<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: aaa authentication enable console (server_name) password iss in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/aaa-authentication-enable-console-server-name-password-issue/m-p/975107#M381173</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Farrukh - Sorry I should have mention this earlier that I had excuted your recommendation and it does work. But I don't want our engineering team having to referr to paper work for the enbale password. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That is why I want want the enable password to be authenticated by the TACAC.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I believe that the problem is with the parameter on the TACAC server. But I do not know all the syntexts that need to be entered.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I beleive that there must be an additional parameter for the enable privilege.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 17 Jun 2008 10:20:13 GMT</pubDate>
    <dc:creator>stancred</dc:creator>
    <dc:date>2008-06-17T10:20:13Z</dc:date>
    <item>
      <title>aaa authentication enable console (server_name) password issue</title>
      <link>https://community.cisco.com/t5/network-access-control/aaa-authentication-enable-console-server-name-password-issue/m-p/975105#M381070</link>
      <description>&lt;P&gt;Here is the problem I am experiencing and I hope someone out there is able to help;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a ASA5510 (running software Version 8.0(3)). I have enabled remote authentication to our company's TACAC server (which is running TACAC open source supplied by Cisco). &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The problem is as follows;&lt;/P&gt;&lt;P&gt;I can telnet to the appliance remote and using my username and password (configured on the TACAC server) I am authenticated. But after entering enable - I am prompted with the password prompt. But I can not get pass this prompt. I have tried the same password as I previous enter at the telnet prompt and failed, the local enable password fails as well. Any suggestion. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa-server (server_name) protocol tacacs+&lt;/P&gt;&lt;P&gt;aaa-server (server_name) (interlinkport) host (Address)&lt;/P&gt;&lt;P&gt; key (password)&lt;/P&gt;&lt;P&gt;aaa authentication enable console (server_name) LOCAL&lt;/P&gt;&lt;P&gt;aaa authentication enable console (server_name) LOCAL&lt;/P&gt;&lt;P&gt;aaa authentication http console (server_name) LOCAL&lt;/P&gt;&lt;P&gt;aaa authentication serial console (server_name) LOCAL&lt;/P&gt;&lt;P&gt;aaa authentication ssh console (server_name) LOCAL&lt;/P&gt;&lt;P&gt;aaa authentication telnet console (server_name)  LOCAL&lt;/P&gt;&lt;P&gt;aaa accounting command privilege 15 (server_name)&lt;/P&gt;&lt;P&gt;aaa authorization exec authentication-server&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 22:54:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/aaa-authentication-enable-console-server-name-password-issue/m-p/975105#M381070</guid>
      <dc:creator>stancred</dc:creator>
      <dc:date>2019-03-10T22:54:46Z</dc:date>
    </item>
    <item>
      <title>Re: aaa authentication enable console (server_name) password iss</title>
      <link>https://community.cisco.com/t5/network-access-control/aaa-authentication-enable-console-server-name-password-issue/m-p/975106#M381119</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;telnet password = passwd command&lt;/P&gt;&lt;P&gt;enable password = enable command&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Try one thing, either remove &lt;/P&gt;&lt;P&gt;aaa authentication enable console (server_name) LOCAL &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;or change it to:&lt;/P&gt;&lt;P&gt;aaa authentication enable console LOCAL &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then try putting the 'local' enable password at the password prompt.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Farrukh&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 17 Jun 2008 09:33:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/aaa-authentication-enable-console-server-name-password-issue/m-p/975106#M381119</guid>
      <dc:creator>Farrukh Haroon</dc:creator>
      <dc:date>2008-06-17T09:33:06Z</dc:date>
    </item>
    <item>
      <title>Re: aaa authentication enable console (server_name) password iss</title>
