Cisco AAA/Identity/Nac :: ACS 5.3 - 11033 Selected Service Type Is Not Network Access

Apr 15, 2013

I have some older devices on the network that only support RADIUS (not TACACS) for authentication and would like to have them use SecureACS 5.3 
 
I understand that by default, ACS only supports TACACS for device administration.  So I'll get this error when trying RADIUS:
 
11033 Selected Service type is not Network Access

Description:

RADIUS requests can only be processed by Access Services that are of type Network Access

Resolution Text: Verify that the Service Selection Policy rules are correct
 
However, even after adjusting the Service Selection rules and seeing hits, I still see the same message in the logs, as if it has no affect. 

View 1 Replies


ADVERTISEMENT

Cisco AAA/Identity/Nac :: Service-Type Not Present Error When Attempting To Authenticate WLC 5508

Sep 13, 2011

I an currently running Cisco (ACS 5.2.0.26.3) and attempting to get my Cisco 5508 WLC's (7.0.98.0) loaded into ACS for TACACS+ authentication for managment users.
 
However I keep getting the following error:
 
*emWeb: Sep 14 14:44:45.931: %EMWEB-1-LOGIN_FAILED: ews_auth.c:2104 Login failed for the user:test_tac. Service-Type is not present or it doesn't allow READ/WRITE permission.
 
Now I've attempted the step-by-step using the following URL but to no avail.( there are some slight differences in ACS 5.2)
 
[URL]
 
Latest WLC configuration guide I could find (Software Release 7.0 June 2010) isn't much useful either.

View 6 Replies View Related

D-Link DIR-655 :: Unicasting Is Selected By Default In Dynamic IP (DHCP) Connection Type

Mar 31, 2012

'Use Unicasting' is selected by default in the Dynamic IP (DHCP) connection type.I turned it off based upon the router's support text since the router gets an IP address from my cable modem.I don't understand this option at all.  I've searched for data on the topic and I can't make sense of it.I think I made the correct selection by un-selecting 'Use Unicasting.'

View 14 Replies View Related

Cisco AAA/Identity/Nac :: ACS 5.1 Radius Device Administration Error 11033

Jul 20, 2010

I'm trying to configure ACS 5.1 as radius server for a catalyst switch but i can't make it work.I keep on getting the "11033 Selected Service type is not Network Access" error message.
 
Tacacs works fine but radius does not. Any sample device administration config to use with RADIUS?it seem the service type does not work with radius in this scenario ( radius + device admin).

View 10 Replies View Related

Cisco AAA/Identity/Nac :: ACS 5.2 Radius For ASA VPN Quits When Tacacs Is Also Selected

Sep 2, 2011

Our ACS 5.2 is authenticating ASA VPN users with Radius. I would like to use the ACS to authenticate ASA administrator logins with Tacacs. When I modify the ASA Network Device by checking the Tacacs box in addition to the Radius box, ASA VPN authentication stops. Running original 5.2 without any patches on ESX. platform. I thought 5.2 supports radius and tacacs on the same device?
 
On subsequent tests found that just opening the ASA Network Device and closing the window will also stop the ASA RADIUS from working. Logs don't show any attempt by the ASA to connect and I'm sure that's wrong. To fix it, I reselect all ACS policy items and save the same settings. Sounds like a bug? 

View 1 Replies View Related

Cisco AAA/Identity/Nac :: ACS 5.2 Access Service Required

Oct 30, 2012

We are using ACS 5.2 in our Network. As can be seen in the provided figure, nothing in the Access Services can be displayed properly.

View 4 Replies View Related

Cisco AAA/Identity/Nac :: Implementing Mac-auth On Selected Ports Between An HP ProCurve 2510 And ACS 5.3?

