout message and disassociates from the client. note this is not a reject or similar message, the ACS simple does not even process the packet. i.e. there is absolutely nothing in the ACS logs to suggest it even received a radius packet from the WLC. In summary the WLC and the ACS successfully function independently but they do not communicate via radius.

View 3 Replies View Related

Cisco AAA/Identity/Nac :: 2347 - Update Is Not Active Terminal Session-Timeout

Aug 15, 2011

Our company has installed ACS Version: 5.1.0.44.6 Internal Build ID: B.2347 with patches: 5-1-0-44-5, 5-1-0-44-6. The security policy of our company includes a password change every 3 months. Our programmers had written a script that allows us to do it. When testing revealed that the script does not work. This is due to the fact that it is not possible to enter the mode "acs-config". In determining the reasons it was found that to enter this mode there is a limit on sessions (6 sessions). When the number of connections becomes larger than 6 then the script does not work. The documentation says that the update is not active sessions is set with terminal session-timeout. In this case, the terminal session-timeout 30. But after 30 minutes of the session will remain active. It interferes with our script.

View 1 Replies View Related

Cisco AAA/Identity/Nac :: ACS V5.3 Identity Selection For Authentication?

Jan 16, 2012

I configured before ACS v4.2 to authenticate network devices using internal users at first, and if the user is not found use AD list users.  But with v5.3 I have some problems doing this, on identity policies I use rule based result selection option, I configured 2 polices for Identity source, one for Internal Users and other policy for AD user, but it only works with the first policy, internal users or AD, but works only for the first policy identity.  how to do that, if the user is not found on first policy, continue to the next policy.

View 7 Replies View Related

Cisco AAA/Identity/Nac :: ACS 5.2 Identity Base Authentication

Jul 3, 2011

I need a specify users to allow access to particular devices and give privilege only for show command or show run. Here is how I tried to configured.
 
1. Configured two seperate Shell Profile and Command set with privilege level 4-5 and allowing only show run command

2. create seperate service selection rule with adding the require NDG and protocol TACACS and maching service "RestrictAccess"

3. In the RestrictAccess Service I have following configured; Identity: internal users, Group Mapping to a particular group where the user exists, authorization: matching the above created identity group, NDG, shell profile, command sets
 
All the steps are attached in the .doc file. However when I tried with the particular user he is able to access everything and he is not hitting the correct access rule.

View 6 Replies View Related

Cisco Firewall :: ASA 8.2(5) - Uauth Absolute Timeout Disabled And Inactivity Timeout Set To 48 Hour

Nov 26, 2012

ASA 8.2(5), uauth absolute timeout is disabled and inactivity timeout is set to 48 hours:
 
timeout xlate 48:00:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
timeout sip-provisional-media 0:02:00 uauth 0:00:00 absolute uauth 48:00:00 inactivity
timeout tcp-proxy-reassembly 0:01:00
timeout floating-conn 0:00:00
 
Users still get kicked out every 8 hours and they have to reauth. This is a logging message:
 
%ASA-5-109012: Authen Session End: user 'john', sid 839, elapsed 28801 seconds

View 1 Replies View Related

Cisco AAA/Identity/Nac :: Web-authentication Using ASA And ACS 5.1

Feb 2, 2012

In order to restrict access to websites on our internal network, would we be able to put an ASA in front of the web server and force users to authenticate through the ASA and, once authenticated, allow only port 80 or 443 traffic for that use?  The ASA would query the ACS 5.1 server for authentication/authorization using AD as the identity store.  Is this even possible with TACACS? 

View 1 Replies View Related

Cisco AAA/Identity/Nac :: MAC OS-X And Authentication Via ACS 5.2?

Apr 1, 2012

My customer has a large installed base of MACs, all connected via controller-based (5508) WLAN. He wants to grant access to the network based on the device's mac addresses and move the WLAN-clients to a specific VLAN.I added all devices with their mac addresses to the ACS internal identity store for hosts.According to the following message the client sends the user-login credentials (chegger) within the RADIUS-request instead of the clients mac address and of course it has to fail.  After many configuration changes, I ended up always with the same result.

