<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Problem setting 7606 router for TACACS+ authentication in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/problem-setting-7606-router-for-tacacs-authentication/m-p/2316906#M101888</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sorry for the delay in response. I have made the change as you recommended and it has worked! Thank you very much.&lt;/P&gt;&lt;P&gt;There are many variations of how to implement this on different types of devices but this has done it for the 7606. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 08 Nov 2013 16:35:56 GMT</pubDate>
    <dc:creator>Samuel Miruka</dc:creator>
    <dc:date>2013-11-08T16:35:56Z</dc:date>
    <item>
      <title>Problem setting 7606 router for TACACS+ authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/problem-setting-7606-router-for-tacacs-authentication/m-p/2316903#M101792</link>
      <description>&lt;P&gt;Hello Support Community,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have two Cisco 7606 routers which I have tried in vain to have users authenticated using TACACS+ servers. As shown below, I have two servers (1.1.1.1 and 2.2.2.2) reachable via vrf OAM which is reachable from desktops for ssh login. The true IP addresses and vrf have been altered because it's a company router.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I use the two servers to authenticate many other Cisco devices in the network they are working fine.&lt;/P&gt;&lt;P&gt;I can reach the servers from the vrf and the source interface in use. I can also telnet port 49 if the servers from the source interface and the vrf.&lt;/P&gt;&lt;P&gt;The server key is hidden but at the time of configuration, I can ascertain that it's correct.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The problem is that after confuring for TACACS authentication, the router still uses the enable password instead of TACACS. While the debug output shows 'bad password', why is the router not authenticating using TACACS? Why is it using the enable password?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please study the outputs below and help point out what I may need to change.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PS: I have tried out many other combinations, including deprecated ones without success including the method suggested in this page;&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.cisco.com/en/US/docs/ios/sec_user_services/configuration/guide/sec_vrf_tacas_svrs.html" style="font-size: 10pt;" target="_blank"&gt;http://www.cisco.com/en/US/docs/ios/sec_user_services/configuration/guide/sec_vrf_tacas_svrs.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please help I'm stuck.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ROUTER#sh running-config | sec aaa&lt;/P&gt;&lt;P&gt;aaa new-model&lt;/P&gt;&lt;P&gt;aaa group server tacacs+ admin&lt;/P&gt;&lt;P&gt; server name admin&lt;/P&gt;&lt;P&gt; server name admin1&lt;/P&gt;&lt;P&gt; ip vrf forwarding OAM&lt;/P&gt;&lt;P&gt; ip tacacs source-interface GigabitEthernet1&lt;/P&gt;&lt;P&gt;aaa authentication login admin group tacacs+ local enable&lt;/P&gt;&lt;P&gt;aaa session-id common&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ROUTER#sh running-config | sec tacacs&lt;/P&gt;&lt;P&gt;aaa group server tacacs+ admin&lt;/P&gt;&lt;P&gt; server name admin&lt;/P&gt;&lt;P&gt; server name admin1&lt;/P&gt;&lt;P&gt; ip vrf forwarding OAM&lt;/P&gt;&lt;P&gt; ip tacacs source-interface GigabitEthernet1&lt;/P&gt;&lt;P&gt;aaa authentication login admin group tacacs+ local enable&lt;/P&gt;&lt;P&gt;tacacs server admin&lt;/P&gt;&lt;P&gt; address ipv4 1.1.1.1&lt;/P&gt;&lt;P&gt; key 7 XXXXXXXXXXXXXXXXXXXX&lt;/P&gt;&lt;P&gt;tacacs server admin1&lt;/P&gt;&lt;P&gt; address ipv4 2.2.2.2&lt;/P&gt;&lt;P&gt; key 7 XXXXXXXXXXXXXXXXxxxx&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;line vty 0 4&lt;/P&gt;&lt;P&gt;login authentication admin&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ROUTER#sh tacacs&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Tacacs+ Server -&amp;nbsp; public&amp;nbsp; :&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Server name: admin&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Server address: 1.1.1.1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Server port: 49&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Socket opens:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 15&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Socket closes:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 15&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Socket aborts:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Socket errors:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Socket Timeouts:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; Failed