<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Radius and Local Authentication in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/radius-and-local-authentication/m-p/1785876#M231739</link>
    <description>&lt;P&gt;Hey everyone,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm having a small problem with some routers that I recently setup to authenticate to a new Windows 2008 R2 Radius Server. That part works fine, but it appears now that we cannot access the local usernames that were configured. Is it possible to do both or do I just have something not set up right? This is running on some older 2600 series routers with ssh enabled. Below is our standard config:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;version 12.3&lt;/P&gt;&lt;P&gt;service timestamps debug datetime msec&lt;/P&gt;&lt;P&gt;service timestamps log datetime msec&lt;/P&gt;&lt;P&gt;service password-encryption&lt;/P&gt;&lt;P&gt;hostname Csico-R1&lt;/P&gt;&lt;P&gt;boot-start-marker&lt;/P&gt;&lt;P&gt;boot-end-marker&lt;/P&gt;&lt;P&gt;enable password **********************&lt;/P&gt;&lt;P&gt;memory-size iomem 15&lt;/P&gt;&lt;P&gt;aaa new-model&lt;/P&gt;&lt;P&gt;aaa group server radius RADIUS_AUTH&lt;/P&gt;&lt;P&gt;server 192.168.1.100 auth-port 1812 acct-port 1813&lt;/P&gt;&lt;P&gt;aaa authentication login default local&lt;/P&gt;&lt;P&gt;aaa authentication login networkaccess group RADIUS_AUTH enable&lt;/P&gt;&lt;P&gt;aaa authentication enable default enable&lt;/P&gt;&lt;P&gt;aaa authorization exec default group RADIUS_AUTH if-authenticated &lt;/P&gt;&lt;P&gt;aaa session-id common&lt;/P&gt;&lt;P&gt;ip subnet-zero&lt;/P&gt;&lt;P&gt;ip cef&lt;/P&gt;&lt;P&gt;no ip domain lookup&lt;/P&gt;&lt;P&gt;ip audit po max-events 100&lt;/P&gt;&lt;P&gt;username ciscoadmin password 7 ******************&lt;/P&gt;&lt;P&gt;username supercisco password 7 *****************&lt;/P&gt;&lt;P&gt;ip ssh time-out 60&lt;/P&gt;&lt;P&gt;ip ssh authentication-retries 5&lt;/P&gt;&lt;P&gt;ip ssh rsa keypair-name myrsakey&lt;/P&gt;&lt;P&gt;interface FastEthernet0/1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; ip address 192.168.1.4 255.255.255.0&lt;/P&gt;&lt;P&gt;duplex auto&lt;/P&gt;&lt;P&gt;speed auto&lt;/P&gt;&lt;P&gt;no ip http server&lt;/P&gt;&lt;P&gt;no ip http secure-server&lt;/P&gt;&lt;P&gt;ip classless&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip radius source-interface FastEthernet0/1 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;radius-server host 192.168.1.100 auth-port 1812 acct-port 1813 key *****************&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;alias interface show do show&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;alias configure show do show&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;line con 0&lt;/P&gt;&lt;P&gt;exec-timeout 0 0&lt;/P&gt;&lt;P&gt;privilege level 15&lt;/P&gt;&lt;P&gt;logging synchronous&lt;/P&gt;&lt;P&gt;login authentication networkaccess&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;line aux 0&lt;/P&gt;&lt;P&gt;line vty 0 4&lt;/P&gt;&lt;P&gt;exec-timeout 0 0&lt;/P&gt;&lt;P&gt;privilege level 15&lt;/P&gt;&lt;P&gt;logging synchronous&lt;/P&gt;&lt;P&gt;login authentication networkaccess&lt;/P&gt;&lt;P&gt;transport input telnet ssh&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;line vty 5 15&lt;/P&gt;&lt;P&gt;exec-timeout 0 0&lt;/P&gt;&lt;P&gt;privilege level 15&lt;/P&gt;&lt;P&gt;logging synchronous&lt;/P&gt;&lt;P&gt;login authentication networkaccess&lt;/P&gt;&lt;P&gt;transport input telnet ssh&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Robert&lt;/P&gt;</description>
    <pubDate>Mon, 11 Mar 2019 01:30:21 GMT</pubDate>
    <dc:creator>rfurman1161</dc:creator>
    <dc:date>2019-03-11T01:30:21Z</dc:date>
    <item>
      <title>Radius and Local Authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/radius-and-local-authentication/m-p/1785876#M231739</link>
      <description>&lt;P&gt;Hey everyone,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm having a small problem with some routers that I recently setup to authenticate to a new Windows 2008 R2 Radius Server. That part works fine, but it appears now that we cannot access the local usernames that were configured. Is it possible to do both or do I just have something not set up right? This is running on some older 2600 series routers with ssh enabled. Below is our standard config:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;version 12.3&lt;/P&gt;&lt;P&gt;service timestamps debug datetime msec&lt;/P&gt;&lt;P&gt;service timestamps log datetime msec&lt;/P&gt;&lt;P&gt;service password-encryption&lt;/P&gt;&lt;P&gt;hostname Csico-R1&lt;/P&gt;&lt;P&gt;boot-start-marker&lt;/P&gt;&lt;P&gt;boot-end-marker&lt;/P&gt;&lt;P&gt;enable password **********************&lt;/P&gt;&lt;P&gt;memory-size iomem 15&lt;/P&gt;&lt;P&gt;aaa new-model&lt;/P&gt;&lt;P&gt;aaa group server radius