<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: TACACS+ force enable secret in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/tacacs-force-enable-secret/m-p/3852216#M24808</link>
    <description>&lt;P&gt;Change the privilege in shell profile in AAA server as&amp;nbsp;&lt;/P&gt;&lt;P&gt;priv-lvl=1&lt;BR /&gt;max_priv_lvl=15&lt;/P&gt;&lt;P&gt;which will keep it in login mode by default.&lt;/P&gt;</description>
    <pubDate>Wed, 08 May 2019 10:23:42 GMT</pubDate>
    <dc:creator>Aravind Ravichandran</dc:creator>
    <dc:date>2019-05-08T10:23:42Z</dc:date>
    <item>
      <title>TACACS+ force enable secret</title>
      <link>https://community.cisco.com/t5/network-access-control/tacacs-force-enable-secret/m-p/3852154#M24806</link>
      <description>&lt;P&gt;Dear Community&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We are using tacacs+ for aaa purposes. Currently each user has to submit their own username and password to connect to our switches. Once they are authenticated, they will have immediately access to the enable prompt.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Now we would like to force our users to re-enter their enable password again to get access to the enable prompt.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is there any possible way to get this working?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Our tacacs+ configuration on the switches are as following:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;aaa new-model
aaa authentication login default group tacacs+ local
aaa authentication enable default group tacacs+ enable
aaa authorization config-commands
aaa authorization commands 1 default group tacacs+ local if-authenticated
aaa authorization commands 15 default group tacacs+ local if-authenticated
aaa authorization exec default group tacacs+ local if-authenticated
aaa accounting exec default start-stop group tacacs+
aaa accounting commands 1 default start-stop group tacacs+
aaa accounting commands 15 default start-stop group tacacs+
service password-encryption
ip tacacs source-interface Vlan1
tacacs-server host IP_OF_TACPLUS_SERVER single-connection key 0 cisco
tacacs-server directed-request&lt;/PRE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you in advance for your help.&lt;/P&gt;</description>
      <pubDate>Wed, 08 May 2019 08:46:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tacacs-force-enable-secret/m-p/3852154#M24806</guid>
      <dc:creator>musystec</dc:creator>
      <dc:date>2019-05-08T08:46:49Z</dc:date>
    </item>
    <item>
      <title>Re: TACACS+ force enable secret</title>
      <link>https://community.cisco.com/t5/network-access-control/tacacs-force-enable-secret/m-p/3852216#M24808</link>
      <description>&lt;P&gt;Change the privilege in shell profile in AAA server as&amp;nbsp;&lt;/P&gt;&lt;P&gt;priv-lvl=1&lt;BR /&gt;max_priv_lvl=15&lt;/P&gt;&lt;P&gt;which will keep it in login mode by default.&lt;/P&gt;</description>
      <pubDate>Wed, 08 May 2019 10:23:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tacacs-force-enable-secret/m-p/3852216#M24808</guid>
      <dc:creator>Aravind Ravichandran</dc:creator>
      <dc:date>2019-05-08T10:23:42Z</dc:date>
    </item>
    <item>
      <title>Re: TACACS+ force enable secret</title>
      <link>https://community.cisco.com/t5/network-access-control/tacacs-force-enable-secret/m-p/3852313#M24809</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;SPAN&gt;Aravind&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you for your answer. We are using tac_plus as alternative. in tac_plus it's only possible to configure&amp;nbsp;&lt;SPAN&gt;priv-lvl=1&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I don't see the option&amp;nbsp;&lt;SPAN&gt;max_priv_lvl=15&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is there any other way to configure it directly on the switch? Since this will be a test environment, it's only affecting one device.&lt;/P&gt;</description>
      <pubDate>Wed, 08 May 2019 12:41:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tacacs-force-enable-secret/m-p/3852313#M24809</guid>
      <dc:creator>musystec</dc:creator>
      <dc:date>2019-05-08T12:41:16Z</dc:date>
    </item>
    <item>
      <title>Re: TACACS+ force enable secret</title>
      <link>https://community.cisco.com/t5/network-access-control/tacacs-force-enable-secret/m-p/3854566#M24811</link>
      <description>&lt;P&gt;tac_plus is not a Cisco product and please either read its documentation or seek support in its user communities.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://wiki.gentoo.org/wiki/Tac_plus#Authentication_to_tac_plus.conf" target="_blank"&gt;3.3 Authentication to tac_plus.conf&lt;/A&gt;&amp;nbsp;might be of interest.&lt;/P&gt;</description>
      <pubDate>Sun, 12 May 2019 07:01:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tacacs-force-enable-secret/m-p/3854566#M24811</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2019-05-12T07:01:35Z</dc:date>
    </item>
  </channel>
</rss>

