Hello i've a lot of 6400 some alone, some in stack, when they are alone if i use Management Authentication through Radius with, this parameters :
Alcatel-Lucent-Asa-Access all
Alcatel-Lucent-Acce-Priv-F-W1 0xFFFFFFFF
Alcatel-Lucent-Acce-Priv-F-W2 0xFFFFFFFF
it's work, but if i try to connect to a stackable 6400 with the same my radius ( freeradius ) get this " Auth: Login incorrect: [staff/\340p\035\035yK\301\226\021\200\374w\022(8\351] (from client 6400-MPTOOL_NAVE2 port 0)"
i try with other values, with help of bitmap calculator, but it's the same error.
anybody get the same problem ?
Thanks
Hugo
Management Authentication through Radius
-
devnull
Re: Management Authentication through Radius
Which firmware are you running?
I have lots of 6250/6450 stacked with Radius Access (here against NPS)
we sent back the same attributes (
Vendor 800 Attribute 9 String "all"
Vendor 800 Attribute 41 hex "ffffffff"
Vendor 800 Attribute 42 hex "ffffffff"
Have you tried running freeradius in debug mode (freeradius -X) to check whether request and response match on stacked/nonstacked units?
I have lots of 6250/6450 stacked with Radius Access (here against NPS)
we sent back the same attributes (
Vendor 800 Attribute 9 String "all"
Vendor 800 Attribute 41 hex "ffffffff"
Vendor 800 Attribute 42 hex "ffffffff"
Have you tried running freeradius in debug mode (freeradius -X) to check whether request and response match on stacked/nonstacked units?
-
hugorosa
Re: Management Authentication through Radius
Hello devnull, thanks, i remove the config of radius in switch, and config again with same settings, and now it's work, .....werdo.....
my freeradius in debug says that the credentials of radius are incorrect, when i config again , it's all ok.
thanks.
my freeradius in debug says that the credentials of radius are incorrect, when i config again , it's all ok.
thanks.
-
devnull
Re: Management Authentication through Radius
What i ran into:
You can't copy the "aaa radius-server" line from one switch to another (using e.g. putty). It will rehash the encrypted password thus rendering it unusable.
You always have to enter the line with the correct (cleartext) shared-key or copy the line into the boot.cfg and reload the switch with that config.
You can't copy the "aaa radius-server" line from one switch to another (using e.g. putty). It will rehash the encrypted password thus rendering it unusable.
You always have to enter the line with the correct (cleartext) shared-key or copy the line into the boot.cfg and reload the switch with that config.
