<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: AAA authentication in ICX Switches</title>
    <link>https://community.ruckuswireless.com/t5/ICX-Switches/AAA-authentication/m-p/28624#M1404</link>
    <description>HI, I have my windows server configured exactly as&amp;nbsp; it is showed on your post, if before&amp;nbsp; I could not get any error message from the sever, now I have one : 'The connection request did not match any configured network policy.&amp;nbsp;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;reason code 49.'&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;I've already to review in many manners the network policy but the same error message appears.&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;</description>
    <pubDate>Fri, 14 Feb 2020 16:36:49 GMT</pubDate>
    <dc:creator>whisler_soineus</dc:creator>
    <dc:date>2020-02-14T16:36:49Z</dc:date>
    <item>
      <title>AAA authentication</title>
      <link>https://community.ruckuswireless.com/t5/ICX-Switches/AAA-authentication/m-p/28616#M1396</link>
      <description>Can't login using AAA radius to a ICX 7450-24. It displays the error when  enter credentials and press return/enter : access denied by radius server.    What should I set on radius server  to get the AAA authentication working please</description>
      <pubDate>Thu, 13 Feb 2020 19:41:25 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/ICX-Switches/AAA-authentication/m-p/28616#M1396</guid>
      <dc:creator>whisler_soineus</dc:creator>
      <dc:date>2020-02-13T19:41:25Z</dc:date>
    </item>
    <item>
      <title>Re: AAA authentication</title>
      <link>https://community.ruckuswireless.com/t5/ICX-Switches/AAA-authentication/m-p/28617#M1397</link>
      <description>Do you have the Vendor specific information entered to the RADIUS server?&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;Check this out:&amp;nbsp;&lt;A alt="" href="http://docs.ruckuswireless.com/fastiron/08.0.80/fastiron-08080-securityguide/GUID-945A5436-ED61-497F-9886-B3AF95FA522B.html" rel="nofollow" target="" title="Link httpdocsruckuswirelesscomfastiron08080fastiron-08080-securityguideGUID-945A5436-ED61-497F-9886-B3AF95FA522Bhtml" type="" value=""&gt;http://docs.ruckuswireless.com/fastiron/08.0.80/fastiron-08080-securityguide/GUID-945A5436-ED61-497F...&lt;/A&gt;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;</description>
      <pubDate>Thu, 13 Feb 2020 19:53:54 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/ICX-Switches/AAA-authentication/m-p/28617#M1397</guid>
      <dc:creator>james_schena</dc:creator>
      <dc:date>2020-02-13T19:53:54Z</dc:date>
    </item>
    <item>
      <title>Re: AAA authentication</title>
      <link>https://community.ruckuswireless.com/t5/ICX-Switches/AAA-authentication/m-p/28618#M1398</link>
      <description>What RADIUS server do you have?&amp;nbsp; I only ask because the instructions to configure it are different.</description>
      <pubDate>Thu, 13 Feb 2020 20:06:28 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/ICX-Switches/AAA-authentication/m-p/28618#M1398</guid>
      <dc:creator>netwizz</dc:creator>
      <dc:date>2020-02-13T20:06:28Z</dc:date>
    </item>
    <item>
      <title>Re: AAA authentication</title>
      <link>https://community.ruckuswireless.com/t5/ICX-Switches/AAA-authentication/m-p/28619#M1399</link>
      <description>My radius server is windows 2019</description>
      <pubDate>Fri, 14 Feb 2020 13:45:41 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/ICX-Switches/AAA-authentication/m-p/28619#M1399</guid>
      <dc:creator>whisler_soineus</dc:creator>
      <dc:date>2020-02-14T13:45:41Z</dc:date>
    </item>
    <item>
      <title>Re: AAA authentication</title>
      <link>https://community.ruckuswireless.com/t5/ICX-Switches/AAA-authentication/m-p/28620#M1400</link>
      <description>Yes I've followed that topic to enter Vendor specific to Radius Server. But I don't know why it rejects the request access.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Do you have information about how to configure NPS server ( Connection request access policy and network policy) on windows 2019? Thanks</description>
      <pubDate>Fri, 14 Feb 2020 13:49:35 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/ICX-Switches/AAA-authentication/m-p/28620#M1400</guid>
      <dc:creator>whisler_soineus</dc:creator>
      <dc:date>2020-02-14T13:49:35Z</dc:date>
    </item>
    <item>
      <title>Re: AAA authentication</title>
      <link>https://community.ruckuswireless.com/t5/ICX-Switches/AAA-authentication/m-p/28621#M1401</link>
      <description>the NPS server should be as follows:&amp;nbsp;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;create policy for IPv4 address pool (I have found that it works best to create 1 policy per subnet)&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;create policy for windows accounts to have access(we create a network admin group and give vendor specific attributes as follows:&amp;nbsp;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;Vendor code 1991, yes to permit attribute 1, decimal, 0.&amp;nbsp;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;Next vendor code 1991, yes, 2, whois* 1.&amp;nbsp;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;Next vedor code 1991, yes, 3, decimal, 0&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;check all encryption types.&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;Harder to explain, much easier to show....&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;try this video:&amp;nbsp;&lt;A href="https://www.youtube.com/watch?v=KAGEA7OnPvY" rel="nofollow" title="Link: https://www.youtube.com/watch?v=KAGEA7OnPvY"&gt;https://www.youtube.com/watch?v=KAGEA7OnPvY&lt;/A&gt;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;</description>
