<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Reg: Tacacs configuration in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/reg-tacacs-configuration/m-p/1485156#M377759</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN style="color: #800000; font-size: 10pt;"&gt;Anu,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000; font-size: 10pt;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000; font-size: 10pt;"&gt;Are you getting tacacs user-name \\ password prompt ?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000; font-size: 10pt;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000; font-size: 10pt;"&gt;if you are getting user-name \\ password prompt and its not taking tacacs credentials, could you please login with local user-name \\ password and run the debugs.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000; font-size: 10pt;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000; font-size: 10pt;"&gt;debug tacacs&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000; font-size: 10pt;"&gt;debug aaa authentication&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000; font-size: 10pt;"&gt;term mon&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000; font-size: 10pt;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000; font-size: 10pt;"&gt;After this try to login again with tacacs user-name \\ password and send me the output.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000; font-size: 10pt;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000; font-size: 10pt;"&gt;Do attach the failed attemopts from the ACS &amp;gt;&amp;gt; reports and activity.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000; font-size: 10pt;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000; font-size: 10pt;"&gt;HTH&lt;BR /&gt;JK&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000; font-size: 10pt;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000; font-size: 10pt;"&gt;Do rate helpful posts-&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 11 Jun 2010 11:32:47 GMT</pubDate>
    <dc:creator>Jatin Katyal</dc:creator>
    <dc:date>2010-06-11T11:32:47Z</dc:date>
    <item>
      <title>Reg: Tacacs configuration</title>
      <link>https://community.cisco.com/t5/network-access-control/reg-tacacs-configuration/m-p/1485155#M377756</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I m trying to set up AAA authentication of around 300 routers through Cisco TACACS,i installed acs4.2 on a windows 2003 server and put following AAA commands in the router,tacacs server host and key mentioned on trialrouter&lt;/P&gt;&lt;P&gt;aaa new-model&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;aaa authentication login default group tacacs+ local&lt;/P&gt;&lt;P&gt;aaa authentication login NO_AUTHEN none&lt;/P&gt;&lt;P&gt;aaa authorization config-commands&lt;/P&gt;&lt;P&gt;aaa authorization exec default group tacacs+ if-authenticated&lt;/P&gt;&lt;P&gt;aaa authorization exec NO_AUTHOR none&lt;/P&gt;&lt;P&gt;aaa authorization commands 1 default group tacacs+ if-authenticated&lt;/P&gt;&lt;P&gt;aaa authorization commands 1 NO_AUTHOR none&lt;/P&gt;&lt;P&gt;aaa authorization commands 15 default group tacacs+ if-authenticated&lt;/P&gt;&lt;P&gt;aaa authorization commands 15 NO_AUTHOR none&lt;/P&gt;&lt;P&gt;aaa authorization network serial none&lt;/P&gt;&lt;P&gt;aaa accounting exec default start-stop group tacacs+&lt;/P&gt;&lt;P&gt;aaa accounting commands 15 default stop-only group tacacs+&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;aaa session-id common&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;then i created a user and mentioned a secret key on the acs server,i added this router as AAA client , the router stopped responding to previous login name and password&amp;nbsp; but was not responding to username defined in the acs,where am i makin a mistake?Kindly help.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 00:11:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/reg-tacacs-configuration/m-p/1485155#M377756</guid>
      <dc:creator>cisco.anubhav</dc:creator>
      <dc:date>2019-03-11T00:11:07Z</dc:date>
    </item>
    <item>
      <title>Re: Reg: Tacacs configuration</title>
      <link>https://community.cisco.com/t5/network-access-control/reg-tacacs-configuration/m-p/1485156#M377759</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN style="color: #800000; font-size: 10pt;"&gt;Anu,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000; font-size: 10pt;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000; font-size: 10pt;"&gt;Are you getting tacacs user-name \\ password prompt ?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000; font-size: 10pt;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000; font-size: 10pt;"&gt;if you are getting user-name \\ password prompt and its not taking tacacs credentials, could you please login with local user-name \\ password and run the debugs.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000; font-size: 10pt;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000; font-size: 10pt;"&gt;debug tacacs&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000; font-size: 10pt;"&gt;debug aaa authentication&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000; font-size: 10pt;"&gt;term mon&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000; font-size: 10pt;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000; font-size: 10pt;"&gt;After this try to login again with tacacs user-name \\ password and send me the output.