Hugh--
we are set to trace 4 and this is all that is entered when this happens
Aug 31 21:48:24 x.x.x.x /usr/bin/radiusd[11856]: Access rejected for pja: No such user
if this will help, here is authentication debugging from the router
11w0d: AAA: name=Virtual-Access1 flags=0x11 type=5 shelf=0 slot=0 adapter=0 port=1
channel=0
11w0d: AAA/MEMORY: create_user (0x6279B794) user='pja' ruser='' port='Virtual-Access1'
rem_addr='' authen_type=PAP service=PPP priv=1
11w0d: AAA/AUTHEN/START (1231792523): port='Virtual-Access1' list='' action=LOGIN
service=PPP
11w0d: AAA/AUTHEN/START (1231792523): using "default" list
11w0d: AAA/AUTHEN (1231792523): status = UNKNOWN
11w0d: AAA/AUTHEN/START (1231792523): Method=LOCAL
11w0d: AAA/AUTHEN (1231792523): status = ERROR
11w0d: AAA/AUTHEN/START (1231792523): Method=radius (radius)
11w0d: AAA/AUTHEN (1231792523): status = FAIL
Sep 1 02:48:24 UTC: %VPDN-6-AUTHENFAIL: L2F HGW FlintVPOP, AAA authentication failure
for Vi1 user pja; Request Denied
11w0d: AAA/MEMORY: free_user (0x6279B794) user='pja' ruser='' port='Virtual-Access1'
rem_addr='' authen_type=PAP service=PPP priv=1
Frank
>
>I will need to see a more complete trace 4 showing what is happening.
>
>thanks
>
>Hugh
>
>On Fri, 01 Sep 2000, FlintHillsTechnical Support wrote:
>> Hello--
>>
>> We have tried to implement Handlers which work, sorta! We now can allow any user
>to connect to our Ascends despite their Service-Type and we can restrict who can
>telnet to the Cisco. However, when we try to dial into the external NAS that is
>connected to the Cisco as a normal user it is rejected and in the debug file is
>>
>> Aug 31 15:44:45 x.x.x.x /usr/bin/radiusd[11856]: Access rejected for pja: No such
>user
>>
>> Here are our 2 examples of our Clients and our Handler statements. I am pretty
>sure this is a syntax issue....
>>
>> <Client x.x.x.x>
>> Secret xxxxxx
>> DefaultRealm cisco.flinthills.com
>> </Client>
>>
>> <Client x.x.x.x>
>> Secret xxxxxx
>> DefaultRealm ascend.flinthills.com
>> </Client>
>>
>> <Handler Realm=ascend.flinthills.com>
>> RewriteUsername tr/A-Z/a-z/
>> RewriteUsername s/\@ascend\.flinthills\.com//
>> <AuthBy DBFILE>
>> Filename %D/users
>> </AuthBy>
>> AcctLogFileName %L/acct-radius
>> WtmpFileName %L/wtmp-radius
>> </Handler>
>>
>> <Handler Service-Type=Framed-User, Realm=cisco.flinthills.com>
>> RewriteUsername tr/A-Z/a-z/
>> RewriteUsername s/\@cisco\.flinthills\.com//
>> <AuthBy DBFILE>
>> Filename %D/users
>> </AuthBy>
>> AcctLogFileName %L/acct-radius
>> WtmpFileName %L/wtmp-radius
>> </Handler>
>>
>> <Handler Realm=cisco.flinthills.com>
>> RewriteUsername tr/A-Z/a-z/
>> RewriteUsername s/\@cisco\.flinthills\.com//
>> <AuthBy DBFILE>
>> Filename %D/netadm
>> </AuthBy>
>> AcctLogFileName %L/acct-radius
>> WtmpFileName %L/wtmp-radius
>> </Handler>
>>
>>
>> Any help on this would be greatly appreciated!!!
>>
>> TIA
>> Frank
>>
>>
>> >>
>> >> We have Ascend NASes and a Cisco router that has other NASes
>> >connected to it via L2F tunnels. We are trying to restrict who can telnet to
>> >the Cisco router. Previously, we did not have the NASes connected to the Cisco
>> >so access was restricted by placing the Cisco in a separate realm pointing to a
>> >users file that only the users allowed on the router were in. The Ascend NASes
>> >were in another realm pointing to a separate users file that all of the dialup
>> >users authenticated from.
>> >
>> >> However, now we have dialup users coming through
>> >the Cisco from external NASes and this will not work and essentially anyone
>> >could telnet to the router.
>> >
>> >> First, we created a common users file and used a
>> >check item of Service-Type = Framed User and set administrators(those who
>> >needed access to the Cisco) with no Service-Type check item so they could
>> >telnet to the router OR dial in via ppp.
>> >
>> >> But now we realize (much to our
>> >dismay)that we have users who dial into the Ascend's TermSrv with Linux and
>> >older Macs that utilize scripts. When accessing this way the Service-Type is
>> >passed as Login-User and not Framed User.
>> >
>> >> Does anyone have ideas on this?
>> >Essentially we want only a few users telnet access to the Cisco yet still allow
>> >the script users their method of access. I have looked through the archive some
>> >but really I don't know the best way to search for this issue. Are we
>> >approaching this correctly by utilizing check items?
>> >
>> >You will have to look at the trace 4 packet dumps of the relevant radius
>> >request packets to see what (if anything) is different between the various
>> >requests. You may find that seperate Handlers for the different classes of user
>> >is a better approach rather than a single users file. You might also consider
>> >having your administrative users log in with a special realm, such as
>> >"[EMAIL PROTECTED]" (perhaps in conjunction with our RadKey product or
>> >something similar).
===
Archive at http://www.starport.net/~radiator/
Announcements on [EMAIL PROTECTED]
To unsubscribe, email '[EMAIL PROTECTED]' with
'unsubscribe radiator' in the body of the message.