<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: AAA using RADIUS in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/aaa-using-radius/m-p/891081#M407610</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;For routers and IOS switches:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa new-model&lt;/P&gt;&lt;P&gt;aaa authentication banner *Unauthorized Access Prohibited*&lt;/P&gt;&lt;P&gt;aaa authentication login default group radius&lt;/P&gt;&lt;P&gt;radius-server host 10.10.10.10 (your acs device)&lt;/P&gt;&lt;P&gt;radius-server key cisco123&lt;/P&gt;&lt;P&gt;radius-server configure-nas&lt;/P&gt;&lt;P&gt;username nmg password telnet&lt;/P&gt;&lt;P&gt;aaa authentication ppp dialins group radius local&lt;/P&gt;&lt;P&gt;aaa authentication login nmg local&lt;/P&gt;&lt;P&gt;aaa authorization network default group radius local&lt;/P&gt;&lt;P&gt;aaa accounting network default start-stop group radius&lt;/P&gt;&lt;P&gt;aaa processes 16&lt;/P&gt;&lt;P&gt;line 1 16&lt;/P&gt;&lt;P&gt;  login authentication&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For CatOS switches:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Set radius-server 10.10.10.10&lt;/P&gt;&lt;P&gt;show radius&lt;/P&gt;&lt;P&gt;set radius key cisco123&lt;/P&gt;&lt;P&gt;     set authentication login radius enable&lt;/P&gt;&lt;P&gt;     set authentication enable radius enable&lt;/P&gt;&lt;P&gt;     show authentication&lt;/P&gt;&lt;P&gt;set radius timeout 5&lt;/P&gt;&lt;P&gt;set radius retransmit 3&lt;/P&gt;&lt;P&gt;set radius deadtime 3&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For Pix Firewalls:&lt;/P&gt;&lt;P&gt;aaa authentication ssh console radius LOCAL&lt;/P&gt;&lt;P&gt;aaa authentication telnet console radius LOCAL&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa-server radgroup protocol RADIUS&lt;/P&gt;&lt;P&gt;	max-failed-attempts 2&lt;/P&gt;&lt;P&gt;	reactivation-mode depletion deadtime 5&lt;/P&gt;&lt;P&gt;exit&lt;/P&gt;&lt;P&gt;(NOTE:  This will depending on the location of the pix firewall)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa-server radgroup (inside) host 10.10.10.10&lt;/P&gt;&lt;P&gt;	key XXXXXXX&lt;/P&gt;&lt;P&gt;	exit&lt;/P&gt;&lt;P&gt;aaa-server radgroup(inside) host 10.10.10.10&lt;/P&gt;&lt;P&gt;	key XXXXXX&lt;/P&gt;&lt;P&gt;	exit&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is pretty much what we used for configurations on our test.  It looks like most of your switches are IOS based so that will be nice for you.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you are using local authentication, you can create a group and assign the local addresses to that group.  What I did in the radius IETF attribute, you ensure that [006] Service-Type is checked and scroll down to Administrative and click Submit &amp;amp; Restart.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps some.  I had alot of help from Cisco TAC on this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Dwane&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 27 Feb 2008 17:01:30 GMT</pubDate>
    <dc:creator>dpatkins</dc:creator>
    <dc:date>2008-02-27T17:01:30Z</dc:date>
    <item>
      <title>AAA using RADIUS</title>
      <link>https://community.cisco.com/t5/network-access-control/aaa-using-radius/m-p/891078#M407607</link>
      <description>&lt;P&gt;GOod morning all, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am trying to configure AAA using RADIUS with ACS 4.1 SE and various Cisco Devices.  I have configured the ACS to perform group mapping on personnel who I want to give access privileges.  What I would like to do is give that group privilege level 15 and do away with enable passwords.  However, I need local level authentication for our console options with enable privileges.  Can this be done?  Any help would be appreciated.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Dwane&lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 22:40:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/aaa-using-radius/m-p/891078#M407607</guid>
      <dc:creator>dpatkins</dc:creator>
      <dc:date>2019-03-10T22:40:05Z</dc:date>
    </item>
    <item>
      <title>Re: AAA using RADIUS</title>
      <link>https://community.cisco.com/t5/network-access-control/aaa-using-radius/m-p/891079#M407608</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This has been resolved. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 21 Feb 2008 21:20:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/aaa-using-radius/m-p/891079#M407608</guid>
