aaaconfig –show output , think thats ok. Have set the Password Policy in Local Security Policy on Server2008 to “Store passwords using reversible encryption - Enabled” So far so good. And I know, that my Knowledge of the NPS and RADIUS in general isn’t so good Tests: If I configure “Allow clients to connect without negotiating an authentication method” and without a Vendor Specific RADIUS Attributes in the CPR I have access to switch with … see below A correct access happens with my CPR “clientaccess” and in this Properties configured “Conditions” daily access (no restrictions). The RADIUS Attribute here is in Vendor Specific only “admin” nothing else. With my CPR “Brocade” and “Conditions” RADIUS Standard plus Vendor Specific attributes – no access Now the Network Policy comes to the game. Without any Network Policy I have no access to the switch. So configured a “Secure Wired (Ethernet) Connection” NP with all the Vendor Specific Attributes as described in the Admin Guide. But this configuration doesn’t work. So I have taken a standard NP from the GUI “Connections to other access servers” and this works. Results: With all the Vendor Specific Attributes the RADIUS config don’t work. My swadmin user is a local user account on the Win Server2008 in group “admin”. With the minimal RADIUS configuration I can login to the switch (PuTTY) with admin role (have add a new user “test” with role).