<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Can't establish local login/authorization on 6500's in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/can-t-establish-local-login-authorization-on-6500-s/m-p/2143552#M138419</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I will probably need more info before I can provide more help but from I am seeing in the snip-it, you have aaa configured and your AAA server is a TACACS+ server. If that is the case you should keep in mind the following:&lt;/P&gt;&lt;P&gt;1. If the authentication/authorization commands are referencing the TACACS+ group then you will need to add "local" at the end of the command. This will allow local accounts to be used when the AAA server is down/unreachable&lt;/P&gt;&lt;P&gt;2. Keep in mind that the local users will ONLY be used when the AAA server is down/unreachable. You cannot have a mixture of both&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Side question, since you have a TACACS+ server, why don't you just create temporary accounts directly on the TACACS+ server vs local accounts? You can get very granular that way and only permit certain commands on certain devices, during certain time of the day, etc...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Hope this helps and thank you for rating! &lt;/EM&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 01 Mar 2013 17:09:01 GMT</pubDate>
    <dc:creator>nspasov</dc:creator>
    <dc:date>2013-03-01T17:09:01Z</dc:date>
    <item>
      <title>Can't establish local login/authorization on 6500's</title>
      <link>https://community.cisco.com/t5/network-access-control/can-t-establish-local-login-authorization-on-6500-s/m-p/2143551#M138417</link>
      <description>&lt;P&gt;I have a need to allow a small group of users temporary level-15 access to several 6500 &lt;/P&gt;&lt;P&gt;switches (running 12.2-33 SXJ2 code), but do not want to provide them with the enable secret password which is used on the &lt;/P&gt;&lt;P&gt;rest of the network (over 1200 devices).&amp;nbsp; I tried to eliminate AAA using the "no aaa new-model" command, but was told I could not remove aaa while there were active sessions, and "login local" no longer appeared as an option for vty lines.&amp;nbsp; So, I created a local user database called "support" which I used to replace the "group" entry in the authentication and authorization sections of our AAA config and for login on vty 0 4. &lt;/P&gt;&lt;P&gt;[The username is given a privilege level of 15 along with an individual password for authentication.&amp;nbsp; (ex. username jsmith privilege 15 password 0 xxxxx)] &lt;/P&gt;&lt;P&gt;I modified our AAA configuration to support local login, but was unable to establish "enable mode" (i.e. # prompt) with any account.&amp;nbsp; I &lt;/P&gt;&lt;P&gt;can login locally, but only to a normal "user mode" (i.e. &amp;gt; prompt).&lt;/P&gt;&lt;P&gt;Here is the current, unmodified and sanitized config for our AAA and line vty 0 4 sections.&amp;nbsp; Please tell me what needs &lt;/P&gt;&lt;P&gt;to stay and what needs to go.&amp;nbsp; Thank you!&lt;/P&gt;&lt;P&gt;P.S.:&amp;nbsp; for security reasons, we want to track individual activity, so need the accounting portion of aaa to stay.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa new-model&lt;BR /&gt;aaa group server tacacs+ XXXXXX&lt;BR /&gt;server xxx.xxx.xxx.xxx&lt;BR /&gt;server xxx.xxx.xxx.xxx&lt;BR /&gt;!&lt;BR /&gt;aaa authentication login default group XXXXXX enable&lt;BR /&gt;aaa authentication enable default enable&lt;BR /&gt;aaa authorization exec default group XXXXXX none&lt;BR /&gt;aaa authorization commands 15 default if-authenticated&lt;BR /&gt;aaa authorization network default group XXXXXX none&lt;BR /&gt;aaa authorization network MLPPP-PPP none&lt;BR /&gt;aaa authorization network MLPPP none&lt;BR /&gt;aaa accounting exec default start-stop group XXXXXX&lt;BR /&gt;aaa accounting commands 15 default start-stop group XXXXXX&lt;BR /&gt;aaa accounting network default start-stop group XXXXXX&lt;BR /&gt;aaa accounting connection default start-stop group XXXXXX&lt;BR /&gt;aaa accounting system default start-stop group XXXXXX&lt;BR /&gt;!&lt;BR /&gt;line vty 0 4&lt;BR /&gt;access-class 75 in&lt;BR /&gt;exec-timeout 15 0&lt;BR /&gt;privilege level 0&lt;BR /&gt;password 7 xxxxxxxxxxxxxxxxxxx&lt;BR /&gt;transport input ssh&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 03:08:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/can-t-establish-local-login-authorization-on-6500-s/m-p/2143551#M138417</guid>
      <dc:creator>ckilday</dc:creator>
      <dc:date>2019-03-11T03:08:13Z</dc:date>
    </item>
    <item>
      <title>Can't establish local login/authorization on 6500's</title>
      <link>https://community.cisco.com/t5/network-access-control/can-t-establish-local-login-authorization-on-6500-s/m-p/2143552#M138419</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I will probably need more info before I can provide more help but from I am seeing in the snip-it, you have aaa configured and your AAA server is a TACACS+ server. If that is the case you should keep in mind the following:&lt;/P&gt;&lt;P&gt;1. If the authentication/authorization commands are referencing the TACACS+ group then you will need to add "local" at the end of the command. This will allow local accounts to be used when the AAA server is down/unreachable&lt;/P&gt;&lt;P&gt;2. Keep in mind that the local users will ONLY be used when the AAA server is down/unreachable. You cannot have a mixture of both&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Side question, since you have a TACACS+ server, why don't you just create temporary accounts directly on the TACACS+ server vs local accounts? You can get very granular that way and only permit certain commands on certain devices, during certain time of the day, etc...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Hope this helps and thank you for rating! &lt;/EM&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 01 Mar 2013 17:09:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/can-t-establish-local-login-authorization-on-6500-s/m-p/2143552#M138419</guid>
      <dc:creator>nspasov</dc:creator>
      <dc:date>2013-03-01T17:09:01Z</dc:date>
    </item>
    <item>
      <title>Can't establish local login/authorization on 6500's</title>
      <link>https://community.cisco.com/t5/network-access-control/can-t-establish-local-login-authorization-on-6500-s/m-p/2143553#M138424</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Great answer Neno. +5.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Users authenticating from AAA with Priv-Level 15 will not need to provide the enable secret password (just do the correct config on ACS).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: blue;"&gt;Rating useful replies is more useful than saying &lt;SPAN style="color: green;"&gt; "&lt;SPAN style="text-decoration: underline;"&gt;Thank you&lt;/SPAN&gt;"&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 05 Mar 2013 07:45:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/can-t-establish-local-login-authorization-on-6500-s/m-p/2143553#M138424</guid>
      <dc:creator>Amjad Abdullah</dc:creator>
      <dc:date>2013-03-05T07:45:01Z</dc:date>
    </item>
  </channel>
</rss>

