<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Tacacs+ Authenticating the Enable Password in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/tacacs-authenticating-the-enable-password/m-p/2384883#M170250</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Dear David ,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please post debug aaa authentication &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;frm the configuration you have posted it seems your switch side configuration is correct and there could be something missing on the tacacs server side . &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://my.safaribooksonline.com/book/networking/cisco-ios/0596527225/tacacsplus/i47039__heada__4_8"&gt;http://my.safaribooksonline.com/book/networking/cisco-ios/0596527225/tacacsplus/i47039__heada__4_8&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you choose to use TACACS+ to authenticate your enable&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; password as well, then you will need to define a special enable user&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; called &lt;TT&gt;$enabl15$&lt;/TT&gt;. The following&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; example creates this enable account by using the password &lt;TT&gt;happy&lt;/TT&gt;. After you define this username, the&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; TACACS+ server will be able to handle authentication requests for the&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; enable password:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE&gt;user = $enab15$ {
&amp;nbsp;&amp;nbsp;&amp;nbsp; login = cleartext happy
}&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks &lt;/P&gt;&lt;P&gt;sharad&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 10 Dec 2013 03:30:33 GMT</pubDate>
    <dc:creator>svashish</dc:creator>
    <dc:date>2013-12-10T03:30:33Z</dc:date>
    <item>
      <title>Tacacs+ Authenticating the Enable Password</title>
      <link>https://community.cisco.com/t5/network-access-control/tacacs-authenticating-the-enable-password/m-p/2384882#M170249</link>
      <description>&lt;P&gt;&lt;STRONG&gt;I have the following configuration on my switch and it works correctly:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa group server tacacs+ tacacs_serv&lt;/P&gt;&lt;P&gt;server 192.168.70.20&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;aaa authentication login tac_auth group tacacs_serv local&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;line vty 0 15&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;login authentication tac_auth&lt;/P&gt;&lt;P&gt;transport input ssh&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;The configuration above works correctly, my username/pwd are authenticated via Tacacs+ and the "enable" password is confirmed via the local database on the switch. &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;When I make the following changes attempeing to have Tacacs validate the username/pwd as well as the "enable" password I cannot log into the switch at all.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa group server tacacs+ tacacs_serv&lt;/P&gt;&lt;P&gt;server 192.168.70.20&lt;/P&gt;&lt;P&gt; &lt;SPAN style="font-size: 10pt;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;aaa authentication login default group tacacs_serv local&lt;/P&gt;&lt;P&gt;aaa authentication enable default group tacacs_serv enable&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;line vty 0 15&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;login authentication default&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;transport input ssh&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;The switch is running 12.2(44)SE6. The username/pwd are in the local database of the Linux server. The Enable password is configured in two places within the tac_plus.conf file:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;host = 192.168.70.15 {&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; prompt = "Enter your Username and Password. Username: "&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; enable = cleartext "password"&lt;/P&gt;&lt;P&gt;}&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;AND&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;user = $enab15$ {&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; login = cleartext "password"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Any help would be appreciated.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Thanks&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 04:10:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tacacs-authenticating-the-enable-password/m-p/2384882#M170249</guid>
      <dc:creator>dhackenberg</dc:creator>