Apr 15, 2012

I am having difficulties implementing Mac-auth on selected ports between an HP ProCurve 2510 and Cisco ACS 5.3.The 802.1x works just fine, but for selected ports I need to implement port-access with MAC-based authentication instead of regular 802.1X (yeah, I know, but this line of ProCurve switches only support one auth-mechanism per port!).The switch successfully forwards interesting MAC-auth requests for authentication to the ACS with CHAP/MD5, but the ACS reports this:

Logged At:
April 16,2012 1:20:48.080 PM
RADIUS Status:
Authentication failed : 22056 Subject not found in the applicable identity store(s). NAS Failure:
Username:
002655886b3d MAC/IP Address:
00-26-55-88-6b-3d Network Device:

[code].....

The ACS is configured to use the Internal Hosts database, where the client computer is configured like this;MAC-address: 00-26-55-88-6B-3D

View 1 Replies View Related

Cisco Switching/Routing :: Nexus 7000 - (service Policy Type Queuing Output) On Port-channel?

Jan 24, 2013

We are planning to implement the following policy map for egress traffic on an Nexus 7000:
 
policy-map type queuing dd-1p3q1t-8e-out-10G    class type queuing 1p3q1t-8e-out-pq1      priority level 1      shape percent 10     class type queuing 1p3q1t-8e-out-q2        bandwidth remaining percent 5    class type queuing 1p3q1t-8e-out-q3        bandwidth remaining percent 5    class type queuing 1p3q1t-8e-out-q-default        bandwidth remaining percent 90
 
We are using two N7K's to which is one N5K connected through a vPC. From the N5k we use a port-channel with 4 * 10G. Two of this four ports are connected to on N7K and the other two are connected to the other N7K. On the n/K's we are using vPC.
 
My question now are:
 
1. Where i have to connect the policy map? To the port-channel or on each physical interface?

2. When i have to connect this policy to the port-channel, how does i have to set the shape percent, when i would like to reserve 10% from the 40G?    Does i have to set the shape value to 5% on each N7K because vPC?

View 1 Replies View Related

Windows Cannot Connect To The Selected Network

Aug 22, 2012

laptop could not connect to wifi. Other laptops can connect to this same wifi but this one can't. tried laptop on other routers and it was able to connect. The error message displays" Windows cannot connect to the selected network.The network may no longer be in range...." tried the solution on microsoft but didn't work. Tried changing the ssid of the wifi then scanned for it. it showed that it was changed. The laptop can detect the wifi but it can't connect to it.The laptop is running on windows xp.

View 2 Replies View Related

Cisco VPN :: Selected Shell Profile Is Showing Deny Access 5510

May 17, 2012

i have got the below long on the acs 5.2,one the vpn client user connect to asa 5510
 
Description
Selected Shell Profile is DenyAccess
Resolution Steps
Check whether the Device Administration Authorization Policy rules are correct

View 1 Replies View Related

Windows Is Unable To Connect To The Selected Network

Oct 9, 2011

Windows is unable to connect to the selected network." The network may no longer be in range. refresh the list of available networks and try to connect again." Your in range of the network (right in the same room as the wireless access point). And when you refresh the list, the network still shows up there.It seems that it will only connect to Routers which use WEP security and not ones which use WPA. I have looked on the Toshiba site for the Wireless Drivers to see if there is any updated ones and used the Driver Update Utility on Intel's download site and that tells me that the latest wireless driver is installed.

View 4 Replies View Related

Unable To Connect To Selected Network - No Longer In Range?

Dec 18, 2012

Windows is unable to connect to the selected network. The network may no longer in range. Please refresh the list of available networks, and try to connect again.This message poped up during connecting to a wireless network[CODE]

View 1 Replies View Related

Netgear MA101 - Windows Unable To Connect To Selected Network

May 17, 2012

I am trying to connect to the internet using an external wireless device (Netgear model:MA101), I have managed to install the drivers and my wireless network is coming up as an option! For some bizarre reason when I try and connect the following messages appears: "Windows is unable to connect to the selected network. The network may no longer be in range. Please refresh the list of available networks, and try again"I then refresh and try to connect but the message constantly appears I have rebooted my computer in case it needs to reset after installing the driver for the wireless device.

