<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How to stop ACS intergated AD users to login in AAA clients( in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/how-to-stop-acs-intergated-ad-users-to-login-in-aaa-clients/m-p/1301950#M405287</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;These types of configurations are a two-way street.  ACS must be configured to actually perform the authentication/authorization, and the AAA clients must also be configured for authentication/authorization.  I would look at the AAA client configurations, first.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What kind of AAA clients are we talking about?  Cisco switches, Cisco WLC's?  Swicthing gear from other companies?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For Cisco switches, lines like the following will tell them to use your ACS server for administrative user auth (RADIUS ro TACACS+, respectively):&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa group server radius rad_admin&lt;/P&gt;&lt;P&gt; server xxx.xxx.xxx.xxx&lt;/P&gt;&lt;P&gt;aaa group server tacacs+ tac_admin&lt;/P&gt;&lt;P&gt; server xxx.xxx.xxx.xxx&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If your AAA client is a WLC, then you need to uncheck the "Management" box where the RADIUS server is defined for authentication (Security -&amp;gt; AAA -&amp;gt; RADIUS -&amp;gt; Auth).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 14 Aug 2009 16:53:59 GMT</pubDate>
    <dc:creator>Robert.N.Barrett_2</dc:creator>
    <dc:date>2009-08-14T16:53:59Z</dc:date>
    <item>
      <title>How to stop ACS intergated AD users to login in AAA clients(network device)</title>
      <link>https://community.cisco.com/t5/network-access-control/how-to-stop-acs-intergated-ad-users-to-login-in-aaa-clients/m-p/1301947#M405284</link>
      <description>&lt;P&gt;I have ACS 4.2 Appliance which is integrated with Active directory. &lt;/P&gt;&lt;P&gt;AD users are able to login in network devices. Is there any so that I can stop AD user and other local users to login in AAA clinets (network devices).&lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 23:38:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/how-to-stop-acs-intergated-ad-users-to-login-in-aaa-clients/m-p/1301947#M405284</guid>
      <dc:creator>sunil.aroraa</dc:creator>
      <dc:date>2019-03-10T23:38:52Z</dc:date>
    </item>
    <item>
      <title>Re: How to stop ACS intergated AD users to login in AAA clients(</title>
      <link>https://community.cisco.com/t5/network-access-control/how-to-stop-acs-intergated-ad-users-to-login-in-aaa-clients/m-p/1301948#M405285</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Check how admin access is controlled (by what groups):&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/docs/net_mgmt/cisco_secure_access_control_server_for_windows/4.2/configuration/guide/nac_conf.html#wp1165622" target="_blank"&gt;http://www.cisco.com/en/US/docs/net_mgmt/cisco_secure_access_control_server_for_windows/4.2/configuration/guide/nac_conf.html#wp1165622&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 13 Aug 2009 18:39:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/how-to-stop-acs-intergated-ad-users-to-login-in-aaa-clients/m-p/1301948#M405285</guid>
      <dc:creator>Robert.N.Barrett_2</dc:creator>
      <dc:date>2009-08-13T18:39:37Z</dc:date>
    </item>
    <item>
      <title>Re: How to stop ACS intergated AD users to login in AAA clients(</title>
      <link>https://community.cisco.com/t5/network-access-control/how-to-stop-acs-intergated-ad-users-to-login-in-aaa-clients/m-p/1301949#M405286</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;HI Robert,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for your reply.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But I'm not talking about administration of ACS applinace. The concern is to stop the external database user to login in network devices (AAA clients).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 14 Aug 2009 02:52:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/how-to-stop-acs-intergated-ad-users-to-login-in-aaa-clients/m-p/1301949#M405286</guid>
      <dc:creator>sunil.aroraa</dc:creator>
      <dc:date>2009-08-14T02:52:46Z</dc:date>
    </item>
    <item>
      <title>Re: How to stop ACS intergated AD users to login in AAA clients(</title>
