<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic AAA authentication problemssss in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/aaa-authentication-problemssss/m-p/2363299#M110360</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Your final script look good to me and should help provide security for your devices. Thank you for the link to the helpful document. And thank you for marking this question as answered. I am glad that my response was helpful to you.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Rick&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 18 Nov 2013 02:11:21 GMT</pubDate>
    <dc:creator>Richard Burts</dc:creator>
    <dc:date>2013-11-18T02:11:21Z</dc:date>
    <item>
      <title>AAA authentication problemssss</title>
      <link>https://community.cisco.com/t5/network-access-control/aaa-authentication-problemssss/m-p/2363295#M110354</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;When I use below aaa&amp;nbsp; commands, and try to authenticate, I am able to authenticate against TACACS+, but further then when I do "sh run" I get message "Command authorization failed." Please advise.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Test-Switch#sh run&lt;/P&gt;&lt;P&gt;Command authorization failed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa new-model&lt;BR /&gt;aaa authentication login NETWORK_ACCESS group tacacs+ local enable&lt;BR /&gt;aaa authentication enable default group tacacs+ enable&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;aaa authorization exec default group tacacs+ if-authenticated &lt;BR /&gt;aaa authorization commands 15 default group tacacs+ none&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;aaa accounting exec default start-stop group tacacs+&lt;BR /&gt;aaa accounting commands 15 default start-stop group tacacs+ &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;tacacs-server host IP-Address key String&lt;/P&gt;&lt;P&gt;line vty 0 4&lt;BR /&gt;transport input telnet ssh&lt;BR /&gt;login authentication NETWORK_ACCESS&lt;BR /&gt;exec-timeout 10&lt;/P&gt;&lt;P&gt;BUT as soon, I just change the aaa configuration as below I am able to run sh run commands as usual without any error.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa new-model&lt;/P&gt;&lt;P&gt;aaa authentication login default group tacacs+ local&lt;/P&gt;&lt;P&gt;aaa authentication login no_tacacs local&lt;/P&gt;&lt;P&gt;aaa authentication enable default none&lt;/P&gt;&lt;P&gt;aaa authentication login default group tacacs+ line&lt;/P&gt;&lt;P&gt;aaa authentication login no_tacacs line&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa authorization console&lt;/P&gt;&lt;P&gt;aaa authorization exec default group tacacs+ local if-authenticated &lt;/P&gt;&lt;P&gt;aaa authorization exec default group tacacs+ if-authenticated&lt;/P&gt;&lt;P&gt;aaa authorization exec no_tacacs local if-authenticated &lt;/P&gt;&lt;P&gt;aaa authorization commands 0 no_tacacs none &lt;/P&gt;&lt;P&gt;aaa authorization commands 1 no_tacacs none &lt;/P&gt;&lt;P&gt;aaa authorization commands 15 no_tacacs none &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa accounting exec default start-stop group tacacs+&lt;/P&gt;&lt;P&gt;aaa accounting commands 15 default start-stop group tacacs+&lt;/P&gt;&lt;P&gt;aaa accounting commands 0 default start-stop group tacacs+&lt;/P&gt;&lt;P&gt;aaa session-id common&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please advise, Thanks. its urgent&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 04:06:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/aaa-authentication-problemssss/m-p/2363295#M110354</guid>
      <dc:creator>raza555</dc:creator>
      <dc:date>2019-03-11T04:06:18Z</dc:date>
    </item>
    <item>
      <title>AAA authentication problemssss</title>
      <link>https://community.cisco.com/t5/network-access-control/aaa-authentication-problemssss/m-p/2363296#M110355</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It's because of the following config:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;aaa authorization commands 0 no_tacacs none&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;aaa authorization commands 1 no_tacacs none&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;aaa authorization commands 15 no_tacacs none&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The NAS sees it as it has to authorize the exec commands for privilege level 0,1 till 15 to a group of server called "no_tacacs".&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you have defined the "no_tacacs" server group on the NAS, then it must be sending out the command authorization packets to the servers defined in the group.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If there is no command set associated with the rule configured on the TACACS shell profile on the ACS or if it does not have the "show running-config" command permitted, your user will definately fail the command authorization.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please enable "debug tacacs authorization" or "debug aaa authorization" to check which server is the request being sent to and on that server check if the corresponding rule contains the "show running-config" command permitted.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Prateek&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 16 Nov 2013 08:12:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/aaa-authentication-problemssss/m-p/2363296#M110355</guid>
