<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: IOS Configuration for HTTP(S) AAA (SDM) in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ios-configuration-for-http-s-aaa-sdm/m-p/919774#M386683</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, need authorization also. Priv lvl falls under authorization head.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;~JG&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 25 Jan 2008 20:36:22 GMT</pubDate>
    <dc:creator>Jagdeep Gambhir</dc:creator>
    <dc:date>2008-01-25T20:36:22Z</dc:date>
    <item>
      <title>IOS Configuration for HTTP(S) AAA (SDM)</title>
      <link>https://community.cisco.com/t5/network-access-control/ios-configuration-for-http-s-aaa-sdm/m-p/919771#M386674</link>
      <description>&lt;P&gt;I'm having trouble getting the internal HTTPS server to use AAA for authentication.  I have a working AAA setup for VTY access using TACACS+ but I can't seem to get HTTPS to work.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa new-model&lt;/P&gt;&lt;P&gt;aaa authentication login console none&lt;/P&gt;&lt;P&gt;aaa authentication login netauth group tacacs+ local&lt;/P&gt;&lt;P&gt;aaa authorization exec default none &lt;/P&gt;&lt;P&gt;aaa accounting delay-start &lt;/P&gt;&lt;P&gt;aaa accounting exec netacc start-stop group tacacs+&lt;/P&gt;&lt;P&gt;aaa accounting commands 15 netacc stop-only group tacacs+&lt;/P&gt;&lt;P&gt;aaa accounting connection netacc start-stop group tacacs+&lt;/P&gt;&lt;P&gt;aaa accounting system default start-stop group tacacs+&lt;/P&gt;&lt;P&gt;aaa session-id common&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;no ip http server&lt;/P&gt;&lt;P&gt;ip http access-class 99&lt;/P&gt;&lt;P&gt;ip http authentication aaa login-authentication netauth&lt;/P&gt;&lt;P&gt;ip http secure-server&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The only "aaa authorization" line was added during troubleshooting.  I don't use authorization.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;TACACS is working fine and ACL 99 permits my source IP.  A debug of ip http auth gives me this after entering my credentials:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;095897: Jan 25 10:35:18.262 CST: HTTP AAA Login-Authentication List name: netauth&lt;/P&gt;&lt;P&gt;095898: Jan 25 10:35:18.262 CST: HTTP AAA picking up Exec-Authorization List name: default&lt;/P&gt;&lt;P&gt;095899: Jan 25 10:35:18.302 CST: HTTP: Authentication failed for level 15&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I tried both a valid userid/passwd configured on the TACACS server as well as a local userid/passwd on the router (I use 'local' as a backup to TACACS).  The TACACS server logs show a successful auth attempt.  The router in question is running 12.4(15)T2 but I've run into this problem on numerous 12.4 and 12.3 releases for years.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've run into this dozens of times in as many networks.  I've never found a solution other than to use local auth and forget AAA.  What am I missing?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt; Justin&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 22:37:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ios-configuration-for-http-s-aaa-sdm/m-p/919771#M386674</guid>
      <dc:creator>Justin Shore</dc:creator>
      <dc:date>2019-03-10T22:37:10Z</dc:date>
    </item>
    <item>
      <title>Re: IOS Configuration for HTTP(S) AAA (SDM)</title>
      <link>https://community.cisco.com/t5/network-access-control/ios-configuration-for-http-s-aaa-sdm/m-p/919772#M386677</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;For Http access you need to have priv 15 defined for that user. And add authorization command&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa authorization exec defult tacacs if-authenticated&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Bring users/groups in at level 15&lt;/P&gt;&lt;P&gt;	1.  Go to user or group setup in ACS&lt;/P&gt;&lt;P&gt;	2.  Drop down to "TACACS+ Settings"&lt;/P&gt;&lt;P&gt;	3.  Place a check in "Shell (Exec)"&lt;/P&gt;&lt;P&gt;	4.  Place a check in "Privilege level" and enter "15" in the adjacent field&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;~JG&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do rate helpful posts&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 25 Jan 2008 18:53:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ios-configuration-for-http-s-aaa-sdm/m-p/919772#M386677</guid>
      <dc:creator>Jagdeep Gambhir</dc:creator>
      <dc:date>2008-01-25T18:53:30Z</dc:date>
    </item>
    <item>
      <title>Re: IOS Configuration for HTTP(S) AAA (SDM)</title>
      <link>https://community.cisco.com/t5/network-access-control/ios-configuration-for-http-s-aaa-sdm/m-p/919773#M386680</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;JG,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for the reply.  We don't use ACS here.  We use an open-source TACACS+ server.  So besides authentication the IOS HTTPS server requires authorization as well?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt; Justin&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 25 Jan 2008 19:43:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ios-configuration-for-http-s-aaa-sdm/m-p/919773#M386680</guid>
      <dc:creator>Justin Shore</dc:creator>
      <dc:date>2008-01-25T19:43:38Z</dc:date>
    </item>
    <item>
      <title>Re: IOS Configuration for HTTP(S) AAA (SDM)</title>
      <link>https://community.cisco.com/t5/network-access-control/ios-configuration-for-http-s-aaa-sdm/m-p/919774#M386683</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, need authorization also. Priv lvl falls under authorization head.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;~JG&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 25 Jan 2008 20:36:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ios-configuration-for-http-s-aaa-sdm/m-p/919774#M386683</guid>
      <dc:creator>Jagdeep Gambhir</dc:creator>
      <dc:date>2008-01-25T20:36:22Z</dc:date>
    </item>
    <item>
      <title>Re: IOS Configuration for HTTP(S) AAA (SDM)</title>
      <link>https://community.cisco.com/t5/network-access-control/ios-configuration-for-http-s-aaa-sdm/m-p/919775#M386686</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I had the exact same problem with HTTP login when trying to use the Cisco SDM v2.5 installation.  The AAA and IP HTTP server information at this link was very helpful:&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/tech/tk59/technologies_tech_note09186a008069bdc5.shtml" target="_blank"&gt;http://www.cisco.com/en/US/tech/tk59/technologies_tech_note09186a008069bdc5.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In my environment, by adding the following I was able to get the SDM to login using AAA an d TACACS:&lt;/P&gt;&lt;P&gt;aaa authorization exec default group tacacs+ local &lt;/P&gt;&lt;P&gt;ip http authentication aaa login-authentication default   &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-- Jeff&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 24 Apr 2008 13:24:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ios-configuration-for-http-s-aaa-sdm/m-p/919775#M386686</guid>
      <dc:creator>jeff-nelson</dc:creator>
      <dc:date>2008-04-24T13:24:58Z</dc:date>
    </item>
  </channel>
</rss>

