<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ACS Failover ?? in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/acs-failover/m-p/1687357#M237776</link>
    <description>&lt;P&gt;After configuring an ACS and having it up and working on a large number and types of Cisco Switches and Routers.&amp;nbsp; I am faced with this the way it was configured , it should have a fall back to local user and password if it can not reach the ACS mine just keeps looking for the ACS. Can i force a local log in? or is there an issues with my config which is posted below?:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;version 12.2&lt;/P&gt;&lt;P&gt;no service pad&lt;/P&gt;&lt;P&gt;service timestamps debug uptime&lt;/P&gt;&lt;P&gt;service timestamps log uptime&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname test_tv&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;enable password ******&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;username admin privilege 15 password 0 line ******&lt;/P&gt;&lt;P&gt;aaa new-model&lt;/P&gt;&lt;P&gt;aaa group server radius rad_eap&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;aaa group server tacacs+ tac_admin&lt;/P&gt;&lt;P&gt;server 10.1.1.120&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;aaa authentication login default group tacacs+ local&lt;/P&gt;&lt;P&gt;aaa authentication login eap_methods group rad_eap&lt;/P&gt;&lt;P&gt;aaa authentication login eap_methods1 group rad_eap1&lt;/P&gt;&lt;P&gt;aaa authentication enable default group tac_admin&lt;/P&gt;&lt;P&gt;aaa authorization exec default group tac_admin group rad_admin&lt;/P&gt;&lt;P&gt;aaa authorization exec tac_admin group tac_admin&lt;/P&gt;&lt;P&gt;aaa authorization commands 0 default group tac_admin&lt;/P&gt;&lt;P&gt;aaa authorization commands 1 default group tac_admin&lt;/P&gt;&lt;P&gt;aaa authorization commands 2 default group tac_admin&lt;/P&gt;&lt;P&gt;aaa authorization commands 3 default group tac_admin&lt;/P&gt;&lt;P&gt;aaa authorization commands 4 default group tac_admin&lt;/P&gt;&lt;P&gt;aaa authorization commands 5 default group tac_admin&lt;/P&gt;&lt;P&gt;aaa authorization commands 6 default group tac_admin&lt;/P&gt;&lt;P&gt;aaa authorization commands 7 default group tac_admin&lt;/P&gt;&lt;P&gt;aaa authorization commands 8 default group tac_admin&lt;/P&gt;&lt;P&gt;aaa authorization commands 9 default group tac_admin&lt;/P&gt;&lt;P&gt;aaa authorization commands 10 default group tac_admin&lt;/P&gt;&lt;P&gt;aaa authorization commands 11 default group tac_admin&lt;/P&gt;&lt;P&gt;aaa authorization commands 12 default group tac_admin&lt;/P&gt;&lt;P&gt;aaa authorization commands 13 default group tac_admin&lt;/P&gt;&lt;P&gt;aaa authorization commands 14 default group tac_admin&lt;/P&gt;&lt;P&gt;aaa authorization commands 15 default group tac_admin&lt;/P&gt;&lt;P&gt;aaa authorization commands 15 tac_admin group tacacs+ none&lt;/P&gt;&lt;P&gt;aaa authorization network tac_admin group tacacs+&lt;/P&gt;&lt;P&gt;aaa accounting exec default start-stop group tac_admin&lt;/P&gt;&lt;P&gt;aaa accounting commands 15 default start-stop group tac_admin&lt;/P&gt;&lt;P&gt;aaa accounting network default start-stop group tac_admin&lt;/P&gt;&lt;P&gt;aaa accounting network acct_methods start-stop group rad_acct&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;aaa session-id common&lt;/P&gt;&lt;P&gt;ip subnet-zero&lt;/P&gt;&lt;P&gt;no ip domain-lookup&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;no file verify auto&lt;/P&gt;&lt;P&gt;spanning-tree mode pvst&lt;/P&gt;&lt;P&gt;spanning-tree extend system-id&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;vlan internal allocation policy ascending&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;snmp-server engineID local 