On 05/23/2013 03:34 PM, Roberto Carna wrote:
Dear, I've implemented Linux SSH authentication using PAM against a
Freeradius server, it was OK !!!
But know I'm trying to authenticate some Allied switch users against the
same Freeradius server...in the Allied switch I've defined the radius
server
On 03/06/2013 03:21 AM, Jimmy Stewpot wrote:
Hello,
We have always had the Cisco-AVPAIR of "shell:priv-lvl=15" which has been working for
some time. With the Cisco UCS platform we need to introduce an additional shell: variable which
looks like this "shell:roles=admin".
Your mileage may vary
On Thu, 2013-02-07 at 23:51 -0500, Norman Zhang wrote:
> Hi,
>
> Using freeradius2-2.1.12. I need to setup read-write access for both
> Cisco NX-OS and IOS devices. I did the following,
>
> DEFAULT Group == operator-rw, Auth-Type = System
> Service-Type = NAS-Prompt-User,
> cisco
On Fri, 2012-11-09 at 15:37 -0400, Chris Taylor wrote:
> I setup tcpdump to dump to a file (tcpdump -i eth0 -n -s0 port radius
> -w rad-capture.lpc) , but when I check it out with wireshark I am
> unable to see the password (just the username). Am I going about this
> the wrong way?
You can decry
nding a "Service-Type" attribute to the switch, according
to Cisco[0], it's required to send the "shell:priv-lvl=" attribute with
a corresponding "Service-Type" attribute. (It might work on later
versions of IOS without the latter attribute though).
[0]
http://www.cisco.com/e
5 matches
Mail list logo