      <dc:creator>prswami</dc:creator>
      <dc:date>2013-11-16T08:12:28Z</dc:date>
    </item>
    <item>
      <title>AAA authentication problemssss</title>
      <link>https://community.cisco.com/t5/network-access-control/aaa-authentication-problemssss/m-p/2363297#M110357</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;To aproach the issue from a slightly different perspective - your original set of commands instruct the router to send authorization request to TACACS for every level 15 command, which includes show run. Your TACACS server was not configured to authorize your use of show run and so your attempt to show run was rejected.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Your revised set of commands does not send authorizaiton requests to TACACS for level 15 commands (or for other level of commands for that matter) and so there is no issue here with doing show run.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As far as I can tell your revised set of commands is saying do not do any authorization for commands. You could achieve this result just as easily (and with less complication in your configuration) if you just remove aaa authorization command lines from your config.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Rick&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 16 Nov 2013 16:01:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/aaa-authentication-problemssss/m-p/2363297#M110357</guid>
      <dc:creator>Richard Burts</dc:creator>
      <dc:date>2013-11-16T16:01:38Z</dc:date>
    </item>
    <item>
      <title>AAA authentication problemssss</title>
      <link>https://community.cisco.com/t5/network-access-control/aaa-authentication-problemssss/m-p/2363298#M110359</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks Richard for making me understand..that ACS need configurations to allow authentication of commands. As soon as i have configured ACS Group Setup -&amp;gt;"Shell Command Authrization Set" -&amp;gt; Assign a Shell Command Authorization set for any network Device-&amp;gt; ReadWriteAccess. ACS is then able to authenticate all commands.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am using below &lt;SPAN style="text-decoration: underline;"&gt;&lt;STRONG&gt;Final Scri&lt;/STRONG&gt;&lt;STRONG&gt;pt&lt;/STRONG&gt;&lt;/SPAN&gt; for Full Access, ReadOnlyAccess &amp;amp; Limited access users; as this script is more clear and accurate;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa new-model&lt;BR /&gt;aaa authentication login NETWORK_ACCESS group tacacs+ local enable&lt;BR /&gt;aaa authentication enable default group tacsacs+ enable&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;aaa authorization exec default group tacacs+ if-authenticated &lt;BR /&gt;aaa authorization commands 15 default group tacacs+ none&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;aaa accounting exec default start-stop group tacacs+&lt;BR /&gt;aaa accounting commands 15 default start-stop group tacacs+ &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If anyone get stuck with ACS Shell Command Authorization Sets on IOS, below is very useful document;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/products/sw/secursw/ps2086"&gt;http://www.cisco.com/en/US/products/sw/secursw/ps2086&lt;/A&gt;&lt;/P&gt;&lt;P&gt;/products_configuration_example09186a00808d9138.shtml#asso1 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Richard please furher confirm that my final script is good enough secure or not ?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 17 Nov 2013 15:38:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/aaa-authentication-problemssss/m-p/2363298#M110359</guid>
      <dc:creator>raza555</dc:creator>
      <dc:date>2013-11-17T15:38:10Z</dc:date>
    </item>
    <item>
      <title>AAA authentication problemssss</title>
      <link>https://community.cisco.com/t5/network-access-control/aaa-authentication-problemssss/m-p/2363299#M110360</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Your final script look good to me and should help provide security for your devices. Thank you for the link to the helpful document. And thank you for marking this question as answered. I am glad that my response was helpful to you.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Rick&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 18 Nov 2013 02:11:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/aaa-authentication-problemssss/m-p/2363299#M110360</guid>
      <dc:creator>Richard Burts</dc:creator>
      <dc:date>2013-11-18T02:11:21Z</dc:date>
    </item>
  </channel>
</rss>