      <dc:date>2019-03-11T04:10:26Z</dc:date>
    </item>
    <item>
      <title>Tacacs+ Authenticating the Enable Password</title>
      <link>https://community.cisco.com/t5/network-access-control/tacacs-authenticating-the-enable-password/m-p/2384883#M170250</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Dear David ,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please post debug aaa authentication &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;frm the configuration you have posted it seems your switch side configuration is correct and there could be something missing on the tacacs server side . &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://my.safaribooksonline.com/book/networking/cisco-ios/0596527225/tacacsplus/i47039__heada__4_8"&gt;http://my.safaribooksonline.com/book/networking/cisco-ios/0596527225/tacacsplus/i47039__heada__4_8&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you choose to use TACACS+ to authenticate your enable&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; password as well, then you will need to define a special enable user&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; called &lt;TT&gt;$enabl15$&lt;/TT&gt;. The following&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; example creates this enable account by using the password &lt;TT&gt;happy&lt;/TT&gt;. After you define this username, the&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; TACACS+ server will be able to handle authentication requests for the&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; enable password:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE&gt;user = $enab15$ {
&amp;nbsp;&amp;nbsp;&amp;nbsp; login = cleartext happy
}&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks &lt;/P&gt;&lt;P&gt;sharad&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 10 Dec 2013 03:30:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tacacs-authenticating-the-enable-password/m-p/2384883#M170250</guid>
      <dc:creator>svashish</dc:creator>
      <dc:date>2013-12-10T03:30:33Z</dc:date>
    </item>
    <item>
      <title>Tacacs+ Authenticating the Enable Password</title>
      <link>https://community.cisco.com/t5/network-access-control/tacacs-authenticating-the-enable-password/m-p/2384884#M170251</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;STRONG&gt;Thanks for your help. I have tried creating the special user you mentioned (enabl15 and enabl15). I did it both ways since ther was a typo. Neither work. Below is the output from the command debug aaa authentication:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Dec 10 15:08:43.155: AAA: parse name=tty0 idb type=-1 tty=-1&lt;/P&gt;&lt;P&gt;Dec 10 15:08:43.155: AAA: name=tty0 flags=0x11 type=4 shelf=0 slot=0 adapter=0 port=0 channel=0&lt;/P&gt;&lt;P&gt;Dec 10 15:08:43.155: AAA/MEMORY: create_user (0x1F3BA50) user='testuser' ruser='NULL' ds0=0 port='tty0' rem_addr='async' authen_type=ASCII service=ENABLE priv=15 initial_task_id='0', vrf= (id=0)&lt;/P&gt;&lt;P&gt;Dec 10 15:08:43.155: AAA/AUTHEN/START (1044210600): port='tty0' list='' action=LOGIN service=ENABLE&lt;/P&gt;&lt;P&gt;Dec 10 15:08:43.155: AAA/AUTHEN/START (1044210600): using "default" list&lt;/P&gt;&lt;P&gt;Dec 10 15:08:43.155: AAA/AUTHEN/START (1044210600): Method=tacacs_serv (tacacs+)&lt;/P&gt;&lt;P&gt;Dec 10 15:08:43.155: TAC+: send AUTHEN/START packet ver=192 id=1044210600&lt;/P&gt;&lt;P&gt;Dec 10 15:08:43.457: TAC+: ver=192 id=1044210600 received AUTHEN status = GETPASS&lt;/P&gt;&lt;P&gt;Dec 10 15:08:43.457: AAA/AUTHEN (1044210600): status = GETPASS&lt;/P&gt;&lt;P&gt;% Error in authentication.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;I am testing this on a 2960, running &lt;STRONG style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;12.2(44)SE6. &lt;/STRONG&gt;Could this be a bug?&lt;/STRONG&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 10 Dec 2013 15:19:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tacacs-authenticating-the-enable-password/m-p/2384884#M170251</guid>
      <dc:creator>dhackenberg</dc:creator>
      <dc:date>2013-12-10T15:19:37Z</dc:date>
    </item>
    <item>
      <title>Tacacs+ Authenticating the Enable Password</title>
      <link>https://community.cisco.com/t5/network-access-control/tacacs-authenticating-the-enable-password/m-p/2384885#M170252</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi David,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;% Error in authentication&lt;/P&gt;&lt;P&gt;at enable authentication usually means that the privilege level (maximum) is not 15.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cause, when you type in "enable" it's actually "enable 15"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;**Share your knowledge. It’s a way to achieve immortality. &lt;BR /&gt;--Dalai Lama** &lt;BR /&gt; &lt;BR /&gt;Please Rate if helpful. &lt;BR /&gt;Regards &lt;BR /&gt;Ed&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 10 Dec 2013 15:27:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tacacs-authenticating-the-enable-password/m-p/2384885#M170252</guid>