000000090200000021000000&lt;/P&gt;&lt;P&gt;snmp-server community &lt;/P&gt;&lt;P&gt;snmp-server community &lt;/P&gt;&lt;P&gt;snmp-server host 10.1.1.110 inform version 2c &lt;/P&gt;&lt;P&gt;snmp-server host 10.1.1.110 version 2c &lt;/P&gt;&lt;P&gt;tacacs-server host 10.1.1.120&lt;/P&gt;&lt;P&gt;tacacs-server directed-request&lt;/P&gt;&lt;P&gt;tacacs-server key **********&lt;/P&gt;&lt;P&gt;radius-server source-ports *************&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;control-plane&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;banner motd ^&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;line con 0&lt;/P&gt;&lt;P&gt;password ******&lt;/P&gt;&lt;P&gt;stopbits 1&lt;/P&gt;&lt;P&gt;line vty 0 4&lt;/P&gt;&lt;P&gt;password ******&lt;/P&gt;&lt;P&gt;authorization commands 0 tac_admin&lt;/P&gt;&lt;P&gt;authorization commands 1 tac_admin&lt;/P&gt;&lt;P&gt;authorization commands 2 tac_admin&lt;/P&gt;&lt;P&gt;authorization commands 3 tac_admin&lt;/P&gt;&lt;P&gt;authorization commands 4 tac_admin&lt;/P&gt;&lt;P&gt;authorization commands 5 tac_admin&lt;/P&gt;&lt;P&gt;authorization commands 6 tac_admin&lt;/P&gt;&lt;P&gt;authorization commands 7 tac_admin&lt;/P&gt;&lt;P&gt;authorization commands 8 tac_admin&lt;/P&gt;&lt;P&gt;authorization commands 9 tac_admin&lt;/P&gt;&lt;P&gt;authorization commands 10 tac_admin&lt;/P&gt;&lt;P&gt;authorization commands 11 tac_admin&lt;/P&gt;&lt;P&gt;authorization commands 12 tac_admin&lt;/P&gt;&lt;P&gt;authorization commands 13 tac_admin&lt;/P&gt;&lt;P&gt;authorization commands 14 tac_admin&lt;/P&gt;&lt;P&gt;authorization commands 15 tac_admin&lt;/P&gt;&lt;P&gt;line vty 5 15&lt;/P&gt;&lt;P&gt;password ******&lt;/P&gt;&lt;P&gt;authorization commands 0 tac_admin&lt;/P&gt;&lt;P&gt;authorization commands 1 tac_admin&lt;/P&gt;&lt;P&gt;authorization commands 2 tac_admin&lt;/P&gt;&lt;P&gt;authorization commands 3 tac_admin&lt;/P&gt;&lt;P&gt;authorization commands 4 tac_admin&lt;/P&gt;&lt;P&gt;authorization commands 5 tac_admin&lt;/P&gt;&lt;P&gt;authorization commands 6 tac_admin&lt;/P&gt;&lt;P&gt;authorization commands 7 tac_admin&lt;/P&gt;&lt;P&gt;authorization commands 8 tac_admin&lt;/P&gt;&lt;P&gt;authorization commands 9 tac_admin&lt;/P&gt;&lt;P&gt;authorization commands 10 tac_admin&lt;/P&gt;&lt;P&gt;authorization commands 11 tac_admin&lt;/P&gt;&lt;P&gt;authorization commands 12 tac_admin&lt;/P&gt;&lt;P&gt;authorization commands 13 tac_admin&lt;/P&gt;&lt;P&gt;authorization commands 14 tac_admin&lt;/P&gt;&lt;P&gt;authorization commands 15 tac_admin&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;end&lt;SPAN id="mce_marker"&gt; &lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Mon, 11 Mar 2019 01:10:45 GMT</pubDate>
    <dc:creator>Kurt Warner</dc:creator>
    <dc:date>2019-03-11T01:10:45Z</dc:date>
    <item>
      <title>ACS Failover ??</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-failover/m-p/1687357#M237776</link>
      <description>&lt;P&gt;After configuring an ACS and having it up and working on a large number and types of Cisco Switches and Routers.&amp;nbsp; I am faced with this the way it was configured , it should have a fall back to local user and password if it can not reach the ACS mine just keeps looking for the ACS. Can i force a local log in? or is there an issues with my config which is posted below?:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;version 12.2&lt;/P&gt;&lt;P&gt;no service pad&lt;/P&gt;&lt;P&gt;service timestamps debug uptime&lt;/P&gt;&lt;P&gt;service timestamps log uptime&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname test_tv&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;enable password ******&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;username admin privilege 15 password 0 line ******&lt;/P&gt;&lt;P&gt;aaa