RADIUS_AUTH&lt;/P&gt;&lt;P&gt;server 192.168.1.100 auth-port 1812 acct-port 1813&lt;/P&gt;&lt;P&gt;aaa authentication login default local&lt;/P&gt;&lt;P&gt;aaa authentication login networkaccess group RADIUS_AUTH enable&lt;/P&gt;&lt;P&gt;aaa authentication enable default enable&lt;/P&gt;&lt;P&gt;aaa authorization exec default group RADIUS_AUTH if-authenticated &lt;/P&gt;&lt;P&gt;aaa session-id common&lt;/P&gt;&lt;P&gt;ip subnet-zero&lt;/P&gt;&lt;P&gt;ip cef&lt;/P&gt;&lt;P&gt;no ip domain lookup&lt;/P&gt;&lt;P&gt;ip audit po max-events 100&lt;/P&gt;&lt;P&gt;username ciscoadmin password 7 ******************&lt;/P&gt;&lt;P&gt;username supercisco password 7 *****************&lt;/P&gt;&lt;P&gt;ip ssh time-out 60&lt;/P&gt;&lt;P&gt;ip ssh authentication-retries 5&lt;/P&gt;&lt;P&gt;ip ssh rsa keypair-name myrsakey&lt;/P&gt;&lt;P&gt;interface FastEthernet0/1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; ip address 192.168.1.4 255.255.255.0&lt;/P&gt;&lt;P&gt;duplex auto&lt;/P&gt;&lt;P&gt;speed auto&lt;/P&gt;&lt;P&gt;no ip http server&lt;/P&gt;&lt;P&gt;no ip http secure-server&lt;/P&gt;&lt;P&gt;ip classless&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip radius source-interface FastEthernet0/1 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;radius-server host 192.168.1.100 auth-port 1812 acct-port 1813 key *****************&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;alias interface show do show&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;alias configure show do show&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;line con 0&lt;/P&gt;&lt;P&gt;exec-timeout 0 0&lt;/P&gt;&lt;P&gt;privilege level 15&lt;/P&gt;&lt;P&gt;logging synchronous&lt;/P&gt;&lt;P&gt;login authentication networkaccess&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;line aux 0&lt;/P&gt;&lt;P&gt;line vty 0 4&lt;/P&gt;&lt;P&gt;exec-timeout 0 0&lt;/P&gt;&lt;P&gt;privilege level 15&lt;/P&gt;&lt;P&gt;logging synchronous&lt;/P&gt;&lt;P&gt;login authentication networkaccess&lt;/P&gt;&lt;P&gt;transport input telnet ssh&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;line vty 5 15&lt;/P&gt;&lt;P&gt;exec-timeout 0 0&lt;/P&gt;&lt;P&gt;privilege level 15&lt;/P&gt;&lt;P&gt;logging synchronous&lt;/P&gt;&lt;P&gt;login authentication networkaccess&lt;/P&gt;&lt;P&gt;transport input telnet ssh&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Robert&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 01:30:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/radius-and-local-authentication/m-p/1785876#M231739</guid>
      <dc:creator>rfurman1161</dc:creator>
      <dc:date>2019-03-11T01:30:21Z</dc:date>
    </item>
    <item>
      <title>Radius and Local Authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/radius-and-local-authentication/m-p/1785877#M231740</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;When you use a group of AAA server (radius or tacacs) the router will always look for the users within those AAA servers. The router can be configured to use the local database only if the AAA servers fail.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 24 Oct 2011 01:15:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/radius-and-local-authentication/m-p/1785877#M231740</guid>
      <dc:creator>Eduardo Aliaga</dc:creator>
      <dc:date>2011-10-24T01:15:14Z</dc:date>
    </item>
    <item>
      <title>Radius and Local Authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/radius-and-local-authentication/m-p/1785878#M231741</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;When you configure AAA authentication you can configure a primary authentication method, such as using Radius, and also one or more alternative authentication methods, including using the loal database on the router (or switch) which can be used if the primary method is not available.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is what is configured:&lt;/P&gt;&lt;P&gt;aaa authentication login networkaccess group RADIUS_AUTH enable&lt;/P&gt;&lt;P&gt;this says to use Radius as the primary authentication method and to use the enable password as the alternative method of authentication if the Radius server is not available. So in this case you would not use the local user name at all.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you configured it this way:&lt;/P&gt;&lt;P&gt;aaa authentication login networkaccess group RADIUS_AUTH local&lt;/P&gt;&lt;P&gt;then it would try Radius and if Radius was not available then it would try the local user name.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Rick&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 24 Oct 2011 03:04:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/radius-and-local-authentication/m-p/1785878#M231741</guid>
      <dc:creator>Richard Burts</dc:creator>
      <dc:date>2011-10-24T03:04:52Z</dc:date>
    </item>
  </channel>
</rss>