      <dc:creator>edwjames</dc:creator>
      <dc:date>2013-12-10T15:27:25Z</dc:date>
    </item>
    <item>
      <title>Tacacs+ Authenticating the Enable Password</title>
      <link>https://community.cisco.com/t5/network-access-control/tacacs-authenticating-the-enable-password/m-p/2384886#M170253</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;STRONG&gt;Below is the config of the enabl15 user in the Tacacs config file:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;user = $enabl15$ {&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; login = cleartext 802.11boingo&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; priv-lvl = 15&lt;/P&gt;&lt;P&gt;}&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;I did at you suggestion add the priv_lvl line. It did not change the result. &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Below is the most recent debug:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;CCG-WLA-TEST-SWT-1&amp;gt;ena&lt;/P&gt;&lt;P&gt;Password:&lt;/P&gt;&lt;P&gt;Dec 10 15:41:55.857: AAA: parse name=tty0 idb type=-1 tty=-1&lt;/P&gt;&lt;P&gt;Dec 10 15:41:55.857: AAA: name=tty0 flags=0x11 type=4 shelf=0 slot=0 adapter=0 port=0 channel=0&lt;/P&gt;&lt;P&gt;Dec 10 15:41:55.857: AAA/MEMORY: create_user (0x1E6AA88) user='testuser' ruser='NULL' ds0=0 port='tty0' rem_addr='async' authen_type=ASCII service=ENABLE priv=15 initial_task_id='0', vrf= (id=0)&lt;/P&gt;&lt;P&gt;Dec 10 15:41:55.865: AAA/AUTHEN/START (3771241761): port='tty0' list='' action=LOGIN service=ENABLE&lt;/P&gt;&lt;P&gt;Dec 10 15:41:55.865: AAA/AUTHEN/START (3771241761): using "default" list&lt;/P&gt;&lt;P&gt;Dec 10 15:41:55.865: AAA/AUTHEN/START (3771241761): Method=tacacs_serv (tacacs+)&lt;/P&gt;&lt;P&gt;Dec 10 15:41:55.865: TAC+: send AUTHEN/START packet ver=192 id=-523725535&lt;/P&gt;&lt;P&gt;Dec 10 15:41:56.167: TAC+: ver=192 id=-523725535 received AUTHEN status = GETPASS&lt;/P&gt;&lt;P&gt;Dec 10 15:41:56.167: AAA/AUTHEN (3771241761): status = GETPASS&lt;/P&gt;&lt;P&gt;% Error in authentication.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Thanks again...&lt;/STRONG&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 10 Dec 2013 15:46:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tacacs-authenticating-the-enable-password/m-p/2384886#M170253</guid>
      <dc:creator>dhackenberg</dc:creator>
      <dc:date>2013-12-10T15:46:33Z</dc:date>
    </item>
    <item>
      <title>Tacacs+ Authenticating the Enable Password</title>
      <link>https://community.cisco.com/t5/network-access-control/tacacs-authenticating-the-enable-password/m-p/2384887#M170254</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi David,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;if you notice the debug:&lt;/P&gt;&lt;P&gt;Dec 10 15:41:55.857: AAA/MEMORY: create_user (0x1E6AA88) user='testuser'&amp;nbsp; ruser='NULL' ds0=0 port='tty0' rem_addr='async' authen_type=ASCII&amp;nbsp; service=ENABLE priv=15 initial_task_id='0', vrf= (id=0)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So enable authentication being done for testuser, so the privilege should also be inside the user: testuser.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;**Share your knowledge. It’s a way to achieve immortality. &lt;BR /&gt;--Dalai Lama** &lt;BR /&gt; &lt;BR /&gt;Please Rate if helpful. &lt;BR /&gt;Regards &lt;BR /&gt;Ed&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 10 Dec 2013 15:50:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tacacs-authenticating-the-enable-password/m-p/2384887#M170254</guid>
      <dc:creator>edwjames</dc:creator>
      <dc:date>2013-12-10T15:50:44Z</dc:date>
    </item>
    <item>
      <title>Tacacs+ Authenticating the Enable Password</title>
      <link>https://community.cisco.com/t5/network-access-control/tacacs-authenticating-the-enable-password/m-p/2384888#M170255</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;STRONG&gt;I added the priv-lvl to enable15:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;user = $enabl15$ {&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; login = cleartext 802.11boingo&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; priv-lvl = 15&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;It is also in the testuser config:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;user = testuser {&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; login = PAM&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; member = admin&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; service = exec&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; priv-lvl = 15&lt;/P&gt;&lt;P&gt;}&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;It is also in the group config:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;group = admin {&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; # group members who don't have their own login password will be&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; # looked up in /etc/passwd&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; #login = file /etc/passwd&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; login = PAM&lt;/P&gt;&lt;P&gt; &lt;SPAN style="font-size: 10pt;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; # group members who have no expiry date set will use this one&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; #expires = "Jan 1 1997"&lt;/P&gt;&lt;P&gt; &lt;SPAN style="font-size: 10pt;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; # only allow access to specific routers&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; acl = default&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; # Needed for the router to make commands available to user (subject&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; # to authorization if so configured on the router&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; service = exec {&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; priv-lvl = 15&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; #default service = permit&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; }&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Below is the latest debug:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;CCG-WLA-TEST-SWT-1&amp;gt;ena&lt;/P&gt;&lt;P&gt;Password:&lt;/P&gt;&lt;P&gt;Dec 10 16:06:45.755: AAA: parse name=tty0 idb type=-1 tty=-1&lt;/P&gt;&lt;P&gt;Dec 10 16:06:45.755: AAA: name=tty0 flags=0x11 type=4 shelf=0 slot=0 adapter=0 port=0 channel=0&lt;/P&gt;&lt;P&gt;Dec 10 16:06:45.755: AAA/MEMORY: create_user (0x1F3CB4C) user='testuser' ruser='NULL' ds0=0 port='tty0' rem_addr='async' authen_type=ASCII service=ENABLE priv=15 initial_task_id='0', vrf= (id=0)&lt;/P&gt;&lt;P&gt;Dec 10 16:06:45.755: AAA/AUTHEN/START (3173866470): port='tty0' list='' action=LOGIN service=ENABLE&lt;/P&gt;&lt;P&gt;Dec 10 16:06:45.755: AAA/AUTHEN/START (3173866470): using "default" list&lt;/P&gt;&lt;P&gt;Dec 10 16:06:45.755: AAA/AUTHEN/START (3173866470): Method=tacacs_serv (tacacs+)&lt;/P&gt;&lt;P&gt;Dec 10 16:06:45.755: TAC+: send AUTHEN/START packet ver=192 id=-1121100826&lt;/P&gt;&lt;P&gt;Dec 10 16:06:46.057: TAC+: ver=192 id=-1121100826 received AUTHEN status = GETPASS&lt;/P&gt;&lt;P&gt;Dec 10 16:06:46.057: AAA/AUTHEN (3173866470): status = GETPASS&lt;/P&gt;&lt;P&gt;% Error in authentication.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 10 Dec 2013 16:07:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tacacs-authenticating-the-enable-password/m-p/2384888#M170255</guid>
      <dc:creator>dhackenberg</dc:creator>
      <dc:date>2013-12-10T16:07:42Z</dc:date>
    </item>
    <item>
      <title>Tacacs+ Authenticating the Enable Password</title>
      <link>https://community.cisco.com/t5/network-access-control/tacacs-authenticating-the-enable-password/m-p/2384889#M170256</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi David,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So here is the thing, I know how to set maximum and default privilege levels on the ACS( Cisco Access control system)&lt;/P&gt;&lt;P&gt;Eg:&lt;/P&gt;&lt;P&gt;&lt;IMG src="http://supportforums.cisco.com/sites/default/files/legacy/8/5/6/170658-Capture.JPG" class="jive-image" /&gt;&lt;/P&gt;&lt;P&gt;The same way, it would be different in the tac_plus server that you are using.&lt;/P&gt;&lt;P&gt;The configuration you have used is I suppose for default privilege level which will not help in our scenario.&lt;/P&gt;&lt;P&gt;Now, I am not sure of how to configure maximum privilege on the tac_plus side.&lt;/P&gt;&lt;P&gt;I do have a suggestion if you are interested in skipping the enable authentication mode and doing the authorization based on privilege levels.&lt;/P&gt;&lt;P&gt;Let me know if you are, then I can suggest you that config on the IOS side.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;**Share your knowledge. It’s a way to achieve immortality. &lt;BR /&gt;--Dalai Lama** &lt;BR /&gt; &lt;BR /&gt;Please Rate if helpful. &lt;BR /&gt;Regards &lt;BR /&gt;Ed&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 11 Dec 2013 00:01:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tacacs-authenticating-the-enable-password/m-p/2384889#M170256</guid>
      <dc:creator>edwjames</dc:creator>
      <dc:date>2013-12-11T00:01:59Z</dc:date>
    </item>
  </channel>
</rss>