View 2 Replies View Related

Error / Ensure That Ipv4 And Ipv6 Are Selected In The Config For The Network Adapter

Aug 14, 2011

I'm working on a computer that has no connectivity on wired or wireless connections. the wired eth card is a broadcom netlink card and the wireless adapter is an atheros ar5007eg. I found the drivers for the wireless on acer.com and removed the driver that was on here at first and put the one from acer. i cant find a network in range but device manager says its working fine. Then I found out the wired connection isnt working either and im getting the same messages from windows troubleshooter. It says both are "experiencing driver or hardware related issues and "make sure your internet protocol bindings are correct - ensure that ipv4 and ipv6 are selected in the config for the network adapter". it links me to the connection properties and ipv4 and ipv6 are checked off for both. futhermore, in the connection status window it says i have no ipv4 or ipv6 connectivity.

View 6 Replies View Related

Cisco AAA/Identity/Nac :: Type Of ACS V4.2 Database Password Hash?

Jan 17, 2012

What's type of ACS v4.2 Database password hash?
example:
-------------------------------------------------
Name          :          ###postureuser
Password      :          0x0020 fe fc f0 11 24 dc dd bd 0f d9 78 56 b8 4a fc f4 40 d0 bd 1d 19 5b 56 7e 14 f0 4e 1a b0 83 66 24
Chap password :          0x000e 22 07 e4 28 c0 09 7f 1a b7 e6 2a 78 a1 52
-------------------------------------------------

View 1 Replies View Related

Broadband :: Network Access Protection Agent Service Is Not Running

Dec 13, 2011

network access protection agent service is not running

View 1 Replies View Related

WNDR3400 Windows Service Can't Access Files On XP Home Network

Feb 15, 2013

I've been able to duplicate my problem by using another WinXp computers instead of a USB drive plugged into my router. Same exact problem. So, the bottom line is that I can access (and modify) the files across the network if I'm doing so manually, but my Windows service fails when trying to do the same thing. If I run the program through Visual Studio, it works. If I run that same exact code as a Windows service, it fails.

I've created a Windows service that needs to access a common network location. To test it at home, I plugged a USB drive into my Netgear N600 WNDR3400 router. The USB storage settings show the workgroup name as Workgroup, and the file path is. [code]

View 1 Replies View Related

Cisco AAA/Identity/Nac :: ACS 5.2 - Can't Delete Service Policy

Oct 23, 2011

We are evaluating Cisco ACS 5.2 and I can not delete a service policy that was created.  The message we receive is " the item that you are trying to delete is being referenced by other items". I am new to ACS, but I did go through each tab in the manager multiple times.

View 5 Replies View Related

Cisco AAA/Identity/Nac :: Stop Radius / Tacacs Service In ACS 5.2?

Jul 11, 2011

IS there a way to stop the Radius/Tacacs service in ACS 5.2 from the GUI ?

View 6 Replies View Related

Cisco AAA/Identity/Nac :: ACS 4.2.1.15 Found CSLog Service Not Started

Mar 13, 2011

I used ACS 4.2.1.15 on windows 2008 SP1, found CSLog service not started. I try to restarted but service was started for while and went to stopped.How should i do to start this service?

View 2 Replies View Related

Cisco AAA/Identity/Nac :: ACS 5.3 Cannot Work With Two Service Policy Rules

Feb 21, 2013

I have an issue about ACS v5.3 Appliance.I have an ACS v 5.3 wo authenticate wireless users, together with a cisco wlc. One profile is to corporate users and the second profile is to guest.
 
The corporate users should authenticate with Active Directory and the guest with WLC. Guest users should authenticate with the ACS Local Database. I have configurate two service selection policy that match with protocol Radius. The first rule is to users of Active Directory and the second is to users in
 
the Local Database of ACS.When i try to authenticate users with active directory is OK, but when try to authenticate users with Local Database (Guest Portal) the ACS try to find the
 
the internal user in the Active Directory, because math the first rule, and the second profile can not authenticate.When I change the order, first the Rule of internal users and second the rule of users of Active Directory, the internal users can authenticate in to ACS, but
 
the users in the Active Directory can not authenticate.I think my ACS only authenticate the first rule of radius to Active Directory, no two rules of radius in the same time. Or maybe exists an issue in OS of the ACS.The authentication by separately is OK.

