<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ASA 5520 Failover Exec AAA Authorization Failed in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/asa-5520-failover-exec-aaa-authorization-failed/m-p/2165495#M133271</link>
    <description>&lt;P&gt;Hello - &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a pair of ASA 5520 firewalls running in active/standby mode on 8.3.2.34 code. My configuration performs authentication/authorization into ACS 5.1, however command authorization is failing when I try to execute a command on the standby from the active unit...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;failover exec standby dir disk0:/&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Fallback authorization. Username 'adminuser' not in LOCAL database&lt;/P&gt;&lt;P&gt;Command authorization failed&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I don't even see the authentication attempt going into ACS. Any ideas?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Darren&lt;/P&gt;</description>
    <pubDate>Mon, 11 Mar 2019 03:12:23 GMT</pubDate>
    <dc:creator>Darren Roback</dc:creator>
    <dc:date>2019-03-11T03:12:23Z</dc:date>
    <item>
      <title>ASA 5520 Failover Exec AAA Authorization Failed</title>
      <link>https://community.cisco.com/t5/network-access-control/asa-5520-failover-exec-aaa-authorization-failed/m-p/2165495#M133271</link>
      <description>&lt;P&gt;Hello - &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a pair of ASA 5520 firewalls running in active/standby mode on 8.3.2.34 code. My configuration performs authentication/authorization into ACS 5.1, however command authorization is failing when I try to execute a command on the standby from the active unit...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;failover exec standby dir disk0:/&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Fallback authorization. Username 'adminuser' not in LOCAL database&lt;/P&gt;&lt;P&gt;Command authorization failed&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I don't even see the authentication attempt going into ACS. Any ideas?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Darren&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 03:12:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/asa-5520-failover-exec-aaa-authorization-failed/m-p/2165495#M133271</guid>
      <dc:creator>Darren Roback</dc:creator>
      <dc:date>2019-03-11T03:12:23Z</dc:date>
    </item>
    <item>
      <title>ASA 5520 Failover Exec AAA Authorization Failed</title>
      <link>https://community.cisco.com/t5/network-access-control/asa-5520-failover-exec-aaa-authorization-failed/m-p/2165496#M133317</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Here's my AAA configuration:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa authentication ssh console TACACS LOCAL&lt;/P&gt;&lt;P&gt;aaa authentication http console TACACS LOCAL&lt;/P&gt;&lt;P&gt;aaa authentication enable console TACACS LOCAL&lt;/P&gt;&lt;P&gt;aaa authorization command TACACS LOCAL&lt;/P&gt;&lt;P&gt;aaa accounting ssh console TACACS&lt;/P&gt;&lt;P&gt;aaa accounting enable console TACACS&lt;/P&gt;&lt;P&gt;aaa accounting command TACACS&lt;/P&gt;&lt;P&gt;aaa authorization exec authentication-server&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 15 Mar 2013 22:05:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/asa-5520-failover-exec-aaa-authorization-failed/m-p/2165496#M133317</guid>
      <dc:creator>Darren Roback</dc:creator>
      <dc:date>2013-03-15T22:05:09Z</dc:date>
    </item>
    <item>
      <title>ASA 5520 Failover Exec AAA Authorization Failed</title>
      <link>https://community.cisco.com/t5/network-access-control/asa-5520-failover-exec-aaa-authorization-failed/m-p/2165497#M133345</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Darren,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This bug looks like it is resolved in version 8.4(1), here is a bug that matches your symptom:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://tools.cisco.com/Support/BugToolKit/search/getBugDetails.do?caller=pluginredirector&amp;amp;method=fetchBugDetails&amp;amp;bugId="&gt;http://tools.cisco.com/Support/BugToolKit/search/getBugDetails.do?caller=pluginredirector&amp;amp;method=fetchBugDetails&amp;amp;bugId=&lt;/A&gt;&lt;A href="https://www.cisco.com/cisco/psn/bssprt/bss?searchType=bstbugidsearch&amp;amp;page=bstBugDetail&amp;amp;BugID=CSCti22636" target="_blank"&gt;CSCti22636&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;TABLE border="0" cellpadding="5" cellspacing="2" width="100%"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD colspan="2" style="font-size: 88%; padding: 8px 8px 8px 8px;"&gt;&lt;STRONG&gt;"failover exec standby" TACACS+ authorization failure &lt;/STRONG&gt; &lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="font-size: 88%; padding: 0px 8px 8px 8px;" valign="top"&gt;&lt;STRONG&gt;Symptom:&lt;/STRONG&gt;&lt;P&gt;&lt;/P&gt;Currently Standby ASA uses "enable_1"&amp;nbsp; username for authorization requests when "failover exec standby" command&amp;nbsp; is run on the Active ASA in failover pair. This leads to authorization&amp;nbsp; failures on TACACS+ server unless the "enable_1" user is created there&amp;nbsp; and privilege 15 is granted to this user.&lt;P&gt;&lt;/P&gt;&lt;STRONG&gt;&lt;STRONG&gt;Conditions&lt;/STRONG&gt;:&lt;/STRONG&gt;&lt;P&gt;&lt;/P&gt;This is a limitation of all software releases where the "failover exec standby" feature is implemented.&lt;P&gt;&lt;/P&gt;&lt;STRONG&gt;Workaround:&lt;/STRONG&gt;&lt;P&gt;&lt;/P&gt;The workaround is:&lt;BR /&gt;- create a user account "enable_1" on TACACS+ server with any random password;&lt;BR /&gt;- grant "privilege = 15" and full access on all commands to this user.&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Tarik Admani &lt;BR /&gt;*Please rate helpful posts*&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 18 Mar 2013 07:32:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/asa-5520-failover-exec-aaa-authorization-failed/m-p/2165497#M133345</guid>
      <dc:creator>Tarik Admani</dc:creator>
      <dc:date>2013-03-18T07:32:21Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5520 Failover Exec AAA Authorization Failed</title>
      <link>https://community.cisco.com/t5/network-access-control/asa-5520-failover-exec-aaa-authorization-failed/m-p/4086596#M560448</link>
      <description>&lt;P&gt;If your running the REST API on your firewall, this fix exposes the API and will not allow upstream TACACS auth on the API due to the local enable_1 user.&lt;/P&gt;</description>
      <pubDate>Fri, 15 May 2020 13:48:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/asa-5520-failover-exec-aaa-authorization-failed/m-p/4086596#M560448</guid>
      <dc:creator>NSutfin</dc:creator>
      <dc:date>2020-05-15T13:48:16Z</dc:date>
    </item>
  </channel>
</rss>

