Radius server test
Author: b | 2025-04-24
The RADIUS test is a test of connectivity to the RADIUS server, not of full RADIUS functionality. The controller‘s RADIUS connectivity test initiates an access-request, to which the RADIUS server will respond. If a response is
Testing the RADIUS Server - Cisco
RADIUS command output are defined as follows: The aaa group server radius command shows the configuration of a server group. The radius server and address command defines the RADIUS server name and IP address of the RADIUS server with authorization and accounting ports specified. The radius-server load-balance command enables load balancing for the RADIUS server with the batch size specified. The show debug sample output below shows test requests being sent to servers. The response to the test request sent to the server is received, the server is removed from quarantine as appropriate, the server is marked alive, and then the idle timer is reset. Device# show debug*Feb 28 13:52:20.835:AAA/SG/TEST:Server (192.0.2.238:2015,2016) quarantined.*Feb 28 13:52:20.835:AAA/SG/TEST:Sending test request(s) to server (192.0.2.238:2015,2016)*Feb 28 13:52:20.835:AAA/SG/TEST:Sending 1 Access-Requests, 1 Accounting-Requests in current batch.*Feb 28 13:52:20.835:AAA/SG/TEST(Req#:1):Sending test AAA Access-Request.*Feb 28 13:52:20.835:AAA/SG/TEST(Req#:1):Sending test AAA Accounting-Request.*Feb 28 13:52:21.087:AAA/SG/TEST:Obtained Test response from server (192.0.2.238:2015,2016)*Feb 28 13:52:22.651:AAA/SG/TEST:Obtained Test response from server (192.0.2.238:2015,2016)*Feb 28 13:52:22.651:AAA/SG/TEST:Necessary responses received from server (192.0.2.238:2015,2016)*Feb 28 13:52:22.651:AAA/SG/TEST:Server (192.0.2.238:2015,2016) marked ALIVE. Idle timer set for 60 secs(s).*Feb 28 13:52:22.651:AAA/SG/TEST:Server (192.0.2.238:2015,2016) removed from quarantine.... The following example shows an authentication server group and an authorization server group that use the same servers 209.165.200.225 and 209.165.200.226. Both server groups have the preferred server flag enabled. Device> enableDevice# configure terminalDevice(config)# aaa group server radius authentication-groupDevice(config-sg-radius)# server 209.165.200.225 key radkey1Device(config-sg-radius)# server 209.165.200.226 key radkey2Device(config-sg-radius)# exitDevice(config)# aaa group server radius accounting-groupDevice(config-sg-radius)# server 209.165.200.225 key radkey1Device(config-sg-radius)# server 209.165.200.226 key radkey2Device(config-sg-radius)# end When a preferred server is selected for a session, all transactions for Load: 3Jul 16 03:15:05: AAA/SG/SERVER_SELECT: Server[1] load: 0Jul 16 03:15:05: AAA/SG/SERVER_SELECT: Server[2] load: 0Jul 16 03:15:05: AAA/SG/SERVER_SELECT: Selected Server[1] with load 0Jul 16 03:15:05: AAA/SG/SERVER_SELECT: [3] transactions remaining in batch.Jul 16 03:15:05: AAA/SG/SERVER_SELECT: Obtaining least loaded server.Jul 16 03:15:05: AAA/SG/SERVER_SELECT: [2] transactions remaining in batch. Reusing server. Step 3 Use the test aaa group command to manually verify the RADIUS load-balanced server status. The following sample output shows the response from a load-balanced RADIUS server that is alive when the username “test” does not match a user profile. The server is verified alive when it issues an Access-Reject response to an authentication, authorization, and accounting (AAA) packet generated using the test aaa group command. Example: Device# test aaa group SG1 test lab new-code 00:06:07: RADIUS/ENCODE(00000000):Orig. component type = INVALID00:06:07: RADIUS/ENCODE(00000000): dropping service type, "radius-server attribute 6 on-for-login-auth" is off00:06:07: RADIUS(00000000): Config NAS IP: 192.0.2.400:06:07: RADIUS(00000000): sending00:06:07: RADIUS/ENCODE: Best Local IP-Address 192.0.2.141 for Radius-Server 192.0.2.17600:06:07: RADIUS(00000000): Send Access-Request to 192.0.2.176:1645 id 1645/1, len 5000:06:07: RADIUS: authenticator CA DB F4 9B 7B 66 C8 A9 - D1 99 4E 8E A4 46 99 B400:06:07: RADIUS: User-Password [2] 18 *00:06:07: RADIUS: User-Name [1] 6 "test"00:06:07: RADIUS: NAS-IP-Address [4] 6 192.0.2.14100:06:07: RADIUS: Received from id 1645/1 192.0.2.176:1645, Access-Reject, len 4400:06:07: RADIUS: authenticator 2F 69 84 3E F0 4E F1 62 - AB B8 75 5B 38 82 49 C300:06:07: RADIUS: Reply-Message [18] 24 00:06:07: RADIUS: 41 75 74 68 65 6E 74 69 63 61 74 69 6F 6E 20 66 [Authentication f]00:06:07: RADIUS:NazgulCoder/RADIUS-Server-Checker: a simple RADIUS test