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000; font-size: 10pt;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000; font-size: 10pt;"&gt;Do attach the failed attemopts from the ACS &amp;gt;&amp;gt; reports and activity.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000; font-size: 10pt;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000; font-size: 10pt;"&gt;HTH&lt;BR /&gt;JK&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000; font-size: 10pt;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000; font-size: 10pt;"&gt;Do rate helpful posts-&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 11 Jun 2010 11:32:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/reg-tacacs-configuration/m-p/1485156#M377759</guid>
      <dc:creator>Jatin Katyal</dc:creator>
      <dc:date>2010-06-11T11:32:47Z</dc:date>
    </item>
    <item>
      <title>Re: Reg: Tacacs configuration</title>
      <link>https://community.cisco.com/t5/network-access-control/reg-tacacs-configuration/m-p/1485157#M377764</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN style="font-family: verdana,geneva; color: #0000ff; font-size: 10pt;"&gt;Hi Anu,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: verdana,geneva; color: #0000ff; font-size: 10pt;"&gt;On Layer 3 device we should have tacacs source interface defined since there are more then one interface. To use the IP address of a specified interface for all outgoing TACACS+&amp;nbsp; packets, use the &lt;STRONG class="cCN_CmdName"&gt;ip tacacs source-interface&lt;/STRONG&gt; command in global configuration or server-group configuration mode. &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: verdana,geneva; color: #0000ff; font-size: 10pt;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="pB1_Body1"&gt;&lt;SPAN style="font-family: verdana,geneva; color: #0000ff; font-size: 10pt;"&gt; The following example makes TACACS+ use the IP address of subinterface&amp;nbsp; "s2" for all outgoing TACACS+ packets: &lt;/SPAN&gt;&lt;/P&gt;&lt;P class="pB1_Body1"&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: verdana,geneva; color: #0000ff; font-size: 10pt;"&gt;&lt;A name="wp1064906"&gt;&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;DIV class="pEx1_Example1"&gt;&lt;PRE&gt;&lt;SPAN style="font-family: verdana,geneva; color: #0000ff; font-size: 10pt;"&gt;ip tacacs source-interface s2&lt;/SPAN&gt;&lt;SPAN style="font-family: verdana,geneva; color: #0000ff; font-size: 10pt;"&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt;&lt;BR /&gt;Usage Guidelines&lt;/EM&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/PRE&gt;&lt;SPAN style="font-family: verdana,geneva; color: #0000ff; font-size: 10pt;"&gt;&lt;A name="wp1064900"&gt;&lt;/A&gt;&lt;/SPAN&gt;&lt;P class="pB1_Body1"&gt;&lt;SPAN style="font-family: verdana,geneva; color: #0000ff; font-size: 10pt;"&gt; Use this command to set the IP address of a subinterface for all&amp;nbsp; outgoing TACACS+ packets. This address is used as long as the interface&amp;nbsp; is in the &lt;EM class="cArgument"&gt;up&lt;/EM&gt;&lt;/SPAN&gt;&lt;SPAN style="color: #0000ff; font-size: 10pt;"&gt; state. In this way, the TACACS+&amp;nbsp; server can use one IP address entry associated with the network access&amp;nbsp; client instead of maintaining a list of all IP addresses. &lt;/SPAN&gt;&lt;/P&gt;&lt;P class="pB1_Body1"&gt;&lt;SPAN style="font-family: verdana,geneva; color: #3366ff; font-size: 10pt;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;SPAN style="font-family: verdana,geneva; color: #3366ff; font-size: 10pt;"&gt;&lt;A name="wp1064901"&gt;&lt;/A&gt;&lt;/SPAN&gt;&lt;P class="pB1_Body1"&gt;&lt;SPAN style="font-family: verdana,geneva; color: #3366ff; font-size: 10pt;"&gt; This command is especially useful in cases where the router has many&amp;nbsp; interfaces and you want to ensure that all TACACS+ packets from a&amp;nbsp; particular router have the same IP address.The specified interface must have an IP address associated with it. If&amp;nbsp; the specified subinterface does not have an IP address or is in a &lt;EM class="cArgument"&gt;down&lt;/EM&gt; state, TACACS+ reverts to the default. To&amp;nbsp; avoid this situation, add an IP address to the subinterface or bring the&amp;nbsp; interface to the &lt;EM class="cArgument"&gt;up&lt;/EM&gt;&lt;/SPAN&gt;&lt;SPAN style="font-family: verdana,geneva; color: #3366ff; font-size: 10pt;"&gt; state. &lt;/SPAN&gt;&lt;/P&gt;&lt;P class="pB1_Body1"&gt;&lt;SPAN style="font-family: verdana,geneva; color: #3366ff;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="pB1_Body1"&gt;&lt;SPAN style="font-family: verdana,geneva; color: #3366ff;"&gt;If there is still any issue please share the debugs.