[c-nsp] Cisco ASR 9k and Windows RADIUS server

Mick O'Rourke mkorourke at gmail.com
Wed May 4 06:28:02 EDT 2016


Working on XR 4.3.2 with Microsoft NPS/Radius here.

The only special config required was on the NPS side was an attribute
specifying the IOS XR IE task group.
Nothing special was required on the XR side - your config looks very
similar to what we use.

Mick
On 4 May 2016 09:31, "David Wilkinson" <cisco-nsp at noroutetohost.net> wrote:

> Hi,
>
> We have a RADIUS server running on Windows Server 2008. It currently
> handles the logins for our network devices, a mixture of Cisco IOS, NX-OS
> and Dell F10 blade switches and this has been working fine.
> When I went to setup our new ASR 9006 routers to the RADIUS server it was
> failing to authorise the users, on further inspection the RADIUS server had
> the following in the logs.
> "A malformed RADIUS message was received from client <device>. The data is
> the RADIUS message."
> From what I can tell via TCPdump the RADIUS packets look OK doesn't seem
> to be malformed. I assume the Windows RADIUS server doesn't like one of the
> options IOS-XR is sending it.
>
> Before I build a FreeRADIUS server to sit in frond of LDAP for auth, I was
> wondering if anyone had got IOS-XR working with a Windows RADIUS server and
> if there was any special configuration needed?
>
> Below is copy of the RADIUS config and "show radius" output.
>
> Thanks
>
> David
>
>
>
> Router config
>
> radius-server host <server 1> auth-port 1812 acct-port 1813
>  key 7 <key>
> !
> radius-server host <server 2> auth-port 1812 acct-port 1813
>  key 7 <key>
> !
> !
> aaa group server radius radservers
>  server <server 1> auth-port 1812 acct-port 1813
>  server <server 2> auth-port 1812 acct-port 1813
>  vrf mgmt
> !
> aaa authorization exec default local group radservers
> aaa authentication login default local group radservers
>
> #show radius
> Server: <server 1>/1812/1813  is UP
>   Address family: IPv4
>   Total Deadtime: 0s Last Deadtime: 0s
>   Timeout: 5 sec, Retransmit limit: 3
>   Quarantined: No
>   Authentication:
>     81 requests, 0 pending, 0 retransmits
>     0 accepts, 0 rejects, 0 challenges
>     81 timeouts, 0 bad responses, 0 bad authenticators
>     0 unknown types, 0 dropped, 0 ms latest rtt
>     Throttled: 0 transactions, 0 timeout, 0 failures
>     Estimated Throttled Access Transactions: 0
>     Maximum Throttled Access Transactions: 0
>
>     Automated TEST Stats:
>         0 requests, 0 timeouts, 0 response, 0 pending
>   Accounting:
>     0 requests, 0 pending, 0 retransmits
>     0 responses, 0 timeouts, 0 bad responses
>     0 bad authenticators, 0 unknown types, 0 dropped
>     0 ms latest rtt
>     Throttled: 0 transactions, 0 timeout, 0 failures
>     Estimated Throttled Accounting Transactions: 0
>     Maximum Throttled Accounting Transactions: 0
>
>     Automated TEST Stats:
>         0 requests, 0 timeouts, 0 response, 0 pending
>
> _______________________________________________
> cisco-nsp mailing list  cisco-nsp at puck.nether.net
> https://puck.nether.net/mailman/listinfo/cisco-nsp
> archive at http://puck.nether.net/pipermail/cisco-nsp/
>


More information about the cisco-nsp mailing list