Load: 3Jul 16 03:15:05: AAA/SG/SERVER_SELECT: Server[1] load: 0Jul 16 03:15:05: AAA/SG/SERVER_SELECT: Server[2] load: 0Jul 16 03:15:05: AAA/SG/SERVER_SELECT: Selected Server[1] with load 0Jul 16 03:15:05: AAA/SG/SERVER_SELECT: [3] transactions remaining in batch.Jul 16 03:15:05: AAA/SG/SERVER_SELECT: Obtaining least loaded server.Jul 16 03:15:05: AAA/SG/SERVER_SELECT: [2] transactions remaining in batch. Reusing server. Step 3 Use the test aaa group command to manually verify the RADIUS load-balanced server status. The following sample output shows the response from a load-balanced RADIUS server that is alive when the username “test” does not match a user profile. The server is verified alive when it issues an Access-Reject response to an authentication, authorization, and accounting (AAA) packet generated using the test aaa group command. Example: Device# test aaa group SG1 test lab new-code 00:06:07: RADIUS/ENCODE(00000000):Orig. component type = INVALID00:06:07: RADIUS/ENCODE(00000000): dropping service type, "radius-server attribute 6 on-for-login-auth" is off00:06:07: RADIUS(00000000): Config NAS IP: 192.0.2.400:06:07: RADIUS(00000000): sending00:06:07: RADIUS/ENCODE: Best Local IP-Address 192.0.2.141 for Radius-Server 192.0.2.17600:06:07: RADIUS(00000000): Send Access-Request to 192.0.2.176:1645 id 1645/1, len 5000:06:07: RADIUS: authenticator CA DB F4 9B 7B 66 C8 A9 - D1 99 4E 8E A4 46 99 B400:06:07: RADIUS: User-Password [2] 18 *00:06:07: RADIUS: User-Name [1] 6 "test"00:06:07: RADIUS: NAS-IP-Address [4] 6 192.0.2.14100:06:07: RADIUS: Received from id 1645/1 192.0.2.176:1645, Access-Reject, len 4400:06:07: RADIUS: authenticator 2F 69 84 3E F0 4E F1 62 - AB B8 75 5B 38 82 49 C300:06:07: RADIUS: Reply-Message [18] 24 00:06:07: RADIUS: 41 75 74 68 65 6E 74 69 63 61 74 69 6F 6E 20 66 [Authentication f]00:06:07: RADIUS: 61 69 6C 75 72 65 [failure]00:06:07: RADIUS(00000000): Received from id 1645/100:06:07: RADIUS/DECODE: Reply-Message fragments, 22, total 22 bytes Enabling VRF Aware RADIUS Automated Testing To enable RADIUS automated testing for a non-default VRF, perform the following procedure: Procedure Command or Action Purpose Step 1 enable Example: Device>enable Enables privileged EXEC mode. Enter your password, if prompted. Step 2 configure terminal Example: Device# configure terminal Enters global configuration mode. Step 3 radius server name Example: Device(config)# radius server myserver Specifies the name of the RADIUS server configuration and enters RADIUS server configuration mode. Step 4 address { ipv4| ipv6} {. The RADIUS test is a test of connectivity to the RADIUS server, not of full RADIUS functionality. The controller‘s RADIUS connectivity test initiates an access-request, to which the RADIUS server will respond. If a response isVerify Radius Server Connectivity with Test AAA Radius