      <link>https://community.cisco.com/t5/network-access-control/aaa-authentication-enable-console-server-name-password-issue/m-p/975107#M381173</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Farrukh - Sorry I should have mention this earlier that I had excuted your recommendation and it does work. But I don't want our engineering team having to referr to paper work for the enbale password. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That is why I want want the enable password to be authenticated by the TACAC.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I believe that the problem is with the parameter on the TACAC server. But I do not know all the syntexts that need to be entered.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I beleive that there must be an additional parameter for the enable privilege.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 17 Jun 2008 10:20:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/aaa-authentication-enable-console-server-name-password-issue/m-p/975107#M381173</guid>
      <dc:creator>stancred</dc:creator>
      <dc:date>2008-06-17T10:20:13Z</dc:date>
    </item>
    <item>
      <title>Re: aaa authentication enable console (server_name) password iss</title>
      <link>https://community.cisco.com/t5/network-access-control/aaa-authentication-enable-console-server-name-password-issue/m-p/975108#M381245</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes I just wanted to double check and rule out every thing else. Which AAA server are you using?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Farrukh&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 17 Jun 2008 10:43:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/aaa-authentication-enable-console-server-name-password-issue/m-p/975108#M381245</guid>
      <dc:creator>Farrukh Haroon</dc:creator>
      <dc:date>2008-06-17T10:43:12Z</dc:date>
    </item>
    <item>
      <title>Re: aaa authentication enable console (server_name) password iss</title>
      <link>https://community.cisco.com/t5/network-access-control/aaa-authentication-enable-console-server-name-password-issue/m-p/975109#M381274</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;My management team informs me that it is open source TACAC supplied by Cisco. I am not sure want version and I am unable to findf out until tomorrow as it is 10:30pm local time.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Wha other info would you like?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 17 Jun 2008 11:19:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/aaa-authentication-enable-console-server-name-password-issue/m-p/975109#M381274</guid>
      <dc:creator>stancred</dc:creator>
      <dc:date>2008-06-17T11:19:53Z</dc:date>
    </item>
    <item>
      <title>Re: aaa authentication enable console (server_name) password iss</title>
      <link>https://community.cisco.com/t5/network-access-control/aaa-authentication-enable-console-server-name-password-issue/m-p/975110#M381328</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I'm assuming they are talking about 'free tacacs', a sample configuration file can be found at the end of this link:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/tech/tk59/technologies_tech_note09186a00800946a3.shtml" target="_blank"&gt;http://www.cisco.com/en/US/tech/tk59/technologies_tech_note09186a00800946a3.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Farrukh&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 17 Jun 2008 11:26:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/aaa-authentication-enable-console-server-name-password-issue/m-p/975110#M381328</guid>
      <dc:creator>Farrukh Haroon</dc:creator>
      <dc:date>2008-06-17T11:26:26Z</dc:date>
    </item>
    <item>
      <title>Re: aaa authentication enable console (server_name) password iss</title>
      <link>https://community.cisco.com/t5/network-access-control/aaa-authentication-enable-console-server-name-password-issue/m-p/975111#M381358</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I will try this tomorrow . Just so you know the same username and password work on cisco routers. I have no trouble in telneting and accessing the enable mode.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa authentication login default group tacacs+ local&lt;/P&gt;&lt;P&gt;aaa authorization exec default group tacacs+ local &lt;/P&gt;&lt;P&gt;aaa authorization commands 1 default group tacacs+ local &lt;/P&gt;&lt;P&gt;aaa authorization commands 15 default group tacacs+ local &lt;/P&gt;&lt;P&gt;aaa accounting exec default start-stop group tacacs+&lt;/P&gt;&lt;P&gt;aaa accounting commands 1 default start-stop group tacacs+&lt;/P&gt;&lt;P&gt;aaa accounting commands 15 default start-stop group tacacs+&lt;/P&gt;&lt;P&gt;aaa accounting system default start-stop group tacacs+&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 17 Jun 2008 11:38:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/aaa-authentication-enable-console-server-name-password-issue/m-p/975111#M381358</guid>
