<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Getting around limitation in AAA AUTHENTICATION ENABLE DEFAULT in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/getting-around-limitation-in-aaa-authentication-enable-default/m-p/947692#M385538</link>
    <description>&lt;P&gt;I'm having a little trouble configuring AAA to allow the two levels of authentication (User and Privilege) between two seperate groups (default and XAUTH).  What I'd like to accomplish is this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;default (or defined group, doesn't matter):&lt;/P&gt;&lt;P&gt;- use line password for authentication to User level&lt;/P&gt;&lt;P&gt;- use enable secret for authentication to Privilege level&lt;/P&gt;&lt;P&gt;- password set @ console (line con 0)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;XAUTH:&lt;/P&gt;&lt;P&gt;- use TACACS + then LOCAL user for authentication to User level&lt;/P&gt;&lt;P&gt;- user TACACS + then LOCAL user for authentication to Privilege level&lt;/P&gt;&lt;P&gt;- XAUTH authentication set to lines vty 0 15&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here's where I'm starting:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;----------&lt;/P&gt;&lt;P&gt;aaa new-model&lt;/P&gt;&lt;P&gt;aaa authentication login default line&lt;/P&gt;&lt;P&gt;aaa authentication login XAUTH group tacacs+ local&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;line con 0&lt;/P&gt;&lt;P&gt; password 7 [hashed_psswd]&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;line vty 0 4&lt;/P&gt;&lt;P&gt; login authentication XAUTH&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;line vty 5 15&lt;/P&gt;&lt;P&gt; login authentication XAUTH&lt;/P&gt;&lt;P&gt;----------&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The simplest approach would be if AAA allowed for different policies toward ENABLE during authentication, but it doesn't.  I've considered using AUTHORIZATION to permit the XAUTH users to pass directly in Privilege level, but as it's TACACS it's looking to the ACS server, which I do not have administrative rights to.  Tried this, but failed to bring the user in Privilege mode and required the ENABLE SECRET when using TACACS, although it did work when XAUTH was set to use LOCAL-CASE for authentication:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;----------&lt;/P&gt;&lt;P&gt;aaa new-model&lt;/P&gt;&lt;P&gt;aaa authentication login default line&lt;/P&gt;&lt;P&gt;aaa authentication login XAUTH group tacacs+ local-case&lt;/P&gt;&lt;P&gt;aaa authorization exec XAUTH group tacacs+ local&lt;/P&gt;&lt;P&gt;aaa authorization commands 0 XAUTH group tacacs+ local&lt;/P&gt;&lt;P&gt;aaa authorization commands 1 XAUTH group tacacs+ local&lt;/P&gt;&lt;P&gt;aaa authorization commands 15 XAUTH group tacacs+ local&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;line con 0&lt;/P&gt;&lt;P&gt; password 7 [hashed_psswd]&lt;/P&gt;&lt;P&gt;line vty 0 4&lt;/P&gt;&lt;P&gt; authorization commands 0 XAUTH&lt;/P&gt;&lt;P&gt; authorization commands 1 XAUTH&lt;/P&gt;&lt;P&gt; authorization commands 15 XAUTH&lt;/P&gt;&lt;P&gt; authorization exec XAUTH&lt;/P&gt;&lt;P&gt; login authentication XAUTH&lt;/P&gt;&lt;P&gt;line vty 5 15&lt;/P&gt;&lt;P&gt; authorization commands 0 XAUTH&lt;/P&gt;&lt;P&gt; authorization commands 1 XAUTH&lt;/P&gt;&lt;P&gt; authorization commands 15 XAUTH&lt;/P&gt;&lt;P&gt; authorization exec XAUTH&lt;/P&gt;&lt;P&gt; login authentication XAUTH&lt;/P&gt;&lt;P&gt;----------&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The end goal is to allow the console port to be free of the TACACS server for authentication all the way to Privilege mode without pushing the user access @ console mode directly into it (hence, why I'm not going with the AAA AUTHORIZATION CONSOLE &amp;amp; AUTHORIZATION EXEC solution).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Anyone come up with a clever way around this?  Appreciate the input.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Dan&lt;/P&gt;</description>
    <pubDate>Sun, 10 Mar 2019 22:50:49 GMT</pubDate>
    <dc:creator>djmwalker</dc:creator>
    <dc:date>2019-03-10T22:50:49Z</dc:date>
    <item>
      <title>Getting around limitation in AAA AUTHENTICATION ENABLE DEFAULT</title>
      <link>https://community.cisco.com/t5/network-access-control/getting-around-limitation-in-aaa-authentication-enable-default/m-p/947692#M385538</link>