      <link>https://community.cisco.com/t5/network-access-control/how-to-stop-acs-intergated-ad-users-to-login-in-aaa-clients/m-p/1301950#M405287</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;These types of configurations are a two-way street.  ACS must be configured to actually perform the authentication/authorization, and the AAA clients must also be configured for authentication/authorization.  I would look at the AAA client configurations, first.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What kind of AAA clients are we talking about?  Cisco switches, Cisco WLC's?  Swicthing gear from other companies?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For Cisco switches, lines like the following will tell them to use your ACS server for administrative user auth (RADIUS ro TACACS+, respectively):&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa group server radius rad_admin&lt;/P&gt;&lt;P&gt; server xxx.xxx.xxx.xxx&lt;/P&gt;&lt;P&gt;aaa group server tacacs+ tac_admin&lt;/P&gt;&lt;P&gt; server xxx.xxx.xxx.xxx&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If your AAA client is a WLC, then you need to uncheck the "Management" box where the RADIUS server is defined for authentication (Security -&amp;gt; AAA -&amp;gt; RADIUS -&amp;gt; Auth).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 14 Aug 2009 16:53:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/how-to-stop-acs-intergated-ad-users-to-login-in-aaa-clients/m-p/1301950#M405287</guid>
      <dc:creator>Robert.N.Barrett_2</dc:creator>
      <dc:date>2009-08-14T16:53:59Z</dc:date>
    </item>
    <item>
      <title>Re: How to stop ACS intergated AD users to login in AAA clients(</title>
      <link>https://community.cisco.com/t5/network-access-control/how-to-stop-acs-intergated-ad-users-to-login-in-aaa-clients/m-p/1301951#M405288</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;As a follow-up, let's assume you want to use ACS to authenticate admin access to your AAA clients, but you don't want ACS to check against AD.  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you are using TACACS+ for admin auth, and the admin users are in the local database on the ACS server, then I think you just need to go to your AAA client definition on the ACS server and scroll down to the "Tacacs+ login/enable authentication" section and select the appropriate "Authenticate Using" option.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 14 Aug 2009 17:01:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/how-to-stop-acs-intergated-ad-users-to-login-in-aaa-clients/m-p/1301951#M405288</guid>
      <dc:creator>Robert.N.Barrett_2</dc:creator>
      <dc:date>2009-08-14T17:01:24Z</dc:date>
    </item>
    <item>
      <title>Re: How to stop ACS intergated AD users to login in AAA clients(</title>
      <link>https://community.cisco.com/t5/network-access-control/how-to-stop-acs-intergated-ad-users-to-login-in-aaa-clients/m-p/1301952#M405289</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, I don't want ACS to check credentials against AD and wants to denied the access to users for AAA clients (routers and switches) which are not local database of ACS. OR I can restrict the only specific user or groups to login in AAA clients.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I haven't found any option for it. As you said, scroll down to "Tacacs+ login/enable authentication" section but I was not able to find this option. Can you please elaborate this or can give the path and screen shot for the same.&lt;/P&gt;&lt;P&gt;I'll appreciate your efforts so solve the issue.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 16 Aug 2009 06:34:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/how-to-stop-acs-intergated-ad-users-to-login-in-aaa-clients/m-p/1301952#M405289</guid>
      <dc:creator>sunil.aroraa</dc:creator>
      <dc:date>2009-08-16T06:34:08Z</dc:date>
    </item>
    <item>
      <title>Re: How to stop ACS intergated AD users to login in AAA clients(</title>
      <link>https://community.cisco.com/t5/network-access-control/how-to-stop-acs-intergated-ad-users-to-login-in-aaa-clients/m-p/1301953#M405290</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My problem havn't resolved yet and i'm still looking for solution. I have not found " Authenticate Using" option in ACS.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;l'll appriciate if you can excatly let me know where I can find this option.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 01 Feb 2010 10:22:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/how-to-stop-acs-intergated-ad-users-to-login-in-aaa-clients/m-p/1301953#M405290</guid>
      <dc:creator>sunil.aroraa</dc:creator>
      <dc:date>2010-02-01T10:22:39Z</dc:date>
    </item>
  </channel>
</rss>