Available to process transactions, the RADIUS automated tester sends a request periodically to the server for a test user ID. If the server returns an Access-Reject message, the server is alive; otherwise the server is either dead or quarantined. A transaction sent to an unresponsive server is failed over to the next available server before the unresponsive server is marked dead. We recommend that you use the retry reorder mode for failed transactions. When using the RADIUS automated tester, verify that the authentication, authorization, and accounting (AAA) servers are responding to the test packets that are sent by the network access server (NAS). If the servers are not configured correctly, packets may be dropped and the server erroneously marked dead. Caution We recommend that you use a test user that is not defined on the RADIUS server for the RADIUS server automated testing to protect against security issues that may arise if the test user is not correctly configured. Note Use the test aaa group command to check load-balancing transactions. The automate-tester username name probe-on command is used to verify the status of a server by sending RADIUS packets. After this command is configured, a five-second dead timer is started and a RADIUS packet is sent to the external RADIUS server after five seconds. The server state is updated if there is a response from the external RADIUS server. If there is no response, the packets are sent out according to the timeout interval that is configured using the radius-server Not sent to a server that is marked dead. A server is marked dead until its timer expires, at which time it moves to quarantine state. A server is in quarantine until it is verified alive by the RADIUS automated tester functionality. To determine if a server is alive and available to process transactions, the RADIUS automated tester sends a request periodically to the server for a test user ID. If the server returns an Access-Reject message, the server is alive; otherwise the server is either dead or quarantined. A transaction sent to an unresponsive server is failed over to the next available server before the unresponsive server is marked dead. We recommend that you use the retry reorder mode for failed transactions. When using the RADIUS automated tester, verify that the authentication, authorization, and accounting (AAA) servers are responding to the test packets that are sent by the network access server (NAS). If the servers are not configured correctly, packets may be dropped and the server erroneously marked dead. Caution We recommend that you use a test user that is not defined on the RADIUS server for the RADIUS server automated testing to protect against security issues that may arise if the test user is not correctly configured. Note Use the test aaa group command to check load-balancing transactions. The automate-tester username name probe-on command is used to verify the status of a server by sending RADIUS packets. After this command is configured, a five-second dead timer is started and a RADIUS packet is sent to the external RADIUS server after five seconds. The server state is updated if there is a response from the external RADIUS server. If there is no response, the packets are sent out according to the timeout interval that is configured using the radius-server timeout command. This will continue for 180 seconds, and if there is still no response, a new dead timer is started based on the configured radius-server deadtime command. VRF-Aware RADIUS Automated Testing The RADIUS automated tester function works at a server-level configuration. There is no group associated with the function.mcguinness/simple-radius-server: Test RADIUS Server for OTP - GitHub
703s, count 3Quarantined: NoAuthen: request 68, timeouts 68, failover 0, retransmission 53Sates defination:State: current UP. ===> this is IOSD statePlatform State from SMD: current UP. ====> This is wired BINOS i,e SMDPlatform State from WNCD (1) : current UP ===> This is wireless BINOS i.e WNCD instance 1Platform State from WNCD (2) : current UP. ===> This is wireless BINOS i.e WNCD instance 2Platform State from WNCD (3) : current UPPlatform State from WNCD (4) : current UPPlatform State from WNCD (5) : current UPPlatform State from WNCD (6) : current UPPlatform State from WNCD (7) : current UPPlatform State from WNCD (8) : current UP. ===> This is wireless BINOS i.e WNCD instance 8 Example: Monitoring Idle Timer The following example shows idle timer and