new-model&lt;/P&gt;&lt;P&gt;aaa group server radius rad_eap&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;aaa group server tacacs+ tac_admin&lt;/P&gt;&lt;P&gt;server 10.1.1.120&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;aaa authentication login default group tacacs+ local&lt;/P&gt;&lt;P&gt;aaa authentication login eap_methods group rad_eap&lt;/P&gt;&lt;P&gt;aaa authentication login eap_methods1 group rad_eap1&lt;/P&gt;&lt;P&gt;aaa authentication enable default group tac_admin&lt;/P&gt;&lt;P&gt;aaa authorization exec default group tac_admin group rad_admin&lt;/P&gt;&lt;P&gt;aaa authorization exec tac_admin group tac_admin&lt;/P&gt;&lt;P&gt;aaa authorization commands 0 default group tac_admin&lt;/P&gt;&lt;P&gt;aaa authorization commands 1 default group tac_admin&lt;/P&gt;&lt;P&gt;aaa authorization commands 2 default group tac_admin&lt;/P&gt;&lt;P&gt;aaa authorization commands 3 default group tac_admin&lt;/P&gt;&lt;P&gt;aaa authorization commands 4 default group tac_admin&lt;/P&gt;&lt;P&gt;aaa authorization commands 5 default group tac_admin&lt;/P&gt;&lt;P&gt;aaa authorization commands 6 default group tac_admin&lt;/P&gt;&lt;P&gt;aaa authorization commands 7 default group tac_admin&lt;/P&gt;&lt;P&gt;aaa authorization commands 8 default group tac_admin&lt;/P&gt;&lt;P&gt;aaa authorization commands 9 default group tac_admin&lt;/P&gt;&lt;P&gt;aaa authorization commands 10 default group tac_admin&lt;/P&gt;&lt;P&gt;aaa authorization commands 11 default group tac_admin&lt;/P&gt;&lt;P&gt;aaa authorization commands 12 default group tac_admin&lt;/P&gt;&lt;P&gt;aaa authorization commands 13 default group tac_admin&lt;/P&gt;&lt;P&gt;aaa authorization commands 14 default group tac_admin&lt;/P&gt;&lt;P&gt;aaa authorization commands 15 default group tac_admin&lt;/P&gt;&lt;P&gt;aaa authorization commands 15 tac_admin group tacacs+ none&lt;/P&gt;&lt;P&gt;aaa authorization network tac_admin group tacacs+&lt;/P&gt;&lt;P&gt;aaa accounting exec default start-stop group tac_admin&lt;/P&gt;&lt;P&gt;aaa accounting commands 15 default start-stop group tac_admin&lt;/P&gt;&lt;P&gt;aaa accounting network default start-stop group tac_admin&lt;/P&gt;&lt;P&gt;aaa accounting network acct_methods start-stop group rad_acct&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;aaa session-id common&lt;/P&gt;&lt;P&gt;ip subnet-zero&lt;/P&gt;&lt;P&gt;no ip domain-lookup&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;no file verify auto&lt;/P&gt;&lt;P&gt;spanning-tree mode pvst&lt;/P&gt;&lt;P&gt;spanning-tree extend system-id&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;vlan internal allocation policy ascending&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;snmp-server engineID local 000000090200000021000000&lt;/P&gt;&lt;P&gt;snmp-server community &lt;/P&gt;&lt;P&gt;snmp-server community &lt;/P&gt;&lt;P&gt;snmp-server host 10.1.1.110 inform version 2c &lt;/P&gt;&lt;P&gt;snmp-server host 10.1.1.110 version 2c &lt;/P&gt;&lt;P&gt;tacacs-server host 10.1.1.120&lt;/P&gt;&lt;P&gt;tacacs-server directed-request&lt;/P&gt;&lt;P&gt;tacacs-server key **********&lt;/P&gt;&lt;P&gt;radius-server source-ports *************&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;control-plane&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;banner motd ^&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;line con 0&lt;/P&gt;&lt;P&gt;password ******&lt;/P&gt;&lt;P&gt;stopbits 1&lt;/P&gt;&lt;P&gt;line vty 0 4&lt;/P&gt;&lt;P&gt;password ******&lt;/P&gt;&lt;P&gt;authorization commands 0 tac_admin&lt;/P&gt;&lt;P&gt;authorization commands 1 tac_admin&lt;/P&gt;&lt;P&gt;authorization commands 2 tac_admin&lt;/P&gt;&lt;P&gt;authorization commands 3 tac_admin&lt;/P&gt;&lt;P&gt;authorization commands 4 tac_admin&lt;/P&gt;&lt;P&gt;authorization