View 2 Replies View Related

Cisco AAA/Identity/Nac :: EAP-TLS Authentication With ACS 5.2

Jun 13, 2012

I have question on EAP-TLS with ACS 5.2. If I would like to implement the EAP-TLS with Microsoft CA, how will the machine and user authentication take place? Understand that the cert are required on both client and server end, but is this certificate ties to the machine or ties to individual user?
 
If ties to user, and I have a shared PC which login by few users, is that mean every user account will have their own certificates?
 
And every individual user will have to manually get the cert from CA? is there any other method as my environment has more than 3000 PCs.
 
And also if it ties to user, all user can get their cert from CA with their AD login name and password, if they bring in their own device and try to get the cert from CA, they will be able to successfully install the cert into their device right?

View 7 Replies View Related

Cisco AAA/Identity/Nac :: AD Authentication In ACS 5.3

Jan 22, 2012

I have a new ACS 5.3 installation which I have joined to our AD Domain and added the directory groups into.  I have also added all our devices into ACS and their groups etc but I am still only able to authenticate on the our switches with an internal ACS account, when I try with an external AD account the log shows the following error   "Subject not found in the applicable identity Store (s)"

View 1 Replies View Related

AAA/Identity/Nac :: Cisco ACS 5.1 And RSA Authentication Manager 6.1?

Apr 18, 2010

We  got recently a Cisco Secure ACS 1120 and i upgraded the Appliance to 5.1 from 5.0 with all your support
 
Now I need to integrate Cisco ACS 5.1 with RSA Authentication Manager 6.1 . I Successfully Downloaded config file from RSA ACE Server and exported into ACS 1120.
 
I also Added ACS as a NetOS Agent in the RSA Server , during the process i found few warnings . The ACE Server is not able to Resolve the IP Address to NAme ( DOes it Necessary ?? ).
 
I havent created any secret Key file for communication between ACS and RSA and encryption i used is DES.
 
Now when I log into ACS and search for Devices in the Identity Store Sequences i am not able to Look for RSA Token Sever .

View 10 Replies View Related

AAA/Identity/Nac :: IPS / IDS Authentication With Cisco Radius ACS 5.2

Nov 22, 2011

I have been trying to get our IPS (ASA-SSM-10 and 4260) to authenticate with Cisco Radius ACS 5.2 and they are not working. However, I was able to get them working with Microsoft Radius. Below is the logs from the IPS:
  
evStatus: eventId=1321566464942057375 vendor=Cisco  originator:    hostId: NACAIRVIDLAB1    appName: authentication    appInstanceId: 350  time: 2011/11/23 17:50:38 2011/11/23 09:50:38 GMT-08:00  controlTransaction:

[Code].....

View 0 Replies View Related

Cisco AAA/Identity/Nac :: Re-authentication In End Points Using ISE 1.1

Dec 13, 2012

If laptop/desktop goes on sleep mode or keep connected with interface configured for 802.1X for more than 12 hours it does not work or not connect to Exchange server, Cisco ISE console, office communicator..for re authentication i need to restart PC/ Laptop or unplug and replug lan cable from it!but before restarting i am able to ping all DNS, DHCP, OCS, everything..[code]

View 6 Replies View Related

Cisco AAA/Identity/Nac :: Two Factor Authentication On ACS 4.x / 5.x

Mar 9, 2011

I would like to konw does Cisco ACS 4.x / 5.x natively support Two factor authenication, but not act as a Radius Proxy?

View 1 Replies View Related

Cisco AAA/Identity/Nac :: Limit AD Authentication With ACS 5.3

Feb 23, 2012

I need to limit to some AD groups, authentication with ACS 5.3.For example, i need that only users os somedomain.com/users/test1 are authenticatet via ACS --> ADS.

View 1 Replies View Related

Cisco AAA/Identity/Nac :: ACS 5.3 And TACACS + Authentication From VPN?

Mar 4, 2012

I have a Cisco ASA (8.2) setup with remote access for my users using Cisco VPN client. The authentication is passed off to my ACS 5.3 which then checks with AD. What I've done so far is create Access Policy rule where I define specifically the Location and NDG where the ASA is and then a DenyAllCommands command set. This should pass authentications just fine but this also gives those users the ability to remote connect directly into the ASA and login successfully. Even though there is a Deny Commands there I still would prefer they get Access Denied as a message. If I do a Deny Access on the ShellProfile then this stops the login authentication altogether.