      <pubDate>Fri, 14 Feb 2020 14:20:04 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/ICX-Switches/AAA-authentication/m-p/28621#M1401</guid>
      <dc:creator>james_schena</dc:creator>
      <dc:date>2020-02-14T14:20:04Z</dc:date>
    </item>
    <item>
      <title>Re: AAA authentication</title>
      <link>https://community.ruckuswireless.com/t5/ICX-Switches/AAA-authentication/m-p/28622#M1402</link>
      <description>Yes, but mine is on an older sever version... I looked at some screenshots, and they look the same, so I suspect this may work.&amp;nbsp; Your Millage May Vary.&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;Also if you use this for other stuff, no promises the Network Policies wont potentially break other connection requests depending upon the processing order, etc.&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;I am looking at an old 2012 r2 box that was decommissioned that I had this working on...&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;Under NPS &amp;gt; Policies &amp;gt; Connection Request Profiles&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;I created a Policy called ICX Request&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;Policy State -&amp;gt; Policy Enabled CHECKED&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;Type of network access server -&amp;gt; Unspecified&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;Conditions TAB:&amp;nbsp; Client Vendor -&amp;gt; RADIUS Standard&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;Settings Tab:&amp;nbsp; Authentication Methods -&amp;gt;ALL unchecked&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;Authentication -&amp;gt; Authenticate requests on this server&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;Everything else is blank&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;***&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;Under NPS &amp;gt; Policies &amp;gt; Network Policies&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;I created one named "ICX Admin Level"&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;Policy State -&amp;gt; Policy Enabled CHECKED&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;Overview Tab:&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;Access Permission -&amp;gt; Grant access SELECTED&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;Type of network access server -&amp;gt; Unspecified&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;Conditions Tab:&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;Conditions: Windows Groups&amp;nbsp; Value:YOURDOMAN\Network Admins (or whatever group you want)&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;Constraints Tab:&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;Authentication Methods:&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;EAP Types -&amp;gt; [Blank]&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;Less secure authentication methods:&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;Microsoft Encrypted Authentication Version 2 (MS-CHAP-v2) CHECKED&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;Microsoft Encrypted Authentciation (MS-CHAP) CHECKED&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;Unencrypted authentication (PAP,SPAP) CHECKED&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;Settings Tab:&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;Standard-&amp;gt; Framed-Protocol PPP&amp;nbsp; (The attribute number is 7, and it is listed under commonly used for Dial-Up or VPN)&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;Standard-&amp;gt;Framed (attribute is 6, and it is listed under commonly used for dial-up VPN)&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;Vendor Specific -&amp;gt; Vendor: Vendor Code 1991 Value: 0&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;On the Add/Edit button&amp;nbsp;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;Enter Vendor Code SELECTED&amp;nbsp; 1991&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;Yes, It conforms SELECTED then click Change Attribute button&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;This oppens Configure VSA (RFC Compliant)&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;Vendor-assigned attribute number: 1&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;Attribute format: Decimal&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;Attribute value: 0&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;NPS Enforcement:&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;Allow full network access&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;Encryption:&amp;nbsp; ALL are checked&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;***&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;Creaet a NEW RADIUS client for your switches.&amp;nbsp; Technically you can even use a subnet if you wish, but for now just use an IP (or DNS)&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;I like to generate a key because they are nice and complex like&amp;nbsp;Wtws5JjQMsf8tnd^fO6oR82zEVl#4MCJYB&amp;amp;kQsuKS2FFg!IO@OWu7CyevweUVvQe&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;At any rate, make sure the client is enabled and that it is set to RADIUS Standard on the other tab.