<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ACS 5.2 Command Authorization in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/acs-5-2-command-authorization/m-p/1642392#M329967</link>
    <description>&lt;P&gt;We are using command authorization on our ios devices with cisco secure acs 5.2&amp;nbsp; We have local accounts defined on our gear in the event that the ACS server is unavailable.&amp;nbsp; However, when we test this, we are able to login to the device, but any command issued at that point with the local account is denied.&amp;nbsp; I am sure there is an additional command required.&amp;nbsp; Any ideas?&lt;/P&gt;</description>
    <pubDate>Mon, 11 Mar 2019 00:50:12 GMT</pubDate>
    <dc:creator>awatson20</dc:creator>
    <dc:date>2019-03-11T00:50:12Z</dc:date>
    <item>
      <title>ACS 5.2 Command Authorization</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-2-command-authorization/m-p/1642392#M329967</link>
      <description>&lt;P&gt;We are using command authorization on our ios devices with cisco secure acs 5.2&amp;nbsp; We have local accounts defined on our gear in the event that the ACS server is unavailable.&amp;nbsp; However, when we test this, we are able to login to the device, but any command issued at that point with the local account is denied.&amp;nbsp; I am sure there is an additional command required.&amp;nbsp; Any ideas?&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 00:50:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-2-command-authorization/m-p/1642392#M329967</guid>
      <dc:creator>awatson20</dc:creator>
      <dc:date>2019-03-11T00:50:12Z</dc:date>
    </item>
    <item>
      <title>Re: ACS 5.2 Command Authorization</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-2-command-authorization/m-p/1642393#M330039</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;In your "aaa authorization command" configuration, did you add local as a fallback method?&lt;/P&gt;&lt;P&gt;When you define the local user account on IOS router, did you set privilege to 15?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 17 Feb 2011 17:15:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-2-command-authorization/m-p/1642393#M330039</guid>
      <dc:creator>Yudong Wu</dc:creator>
      <dc:date>2011-02-17T17:15:34Z</dc:date>
    </item>
    <item>
      <title>Re: ACS 5.2 Command Authorization</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-2-command-authorization/m-p/1642394#M330119</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes.&amp;nbsp; Below is what the configuration looks like. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa authentication login default group tacacs+ local&lt;BR /&gt;aaa authentication login local_auth local&lt;BR /&gt;aaa authorization config-commands&lt;BR /&gt;aaa authorization exec default group Admin local if-authenticated&lt;BR /&gt;aaa authorization commands 0 default group tacacs+&lt;BR /&gt;aaa authorization commands 1 default group tacacs+&lt;BR /&gt;aaa authorization commands 15 default group tacacs+&lt;BR /&gt;aaa accounting exec default start-stop group Admin&lt;BR /&gt;aaa accounting network default start-stop group Admin&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is the message I get when I attempt to go in enable mode.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;switch&amp;gt;en&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;% Authorization failed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;switch&amp;gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 17 Feb 2011 18:22:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-2-command-authorization/m-p/1642394#M330119</guid>
      <dc:creator>awatson20</dc:creator>
      <dc:date>2011-02-17T18:22:28Z</dc:date>
    </item>
    <item>
      <title>Re: ACS 5.2 Command Authorization</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-2-command-authorization/m-p/1642395#M330220</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You need change the following commands&lt;/P&gt;&lt;P&gt;aaa authorization commands 0 default group tacacs+&lt;BR /&gt;aaa authorization commands 1 default group tacacs+&lt;BR /&gt;aaa authorization commands 15 default group tacacs+&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;to&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa authorization commands 0 default group tacacs+ local&lt;BR /&gt;aaa authorization commands 1 default group tacacs+ local&lt;BR /&gt;aaa authorization commands 15 default group tacacs+ local&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;when you define the user account on the router, you need add it like the following&lt;/P&gt;&lt;P&gt;user &lt;USERNAME&gt; password &lt;PASSWORD&gt; privilege &lt;PRIVILEGE&gt;&amp;nbsp; &amp;lt;-- use 15 as privilege number if you would like to let user to use all commands.&lt;/PRIVILEGE&gt;&lt;/PASSWORD&gt;&lt;/USERNAME&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 17 Feb 2011 19:04:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-2-command-authorization/m-p/1642395#M330220</guid>
      <dc:creator>Yudong Wu</dc:creator>
      <dc:date>2011-02-17T19:04:22Z</dc:date>
    </item>
  </channel>
</rss>

