<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Some boxes reference enable secret, some do not in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/some-boxes-reference-enable-secret-some-do-not/m-p/1205558#M405400</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;What you have looks good. Does everything look OK in ACS?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 15 May 2009 18:56:08 GMT</pubDate>
    <dc:creator>Collin Clark</dc:creator>
    <dc:date>2009-05-15T18:56:08Z</dc:date>
    <item>
      <title>Some boxes reference enable secret, some do not</title>
      <link>https://community.cisco.com/t5/network-access-control/some-boxes-reference-enable-secret-some-do-not/m-p/1205555#M405389</link>
      <description>&lt;P&gt;I am working at a client site today that uses a Cisco ACS server via AAA to authenticate users.  TACACS is configured and when an admin ssh's to a  box on the network, the box queries TACACS which in turn queries Active Directory to authenticate the user.&lt;/P&gt;&lt;P&gt;We came up with a policy that would grant priveleged mode to the authenticated user, and then they would have to enter the "enable secret" password locally on the box to enter into PRIV EXEC mode.&lt;/P&gt;&lt;P&gt;For some reason, most of our Cisco devices work fine this way.  But we have a handful that will authenticate directly to PRIV EXEC mode after TACACS authentication without prompting the admin for the enable secret password.&lt;/P&gt;&lt;P&gt;I have inspected the configurations on the devices that do not challenge for the enable secret, and they have the same aaa command configured on them as the ones that do challenge for the enable secret password.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is an example configuration:&lt;/P&gt;&lt;P&gt;aaa new-model&lt;/P&gt;&lt;P&gt;aaa authentication login default group tacacs+ line&lt;/P&gt;&lt;P&gt;aaa authentication login vty-access group tacacs+ local&lt;/P&gt;&lt;P&gt;aaa authentication enable default enable&lt;/P&gt;&lt;P&gt;aaa authorization config-commands&lt;/P&gt;&lt;P&gt;aaa authorization exec vty-access group tacacs+ local none&lt;/P&gt;&lt;P&gt;aaa authorization commands 0 default group tacacs+ none&lt;/P&gt;&lt;P&gt;aaa authorization commands 1 default group tacacs+ none&lt;/P&gt;&lt;P&gt;aaa authorization commands 2 default group tacacs+ none&lt;/P&gt;&lt;P&gt;aaa authorization commands 3 default group tacacs+ none&lt;/P&gt;&lt;P&gt;aaa authorization commands 4 default group tacacs+ none&lt;/P&gt;&lt;P&gt;aaa authorization commands 5 default group tacacs+ none&lt;/P&gt;&lt;P&gt;aaa authorization commands 6 default group tacacs+ none&lt;/P&gt;&lt;P&gt;aaa authorization commands 7 default group tacacs+ none&lt;/P&gt;&lt;P&gt;aaa authorization commands 8 default group tacacs+ none&lt;/P&gt;&lt;P&gt;aaa authorization commands 9 default group tacacs+ none&lt;/P&gt;&lt;P&gt;aaa authorization commands 10 default group tacacs+ none&lt;/P&gt;&lt;P&gt;aaa authorization commands 11 default group tacacs+ none&lt;/P&gt;&lt;P&gt;aaa authorization commands 12 default group tacacs+ none&lt;/P&gt;&lt;P&gt;aaa authorization commands 13 default group tacacs+ none&lt;/P&gt;&lt;P&gt;aaa authorization commands 14 default group tacacs+ none&lt;/P&gt;&lt;P&gt;aaa authorization commands 15 default group tacacs+ none&lt;/P&gt;&lt;P&gt;aaa authorization network default group tacacs+ none&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 23:29:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/some-boxes-reference-enable-secret-some-do-not/m-p/1205555#M405389</guid>
      <dc:creator>Kevin Melton</dc:creator>
      <dc:date>2019-03-10T23:29:44Z</dc:date>
    </item>
    <item>
      <title>Re: Some boxes reference enable secret, some do not</title>
      <link>https://community.cisco.com/t5/network-access-control/some-boxes-reference-enable-secret-some-do-not/m-p/1205556#M405394</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Do the VTY's have-&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;privilege level 15&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That's typically where you get PRIV EXEC mode from.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 15 May 2009 14:46:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/some-boxes-reference-enable-secret-some-do-not/m-p/1205556#M405394</guid>