&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;****&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;On the switch:&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&lt;PRE alt="" name="" rel="" target="" title="" type="" value=""&gt;hostname yourhostname&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;username backup password yourpassword_if_RADIUS_Breaks&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;crypto key zeroize rsa&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;crypto key zeroize dsa&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;crypto key generate rsa mod 2048&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;crypto-ssl certificate generate&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;radius-server host 10.1.2.3&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;radius-server key Wtws5JjQMsf8tnd^fO6oR82zEVl#4MCJYB&amp;amp;kQsuKS2FFg!IO@OWu7CyevweUVvQe&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;aaa authentication web-server default local&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;aaa authentication enable default radius local&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;aaa authentication login default radius local&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;aaa authentication login privilege-mode&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;enable aaa console&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;console timeout 30&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;ip dns domain-list yourdomain.tld&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;ip dns server-address 10.4.5.6 10.7.8.9&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;no telnet server&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;clock summer-time&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;clock timezone us Eastern&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;!&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;!&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;ntp&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&amp;nbsp;server 10.1.2.3&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;!&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;!&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;exit&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;no web-management http&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;web-management https&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;ip access-list standard 99&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;permit host 10.10.11.12&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;!&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;ssh access-group 99&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;web access-group 99&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;!&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;!&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;ip ssh&amp;nbsp; authentication-retries 2&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;ip ssh&amp;nbsp; timeout 30&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;ip ssh&amp;nbsp; idle-time 30&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;ip ssh&amp;nbsp; scp disable&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;ip ssh&amp;nbsp; encryption disable-aes-cbc&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;!&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&lt;/PRE&gt;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;</description>
      <pubDate>Fri, 14 Feb 2020 14:32:02 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/ICX-Switches/AAA-authentication/m-p/28622#M1402</guid>
      <dc:creator>netwizz</dc:creator>
      <dc:date>2020-02-14T14:32:02Z</dc:date>
    </item>
    <item>
      <title>Re: AAA authentication</title>
      <link>https://community.ruckuswireless.com/t5/ICX-Switches/AAA-authentication/m-p/28623#M1403</link>
      <description>Ok, I'm gonna to try this, I will let you know. Thanks you</description>
      <pubDate>Fri, 14 Feb 2020 14:46:30 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/ICX-Switches/AAA-authentication/m-p/28623#M1403</guid>
      <dc:creator>whisler_soineus</dc:creator>
      <dc:date>2020-02-14T14:46:30Z</dc:date>
    </item>
    <item>
      <title>Re: AAA authentication</title>
      <link>https://community.ruckuswireless.com/t5/ICX-Switches/AAA-authentication/m-p/28624#M1404</link>
      <description>HI, I have my windows server configured exactly as&amp;nbsp; it is showed on your post, if before&amp;nbsp; I could not get any error message from the sever, now I have one : 'The connection request did not match any configured network policy.&amp;nbsp;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;reason code 49.'&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;I've already to review in many manners the network policy but the same error message appears.&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;</description>
      <pubDate>Fri, 14 Feb 2020 16:36:49 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/ICX-Switches/AAA-authentication/m-p/28624#M1404</guid>
      <dc:creator>whisler_soineus</dc:creator>
      <dc:date>2020-02-14T16:36:49Z</dc:date>
    </item>
    <item>
      <title>Re: AAA authentication</title>
      <link>https://community.ruckuswireless.com/t5/ICX-Switches/AAA-authentication/m-p/28625#M1405</link>
      <description>HI guys, it's working now.&amp;nbsp;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;Thanks you.&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;</description>
      <pubDate>Fri, 14 Feb 2020 16:52:24 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/ICX-Switches/AAA-authentication/m-p/28625#M1405</guid>
      <dc:creator>whisler_soineus</dc:creator>
      <dc:date>2020-02-14T16:52:24Z</dc:date>
    </item>
  </channel>
</rss>