Connect Attempts:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Total Packets Sent:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Total Packets Recv:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Tacacs+ Server -&amp;nbsp; public&amp;nbsp; :&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Server name: admin1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Server address: 2.2.2.2&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Server port: 49&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Socket opens:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 15&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Socket closes:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 15&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Socket aborts:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Socket errors:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Socket Timeouts:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; Failed Connect Attempts:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Total Packets Sent:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Total Packets Recv:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Oct 22 12:38:57.587: AAA/BIND(0000001A): Bind i/f&amp;nbsp; &lt;/P&gt;&lt;P&gt;Oct 22 12:38:57.587: AAA/AUTHEN/LOGIN (0000001A): Pick method list 'admin' &lt;/P&gt;&lt;P&gt;Oct 22 12:38:57.587: AAA/AUTHEN/ENABLE(0000001A): Processing request action LOGIN&lt;/P&gt;&lt;P&gt;Oct 22 12:38:57.587: AAA/AUTHEN/ENABLE(0000001A): Done status GET_PASSWORD &lt;/P&gt;&lt;P&gt;Oct 22 12:39:02.327: AAA/AUTHEN/ENABLE(0000001A): Processing request action LOGIN&lt;/P&gt;&lt;P&gt;Oct 22 12:39:02.327: AAA/AUTHEN/ENABLE(0000001A): Done status FAIL - bad password&lt;/P&gt;&lt;P&gt;Oct 22 12:39:04.335: AAA/AUTHEN/LOGIN (0000001A): Pick method list 'admin' &lt;/P&gt;&lt;P&gt;Oct 22 12:39:04.335: AAA/AUTHEN/ENABLE(0000001A): Processing request action LOGIN&lt;/P&gt;&lt;P&gt;Oct 22 12:39:04.335: AAA/AUTHEN/ENABLE(0000001A): Done status GET_PASSWORD &lt;/P&gt;&lt;P&gt;Oct 22 12:39:08.675: AAA/AUTHEN/ENABLE(0000001A): Processing request action LOGIN&lt;/P&gt;&lt;P&gt;Oct 22 12:39:08.675: AAA/AUTHEN/ENABLE(0000001A): Done status FAIL - bad password&lt;/P&gt;&lt;P&gt;Oct 22 12:39:10.679: AAA/AUTHEN/LOGIN (0000001A): Pick method list 'admin' &lt;/P&gt;&lt;P&gt;Oct 22 12:39:10.683: AAA/AUTHEN/ENABLE(0000001A): Processing request action LOGIN&lt;/P&gt;&lt;P&gt;Oct 22 12:39:10.683: AAA/AUTHEN/ENABLE(0000001A): Done status GET_PASSWORD &lt;/P&gt;&lt;P&gt;Oct 22 12:39:14.907: AAA/AUTHEN/ENABLE(0000001A): Processing request action LOGIN&lt;/P&gt;&lt;P&gt;Oct 22 12:39:14.907: AAA/AUTHEN/ENABLE(0000001A): Done status FAIL - bad password&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ROUTER#sh ver&lt;/P&gt;&lt;P&gt;Cisco IOS Software, c7600rsp72043_rp Software (c7600rsp72043_rp-ADVIPSERVICESK9-M), Version 15.1(3)S3, RELEASE SOFTWARE (fc1)&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Technical Support: &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/techsupport" target="_blank"&gt;http://www.cisco.com/techsupport&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Copyright (c) 1986-2012 by Cisco Systems, Inc.&lt;/P&gt;&lt;P&gt;Compiled Fri 30-Mar-12 08:34 by prod_rel_team&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ROM: System Bootstrap, Version 12.2(33r)SRE, RELEASE SOFTWARE (fc1)&lt;/P&gt;&lt;P&gt;BOOTLDR: Cisco IOS Software, c7600rsp72043_rp Software (c7600rsp72043_rp-ADVIPSERVICESK9-M), Version 15.1(3)S3, RELEASE SOFTWARE (fc1)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ROUTER uptime is 7 weeks, 5 days, 16 hours, 48 minutes&lt;/P&gt;&lt;P&gt;Uptime for this control processor is 7 weeks, 5 days, 16 hours, 49 minutes&lt;/P&gt;&lt;P&gt;System returned to ROM by reload (SP by reload)&lt;/P&gt;&lt;P&gt;System restarted at 20:00:59 UTC Wed Aug 28 2013&lt;/P&gt;&lt;P&gt;System image file is "sup-bootdisk:c7600rsp72043-advipservicesk9-mz.151-3.S3.bin"&lt;/P&gt;&lt;P&gt;Last reload type: Normal Reload&lt;/P&gt;&lt;P&gt;Last reload reason: power-on&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This product contains cryptographic features and is subject to United&lt;/P&gt;&lt;P&gt;States and local country laws governing import, export, transfer and&lt;/P&gt;&lt;P&gt;use. Delivery of Cisco cryptographic products does not imply&lt;/P&gt;&lt;P&gt;third-party authority to import, export, distribute or use encryption.&lt;/P&gt;&lt;P&gt;Importers, exporters, distributors and users are responsible for&lt;/P&gt;&lt;P&gt;compliance with U.S. and local country laws. By using this product you&lt;/P&gt;&lt;P&gt;agree to comply with applicable laws and regulations. If you are unable&lt;/P&gt;&lt;P&gt;to comply with U.S. and local laws, return this product immediately.