commands 5 tac_admin&lt;/P&gt;&lt;P&gt;authorization commands 6 tac_admin&lt;/P&gt;&lt;P&gt;authorization commands 7 tac_admin&lt;/P&gt;&lt;P&gt;authorization commands 8 tac_admin&lt;/P&gt;&lt;P&gt;authorization commands 9 tac_admin&lt;/P&gt;&lt;P&gt;authorization commands 10 tac_admin&lt;/P&gt;&lt;P&gt;authorization commands 11 tac_admin&lt;/P&gt;&lt;P&gt;authorization commands 12 tac_admin&lt;/P&gt;&lt;P&gt;authorization commands 13 tac_admin&lt;/P&gt;&lt;P&gt;authorization commands 14 tac_admin&lt;/P&gt;&lt;P&gt;authorization commands 15 tac_admin&lt;/P&gt;&lt;P&gt;line vty 5 15&lt;/P&gt;&lt;P&gt;password ******&lt;/P&gt;&lt;P&gt;authorization commands 0 tac_admin&lt;/P&gt;&lt;P&gt;authorization commands 1 tac_admin&lt;/P&gt;&lt;P&gt;authorization commands 2 tac_admin&lt;/P&gt;&lt;P&gt;authorization commands 3 tac_admin&lt;/P&gt;&lt;P&gt;authorization commands 4 tac_admin&lt;/P&gt;&lt;P&gt;authorization commands 5 tac_admin&lt;/P&gt;&lt;P&gt;authorization commands 6 tac_admin&lt;/P&gt;&lt;P&gt;authorization commands 7 tac_admin&lt;/P&gt;&lt;P&gt;authorization commands 8 tac_admin&lt;/P&gt;&lt;P&gt;authorization commands 9 tac_admin&lt;/P&gt;&lt;P&gt;authorization commands 10 tac_admin&lt;/P&gt;&lt;P&gt;authorization commands 11 tac_admin&lt;/P&gt;&lt;P&gt;authorization commands 12 tac_admin&lt;/P&gt;&lt;P&gt;authorization commands 13 tac_admin&lt;/P&gt;&lt;P&gt;authorization commands 14 tac_admin&lt;/P&gt;&lt;P&gt;authorization commands 15 tac_admin&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;end&lt;SPAN id="mce_marker"&gt; &lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 01:10:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-failover/m-p/1687357#M237776</guid>
      <dc:creator>Kurt Warner</dc:creator>
      <dc:date>2019-03-11T01:10:45Z</dc:date>
    </item>
    <item>
      <title>ACS Failover ??</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-failover/m-p/1687358#M237797</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Kurt &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The command on device shows that primary method is Tacacs and then, local. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;STRONG&gt;aaa authentication login default group tacacs+ local&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is ACS server unreacable from device ? Does it fail on authentication ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;&lt;P&gt;Devashree&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 21 Jun 2011 17:43:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-failover/m-p/1687358#M237797</guid>
      <dc:creator>Devashree Chakrabarti</dc:creator>
      <dc:date>2011-06-21T17:43:27Z</dc:date>
    </item>
    <item>
      <title>ACS Failover ??</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-failover/m-p/1687359#M237818</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; The ACS sits on another network and "what if" that link is down. When i have removed the ability to contact the ACS i have no way to log in. I would figured the switch would detect it could not reach the ACS and try local login but that is not happening.&lt;/P&gt;&lt;P&gt;.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 22 Jun 2011 13:14:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-failover/m-p/1687359#M237818</guid>
      <dc:creator>Kurt Warner</dc:creator>
      <dc:date>2011-06-22T13:14:51Z</dc:date>
    </item>
    <item>
      <title>ACS Failover ??</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-failover/m-p/1687360#M237841</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It should fail over if the ACS is really unreachable.&lt;/P&gt;&lt;P&gt;Can you turn on some debug tacacs and debug aaa ?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 23 Jun 2011 08:00:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-failover/m-p/1687360#M237841</guid>
