<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic AAA authorization not working in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/aaa-authorization-not-working/m-p/2068147#M184649</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Subodh,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I understand that you are trying to use command authorization using RADIUS.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa authorization commands 15 default group radius if-authenticated local&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Command authorization is not supported in RADIUS. RADIUS does not allow users to control which commands can be executed &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; on a router and which cannot.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please refer the following link:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/tech/tk59/technologies_tech_note09186a0080094e99.shtml"&gt;http://www.cisco.com/en/US/tech/tk59/technologies_tech_note09186a0080094e99.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You need to use TACACS+ for configuring command authorization for IOS and PIX/ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Karthik Chandran&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;*kindly rate helpful post*&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 25 Oct 2012 06:59:03 GMT</pubDate>
    <dc:creator>Karthik Chandran</dc:creator>
    <dc:date>2012-10-25T06:59:03Z</dc:date>
    <item>
      <title>AAA authorization not working</title>
      <link>https://community.cisco.com/t5/network-access-control/aaa-authorization-not-working/m-p/2068146#M184625</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Configured the switch for the AAA authentication it's getting authenticated but it's failing for authentication.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When connected to console it worked-&amp;nbsp; Authenticated and then supplied the enable password.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When telneted : it says "access approved" and&amp;nbsp; "authorization failed"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Relevant switch configuration is as follows&amp;nbsp; and also debug of aaa authorization.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;+++++++++++++++++++++++++++++&lt;/P&gt;&lt;P&gt;no service single-slot-reload-enable&lt;/P&gt;&lt;P&gt; no service pad&lt;BR /&gt; service timestamps debug uptime&lt;BR /&gt; service timestamps log uptime&lt;BR /&gt; service password-encryption&lt;BR /&gt; !&lt;BR /&gt; hostname Switch&lt;BR /&gt; !&lt;BR /&gt; aaa new-model&lt;BR /&gt; aaa authentication login default group radius local&lt;BR /&gt; aaa authentication enable default enable&lt;BR /&gt; aaa authorization config-commands&lt;BR /&gt; aaa authorization exec default group radius if-authenticated local&lt;BR /&gt; aaa authorization commands 15 default group radius if-authenticated local&lt;BR /&gt; enable secret 5 $lkl34579231$uK8U$B4sL3AiXAEUzZ8o.Dv34Y/&lt;BR /&gt; !&lt;/P&gt;&lt;P&gt;username cisco privilege 15 password 7 05080F1C224233&amp;nbsp; &lt;BR /&gt; !&lt;BR /&gt; vlan 10&lt;BR /&gt; !&lt;BR /&gt; vlan 120&lt;BR /&gt; ip subnet-zero&lt;BR /&gt; !&lt;BR /&gt; vtp mode transparent&lt;BR /&gt; !&lt;BR /&gt; spanning-tree extend system-id&lt;BR /&gt; !&lt;BR /&gt; !&lt;BR /&gt; interface FastEthernet0/1&lt;BR /&gt;&amp;nbsp; switchport access vlan 10&lt;BR /&gt;&amp;nbsp; switchport mode access&lt;BR /&gt;&amp;nbsp; no ip address&lt;BR /&gt;&amp;nbsp; spanning-tree portfast&lt;BR /&gt; interface GigabitEthernet0/1&lt;BR /&gt;&amp;nbsp; no ip address&lt;BR /&gt; !&lt;BR /&gt; interface GigabitEthernet0/2&lt;BR /&gt;&amp;nbsp; no ip address&lt;BR /&gt; !&lt;BR /&gt; interface Vlan1&lt;BR /&gt;&amp;nbsp; no ip address&lt;BR /&gt;&amp;nbsp; shutdown&lt;BR /&gt; !&lt;BR /&gt; interface Vlan120&lt;BR /&gt;&amp;nbsp; ip address 10.12.8.70 255.255.255.240&lt;BR /&gt; !&lt;BR /&gt; ip default-gateway 10.12.8.65&lt;BR /&gt; ip classless&lt;BR /&gt; ip http server&lt;BR /&gt; !&lt;BR /&gt; !