&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="pB1_Body1"&gt;&lt;SPAN style="font-family: verdana,geneva; color: #3366ff;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="pB1_Body1"&gt;&lt;SPAN style="font-family: verdana,geneva; color: #3366ff;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="pB1_Body1"&gt;&lt;SPAN style="font-family: verdana,geneva; color: #3366ff;"&gt;Regards,&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="pB1_Body1"&gt;&lt;SPAN style="font-family: verdana,geneva; color: #3366ff;"&gt;~JG&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="pB1_Body1"&gt;&lt;SPAN style="font-family: verdana,geneva; color: #3366ff;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="pB1_Body1"&gt;&lt;SPAN style="font-family: verdana,geneva; color: #3366ff;"&gt;Do rate helpful posts&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;PRE&gt;&lt;SPAN style="font-family: verdana,geneva; color: #3366ff; font-size: 10pt;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/PRE&gt;&lt;/DIV&gt;&lt;P&gt;&lt;SPAN style="font-family: verdana,geneva; color: #3366ff; font-size: 10pt;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: verdana,geneva; color: #3366ff; font-size: 10pt;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 11 Jun 2010 15:41:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/reg-tacacs-configuration/m-p/1485157#M377764</guid>
      <dc:creator>Jagdeep Gambhir</dc:creator>
      <dc:date>2010-06-11T15:41:20Z</dc:date>
    </item>
    <item>
      <title>Re: Reg: Tacacs configuration</title>
      <link>https://community.cisco.com/t5/network-access-control/reg-tacacs-configuration/m-p/1485158#M377765</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Dear All,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I logged into the AAA client using user configured in acs and password,but i am not able to run any command as it gives error&lt;BR /&gt;Command authorization failed.&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ^&lt;BR /&gt;% Invalid input detected at '^' marker.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;the AAA command are given above,Kindly suggest what should i do to run the commands.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 12 Jun 2010 07:51:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/reg-tacacs-configuration/m-p/1485158#M377765</guid>
      <dc:creator>cisco.anubhav</dc:creator>
      <dc:date>2010-06-12T07:51:21Z</dc:date>
    </item>
    <item>
      <title>Re: Reg: Tacacs configuration</title>
      <link>https://community.cisco.com/t5/network-access-control/reg-tacacs-configuration/m-p/1485159#M377766</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN style="color: #800000; font-size: 10pt;"&gt;Anu,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000; font-size: 10pt;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000; font-size: 10pt;"&gt;Create a full access command set by looking the link&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000; font-size: 10pt;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000; font-size: 10pt;"&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/products/sw/secursw/ps2086/products_configuration_example09186a00808d9138.shtml#scenario1"&gt;http://www.cisco.com/en/US/products/sw/secursw/ps2086/products_configuration_example09186a00808d9138.shtml#scenario1&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000; font-size: 10pt;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000; font-size: 10pt;"&gt;After that associate the command set with the group where user belongs to.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000; font-size: 10pt;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000; font-size: 10pt;"&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/products/sw/secursw/ps2086/products_configuration_example09186a00808d9138.shtml#asso1"&gt;http://www.cisco.com/en/US/products/sw/secursw/ps2086/products_configuration_example09186a00808d9138.shtml#asso1&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000; font-size: 10pt;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000; font-size: 10pt;"&gt;HTH&lt;BR /&gt;JK&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000; font-size: 10pt;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000; font-size: 10pt;"&gt;Do rate helpful posts-&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 12 Jun 2010 09:42:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/reg-tacacs-configuration/m-p/1485159#M377766</guid>
      <dc:creator>Jatin Katyal</dc:creator>
      <dc:date>2010-06-12T09:42:09Z</dc:date>
    </item>
    <item>
      <title>Re: Reg: Tacacs configuration</title>
      <link>https://community.cisco.com/t5/network-access-control/reg-tacacs-configuration/m-p/1485160#M377767</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I could get full level 15 access to my test router through TACACS.I have to get 900 routers authenticated using TACACS,believe it supports the no..I wish to create three level of users just like suggested in the link,should i create three users with different permissions and use them on clients as i wish to keep all the clients in the default group.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Kindy suggest if this is fine or any other approch should be there.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 12 Jun 2010 11:02:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/reg-tacacs-configuration/m-p/1485160#M377767</guid>
      <dc:creator>cisco.anubhav</dc:creator>
      <dc:date>2010-06-12T11:02:13Z</dc:date>
    </item>
    <item>
      <title>Re: Reg: Tacacs configuration</title>
