<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic AAA authenticate to ACS Server in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/aaa-authenticate-to-acs-server/m-p/2063358#M147692</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jeff,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you use the command, "server-private key 7 &lt;XXXXX&gt;" command, then the string that is entered is considered to be encrypted text. If no number or 0 is entered, the string that is entered is considered to be plain text.&lt;/XXXXX&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So if you are planning to enter your shared secret in plain text, try using the command "server-private key 0 &lt;XXXXX&gt;" or "server-private key &lt;XXXXX&gt;".&lt;/XXXXX&gt;&lt;/XXXXX&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If after entering the shared secret in plain text (using the 0 or no number) and if you are facing issue in authentication, then check the failed attempts logs in the tacacs+ server which should give you the hint of the issue.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 25 Oct 2012 05:37:20 GMT</pubDate>
    <dc:creator>Karthik Chandran</dc:creator>
    <dc:date>2012-10-25T05:37:20Z</dc:date>
    <item>
      <title>AAA authenticate to ACS Server</title>
      <link>https://community.cisco.com/t5/network-access-control/aaa-authenticate-to-acs-server/m-p/2063356#M147667</link>
      <description>&lt;P&gt;I am trying to get my cisco switches to authenticate to our ACS server through TACAS but I am running into a problem when I try to put in the secret key.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Below is an output&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa new-model&lt;/P&gt;&lt;P&gt;aaa group server tacacs+ VTY&lt;/P&gt;&lt;P&gt; server 10.1.10.99&lt;/P&gt;&lt;P&gt; server-private 10.1.10.99 key BrAqaq4h&lt;/P&gt;&lt;P&gt; ip tacacs source-interface Vlan99&lt;/P&gt;&lt;P&gt;aaa authentication login VTY group VTY local&lt;/P&gt;&lt;P&gt;aaa authorization exec VTY group tacacs+ if-authenticated&lt;/P&gt;&lt;P&gt;aaa accounting commands 1 default start-stop group VTY&lt;/P&gt;&lt;P&gt;aaa accounting commands 15 default start-stop group VTY&lt;/P&gt;&lt;P&gt;aaa session-id common&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Whenever I try to make the server-private key 7 BrAqaq4h I get the error&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;server-private 10.1.10.99 key 7 BrAqaq4h&lt;/P&gt;&lt;P&gt;%Invalid encrypted key: BrAqaq4h&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I don't know if this is the reason I cannot authenticate with AD but on the server ACS that is the key it has under every other device that is working.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa new-model&lt;/P&gt;&lt;P&gt;aaa group server tacacs+ VTY&lt;/P&gt;&lt;P&gt; server 10.1.10.99&lt;/P&gt;&lt;P&gt; server-private 10.1.10.99 key 7 0529142E304D5F5D11&lt;/P&gt;&lt;P&gt; ip tacacs source-interface Vlan99&lt;/P&gt;&lt;P&gt;aaa authentication login VTY group VTY local&lt;/P&gt;&lt;P&gt;aaa authorization exec VTY group tacacs+ if-authenticated&lt;/P&gt;&lt;P&gt;aaa accounting commands 1 default start-stop group VTY&lt;/P&gt;&lt;P&gt;aaa accounting commands 15 default start-stop group VTY&lt;/P&gt;&lt;P&gt;aaa session-id common&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The last output is a device where I can authenticate correctly.&amp;nbsp; Does anyone have any ideas as to why this doesn't work?&amp;nbsp; The vty settings on both devices are the same.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;line vty 0 4&lt;/P&gt;&lt;P&gt; privilege level 15&lt;/P&gt;&lt;P&gt; logging synchronous&lt;/P&gt;&lt;P&gt; login authentication VTY&lt;/P&gt;&lt;P&gt; transport input all&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 02:41:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/aaa-authenticate-to-acs-server/m-p/2063356#M147667</guid>
      <dc:creator>jefbowli</dc:creator>
      <dc:date>2019-03-11T02:41:12Z</dc:date>
    </item>
    <item>
      <title>AAA authenticate to ACS Server</title>
      <link>https://community.cisco.com/t5/network-access-control/aaa-authenticate-to-acs-server/m-p/2063357#M147678</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I was able to authenticate with the following commands, I'm just wondering why the above didn't work.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;tacacs-server host 10.1.10.99&lt;/P&gt;&lt;P&gt;tacacs-server directed-request&lt;/P&gt;&lt;P&gt;tacacs-server key 7 047919271E205D1A01&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 17 Oct 2012 17:10:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/aaa-authenticate-to-acs-server/m-p/2063357#M147678</guid>
      <dc:creator>jefbowli</dc:creator>
      <dc:date>2012-10-17T17:10:01Z</dc:date>
    </item>
    <item>
      <title>AAA authenticate to ACS Server</title>
      <link>https://community.cisco.com/t5/network-access-control/aaa-authenticate-to-acs-server/m-p/2063358#M147692</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jeff,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you use the command, "server-private key 7 &lt;XXXXX&gt;" command, then the string that is entered is considered to be encrypted text. If no number or 0 is entered, the string that is entered is considered to be plain text.&lt;/XXXXX&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So if you are planning to enter your shared secret in plain text, try using the command "server-private key 0 &lt;XXXXX&gt;" or "server-private key &lt;XXXXX&gt;".&lt;/XXXXX&gt;&lt;/XXXXX&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If after entering the shared secret in plain text (using the 0 or no number) and if you are facing issue in authentication, then check the failed attempts logs in the tacacs+ server which should give you the hint of the issue.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 25 Oct 2012 05:37:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/aaa-authenticate-to-acs-server/m-p/2063358#M147692</guid>
      <dc:creator>Karthik Chandran</dc:creator>
      <dc:date>2012-10-25T05:37:20Z</dc:date>
    </item>
  </channel>
</rss>

