Verify Radius Server Connectivity With Test AAA Radius Command
Verify Radius Server Connectivity With Test AAA Radius Command
Introduction
This document describes how the test aaa radius command on the Cisco WLC can be used to
identify radius server connectivity and client authentication issues without the use of a wireless
client.
Prerequisites
Requirements
Cisco recommends that you have knowledge of Wireless LAN Controller (WLC) code 8.2 and
above.
Components Used
Background Information
Wireless client authentication issues are one of the most challenging problems that wireless
network engineers face. In order to troubleshoot this, it often requires to get hold of the
problematic client, work with the end users who may not have the best knowledge of wireless
networks and to collect debugs and captures. In an increasingly critical wireless network, this can
cause significant downtime.
Up until now there was no easy way to identify if an authentication failure was caused by the
radius server which rejects the client, or just simply a reachability issue. The test aaa radius
command lets you do just that. You can now remotely verify if the WLC-Radius server
communication fails or if the credentials for the client results in a passed or failed authentication.
Step 1. The WLC sends an access request message to the radius server along with the
parameters that is mentioned in the test aaa radius command.
For ex: test aaa radius username admin password cisco123 wlan-id 1 apgroup default-
group server-index 2
Step 2. The radius server validates the credentials provided and provides the results of the
authentication request.
Command Syntax
These parameters need to be provided to execute the command:
(Cisco Controller) > test aaa radius username <user name> password <password> wlan-id
<wlan-id> ap-group <apgroup-name> server-index <server-index>
(Cisco Controller) >test aaa radius username admin password cisco123 wlan-id 1 apgroup default-
group server-index 2
Radius Test Request
Wlan-id........................................ 1
ApGroup Name................................... default-group
Attributes Values
---------- ------
User-Name admin
Called-Station-Id 00:00:00:00:00:00:WLC5508
Calling-Station-Id 00:11:22:33:44:55
Nas-Port 0x0000000d (13)
Nas-Ip-Address 10.20.227.39
NAS-Identifier WLC_5508
Airespace / WLAN-Identifier 0x00000001 (1)
User-Password cisco123
Service-Type 0x00000008 (8)
Framed-MTU 0x00000514 (1300)
Nas-Port-Type 0x00000013 (19)
Tunnel-Type 0x0000000d (13)
Tunnel-Medium-Type 0x00000006 (6)
Tunnel-Group-Id 0x00000051 (81)
Cisco / Audit-Session-Id ad14e327000000c466191e23
Acct-Session-Id 56131b33/00:11:22:33:44:55/210
test radius auth request successfully sent. Execute 'test aaa show radius' for response
In order to view the results of the authentication request, you need to execute the command test
aaa show radius. The command can take some time to show the output if a radius server is
unreachable and the WLC needs to retry or fallback to a different radius server.
Caution: The username/password in the access request are sent in clear text to the radius
server, so you need to use it with caution if traffic flows over an unsecured network.
Caveats
● There is currently no GUI support. It is only a command that can be executed from the WLC.
● The verification is only for radius. It cannot be used for TACACS authentication.
● Flexconnect local authentication cannot be tested with this method.