View 5 Replies View Related

Cisco AAA/Identity/Nac :: ACS 5.3 Appliance - Service Rules Missing

Sep 25, 2012

This does seem correct.  I had 2 rules and now they are gone.

View 2 Replies View Related

Cisco WAN :: How To Convert From LSA Type 5 To Type 3 And Reverse

Nov 28, 2012

I have some LSA type 5, I want to change it from type 5 to type 3 before send to another Area, How can i do it?

View 1 Replies View Related

Cisco AAA/Identity/Nac :: ACS 5.3 Service Selection Rules To Differentiate Web-vpn And Ipsec

Aug 25, 2012

I'm working with an ACS 5.3 and ASA 8.2.5 and i've configured several access services for webvpn and ipsec remote access profiles but i haven't found which radius attribute can differentiate  among them in the service selection rules.

View 5 Replies View Related

Cisco AAA/Identity/Nac :: ACS 5.3 - External Proxy Service User Logs?

Apr 11, 2012

We are currently using Cisco ACS 5.3.0.40.2. One of the Services Selection Policy it hosts is:
 
Receive Authentication request from a wireless controller for a wireless userIf the wireless user's username contains a particular domain suffix, the request is proxied to an external proxy server using an External Proxy service (configured for both local/remote accounting)On receiving an Acccess-Accept from the external proxy, the user is given access and ACS 5 will start logging account packets for the username (nothing appears in the RADIUS authentication logs - ACS 5 it seems doesn't log proxied authentication requests) The above setup works fine in most instances. We start to have problems when an external proxy server strips the domain suffix off the username in the Access-Accept packet e.g.
 
ACS 5 proxies an Access-Request to an external proxy server (with Username = someuser@somwhere.com)The external proxy replies with an Access-Accept (with Username = someuser)The user 'someuser' is given access but subsequent accounting attempts fail because their username (without the domain suffix) doesn't match the Service Selection PolicyIs there any way to get ACS 5.3 to log proxied authentication requests? If not, can I configure ACS 5.3 to use the username in the Access-Request packet (rather than the username in the Access-Accept packet) for accounting?

View 2 Replies View Related

Cisco AAA/Identity/Nac :: ACS 5.1 - Service Selection Rule And Machine Authentication

Nov 7, 2011

- I have a cisco unified network (ACS 5.1, Cisco controller, LWAP) and have configured ACS to integrate with AD.

- I am using this network for Laptops and wireless IP phones access.

- I have only one Service Selection rule for both Laptops and wireless IP phones. All the conditions attributes are set to ANY except Protocol = Radius

- I select a simple Identity Policy and I use a sequence where IP phones users are authenticated using ACS local user and the Laptops users are authenticated using AD

- Laptop users are authenticated using PEAP and IP phones users using EAP-Fast
 
Everything is working fine BUT I need to make 2 changes and eventhough  I spent many hours hours on forums and reading articles and trying things myself I can't get the changes to work.
 
The first change is to use 2 Service Selection Rules one for the IP phones and one for the Laptops. After adding another service selection rules that I put at the top, I tried many combinations to try and get the IP phones to use it but whatever I did (used different combinations of conditions), the IP phones always select the 2nd rule, which is the original one. The question is "what conditions to put in a service selection rule to make wireless IP phones use the rule).
 
The second change is that I want to add machine authentication so only Laptops that are in AD can access the network. AGain I tried various settings but can't get this to work.

View 2 Replies View Related

Cisco AAA/Identity/Nac :: CSlog Service Not Starting On ACS 4.2 Running On Windows 2003?

Jul 5, 2010

I just upgraded my ACS v4.0 to the latest available version v4.2(1) build 15 patch 2 and I've got some trouble with the CSLog service. I performed a successive upgrade first to v4.2 then to v4.2.1 and finally applied the two patches. Everything is working fine, I'm using both radius and tacacs services and they doing great like they were in v4.0. The only problem I have is with Cslog service which doesn't start. To be accurate, it starts but stops just after. I've uploaded some logs from cslog.log in cslog/logs directory.

