Our Cisco specialist told me, ssh can only be enabled on crypto-IOS. But this
is more expensive. If you want, i can tell you the exact version of the IOS we
currently use.
But i will show him your question.
Robert
- Original Nachricht
Von: "King, Michael" <[EMAIL PROTECTED]>
An:
Dear all,
For AAA-Authenticating on a Cisco Catalyst Switch 3750, i try to use use the
ntlm_auth to authenticate users against our Active Directory (domain-name:
SOUTH). Users telnet the switch, therefore a clear-text password will be sent.
according to an earlier posting
http://lists.freerad
> ntlm_auth should work. I'm less sure how to configure multiple AD
> domains in ldap.
>
> Alan DeKok.
>
Okay, according to an earlier posting
http://lists.freeradius.org/mailman/htdig/freeradius-users/2005-July/045377.html
i did this:
> What you need to do is to configure a *different*
Dear all,
For AAA-Authenticating on a Cisco Catalyst Switch 3750, i use the rlm_ldap
module to authenticate users against our single Active Directory (domain-name:
SOUTH). Users telnet the switch, therefore a clear-text password will be sent.
This works properly.
But now, we have four AD-Domai
Dear all,
My Supplicant is a WinXP-Client, EAP-Type is MD5-Challenge.
My Authenticator is a Cisco Catalyst 3750
I try to do a 802.1X Authentication for a user listet in a LDAP-database.
When i do a MD5-Challenge it does not work. Do i have a problem with
MD5-encrypted passwords?
My configuratio
- Original Nachricht
Von: [EMAIL PROTECTED]
An: FreeRadius users mailing list
Datum: 23.05.2006 09:46
Betreff: Re: VLAN-mapping by DEFAULT Entry fails
> Hi,
>
> > I use a WindowsXP, EAP-Type MD5-challenge as supplicant and a Cisco
> Catalyst Switch 3750 as authenticator a
Dear all,
I use a WindowsXP, EAP-Type MD5-challenge as supplicant and a Cisco Catalyst
Switch 3750 as authenticator and i want that user hugo will be mapped in VLAN
50 on the switch. This works properly.
Every other user should be mapped in VLAN 999, my guest-vlan. I try this with a
DEFAULT-en
> [EMAIL PROTECTED] wrote:
> >
> > robiwan: Okay, here is the complete output from my radiusd, when user roka
> do a request:
> > sorry, it's huge
> >
> > rad_recv: Access-Request packet from host 10.187.0.15:1645, id=231,
> length=137
> >
Tunnel-Type = VLAN,
> Tunnel-Medium-Type = 6,
> Tunnel-Private-Group-ID = 40
> -snap--
Do NOT set Auth-Type. If your server is properly configured, it is not
needed and can cause problems. In this case, it should not be ca
Dear all,
I try to put my Windows-XP-Clients in different VLANs on my Cisco Catalyst 3750
Switch, depending on their Account.
And i use two differnt authentication methods: MD5-Challange and MS-CHAP.
User hugo should be mapped in VLAN 50 and authenticated via MD5-Challange
User roka at Domain WIN
- Original Nachricht
Von: Stefan Winter <[EMAIL PROTECTED]>
An: FreeRadius users mailing list
Datum: 04.05.2006 13:20
Betreff: Re: ntlm_auth is not used by mschap
> Hi,
>
> you didn't state what problem you have right now. The logs send an Accept at
>
> the end, so everythin
Dear All,
Now i am a step further on, my radiusd uses the ntlm_auth module AND
authenticate the user correctly !!!.
My Username = roka, Password = Gerti1000, Domain = WINLAB
Now i use the selfcompiled freeradius 1.1.1 and NOT the Debian freeradius. The
Debian freeradius is unable to load EAP-Ty
You send a packet that does not contain any MS-CHAP attributes. Because of
that, the server is not doing MS-CHAP:
> modcall[authorize]: module "mschap" returns noop for request 0
As this line tells you.
Send a MS-CHAP request, and look what happens then.
Stefan
Hi ,
Now i send a mschap req
- Original Nachricht
Von: Stefan Winter <[EMAIL PROTECTED]>
An: FreeRadius users mailing list
Datum: 03.05.2006 11:59
Betreff: Re: ntlm_auth is not used by mschap
> > Now i try to authenticate the user roka:
> > ---
> >
> > D
Dear all,
I try to authenticate Radius-users against my Microsoft-2003-Server
Active-Directory using the mschap-Module with ntlm_auth.
My Windows-Domain is "winlab" my username is "roka" and the Password is
"Gerti1000".
The winbindd and therefore the ntlm_auth works properly as you can see:
D
15 matches
Mail list logo