<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Tacacs Fallback and console login in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/tacacs-fallback-and-console-login/m-p/698308#M421621</link>
    <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am trying to create a tacacs config that will make sure that when you log onto the console you do not get tacacs and that we are on line login and local enable.  If connectivity to the tacacs server is lost, the login for telnet defaults to the line password and uses the local enable password.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My config:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa authentication login default group tacacs+ line&lt;/P&gt;&lt;P&gt;aaa authentication login CONSOLE line&lt;/P&gt;&lt;P&gt;aaa authentication enable default group tacacs+ enable&lt;/P&gt;&lt;P&gt;aaa authorization exec default group tacacs+ if-authenticated&lt;/P&gt;&lt;P&gt;aaa authorization exec CONSOLE none&lt;/P&gt;&lt;P&gt;aaa authorization commands 1 default if-authenticated&lt;/P&gt;&lt;P&gt;aaa authorization commands 15 default if-authenticated&lt;/P&gt;&lt;P&gt;aaa authorization commands 1 CONSOLE none&lt;/P&gt;&lt;P&gt;aaa authorization commands 15 CONSOLE none&lt;/P&gt;&lt;P&gt;aaa accounting exec default start-stop group tacacs+&lt;/P&gt;&lt;P&gt;aaa accounting commands 1 default start-stop group tacacs+&lt;/P&gt;&lt;P&gt;aaa accounting commands 15 default start-stop group tacacs+&lt;/P&gt;&lt;P&gt;aaa accounting connection default start-stop group tacacs+&lt;/P&gt;&lt;P&gt;aaa accounting system default start-stop group tacacs+&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;line con 0&lt;/P&gt;&lt;P&gt;password xxxxx&lt;/P&gt;&lt;P&gt;authorization exec CONSOLE&lt;/P&gt;&lt;P&gt;login authentication CONSOLE&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;end&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;msteinhoff&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
    <pubDate>Sun, 10 Mar 2019 21:59:20 GMT</pubDate>
    <dc:creator>m.steinhoff</dc:creator>
    <dc:date>2019-03-10T21:59:20Z</dc:date>
    <item>
      <title>Tacacs Fallback and console login</title>
      <link>https://community.cisco.com/t5/network-access-control/tacacs-fallback-and-console-login/m-p/698308#M421621</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am trying to create a tacacs config that will make sure that when you log onto the console you do not get tacacs and that we are on line login and local enable.  If connectivity to the tacacs server is lost, the login for telnet defaults to the line password and uses the local enable password.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My config:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa authentication login default group tacacs+ line&lt;/P&gt;&lt;P&gt;aaa authentication login CONSOLE line&lt;/P&gt;&lt;P&gt;aaa authentication enable default group tacacs+ enable&lt;/P&gt;&lt;P&gt;aaa authorization exec default group tacacs+ if-authenticated&lt;/P&gt;&lt;P&gt;aaa authorization exec CONSOLE none&lt;/P&gt;&lt;P&gt;aaa authorization commands 1 default if-authenticated&lt;/P&gt;&lt;P&gt;aaa authorization commands 15 default if-authenticated&lt;/P&gt;&lt;P&gt;aaa authorization commands 1 CONSOLE none&lt;/P&gt;&lt;P&gt;aaa authorization commands 15 CONSOLE none&lt;/P&gt;&lt;P&gt;aaa accounting exec default start-stop group tacacs+&lt;/P&gt;&lt;P&gt;aaa accounting commands 1 default start-stop group tacacs+&lt;/P&gt;&lt;P&gt;aaa accounting commands 15 default start-stop group tacacs+&lt;/P&gt;&lt;P&gt;aaa accounting connection default start-stop group tacacs+&lt;/P&gt;&lt;P&gt;aaa accounting system default start-stop group tacacs+&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;line con 0&lt;/P&gt;&lt;P&gt;password xxxxx&lt;/P&gt;&lt;P&gt;authorization exec CONSOLE&lt;/P&gt;&lt;P&gt;login authentication CONSOLE&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;end&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;msteinhoff&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 21:59:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tacacs-fallback-and-console-login/m-p/698308#M421621</guid>
      <dc:creator>m.steinhoff</dc:creator>
      <dc:date>2019-03-10T21:59:20Z</dc:date>
    </item>
    <item>
      <title>Re: Tacacs Fallback and console login</title>
