<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Reg: Configuration of AAA using TACACS+ in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/reg-configuration-of-aaa-using-tacacs/m-p/1438659#M387585</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As I ve written in my previous post that i ve configured acs-server host and key on router , i ve created a user name test 1 on acs and added ,the router through add AAA client and Secure as shared Key.I must mention that i am using a Cisco 3845 router connected on my LAN for testing ACS and I have access to it through console as well.What else should I do on acs4.2 to get it authenticated by TACACS server ,also if i have more routers to add ,could i create a group in the same way and add AAA clients,Kindly suggest if my approach is correct.will there be separate users for each AAA client or same user can be used for all AAA clients for authentication through ACS if they are assigned to same group or if they are in Default group.&lt;/P&gt;&lt;P&gt;Also how to implement policies on a group(say:security).Is there any screenshots tutorial available for the same.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sun, 16 May 2010 12:38:04 GMT</pubDate>
    <dc:creator>cisco.anubhav</dc:creator>
    <dc:date>2010-05-16T12:38:04Z</dc:date>
    <item>
      <title>Reg: Configuration of AAA using TACACS+</title>
      <link>https://community.cisco.com/t5/network-access-control/reg-configuration-of-aaa-using-tacacs/m-p/1438656#M387415</link>
      <description>&lt;P style="text-align: left;"&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="text-align: left;"&gt;I am Anubhav ,i m new to TACACS+ server and trying to implement aaa authentication using Cisco TACACS+ Server for which i've decided following AAA commands and a fall back user user1 has been configured on router to be authenticated.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="text-align: left;"&gt;&lt;EM&gt;aaa authentication login default group tacacs+ local&lt;BR /&gt;aaa authentication login NO_AUTHEN none&lt;BR /&gt;aaa authorization config-commands&lt;BR /&gt;aaa authorization exec default group tacacs+ if-authenticated&lt;BR /&gt;aaa authorization exec NO_AUTHOR none&lt;BR /&gt;aaa authorization commands 1 default group tacacs+ if-authenticated&lt;BR /&gt;aaa authorization commands 1 NO_AUTHOR none&lt;BR /&gt;aaa authorization commands 15 default group tacacs+ if-authenticated&lt;BR /&gt;aaa authorization commands 15 NO_AUTHOR none&lt;BR /&gt;aaa authorization network serial none&lt;BR /&gt;aaa accounting exec default start-stop group tacacs+&lt;BR /&gt;aaa accounting commands 15 default stop-only group tacacs+&lt;/EM&gt;&lt;BR /&gt;&lt;STRONG&gt;aaa session-id common:purpose of this line ?&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="text-align: left;"&gt;Kindly check if it's ok and i might not get locked out.acs server has been defined on router .kindly guide us on steps to configure the user ,group ,privilege level on TACACS.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="text-align: left;"&gt;Thanks.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 00:07:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/reg-configuration-of-aaa-using-tacacs/m-p/1438656#M387415</guid>
      <dc:creator>cisco.anubhav</dc:creator>
      <dc:date>2019-03-11T00:07:38Z</dc:date>
    </item>
    <item>
      <title>Re: Reg: Configuration of AAA using TACACS+</title>
      <link>https://community.cisco.com/t5/network-access-control/reg-configuration-of-aaa-using-tacacs/m-p/1438657#M387460</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You can view the documentation on this command at the following URL:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/ios/12_3/security/command/reference/sec_a1g.html#wp1073858"&gt;http://www.cisco.com/en/US/docs/ios/12_3/security/command/reference/sec_a1g.html#wp1073858&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 11 May 2010 19:22:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/reg-configuration-of-aaa-using-tacacs/m-p/1438657#M387460</guid>
      <dc:creator>Javier Henderson</dc:creator>
      <dc:date>2010-05-11T19:22:24Z</dc:date>
    </item>
    <item>
      <title>Re: Reg: Configuration of AAA using TACACS+</title>
      <link>https://community.cisco.com/t5/network-access-control/reg-configuration-of-aaa-using-tacacs/m-p/1438658#M387514</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN style="color: #800000;"&gt;Anubhav,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000;"&gt;In order to configure different kind of privelege level, you may visit the below listed doc&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000;"&gt;&lt;STRONG&gt;ACS Shell Command Authorization Sets on IOS&lt;/STRONG&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000;"&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/products/sw/secursw/ps2086/products_configuration_example09186a00808d9138.shtml#backinfo"&gt;http://www.cisco.com/en/US/products/sw/secursw/ps2086/products_configuration_example09186a00808d9138.shtml#backinfo&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000;"&gt;Regds,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000;"&gt;JK&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000;"&gt;Do rate helpful posts-&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 12 May 2010 09:48:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/reg-configuration-of-aaa-using-tacacs/m-p/1438658#M387514</guid>
      <dc:creator>Jatin Katyal</dc:creator>
      <dc:date>2010-05-12T09:48:59Z</dc:date>
    </item>
    <item>
      <title>Re: Reg: Configuration of AAA using TACACS+</title>
      <link>https://community.cisco.com/t5/network-access-control/reg-configuration-of-aaa-using-tacacs/m-p/1438659#M387585</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As I ve written in my previous post that i ve configured acs-server host and key on router , i ve created a user name test 1 on acs and added ,the router through add AAA client and Secure as shared Key.I must mention that i am using a Cisco 3845 router connected on my LAN for testing ACS and I have access to it through console as well.What else should I do on acs4.2 to get it authenticated by TACACS server ,also if i have more routers to add ,could i create a group in the same way and add AAA clients,Kindly suggest if my approach is correct.will there be separate users for each AAA client or same user can be used for all AAA clients for authentication through ACS if they are assigned to same group or if they are in Default group.&lt;/P&gt;&lt;P&gt;Also how to implement policies on a group(say:security).Is there any screenshots tutorial available for the same.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 16 May 2010 12:38:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/reg-configuration-of-aaa-using-tacacs/m-p/1438659#M387585</guid>
      <dc:creator>cisco.anubhav</dc:creator>
      <dc:date>2010-05-16T12:38:04Z</dc:date>
    </item>
    <item>
      <title>Re: Reg: Configuration of AAA using TACACS+</title>
      <link>https://community.cisco.com/t5/network-access-control/reg-configuration-of-aaa-using-tacacs/m-p/1438660#M387649</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is the user guide that should help you:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://cisco.com/en/US/docs/net_mgmt/cisco_secure_access_control_system/5.1/user/guide/acsuserguide.html"&gt;http://cisco.com/en/US/docs/net_mgmt/cisco_secure_access_control_system/5.1/user/guide/acsuserguide.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The router has to be configured to ''talk'' to the ACS.&lt;/P&gt;&lt;P&gt;The router has to be a AAA client and the ACS a AAA server (both sharing the same secret-key)&lt;/P&gt;&lt;P&gt;You can also create groups and policies for the same devices, hope the above link will help you.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 16 May 2010 13:00:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/reg-configuration-of-aaa-using-tacacs/m-p/1438660#M387649</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2010-05-16T13:00:55Z</dc:date>
    </item>
  </channel>
</rss>