      <dc:creator>dpatkins</dc:creator>
      <dc:date>2008-02-21T21:20:22Z</dc:date>
    </item>
    <item>
      <title>Re: AAA using RADIUS</title>
      <link>https://community.cisco.com/t5/network-access-control/aaa-using-radius/m-p/891080#M407609</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi!!!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I also want to perform similar activities within my network.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I also do have ACS 4.1 SE, Cisco 4500, 6500,2960, 3750, 3560, ASA, CSMARS, routers etc in my network. I want to have radius based authentication for the same.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I want telnet, ssh has to be verified by radius server &amp;amp; console by local authentication. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;could u plz send me the config that is required to be done in the active devices as well as ACS!!!!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 23 Feb 2008 06:34:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/aaa-using-radius/m-p/891080#M407609</guid>
      <dc:creator>acharyr123</dc:creator>
      <dc:date>2008-02-23T06:34:11Z</dc:date>
    </item>
    <item>
      <title>Re: AAA using RADIUS</title>
      <link>https://community.cisco.com/t5/network-access-control/aaa-using-radius/m-p/891081#M407610</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;For routers and IOS switches:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa new-model&lt;/P&gt;&lt;P&gt;aaa authentication banner *Unauthorized Access Prohibited*&lt;/P&gt;&lt;P&gt;aaa authentication login default group radius&lt;/P&gt;&lt;P&gt;radius-server host 10.10.10.10 (your acs device)&lt;/P&gt;&lt;P&gt;radius-server key cisco123&lt;/P&gt;&lt;P&gt;radius-server configure-nas&lt;/P&gt;&lt;P&gt;username nmg password telnet&lt;/P&gt;&lt;P&gt;aaa authentication ppp dialins group radius local&lt;/P&gt;&lt;P&gt;aaa authentication login nmg local&lt;/P&gt;&lt;P&gt;aaa authorization network default group radius local&lt;/P&gt;&lt;P&gt;aaa accounting network default start-stop group radius&lt;/P&gt;&lt;P&gt;aaa processes 16&lt;/P&gt;&lt;P&gt;line 1 16&lt;/P&gt;&lt;P&gt;  login authentication&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For CatOS switches:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Set radius-server 10.10.10.10&lt;/P&gt;&lt;P&gt;show radius&lt;/P&gt;&lt;P&gt;set radius key cisco123&lt;/P&gt;&lt;P&gt;     set authentication login radius enable&lt;/P&gt;&lt;P&gt;     set authentication enable radius enable&lt;/P&gt;&lt;P&gt;     show authentication&lt;/P&gt;&lt;P&gt;set radius timeout 5&lt;/P&gt;&lt;P&gt;set radius retransmit 3&lt;/P&gt;&lt;P&gt;set radius deadtime 3&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For Pix Firewalls:&lt;/P&gt;&lt;P&gt;aaa authentication ssh console radius LOCAL&lt;/P&gt;&lt;P&gt;aaa authentication telnet console radius LOCAL&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa-server radgroup protocol RADIUS&lt;/P&gt;&lt;P&gt;	max-failed-attempts 2&lt;/P&gt;&lt;P&gt;	reactivation-mode depletion deadtime 5&lt;/P&gt;&lt;P&gt;exit&lt;/P&gt;&lt;P&gt;(NOTE:  This will depending on the location of the pix firewall)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa-server radgroup (inside) host 10.10.10.10&lt;/P&gt;&lt;P&gt;	key XXXXXXX&lt;/P&gt;&lt;P&gt;	exit&lt;/P&gt;&lt;P&gt;aaa-server radgroup(inside) host 10.10.10.10&lt;/P&gt;&lt;P&gt;	key XXXXXX&lt;/P&gt;&lt;P&gt;	exit&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is pretty much what we used for configurations on our test.  It looks like most of your switches are IOS based so that will be nice for you.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you are using local authentication, you can create a group and assign the local addresses to that group.  What I did in the radius IETF attribute, you ensure that [006] Service-Type is checked and scroll down to Administrative and click Submit &amp;amp; Restart.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps some.  I had alot of help from Cisco TAC on this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Dwane&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 27 Feb 2008 17:01:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/aaa-using-radius/m-p/891081#M407610</guid>
      <dc:creator>dpatkins</dc:creator>
      <dc:date>2008-02-27T17:01:30Z</dc:date>
    </item>
  </channel>
</rss>