View 6 Replies View Related

Cisco AAA/Identity/Nac :: 4.2 Find Service Selection For TACACS+ Protocol Coming From ASA

Mar 10, 2011

I'm migrating ACS 4.2 to ACS 5.2 for a customer and I'd like to find a service selection for TACACS+ protocol coming from an ASA.I use TACACS+ for device administration but also for AAA of internal users internet access.I also use RADIUS for vpn remote-access, without problems.How to distinguish through the ACS service selection ?

View 24 Replies View Related

Cisco AAA/Identity/Nac :: Assign QoS Service Policy Via RADIUS To Catalyst 45k / 3750?

May 4, 2011

is there a way to assigen a QoS service policy via Radius to an Caltalyst 4500/3750 Switchport?
 
in detail, we would like to assign this policy
 
policy-map SET_EF     class class-default       set dscp ef
 
to an interface. All traffic should be marked with a defined DSCP value.
 
This works find when doing it statically with
 
interface FastEthernet2/1         service-policy input SET_EF
 
but we would need to assign such a policy via Radius during the 802.1x Authentication. different users should get differnt policies. We use Cisco ACS 5.2 as Radius Server and there actually is a field for that in the Authorization Profile Common Tasks Configuration. in detail, this uses the cisco-av-pair "sub-policy-In=<policy name>" attribute to assign a service policy to an NAS.
 
we found also two other attributes "sub-qos-policy-in" and "ip:sub-qos-polcy-in" for that. CCO says that "ip:sub-qos-polcy-in" works with Catalyst 65k [URL]
 
unfortunately this seems to not work on Catalyst 45k and 37k.
 
In the ACS Logs we can see that these attributes are attached to the Radius Reply, but unfortunately they are ignored by the switch.
 
it is interesing that when entering "show aaa attributes" on the Catalyst 45k, these attributes are displayd - so for my understanding the switch should understand these attibutes (?)
 
4503-E#sh aaa attributes         AAA ATTRIBUTE LIST:        Type=1     Name=disc-cause-ext                 Format=Enum        Type=2     Name=Acct-Status-Type               Format=Enum

[Code]......

View 1 Replies View Related

AAA/Identity/Nac :: ACS 5.3 Multiple Service Selection Required For RADIUS Wireless

Feb 26, 2013

I use ACS 5.3.0.40.8 with TACACS+ servicing Device AAA and RADIUS servicing the Cisco Wireless environment for AD user access. How can I implement 802.1x with the current RADIUS implementation with hindering current wireless users or am I hindered due to the EAP-GTC in use with PEAP via RADIUS?

View 3 Replies View Related

AAA/Identity/Nac :: 7206VXR - Apply Specific Service Policies Per PPPOE - User

Jun 3, 2011

We are trying to apply specific service policies per PPPOE-User.
 
Our BRAS is a Cisco 7206VXR , running c7200-spservicesk9-mz.122-33.SRE3.bin
 
When we try an very easy service policy as following the policy is well applied:
 
Code...

View 0 Replies View Related

Cisco VPN :: How To Configure Remote Access Type On SA520-k9

Mar 21, 2012

I'm trying to configure a VPN remote access type on a SA520-k9 but i don't know  why doesn't work.
 
My Internal network is 192.168.131.0/24 and my Wan Ip is 87.216.xxx.xxx.
 
on Remote WAN's IP Address / FQDN i put the WAN IP 87.216.xxx.xxx on Local WAN's IP Address / FQDN I put the cisco SA520 Ip. I think this is the problem.
 
I create a IPsec user. I create a firewall rule from WAN interface to SA520 Ip with IPSEC-UDP-ENCAP service.

View 3 Replies View Related

Cisco AAA/Identity/Nac :: ACS 5.2 - TACACS For Network Access

Feb 27, 2011

I found that TACACS should be available for network access with ACS 5.2:(url) But when I'm trying to create Rule tu allow PPP authentication against TACACS server I get error.

View 2 Replies View Related







Copyrights 2005-15 www.BigResource.com, All rights reserved