related server state for load balancing enabled for a named RADIUS server group. The current configuration of the RADIUS command output and debug command output are also displayed. The following sample output shows the relevant RADIUS configuration: Device(config)# do show run aaaaaa group server radius server-group1radius server server1address ipv4 192.0.2.1 auth-port 1812 acct-port 1813automate-tester username user1 idle-time 2 vrf VRF1radius-server load-balance method least-outstanding batch-size 5 The lines in the current configuration of the preceding RADIUS command output are defined as follows: The aaa group server radius command shows the configuration of a server group. The radius server and address command defines the RADIUS server name and IP address of the RADIUS server with authorization and accounting ports specified. The radius-server load-balance command enables load balancing for the RADIUS server with the batch size specified. The show debug sample output below shows test requests being sent to servers. The response to the test request sent to the server is received, the server is removed from quarantine as appropriate, the server is marked alive, and then the idle timer is reset. Device# show debug*Feb 28 13:52:20.835:AAA/SG/TEST:Server (192.0.2.238:2015,2016) quarantined.*Feb 28 13:52:20.835:AAA/SG/TEST:Sending test request(s) to server (192.0.2.238:2015,2016)*Feb 28 13:52:20.835:AAA/SG/TEST:Sending 1 Access-Requests, 1 Accounting-Requests in current batch.*Feb 28 13:52:20.835:AAA/SG/TEST(Req#:1):Sending test AAA Access-Request.*Feb 28 13:52:20.835:AAA/SG/TEST(Req#:1):Sending test AAA Accounting-Request.*Feb 28 13:52:21.087:AAA/SG/TEST:Obtained Test response from server (192.0.2.238:2015,2016)*Feb 28 13:52:22.651:AAA/SG/TEST:Obtained Test response fromEAPTest RADIUS server testing - Ermitacode
DescriptionRADIUS is used as an Authentication, Authorization, and Accounting Server (AAA). The RADIUS server authenticates client requests either with approval or rejection. RADIUS Server not only authenticates users based on the username and password but also authorizes based on the configured policy.Sometimes, customer wants the GVC users to get authenticated directly through radius server. Radius users can be authenticated also with a PIN.There are chances to come across an If we see the error on GVC: XAUTH Failed with VPN client.CauseThis may be because of misconfiguration on the firewall.There may be some issues also on the radius server as well.We have to check that all the settings are fine on the firewall, for server related issue, customer has to check themselves. ResolutionIf we see the error on GVC: XAUTH Failed with VPN client, we first have to check if the settings on the firewall are correct. One can also test if local users are able to connect.Please check the below KB for reference.Configuring RADIUS authentication for Global VPN Clients with Network Policy and Access Server | SonicWallCheck the event log to see any related log or User login denied - RADIUS authentication failureCheck that VPN Clients via XAUTH has trusted group and also the radius users are part of trusted group.Try to test the user under radius settings and check with what method it is working:PAP, CHAP, MSCHAP, MSCHAP2If radius test is only working with MSCHAP2 or MSCHAP, then there is a config option in advanced vpn tabEnable : Use RADIUS in MSCHAP MSCHAPv2 mode for XAUTH (allows users to change expired passwords) If test is successful only with PAP, If the settings are correct, then run a packet capture for udp packets for port 1812.Here, check if the radius server is accepting or rejecting the request. If after testing from GVC clients and also from firewall under test user, when there is a reject from server. It means that this is not a firewall issue. Customer will have to check the settings on server side.If we see accept from server, then we have to check the firewall.Also make sure that the below option is uncheck: Allow only users listed locallyPacket capture will show us if the issue is on firewall or not. Note: when trying to use GVC to authenticate, always try twice as there is phase 1 and phase 2 involved.. The RADIUS test is a test of connectivity to the RADIUS server, not of full RADIUS functionality. The controller‘s RADIUS connectivity test initiates an access-request, to which the RADIUS server will respond. If a response isTest RADIUS Server Using This Guide