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;A summary of U.S. laws governing Cisco cryptographic products may be found at:&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/wwl/export/crypto/tool/stqrg.html" target="_blank"&gt;http://www.cisco.com/wwl/export/crypto/tool/stqrg.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you require further assistance please contact us by sending email to&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-email-small" href="mailto:export@cisco.com" target="_blank"&gt;export@cisco.com&lt;/A&gt;&lt;SPAN&gt;.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cisco CISCO7606-S (M8500) processor (revision 1.1) with 3670016K/262144K bytes of memory.&lt;/P&gt;&lt;P&gt;Processor board ID FOX1623G61B&lt;/P&gt;&lt;P&gt; BASEBOARD: RSP720&lt;/P&gt;&lt;P&gt; CPU: MPC8548_E, Version: 2.1, (0x80390021)&lt;/P&gt;&lt;P&gt; CORE: E500, Version: 2.2, (0x80210022)&lt;/P&gt;&lt;P&gt; CPU:1200MHz, CCB:400MHz, DDR:200MHz,&lt;/P&gt;&lt;P&gt; L1:&amp;nbsp;&amp;nbsp;&amp;nbsp; D-cache 32 kB enabled&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; I-cache 32 kB enabled&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Last reset from power-on&lt;/P&gt;&lt;P&gt;3 Virtual Ethernet interfaces&lt;/P&gt;&lt;P&gt;76 Gigabit Ethernet interfaces&lt;/P&gt;&lt;P&gt;8 Ten Gigabit Ethernet interfaces&lt;/P&gt;&lt;P&gt;3964K bytes of non-volatile configuration memory.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;500472K bytes of Internal ATA PCMCIA card (Sector size 512 bytes).&lt;/P&gt;&lt;P&gt;Configuration register is 0x2102&lt;/P&gt;</description>
      <pubDate>Tue, 26 Mar 2019 00:31:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/problem-setting-7606-router-for-tacacs-authentication/m-p/2316903#M101792</guid>
      <dc:creator>Samuel Miruka</dc:creator>
      <dc:date>2019-03-26T00:31:14Z</dc:date>
    </item>
    <item>
      <title>Problem setting 7606 router for TACACS+ authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/problem-setting-7606-router-for-tacacs-authentication/m-p/2316904#M101814</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;In order to resolve this issue. Please replace the below listed command &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa authentication login admin group tacacs+ local enable&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;with;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa authentication login default group admin local enable&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You defined the server group name as method list and instead of using admin as a server-group, you used tacacs+&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Note: Please ensure you have local user and enable password configured in case of tacacs server unreachable.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;~BR &lt;BR /&gt;Jatin Katyal &lt;BR /&gt; &lt;BR /&gt;**Do rate helpful posts**&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 27 Oct 2013 20:02:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/problem-setting-7606-router-for-tacacs-authentication/m-p/2316904#M101814</guid>
      <dc:creator>Jatin Katyal</dc:creator>
      <dc:date>2013-10-27T20:02:55Z</dc:date>
    </item>
    <item>
      <title>Problem setting 7606 router for TACACS+ authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/problem-setting-7606-router-for-tacacs-authentication/m-p/2316905#M101860</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Sam,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let me know how it goes.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;~BR &lt;BR /&gt;Jatin Katyal &lt;BR /&gt; &lt;BR /&gt;**Do rate helpful posts**&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 28 Oct 2013 18:03:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/problem-setting-7606-router-for-tacacs-authentication/m-p/2316905#M101860</guid>
      <dc:creator>Jatin Katyal</dc:creator>
      <dc:date>2013-10-28T18:03:47Z</dc:date>
    </item>
    <item>
      <title>Problem setting 7606 router for TACACS+ authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/problem-setting-7606-router-for-tacacs-authentication/m-p/2316906#M101888</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sorry for the delay in response. I have made the change as you recommended and it has worked! Thank you very much.&lt;/P&gt;&lt;P&gt;There are many variations of how to implement this on different types of devices but this has done it for the 7606. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 08 Nov 2013 16:35:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/problem-setting-7606-router-for-tacacs-authentication/m-p/2316906#M101888</guid>
      <dc:creator>Samuel Miruka</dc:creator>
      <dc:date>2013-11-08T16:35:56Z</dc:date>
    </item>
  </channel>
</rss>