      <link>https://community.cisco.com/t5/network-access-control/reg-tacacs-configuration/m-p/1485161#M377768</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN style="color: #800000; font-size: 10pt;"&gt;For different permission level, check this:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000; font-size: 10pt;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000; font-size: 10pt;"&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/products/sw/secursw/ps2086/products_configuration_example09186a00808d9138.shtml#backinfo"&gt;http://www.cisco.com/en/US/products/sw/secursw/ps2086/products_configuration_example09186a00808d9138.shtml#backinfo&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000; font-size: 10pt;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000; font-size: 10pt;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000; font-size: 10pt;"&gt;HTH&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000; font-size: 10pt;"&gt;JK&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000; font-size: 10pt;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000; font-size: 10pt;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000; font-size: 10pt;"&gt;Do rate helpful posts-&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 12 Jun 2010 11:20:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/reg-tacacs-configuration/m-p/1485161#M377768</guid>
      <dc:creator>Jatin Katyal</dc:creator>
      <dc:date>2010-06-12T11:20:32Z</dc:date>
    </item>
    <item>
      <title>Re: Reg: Tacacs configuration</title>
      <link>https://community.cisco.com/t5/network-access-control/reg-tacacs-configuration/m-p/1485162#M377772</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I prepared two command sets in ACS and got few devices authorized butat that very moment console login is also autheticated,which i dont plan to do.I wish that console access remains non authenticated.At the moment when trying to login,Authentication fails when i tried to login using local user login and password.&lt;/P&gt;&lt;P&gt;Kindly help.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 15 Jun 2010 13:16:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/reg-tacacs-configuration/m-p/1485162#M377772</guid>
      <dc:creator>cisco.anubhav</dc:creator>
      <dc:date>2010-06-15T13:16:51Z</dc:date>
    </item>
    <item>
      <title>Re: Reg: Tacacs configuration</title>
      <link>https://community.cisco.com/t5/network-access-control/reg-tacacs-configuration/m-p/1485163#M377779</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN style="font-family: verdana,geneva; color: #0000ff; font-size: 10pt;"&gt;Hi Anu,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: verdana,geneva; color: #0000ff; font-size: 10pt;"&gt;For that we need to set up Method list so that console is authenticated locally. Here are the commands we need&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: verdana,geneva; color: #0000ff; font-size: 10pt;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: verdana,geneva; color: #0000ff; font-size: 10pt;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: verdana,geneva; color: #0000ff; font-size: 10pt;"&gt;&lt;STRONG&gt;Router(config)# username [username] password [password]&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; tacacs-server host [ip]&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; tacacs-server key [key]&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: verdana,geneva; color: #0000ff; font-size: 10pt;"&gt;&lt;STRONG&gt;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; aaa new-model&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; aaa authentication login default group tacacs+ local&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: verdana,geneva; color: #0000ff; font-size: 10pt;"&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; aaa authentication login con local&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: verdana,geneva; color: #3366ff; font-size: 10pt;"&gt;&lt;STRONG&gt;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; aaa authorization exec default group tacacs+ if-authenticated&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; aaa authorization commands 1 default group tacacs+ if-authenticated&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; aaa authorization commands 15 default group tacacs+ if-authenticated&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; aaa authorization config-commands&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;line con 0 &lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: verdana,geneva; color: #3366ff; font-size: 10pt;"&gt;&lt;STRONG&gt;&lt;SPAN style="color: #3366ff;"&gt;Router(config-line)# login authentication con&lt;/SPAN&gt;-----&amp;gt; Where " con" is the name of method list we created above. &lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: verdana,geneva; color: #3366ff;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: verdana,geneva; color: #3366ff;"&gt;Regards,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: verdana,geneva; color: #3366ff;"&gt;~JG&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: verdana,geneva; color: #3366ff;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: verdana,geneva; color: #3366ff;"&gt;Do rate helpful post&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 15 Jun 2010 14:56:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/reg-tacacs-configuration/m-p/1485163#M377779</guid>
      <dc:creator>Jagdeep Gambhir</dc:creator>
      <dc:date>2010-06-15T14:56:34Z</dc:date>
    </item>
  </channel>
</rss>