      <description>&lt;P&gt;I'm having a little trouble configuring AAA to allow the two levels of authentication (User and Privilege) between two seperate groups (default and XAUTH).  What I'd like to accomplish is this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;default (or defined group, doesn't matter):&lt;/P&gt;&lt;P&gt;- use line password for authentication to User level&lt;/P&gt;&lt;P&gt;- use enable secret for authentication to Privilege level&lt;/P&gt;&lt;P&gt;- password set @ console (line con 0)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;XAUTH:&lt;/P&gt;&lt;P&gt;- use TACACS + then LOCAL user for authentication to User level&lt;/P&gt;&lt;P&gt;- user TACACS + then LOCAL user for authentication to Privilege level&lt;/P&gt;&lt;P&gt;- XAUTH authentication set to lines vty 0 15&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here's where I'm starting:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;----------&lt;/P&gt;&lt;P&gt;aaa new-model&lt;/P&gt;&lt;P&gt;aaa authentication login default line&lt;/P&gt;&lt;P&gt;aaa authentication login XAUTH group tacacs+ local&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;line con 0&lt;/P&gt;&lt;P&gt; password 7 [hashed_psswd]&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;line vty 0 4&lt;/P&gt;&lt;P&gt; login authentication XAUTH&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;line vty 5 15&lt;/P&gt;&lt;P&gt; login authentication XAUTH&lt;/P&gt;&lt;P&gt;----------&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The simplest approach would be if AAA allowed for different policies toward ENABLE during authentication, but it doesn't.  I've considered using AUTHORIZATION to permit the XAUTH users to pass directly in Privilege level, but as it's TACACS it's looking to the ACS server, which I do not have administrative rights to.  Tried this, but failed to bring the user in Privilege mode and required the ENABLE SECRET when using TACACS, although it did work when XAUTH was set to use LOCAL-CASE for authentication:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;----------&lt;/P&gt;&lt;P&gt;aaa new-model&lt;/P&gt;&lt;P&gt;aaa authentication login default line&lt;/P&gt;&lt;P&gt;aaa authentication login XAUTH group tacacs+ local-case&lt;/P&gt;&lt;P&gt;aaa authorization exec XAUTH group tacacs+ local&lt;/P&gt;&lt;P&gt;aaa authorization commands 0 XAUTH group tacacs+ local&lt;/P&gt;&lt;P&gt;aaa authorization commands 1 XAUTH group tacacs+ local&lt;/P&gt;&lt;P&gt;aaa authorization commands 15 XAUTH group tacacs+ local&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;line con 0&lt;/P&gt;&lt;P&gt; password 7 [hashed_psswd]&lt;/P&gt;&lt;P&gt;line vty 0 4&lt;/P&gt;&lt;P&gt; authorization commands 0 XAUTH&lt;/P&gt;&lt;P&gt; authorization commands 1 XAUTH&lt;/P&gt;&lt;P&gt; authorization commands 15 XAUTH&lt;/P&gt;&lt;P&gt; authorization exec XAUTH&lt;/P&gt;&lt;P&gt; login authentication XAUTH&lt;/P&gt;&lt;P&gt;line vty 5 15&lt;/P&gt;&lt;P&gt; authorization commands 0 XAUTH&lt;/P&gt;&lt;P&gt; authorization commands 1 XAUTH&lt;/P&gt;&lt;P&gt; authorization commands 15 XAUTH&lt;/P&gt;&lt;P&gt; authorization exec XAUTH&lt;/P&gt;&lt;P&gt; login authentication XAUTH&lt;/P&gt;&lt;P&gt;----------&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The end goal is to allow the console port to be free of the TACACS server for authentication all the way to Privilege mode without pushing the user access @ console mode directly into it (hence, why I'm not going with the AAA AUTHORIZATION CONSOLE &amp;amp; AUTHORIZATION EXEC solution).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Anyone come up with a clever way around this?  Appreciate the input.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Dan&lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 22:50:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/getting-around-limitation-in-aaa-authentication-enable-default/m-p/947692#M385538</guid>
      <dc:creator>djmwalker</dc:creator>
      <dc:date>2019-03-10T22:50:49Z</dc:date>
    </item>
    <item>
      <title>Re: Getting around limitation in AAA AUTHENTICATION ENABLE DEFAU</title>
      <link>https://community.cisco.com/t5/network-access-control/getting-around-limitation-in-aaa-authentication-enable-default/m-p/947693#M385580</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Authentication verifies users before they are allowed access to the network and network services. Authentication, for the most part, is implemented through the AAA security services.Whenever possible, its good to have AAA be used to implement authentication. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Refer the following url for moe info about Configuring Login Authentication Using AAA:&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/docs/ios/12_4/secure/configuration/guide/schathen.html#wp1001032" target="_blank"&gt;http://www.cisco.com/en/US/docs/ios/12_4/secure/configuration/guide/schathen.html#wp1001032&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 20 May 2008 12:52:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/getting-around-limitation-in-aaa-authentication-enable-default/m-p/947693#M385580</guid>
      <dc:creator>smahbub</dc:creator>
      <dc:date>2008-05-20T12:52:58Z</dc:date>
    </item>
  </channel>
</rss>