&lt;BR /&gt; radius-server host 192.168.38.169 auth-port 1812 acct-port 1813&lt;BR /&gt; radius-server host 10.12.1.142 auth-port 1812 acct-port 1813&lt;BR /&gt; radius-server retransmit 3&lt;BR /&gt; radius-server key cisco&lt;BR /&gt; !&lt;BR /&gt; line con 0&lt;BR /&gt; line vty 0 4&lt;BR /&gt;&amp;nbsp; password 7 grrfcb7swe&lt;BR /&gt;&amp;nbsp; transport input telnet&lt;BR /&gt; line vty 5 15&lt;BR /&gt; !&lt;BR /&gt; end&lt;/P&gt;&lt;P&gt;Debug output :&lt;/P&gt;&lt;P&gt;Switch#&lt;/P&gt;&lt;P&gt; 21:45:02: AAA/AUTHEN/CONT (2947331915): continue_login (user='(undef)')&lt;BR /&gt; 21:45:02: AAA/AUTHEN (2947331915): status = GETUSER&lt;BR /&gt; 21:45:02: AAA/AUTHEN (2947331915): Method=radius (radius)&lt;BR /&gt; 21:45:02: AAA/AUTHEN (2947331915): status = GETPASS&lt;BR /&gt; 21:45:06: AAA/AUTHEN/CONT (2947331915): continue_login (user='wrrt\trial1')&lt;BR /&gt; 21:45:06: AAA/AUTHEN (2947331915): status = GETPASS&lt;BR /&gt; 21:45:06: AAA/AUTHEN (2947331915): Method=radius (radius)&lt;BR /&gt; 21:45:07: AAA/AUTHEN (2947331915): status = PASS&lt;BR /&gt; 21:45:07: tty1 AAA/AUTHOR/EXEC (284909353): Port='tty1' list='' service=EXEC&lt;BR /&gt; 21:45:07: AAA/AUTHOR/EXEC: tty1 (284909353) user='wrrt\trial1 '&lt;BR /&gt; 21:45:07: tty1 AAA/AUTHOR/EXEC (284909353): send AV service=shell&lt;BR /&gt; 21:45:07: tty1 AAA/AUTHOR/EXEC (284909353): send AV cmd*&lt;BR /&gt; 21:45:07: tty1 AAA/AUTHOR/EXEC (284909353): found list "default"&lt;BR /&gt; 21:45:07: tty1 AAA/AUTHOR/EXEC (284909353): Method=radius (radius)&lt;BR /&gt; 21:45:07: AAA/AUTHOR (284909353): Post authorization status = FAIL -------------------------#&amp;nbsp; authorization failed # &lt;BR /&gt; 21:45:07: AAA/AUTHOR/EXEC: Authorization FAILED&lt;BR /&gt; 21:45:09: AAA/MEMORY: free_user (0xDF12AC) user='wrrt\trial1' ruser='' port='tty1' rem_addr='10.12.7.71' authen_type=ASCII service=LOGIN priv=1&lt;BR /&gt; Switch#&lt;BR /&gt; Switch#&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do we need to change anything on Radius server or can we change the authorization preference to local and then to radius.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please share the experience.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance,&lt;/P&gt;&lt;P&gt;Subodh&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 02:39:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/aaa-authorization-not-working/m-p/2068146#M184625</guid>
      <dc:creator>bapatsubodh</dc:creator>
      <dc:date>2019-03-11T02:39:41Z</dc:date>
    </item>
    <item>
      <title>AAA authorization not working</title>
      <link>https://community.cisco.com/t5/network-access-control/aaa-authorization-not-working/m-p/2068147#M184649</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Subodh,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I understand that you are trying to use command authorization using RADIUS.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa authorization commands 15 default group radius if-authenticated local&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Command authorization is not supported in RADIUS. RADIUS does not allow users to control which commands can be executed &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; on a router and which cannot.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please refer the following link:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/tech/tk59/technologies_tech_note09186a0080094e99.shtml"&gt;http://www.cisco.com/en/US/tech/tk59/technologies_tech_note09186a0080094e99.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You need to use TACACS+ for configuring command authorization for IOS and PIX/ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Karthik Chandran&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;*kindly rate helpful post*&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 25 Oct 2012 06:59:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/aaa-authorization-not-working/m-p/2068147#M184649</guid>
      <dc:creator>Karthik Chandran</dc:creator>
      <dc:date>2012-10-25T06:59:03Z</dc:date>
    </item>
  </channel>
</rss>