View 2 Replies View Related

Cisco AAA/Identity/Nac :: 881 - ACS Authentication Across VPN Tunnel

Jun 14, 2011

We would like to enable ACS authentication to login to different routers (Cisco 881s) we got that are interconnecting with our WAN via VPN tunnels. We would like to avoid using public IP for the router to communicate and relay user/password info with the ACS server and rely on the server's private IP instead. The problem is that all the router's outside interfaces connect to the Internet using public IPs and when the router wants to communicate with the ACS server it will use its public-facing interface IP and that'll fail. We can ping the server obviously when we set the source to the internal LAN IP.
 
The question is is there a way to have the router communicate with ACS across the VPN tunnel using its private IP?
 
config being used and tested succesfully on local devices:
 
aaa new-model
tacacs-server host 10.x.x.x single-connection key xxxxxx
aaa authentication login tacacs-local group tacacs local

[Code].....

View 6 Replies View Related

Cisco AAA/Identity/Nac :: ACS 5.2 Re-authentication Not Working?

Aug 17, 2011

I have a dot1x client with client certificate working well with my ACS 5.2 and EAP-TLS. Now I would like to configure the Re-Auth periode on the ACS 5.2, I did the following:
 
1. Configure a Access Profile with Reauthentication Timer = static and 30 seconds (see attachment ACS1.png and ACS2.png)
 
2. Enabled authentication periodic and authentication timer reauthenticate server on switchport
 
interface GigabitEthernet1/0/x
description to dot1x clients
switchport access vlan 5
switchport mode access
authentication event fail action authorize vlan 998

[code]....

View 2 Replies View Related

Cisco AAA/Identity/Nac :: SSH Authentication From ASA5505 To ACS 5.3 Not Using PAP

Aug 8, 2012

i am evaluating ACS 5.3 with an ASA5505, by using password management in the IPSec tunnel config i am able to authenticate the VPN clients using mschapv2, however, the SSH sessions are authenticated using PAP
 
I have looked for days and days for an answer without success, is this by design?
 
Cisco documents state that SSH can be authenticated via  TACACS with PAP,CHAP or MSCHAPv1, however, It seems to be default to PAP
 
From Cisco Doc: TACACS+ Server Support # The security appliance supports TACACS+ authentication with ASCII, PAP, CHAP, and MS-CHAPv1

View 1 Replies View Related

Cisco AAA/Identity/Nac :: Dual Authentication - ACS 4.1 And ACS 5.1

May 13, 2011

I am getting ready to install a new ACS 5.1 server to replace my current 4.1 acs box. I wanted to start off with a fresh install rather than upgrading all of my 4.1 data.
 
Can I have devices (ASA for VPN authentication, routers & switches for user authentication) use both for authentication while I get all the users configured in the new box?

View 3 Replies View Related

Cisco AAA/Identity/Nac :: Radius Authentication In ACS 5.2 With AD

Mar 10, 2011

I have a questión about radius authenticaction with AD, when I log in into the network with user in AD and I make a mistake in password my radius authenticaction event in ACS 5.2 dont show me this logg. only show the authentication succeeded but dont show me the authentication failed. Maybe i must to enable same service to show the authentiaction failed. The Voice authetication works fine..
 
This is the confg in the port of the switch:
 
interface FastEthernet0/12 switchport mode access switchport access vlan 2 switchport voice vlan 10 authentication port-control auto authentication host-mode multi-domain authentication violation protect authentication event fail action authorize vlan 11 authentication event fail retry 2 action authorize vlan 11 authentication event no-response action authorize vlan 11 authentication periodic authentication timer reauthenticate 60 mab dot1x pae authenticator dot1x timeout tx-period 10 dot1x max-reauth-req 3 spanning-tree portfast end
 
Vlan 2: DATA
Vlan 10: VOICE
Vlan 11: GUEST

View 1 Replies View Related







Copyrights 2005-15 www.BigResource.com, All rights reserved