      <dc:creator>stancred</dc:creator>
      <dc:date>2008-06-17T11:38:44Z</dc:date>
    </item>
    <item>
      <title>Re: aaa authentication enable console (server_name) password iss</title>
      <link>https://community.cisco.com/t5/network-access-control/aaa-authentication-enable-console-server-name-password-issue/m-p/975112#M381384</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You arent authenticating the enable password via AAA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That would require a:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa authentication enable ....&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Farrukh&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 17 Jun 2008 12:07:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/aaa-authentication-enable-console-server-name-password-issue/m-p/975112#M381384</guid>
      <dc:creator>Farrukh Haroon</dc:creator>
      <dc:date>2008-06-17T12:07:36Z</dc:date>
    </item>
    <item>
      <title>Re: aaa authentication enable console (server_name) password iss</title>
      <link>https://community.cisco.com/t5/network-access-control/aaa-authentication-enable-console-server-name-password-issue/m-p/975113#M381397</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;With respect to your comments:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;"I believe that the problem is with the parameter on the TACAC server. But I do not know all the syntexts that need to be entered.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I beleive that there must be an additional parameter for the enable privilege."&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;... I understand you are NOT using Cisco Secure ACS, however, the following requirement may exist in your scenario as well:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When configuring enable authentication on a CSACS, you would need to specify "Max Privilege" (i.e.: Level 15) in the "TACACS+ Enable Control" section of "Advanced TACACS+ Settings" for the User's account.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When the AAA Client sends an authentication request to the TACACS server, the "Privilege Level" AV pair is specified. I would expect this criteria to be compared to the user's configuration (i.e.: Max Privilege).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 17 Jun 2008 18:35:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/aaa-authentication-enable-console-server-name-password-issue/m-p/975113#M381397</guid>
      <dc:creator>michael.leblanc</dc:creator>
      <dc:date>2008-06-17T18:35:48Z</dc:date>
    </item>
    <item>
      <title>Re: aaa authentication enable console (server_name) password iss</title>
      <link>https://community.cisco.com/t5/network-access-control/aaa-authentication-enable-console-server-name-password-issue/m-p/975114#M381403</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Farrukh, that is correct we are (stancred and I) using the 'free tacacs' as you suggested.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Group Definitions:&lt;/P&gt;&lt;P&gt;group = engineer {&lt;/P&gt;&lt;P&gt;   default service = permit&lt;/P&gt;&lt;P&gt;   service = exec {&lt;/P&gt;&lt;P&gt;      # logout after n mins idle&lt;/P&gt;&lt;P&gt;      idletime = 15&lt;/P&gt;&lt;P&gt;      # grant access level 15&lt;/P&gt;&lt;P&gt;      priv-lvl=15&lt;/P&gt;&lt;P&gt;   }&lt;/P&gt;&lt;P&gt;}&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And User definitions:&lt;/P&gt;&lt;P&gt;user = &lt;USERNAME&gt; {&lt;/USERNAME&gt;&lt;/P&gt;&lt;P&gt;   login = cleartext &lt;PASSWORD&gt;&lt;/PASSWORD&gt;&lt;/P&gt;&lt;P&gt;   member = engineer&lt;/P&gt;&lt;P&gt;}&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 17 Jun 2008 23:20:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/aaa-authentication-enable-console-server-name-password-issue/m-p/975114#M381403</guid>
      <dc:creator>kyliem</dc:creator>
      <dc:date>2008-06-17T23:20:32Z</dc:date>
    </item>
    <item>
      <title>Re: aaa authentication enable console (server_name) password iss</title>