      <dc:creator>Nicolas Darchis</dc:creator>
      <dc:date>2011-06-23T08:00:19Z</dc:date>
    </item>
    <item>
      <title>ACS Failover ??</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-failover/m-p/1687361#M237862</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; hi Kurt,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;you have ....&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa authentication login default group tacacs+ local&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and then...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa authorization exec default group tac_admin group rad_admin&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i am thinking this could be the issue, the authorization of exec shell should have a local option at the end in case your tacacs server fails.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 28 Jun 2011 12:54:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-failover/m-p/1687361#M237862</guid>
      <dc:creator>Julio Garcia</dc:creator>
      <dc:date>2011-06-28T12:54:00Z</dc:date>
    </item>
    <item>
      <title>ACS Failover ??</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-failover/m-p/1687362#M237886</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Please post the below debugs &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; debug tacacs events / packets / errors &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; debug aaa&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 29 Jun 2011 17:40:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-failover/m-p/1687362#M237886</guid>
      <dc:creator>Angus Bishop</dc:creator>
      <dc:date>2011-06-29T17:40:27Z</dc:date>
    </item>
    <item>
      <title>ACS Failover ??</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-failover/m-p/1687363#M237901</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; It can not reach the ACS ( in this case) so i couldnt log in to get that information &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 30 Jun 2011 17:05:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-failover/m-p/1687363#M237901</guid>
      <dc:creator>Kurt Warner</dc:creator>
      <dc:date>2011-06-30T17:05:42Z</dc:date>
    </item>
    <item>
      <title>ACS Failover ??</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-failover/m-p/1687364#M237917</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;adding the local worked i can now get to the command prompt BUT when i type enable it says &lt;STRONG&gt;:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;" % error in Authentication"&lt;/STRONG&gt; and returns me to the &amp;gt; with nothing to enter.&amp;nbsp; &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 06 Jul 2011 17:19:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-failover/m-p/1687364#M237917</guid>
      <dc:creator>Kurt Warner</dc:creator>
      <dc:date>2011-07-06T17:19:11Z</dc:date>
    </item>
    <item>
      <title>ACS Failover ??</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-failover/m-p/1687365#M237933</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Isn't that because of this line:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa authentication enable default group tac_admin&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Shouldn't that also fallback to local?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 12 Jul 2011 13:35:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-failover/m-p/1687365#M237933</guid>
      <dc:creator>marcelnjkoks</dc:creator>
      <dc:date>2011-07-12T13:35:06Z</dc:date>
    </item>
  </channel>
</rss>

