Appendix A Troubleshooting Information for Cisco Secure ACS
Debug Issues
A-10
User Guide for Cisco Secure ACS for Windows Server
78-14696-01, Version 3.1
Debug Issues
Condition
Recovery Action
When you run debug aaa
authentication on the AAA
client, Cisco Secure ACS returns
a failure message.
The configurations of the AAA client or Cisco Secure ACS are
likely to be at fault.
From within Cisco Secure ACS confirm the following:
Cisco Secure ACS is receiving the request. This can be done by
viewing the Cisco Secure ACS reports. What does or does not
appear in the reports may provide indications that your
Cisco Secure ACS is misconfigured.
From the AAA client, confirm the following:
•
The command ppp authentication pap is entered for each
interface if authentication against the Windows NT/2000 user
database is being used.
•
The command ppp authentication chap pap is entered for
each interface if authentication against the CiscoSecure user
database is being used.
•
The AAA and or RADIUS configuration is correct
in the AAA client. The necessary commands are listed in the
following:
Program Files\CiscoSecure ACS vx.x\TacConfig.txt
Program Files\CiscoSecure ACS vx.x\RadConfig.txt
Program Files\CiscoSecure ACS vx.x\README.TXT
When you run debug aaa
authentication and debug aaa
authorization on the AAA
client, Cisco Secure ACS returns
a
PASS
for authentication, but
returns a
FAIL
for authorization.
This problem occurs because authorization rights are not correctly
assigned.
From Cisco Secure ACS User Setup, confirm that the user is
assigned to a group that has the correct authorization rights.
Authorization rights can be modified under Group Setup or User
Setup. User settings override group settings.
If a specific attribute for or RADIUS is not displayed
within the Group Setup section, this might indicate it has not been
enabled in Interface Configuration: (Cisco IOS) or
RADIUS.