      <link>https://community.cisco.com/t5/network-access-control/aaa-authentication-enable-console-server-name-password-issue/m-p/975115#M381416</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Do you have this at the top of your file, as per the cisco.com link I sent earlier?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;# Enable password setup for everyone:&lt;/P&gt;&lt;P&gt;user = $enable$ {&lt;/P&gt;&lt;P&gt;        login = cleartext "cisco"&lt;/P&gt;&lt;P&gt;        }&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please note there is slight difference between the PIX and IOS routers, the privilege level feature was never properly implemented in PIX firewalls. So you might need to setup an enable password as above.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Farrukh&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 18 Jun 2008 00:43:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/aaa-authentication-enable-console-server-name-password-issue/m-p/975115#M381416</guid>
      <dc:creator>Farrukh Haroon</dc:creator>
      <dc:date>2008-06-18T00:43:16Z</dc:date>
    </item>
    <item>
      <title>Re: aaa authentication enable console (server_name) password iss</title>
      <link>https://community.cisco.com/t5/network-access-control/aaa-authentication-enable-console-server-name-password-issue/m-p/975116#M381427</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I think I can help you here since I've been using Cisco &lt;/P&gt;&lt;P&gt;Freeware TACACS+ for almost 7 years now.  I am not&lt;/P&gt;&lt;P&gt;an expert, just enough to be dangerous.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Since the code is open-source, each company uses&lt;/P&gt;&lt;P&gt;differently; however, there is one thing that will&lt;/P&gt;&lt;P&gt;always true.  That would be the the enable.c file,&lt;/P&gt;&lt;P&gt;which is a C program.  You would need to modify&lt;/P&gt;&lt;P&gt;this file so that EVERYONE can have his/her own&lt;/P&gt;&lt;P&gt;enable password, just like Cisco ACS running on&lt;/P&gt;&lt;P&gt;Windows platforms.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;the configuration file would look something like this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;accounting file = /var/log/tac_plus.log&lt;/P&gt;&lt;P&gt;key  = zFgGkIooIsZ.Q&lt;/P&gt;&lt;P&gt;user =   cciesec   {&lt;/P&gt;&lt;P&gt;         member = admin&lt;/P&gt;&lt;P&gt;         name = "ccie security"&lt;/P&gt;&lt;P&gt;         login = cleartext "cciesec"&lt;/P&gt;&lt;P&gt;                   }&lt;/P&gt;&lt;P&gt;user =   $cciesec$ {&lt;/P&gt;&lt;P&gt;         member = admin&lt;/P&gt;&lt;P&gt;         name = "ccie security"&lt;/P&gt;&lt;P&gt;         login = cleartext "cciesec1"&lt;/P&gt;&lt;P&gt;                }&lt;/P&gt;&lt;P&gt;group = admin {&lt;/P&gt;&lt;P&gt;         default service = permit&lt;/P&gt;&lt;P&gt;              }&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On the Pix:&lt;/P&gt;&lt;P&gt;aaa-server NEO protocol tacacs+&lt;/P&gt;&lt;P&gt;aaa-server NEO (outside) host 192.168.15.10&lt;/P&gt;&lt;P&gt; timeout 5&lt;/P&gt;&lt;P&gt; key cciesec&lt;/P&gt;&lt;P&gt;aaa authentication ssh console NEO LOCAL&lt;/P&gt;&lt;P&gt;aaa authentication enable console NEO LOCAL&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is the login sequence:&lt;/P&gt;&lt;P&gt;[root@dca2-LinuxES root]#  ssh -l cciesec 192.168.0.25&lt;/P&gt;&lt;P&gt;The authenticity of host '192.168.0.25 (192.168.0.25)' can't be established.&lt;/P&gt;&lt;P&gt;RSA key fingerprint is c2:48:15:85:92:7f:56:15:a8:0f:80:d9:88:50:fd:1c.&lt;/P&gt;&lt;P&gt;Are you sure you want to continue connecting (yes/no)? yes&lt;/P&gt;&lt;P&gt;Warning: Permanently added '192.168.0.25' (RSA) to the list of known hosts.&lt;/P&gt;&lt;P&gt;cciesec@192.168.0.25's password:&lt;/P&gt;&lt;P&gt;Type help or '?' for a list of available commands.&lt;/P&gt;&lt;P&gt;CiscoPix&amp;gt; en&lt;/P&gt;&lt;P&gt;Password: ********&lt;/P&gt;&lt;P&gt;CiscoPix#&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In other words, my initial password is "cciesec" and my enable password&lt;/P&gt;&lt;P&gt;is "cciesec1".  Another user "tom" will have his own login and enable&lt;/P&gt;&lt;P&gt;password.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Simple enough?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 18 Jun 2008 00:54:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/aaa-authentication-enable-console-server-name-password-issue/m-p/975116#M381427</guid>
      <dc:creator>cisco24x7</dc:creator>
      <dc:date>2008-06-18T00:54:03Z</dc:date>
    </item>
    <item>
      <title>Re: aaa authentication enable console (server_name) password iss</title>