Verify_the_installation Verifying the InstallationFirst step after installing Evolynx RADIUS is to verify that the installation was successfully and software is working properly.Verify Evolynx Service StatusMain component of Evolynx RADIUS is a Windows service which runs all the time in background. At the end of the installation process, the Registration Tool will start this service (if the appropriate checkbox is checked). To verify that this service has been started and is running correctly, you can run the Evolynx Controller tool, which can be found in the Evolynx group on Start menu.Important: If service status is Stopped, you should look at the Evolynx RADIUS Events in Windows Event log for possible error messages.Verify Evolynx web AdminMost of the configuration and data management including Clients, Services, and Customers is done through the Evolynx Web Admin, which is a Web based tool. To verify that it is working correctly, open a browser and enter this URL: (When accessing from a remote computer, replace localhost with the computer name which hosts EvolynxAdmin.) You should see the following login screen: The default User ID/Password is admin/admin (make sure you change password for Admin in Operators section.) After you are logged in, you will see the Welcome screen: Verify RADIUS OperationsInstallation process will create minimum data required for RADIUS operation, which includes Company, Client, Service, Customer and LoginID. To test RADIUS operations like Authentication and Accounting, you can use the RADIUS Load Test tool located in the Evolynx program group on Start menu. When executed, it will display this screen:By default, it is populated with the IP address of the local computer, default RADIUS port numbers (1812 and 1813), default secret and login information. If you click on the Send Access Request, this tool will send an Access-Request packet to the RADIUS server, and should receive an Access-Accept response back, and you will see the counters incremented:TroubleshootingIt is posssible that during the test you see an error message like the following: In this case we changed the default IP of the local computer to IP address of a computer that is not running RADIUS server. This error can also happen if port numbers do not match between server and client, RADIUS Server is not running, or the client is not defined in the Evolynx RADIUS server. Following actions are suggested when this error happens:Verify that Evolynx RADIUS Server is running. (see related section above)Make sure IP address and port numbers used in test tool are the same as the IP address and port numbers RADIUS server is listening to. This problem can happen when same computer has more than one IP address assigned to it. To see what IP address is used by Evolynx RADIUS, please see the Log file located in Log folder, under Evolynx RADIUS Server program directory: Make sure IP address of the computer used as the test client is defined in Evolynx RADIUS as a client. If it is not, you will see following error in Log file, showing the IP address ofComments