      <dc:creator>Collin Clark</dc:creator>
      <dc:date>2009-05-15T14:46:59Z</dc:date>
    </item>
    <item>
      <title>Re: Some boxes reference enable secret, some do not</title>
      <link>https://community.cisco.com/t5/network-access-control/some-boxes-reference-enable-secret-some-do-not/m-p/1205557#M405396</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;We have the following commands configured on our vty lines:&lt;/P&gt;&lt;P&gt;line vty 0 4&lt;/P&gt;&lt;P&gt; session-timeout 30&lt;/P&gt;&lt;P&gt; access-class telnet-access in&lt;/P&gt;&lt;P&gt; exec-timeout 15 0&lt;/P&gt;&lt;P&gt; authorization commands 15 vty-access&lt;/P&gt;&lt;P&gt; authorization exec vty-access&lt;/P&gt;&lt;P&gt; logging synchronous&lt;/P&gt;&lt;P&gt; login authentication vty-access&lt;/P&gt;&lt;P&gt; transport input telnet ssh&lt;/P&gt;&lt;P&gt;line vty 5 15&lt;/P&gt;&lt;P&gt; session-timeout 30&lt;/P&gt;&lt;P&gt; access-class telnet-access in&lt;/P&gt;&lt;P&gt; exec-timeout 15 0&lt;/P&gt;&lt;P&gt; authorization commands 15 vty-access&lt;/P&gt;&lt;P&gt; authorization exec vty-access&lt;/P&gt;&lt;P&gt; login authentication vty-access&lt;/P&gt;&lt;P&gt; transport input telnet ssh&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;we tried negating the &lt;/P&gt;&lt;P&gt;"authorization commands 15 vty-access" but to no avail.&lt;/P&gt;&lt;P&gt;At that point we were authenticating to TACACS fine and then getting prompted like we wanted.  But for some reason( witnessed during debug aaa auth) we were getting password mismatches.  We re-entered our enable secret password and tried again, but kept on getting password no match and then "Access Denied".&lt;/P&gt;&lt;P&gt;Perhaps you can help out and tell me what should be configured on the VTY lines so that it will reference the enable secret?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 15 May 2009 18:04:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/some-boxes-reference-enable-secret-some-do-not/m-p/1205557#M405396</guid>
      <dc:creator>Kevin Melton</dc:creator>
      <dc:date>2009-05-15T18:04:57Z</dc:date>
    </item>
    <item>
      <title>Re: Some boxes reference enable secret, some do not</title>
      <link>https://community.cisco.com/t5/network-access-control/some-boxes-reference-enable-secret-some-do-not/m-p/1205558#M405400</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;What you have looks good. Does everything look OK in ACS?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 15 May 2009 18:56:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/some-boxes-reference-enable-secret-some-do-not/m-p/1205558#M405400</guid>
      <dc:creator>Collin Clark</dc:creator>
      <dc:date>2009-05-15T18:56:08Z</dc:date>
    </item>
    <item>
      <title>Re: Some boxes reference enable secret, some do not</title>
      <link>https://community.cisco.com/t5/network-access-control/some-boxes-reference-enable-secret-some-do-not/m-p/1205559#M405404</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Kevin&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My guess at this point is that the issue is not on the router but is in ACS. Can you check on the configuration in ACS of a couple of the devices that put authenticated users directly into privilege mode? Do these devices have the shell exe checked (and do they give privilege level 15)?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The command on the router that works with this is the command:&lt;/P&gt;&lt;P&gt;aaa authorization exec vty-access group tacacs+ local none &lt;/P&gt;&lt;P&gt;I would suggest a slight revision of this to make it like:&lt;/P&gt;&lt;P&gt;aaa authorization exec vty-access group tacacs+ if-authenticated&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Rick&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 15 May 2009 19:21:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/some-boxes-reference-enable-secret-some-do-not/m-p/1205559#M405404</guid>
      <dc:creator>Richard Burts</dc:creator>
      <dc:date>2009-05-15T19:21:07Z</dc:date>
    </item>
  </channel>
</rss>