      <link>https://community.cisco.com/t5/network-access-control/aaa-authentication-enable-console-server-name-password-issue/m-p/975117#M381436</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi cisco24x7&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Looking at the enable.c file as suggested, I can see the section for $enable$ or $enab15$ - I assume this is where you are referencing when you mention that we would need to add each user (ie to be tested within the code).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Stupid question - I assume that I would need to have to compile this code once modifications have been made?  And as such this is not able to be dynamically updated?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Our environment will not allow for a 'default' enable password across all devices. At most we could specify a default per 'group' of devices (ie per Customer).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Farrukh - As suggested the below config works - however as per my above post it is not acceptable to have a default enable password across all devices (or all pix's)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;# Enable password setup for everyone: &lt;/P&gt;&lt;P&gt;user = $enable$ { &lt;/P&gt;&lt;P&gt;login = cleartext "cisco" &lt;/P&gt;&lt;P&gt;} &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Kylie&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 18 Jun 2008 03:22:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/aaa-authentication-enable-console-server-name-password-issue/m-p/975117#M381436</guid>
      <dc:creator>kyliem</dc:creator>
      <dc:date>2008-06-18T03:22:50Z</dc:date>
    </item>
    <item>
      <title>Re: aaa authentication enable console (server_name) password iss</title>
      <link>https://community.cisco.com/t5/network-access-control/aaa-authentication-enable-console-server-name-password-issue/m-p/975118#M381441</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Then you need to go with the solution present by Cisco24X7. You mind find compiling help at the link I posted earlier.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Farrukh&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 18 Jun 2008 07:10:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/aaa-authentication-enable-console-server-name-password-issue/m-p/975118#M381441</guid>
      <dc:creator>Farrukh Haroon</dc:creator>
      <dc:date>2008-06-18T07:10:01Z</dc:date>
    </item>
    <item>
      <title>Re: aaa authentication enable console (server_name) password iss</title>
      <link>https://community.cisco.com/t5/network-access-control/aaa-authentication-enable-console-server-name-password-issue/m-p/975119#M381444</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;My solution allows everyone to have both his/her own unique &lt;/P&gt;&lt;P&gt;exec and enable password.  NO PASSWORD SHARING, just like&lt;/P&gt;&lt;P&gt;Cisco ACS.  With Freeware TACACS+, you have ACL in the &lt;/P&gt;&lt;P&gt;configuration to block certain users from accessing certain&lt;/P&gt;&lt;P&gt;devices.  In other words, you can do just about whatever &lt;/P&gt;&lt;P&gt;you want.  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Last but not least, everytime you make change in the&lt;/P&gt;&lt;P&gt;configuration, you have to restart the tac_plus.  That's really&lt;/P&gt;&lt;P&gt;easy.  I have multiple tacacs servers and I only make changes&lt;/P&gt;&lt;P&gt;to the master tacacs server configuration files.  Since mine&lt;/P&gt;&lt;P&gt;is running on Linux, I can do "service tac_plus restart" or&lt;/P&gt;&lt;P&gt;set a cron job to run every 4 hours to restart the tac_plus&lt;/P&gt;&lt;P&gt;service.  The restart takes about 2 seconds.  Furthermore,&lt;/P&gt;&lt;P&gt;I also setup another cron to copy the master file over &lt;/P&gt;&lt;P&gt;to other tacacs servers as well, via Secure Copy, very&lt;/P&gt;&lt;P&gt;secure.  That way I can achieve redudancies in case my primary&lt;/P&gt;&lt;P&gt;tacacs server goes down, which is very unlikely (This is&lt;/P&gt;&lt;P&gt;NOT a windows environment).  The best thing is that&lt;/P&gt;&lt;P&gt;all of this is FREE.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;One more thing, you can compile the code to use&lt;/P&gt;&lt;P&gt;One-time Password In Everything (OPIE) as well.  Think of&lt;/P&gt;&lt;P&gt;it like two-factor authentication.  In this day and age,&lt;/P&gt;&lt;P&gt;sharing enable password is a security violation, IMHO&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 18 Jun 2008 10:02:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/aaa-authentication-enable-console-server-name-password-issue/m-p/975119#M381444</guid>
      <dc:creator>cisco24x7</dc:creator>
      <dc:date>2008-06-18T10:02:26Z</dc:date>
    </item>
    <item>