      <link>https://community.cisco.com/t5/network-access-control/tacacs-fallback-and-console-login/m-p/698309#M421623</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;msteinhoff &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Your config looks pretty good to me. For telnet authentication it should use tacacs and if tacacs is not available it will use the line password. The console will not use tacacs for authentication and will use the line password. Both telnet and console will use tacacs to authenticate enable and will fall back to the locally configured enable/enable secret if tacacs is not available.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mostly I think the configuration of authorization is fine. I would suggest one minor fine tuning. Instead of:&lt;/P&gt;&lt;P&gt;aaa authorization exec CONSOLE none &lt;/P&gt;&lt;P&gt;I would suggest this:&lt;/P&gt;&lt;P&gt;aaa authorization exec CONSOLE if-authenticated&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Rick&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 15 Feb 2007 14:57:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tacacs-fallback-and-console-login/m-p/698309#M421623</guid>
      <dc:creator>Richard Burts</dc:creator>
      <dc:date>2007-02-15T14:57:39Z</dc:date>
    </item>
    <item>
      <title>Re: Tacacs Fallback and console login</title>
      <link>https://community.cisco.com/t5/network-access-control/tacacs-fallback-and-console-login/m-p/698310#M421624</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This is exactly what you need:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa authentication login notac none&lt;/P&gt;&lt;P&gt;aaa authentication login VTY group tacacs+ local&lt;/P&gt;&lt;P&gt;aaa authentication enable default group tacacs+ enable&lt;/P&gt;&lt;P&gt;aaa authorization console&lt;/P&gt;&lt;P&gt;aaa authorization config-commands&lt;/P&gt;&lt;P&gt;aaa authorization exec default group tacacs+ group tacacs+&lt;/P&gt;&lt;P&gt;aaa authorization exec notac none&lt;/P&gt;&lt;P&gt;aaa authorization exec VTY group tacacs+ if-authenticated none&lt;/P&gt;&lt;P&gt;aaa authorization commands 0 VTY group tacacs+ if-authenticated none&lt;/P&gt;&lt;P&gt;aaa authorization commands 1 VTY group tacacs+ if-authenticated none&lt;/P&gt;&lt;P&gt;aaa authorization commands 15 VTY group tacacs+ if-authenticated none&lt;/P&gt;&lt;P&gt;aaa authorization network VTY group tacacs+ if-authenticated none&lt;/P&gt;&lt;P&gt;aaa accounting exec TAC start-stop group tacacs+&lt;/P&gt;&lt;P&gt;aaa accounting exec VTY start-stop group tacacs+&lt;/P&gt;&lt;P&gt;aaa accounting commands 0 TAC start-stop group tacacs+&lt;/P&gt;&lt;P&gt;aaa accounting commands 0 VTY start-stop group tacacs+&lt;/P&gt;&lt;P&gt;aaa accounting commands 1 TAC start-stop group tacacs+&lt;/P&gt;&lt;P&gt;aaa accounting commands 1 VTY start-stop group tacacs+&lt;/P&gt;&lt;P&gt;aaa accounting commands 10 TAC start-stop group tacacs+&lt;/P&gt;&lt;P&gt;aaa accounting commands 15 TAC start-stop group tacacs+&lt;/P&gt;&lt;P&gt;aaa accounting commands 15 VTY start-stop group tacacs+&lt;/P&gt;&lt;P&gt;aaa accounting network VTY start-stop group tacacs+&lt;/P&gt;&lt;P&gt;aaa accounting connection TAC start-stop group tacacs+&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;line con 0&lt;/P&gt;&lt;P&gt; exec-timeout 0 0&lt;/P&gt;&lt;P&gt; authorization exec notac&lt;/P&gt;&lt;P&gt; accounting commands 0 VTY&lt;/P&gt;&lt;P&gt; accounting commands 1 VTY&lt;/P&gt;&lt;P&gt; accounting commands 15 VTY&lt;/P&gt;&lt;P&gt; accounting exec VTY&lt;/P&gt;&lt;P&gt; logging synchronous&lt;/P&gt;&lt;P&gt; login authentication notac&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;line vty 0 15&lt;/P&gt;&lt;P&gt; exec-timeout 0 0&lt;/P&gt;&lt;P&gt; authorization commands 0 VTY&lt;/P&gt;&lt;P&gt; authorization commands 1 VTY&lt;/P&gt;&lt;P&gt; authorization commands 15 VTY&lt;/P&gt;&lt;P&gt; authorization exec VTY&lt;/P&gt;&lt;P&gt; accounting commands 0 VTY&lt;/P&gt;&lt;P&gt; accounting commands 1 VTY&lt;/P&gt;&lt;P&gt; accounting commands 15 VTY&lt;/P&gt;&lt;P&gt; accounting exec VTY&lt;/P&gt;&lt;P&gt; login authentication VTY&lt;/P&gt;&lt;P&gt; transport input ssh&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;This will give very fine control on what user(s) can and can not do.  I use this configuration with Freeware TACACS and it &lt;/P&gt;&lt;P&gt;works wonder for me.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Good luck.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;David&lt;/P&gt;&lt;P&gt;CCIE Security&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 15 Feb 2007 16:51:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tacacs-fallback-and-console-login/m-p/698310#M421624</guid>
      <dc:creator>daviddtran</dc:creator>
      <dc:date>2007-02-15T16:51:32Z</dc:date>
    </item>
  </channel>
</rss>

