If you use the 1.1.1.2 RADIUS server first in the list you cannot authenticate to the switch at all, even over super-user-password. ![]() WORKAROUND 1 radius-server host 1.1.1.1 auth-port 1812 acct-port 1813 default key RADIUS1SECRET radius-server host 1.1.1.2 auth-port 1812 acct-port 1813 default key RADIUS2SECRET dot1x mac-auth Here are my AAA Authentication Commands: sh run | inc authentication aaa authentication web-server default radius local aaa authentication enable default radius local aaa authentication dot1x default radius aaa authentication login default radius local I have found 2 work arounds, I did however also call support and spend 1 hour troubleshooting with them and they didn’t have an answer for me. In Ruckus ICX switches there isn’t any concept of AAA groups like in Cisco, where you can designate specific RADIUS traffic to go to various different RADIUS Servers. ![]() ![]() RADIUS Authenticate using 802.1x or MAC-Auth using DOT1x RADIUS Server RADIUS Authenticate over SSH to switch using Microsoft NPS RADIUS Server I have recently been configuring Network Access Control with 802.1x, and I had been having issues with using multiple RADIUS servers on Ruckus ICX Switches.
0 Comments
Leave a Reply. |