      <title>Re: aaa authentication enable console (server_name) password iss</title>
      <link>https://community.cisco.com/t5/network-access-control/aaa-authentication-enable-console-server-name-password-issue/m-p/975120#M381451</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;problem has been rectified and it was the setting in our TACAC server&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 25 Jun 2008 08:50:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/aaa-authentication-enable-console-server-name-password-issue/m-p/975120#M381451</guid>
      <dc:creator>stancred</dc:creator>
      <dc:date>2008-06-25T08:50:16Z</dc:date>
    </item>
    <item>
      <title>Re: aaa authentication enable console (server_name) password iss</title>
      <link>https://community.cisco.com/t5/network-access-control/aaa-authentication-enable-console-server-name-password-issue/m-p/975121#M381454</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ok its great to know you have it working now.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Farrukh&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 25 Jun 2008 12:37:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/aaa-authentication-enable-console-server-name-password-issue/m-p/975121#M381454</guid>
      <dc:creator>Farrukh Haroon</dc:creator>
      <dc:date>2008-06-25T12:37:32Z</dc:date>
    </item>
    <item>
      <title>Re: aaa authentication enable console (server_name) password iss</title>
      <link>https://community.cisco.com/t5/network-access-control/aaa-authentication-enable-console-server-name-password-issue/m-p/975122#M381457</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I also have the same issues as you've described. Ie - When logging into a pix I can authenticate against tac_plus during first level ssh or telnet authentication, but it wont authenticate with the same users password when attempting to enter enable mode. Michael mentioned above that ACS uses the Max Privilege attributes to achieve what we want, so I'm assuming that some related configuration is required in tac_plus.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It would be great if you can share the tacacs server config setting you used to get it working.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Matt&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 10 Aug 2008 03:27:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/aaa-authentication-enable-console-server-name-password-issue/m-p/975122#M381457</guid>
      <dc:creator>trasheuro</dc:creator>
      <dc:date>2008-08-10T03:27:33Z</dc:date>
    </item>
    <item>
      <title>Re: aaa authentication enable console (server_name) password iss</title>
      <link>https://community.cisco.com/t5/network-access-control/aaa-authentication-enable-console-server-name-password-issue/m-p/975123#M381459</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You don't need to set the "Max Privilege for any AAA Client." but actually need to set the "Privilege Level" = 15. If you want you can set both to 15. The first option kicks in when you use 'aaa authentication enable....' and the second one when you use ''aaa authorization exec....'. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Farrukh&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 10 Aug 2008 04:29:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/aaa-authentication-enable-console-server-name-password-issue/m-p/975123#M381459</guid>
      <dc:creator>Farrukh Haroon</dc:creator>
      <dc:date>2008-08-10T04:29:05Z</dc:date>
    </item>
    <item>
      <title>Re: aaa authentication enable console (server_name) password iss</title>
      <link>https://community.cisco.com/t5/network-access-control/aaa-authentication-enable-console-server-name-password-issue/m-p/975124#M381461</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks Farrukh,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm familiar with those settings in ACS, however as the company I now work for uses the freeware tac_plus I need to know the correspondong commands in tac_plus. Steve Tancred (stancred) mentioned above that he now has a solution, so I would be interested in his tac_plus config if available. Specifically I'm after the enable related commands.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Matt&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 10 Aug 2008 10:39:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/aaa-authentication-enable-console-server-name-password-issue/m-p/975124#M381461</guid>
      <dc:creator>trasheuro</dc:creator>
      <dc:date>2008-08-10T10:39:45Z</dc:date>
    </item>
  </channel>
</rss>