RADIUS command output are defined as follows: The aaa group server radius command shows the configuration of a server group. The radius server and address command defines the RADIUS server name and IP address of the RADIUS server with authorization and accounting ports specified. The radius-server load-balance command enables load balancing for the RADIUS server with the batch size specified. The show debug sample output below shows test requests being sent to servers. The response to the test request sent to the server is received, the server is removed from quarantine as appropriate, the server is marked alive, and then the idle timer is reset. Device# show debug*Feb 28 13:52:20.835:AAA/SG/TEST:Server (192.0.2.238:2015,2016) quarantined.*Feb 28 13:52:20.835:AAA/SG/TEST:Sending test request(s) to server (192.0.2.238:2015,2016)*Feb 28 13:52:20.835:AAA/SG/TEST:Sending 1 Access-Requests, 1 Accounting-Requests in current batch.*Feb 28 13:52:20.835:AAA/SG/TEST(Req#:1):Sending test AAA Access-Request.*Feb 28 13:52:20.835:AAA/SG/TEST(Req#:1):Sending test AAA Accounting-Request.*Feb 28 13:52:21.087:AAA/SG/TEST:Obtained Test response from server (192.0.2.238:2015,2016)*Feb 28 13:52:22.651:AAA/SG/TEST:Obtained Test response from server (192.0.2.238:2015,2016)*Feb 28 13:52:22.651:AAA/SG/TEST:Necessary responses received from server (192.0.2.238:2015,2016)*Feb 28 13:52:22.651:AAA/SG/TEST:Server (192.0.2.238:2015,2016) marked ALIVE. Idle timer set for 60 secs(s).*Feb 28 13:52:22.651:AAA/SG/TEST:Server (192.0.2.238:2015,2016) removed from quarantine.... The following example shows an authentication server group and an authorization server group that use the same servers 209.165.200.225 and 209.165.200.226. Both server groups have the preferred server flag enabled. Device> enableDevice# configure terminalDevice(config)# aaa group server radius authentication-groupDevice(config-sg-radius)# server 209.165.200.225 key radkey1Device(config-sg-radius)# server 209.165.200.226 key radkey2Device(config-sg-radius)# exitDevice(config)# aaa group server radius accounting-groupDevice(config-sg-radius)# server 209.165.200.225 key radkey1Device(config-sg-radius)# server 209.165.200.226 key radkey2Device(config-sg-radius)# end When a preferred server is selected for a session, all transactions for
2025-03-31Load: 3Jul 16 03:15:05: AAA/SG/SERVER_SELECT: Server[1] load: 0Jul 16 03:15:05: AAA/SG/SERVER_SELECT: Server[2] load: 0Jul 16 03:15:05: AAA/SG/SERVER_SELECT: Selected Server[1] with load 0Jul 16 03:15:05: AAA/SG/SERVER_SELECT: [3] transactions remaining in batch.Jul 16 03:15:05: AAA/SG/SERVER_SELECT: Obtaining least loaded server.Jul 16 03:15:05: AAA/SG/SERVER_SELECT: [2] transactions remaining in batch. Reusing server. Step 3 Use the test aaa group command to manually verify the RADIUS load-balanced server status. The following sample output shows the response from a load-balanced RADIUS server that is alive when the username “test” does not match a user profile. The server is verified alive when it issues an Access-Reject response to an authentication, authorization, and accounting (AAA) packet generated using the test aaa group command. Example: Device# test aaa group SG1 test lab new-code 00:06:07: RADIUS/ENCODE(00000000):Orig. component type = INVALID00:06:07: RADIUS/ENCODE(00000000): dropping service type, "radius-server attribute 6 on-for-login-auth" is off00:06:07: RADIUS(00000000): Config NAS IP: 192.0.2.400:06:07: RADIUS(00000000): sending00:06:07: RADIUS/ENCODE: Best Local IP-Address 192.0.2.141 for Radius-Server 192.0.2.17600:06:07: RADIUS(00000000): Send Access-Request to 192.0.2.176:1645 id 1645/1, len 5000:06:07: RADIUS: authenticator CA DB F4 9B 7B 66 C8 A9 - D1 99 4E 8E A4 46 99 B400:06:07: RADIUS: User-Password [2] 18 *00:06:07: RADIUS: User-Name [1] 6 "test"00:06:07: RADIUS: NAS-IP-Address [4] 6 192.0.2.14100:06:07: RADIUS: Received from id 1645/1 192.0.2.176:1645, Access-Reject, len 4400:06:07: RADIUS: authenticator 2F 69 84 3E F0 4E F1 62 - AB B8 75 5B 38 82 49 C300:06:07: RADIUS: Reply-Message [18] 24 00:06:07: RADIUS: 41 75 74 68 65 6E 74 69 63 61 74 69 6F 6E 20 66 [Authentication f]00:06:07: RADIUS:
2025-03-25Load: 3Jul 16 03:15:05: AAA/SG/SERVER_SELECT: Server[1] load: 0Jul 16 03:15:05: AAA/SG/SERVER_SELECT: Server[2] load: 0Jul 16 03:15:05: AAA/SG/SERVER_SELECT: Selected Server[1] with load 0Jul 16 03:15:05: AAA/SG/SERVER_SELECT: [3] transactions remaining in batch.Jul 16 03:15:05: AAA/SG/SERVER_SELECT: Obtaining least loaded server.Jul 16 03:15:05: AAA/SG/SERVER_SELECT: [2] transactions remaining in batch. Reusing server. Step 3 Use the test aaa group command to manually verify the RADIUS load-balanced server status. The following sample output shows the response from a load-balanced RADIUS server that is alive when the username “test” does not match a user profile. The server is verified alive when it issues an Access-Reject response to an authentication, authorization, and accounting (AAA) packet generated using the test aaa group command. Example: Device# test aaa group SG1 test lab new-code 00:06:07: RADIUS/ENCODE(00000000):Orig. component type = INVALID00:06:07: RADIUS/ENCODE(00000000): dropping service type, "radius-server attribute 6 on-for-login-auth" is off00:06:07: RADIUS(00000000): Config NAS IP: 192.0.2.400:06:07: RADIUS(00000000): sending00:06:07: RADIUS/ENCODE: Best Local IP-Address 192.0.2.141 for Radius-Server 192.0.2.17600:06:07: RADIUS(00000000): Send Access-Request to 192.0.2.176:1645 id 1645/1, len 5000:06:07: RADIUS: authenticator CA DB F4 9B 7B 66 C8 A9 - D1 99 4E 8E A4 46 99 B400:06:07: RADIUS: User-Password [2] 18 *00:06:07: RADIUS: User-Name [1] 6 "test"00:06:07: RADIUS: NAS-IP-Address [4] 6 192.0.2.14100:06:07: RADIUS: Received from id 1645/1 192.0.2.176:1645, Access-Reject, len 4400:06:07: RADIUS: authenticator 2F 69 84 3E F0 4E F1 62 - AB B8 75 5B 38 82 49 C300:06:07: RADIUS: Reply-Message [18] 24 00:06:07: RADIUS: 41 75 74 68 65 6E 74 69 63 61 74 69 6F 6E 20 66 [Authentication f]00:06:07: RADIUS: 61 69 6C 75 72 65 [failure]00:06:07: RADIUS(00000000): Received from id 1645/100:06:07: RADIUS/DECODE: Reply-Message fragments, 22, total 22 bytes Enabling VRF Aware RADIUS Automated Testing To enable RADIUS automated testing for a non-default VRF, perform the following procedure: Procedure Command or Action Purpose Step 1 enable Example: Device>enable Enables privileged EXEC mode. Enter your password, if prompted. Step 2 configure terminal Example: Device# configure terminal Enters global configuration mode. Step 3 radius server name Example: Device(config)# radius server myserver Specifies the name of the RADIUS server configuration and enters RADIUS server configuration mode. Step 4 address { ipv4| ipv6} {
2025-04-14Available to process transactions, the RADIUS automated tester sends a request periodically to the server for a test user ID. If the server returns an Access-Reject message, the server is alive; otherwise the server is either dead or quarantined. A transaction sent to an unresponsive server is failed over to the next available server before the unresponsive server is marked dead. We recommend that you use the retry reorder mode for failed transactions. When using the RADIUS automated tester, verify that the authentication, authorization, and accounting (AAA) servers are responding to the test packets that are sent by the network access server (NAS). If the servers are not configured correctly, packets may be dropped and the server erroneously marked dead. Caution We recommend that you use a test user that is not defined on the RADIUS server for the RADIUS server automated testing to protect against security issues that may arise if the test user is not correctly configured. Note Use the test aaa group command to check load-balancing transactions. The automate-tester username name probe-on command is used to verify the status of a server by sending RADIUS packets. After this command is configured, a five-second dead timer is started and a RADIUS packet is sent to the external RADIUS server after five seconds. The server state is updated if there is a response from the external RADIUS server. If there is no response, the packets are sent out according to the timeout interval that is configured using the radius-server
2025-04-08