<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: local authorization in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/local-authorization/m-p/697680#M426534</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Your config looks appropriate to accomplish what you are trying to. I use this (usually as backup for TACACS), and it works great. Have you tried your config and had issues? The only difference from my working configs is I do not have aaa authoriz commands 0 and 15 in my config. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;One side note, if it's a recent IOS I suggest using secret instead of password for your local users. That will prevent the password from being reversed if someone gets your config. For example:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;username admin priv 15 secret mypassword&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sun, 24 Sep 2006 01:08:01 GMT</pubDate>
    <dc:creator>ethiel</dc:creator>
    <dc:date>2006-09-24T01:08:01Z</dc:date>
    <item>
      <title>local authorization</title>
      <link>https://community.cisco.com/t5/network-access-control/local-authorization/m-p/697679#M426533</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is it possible to make authorization using local database (not tacacs or radius)?&lt;/P&gt;&lt;P&gt;I have username admin that has to have access to configuration on router. I also have usename and passwords for IPsec users, but they shouldn't have access to configuration. But both (if they know enable secret) can enter privilege level.&lt;/P&gt;&lt;P&gt;Here is the config output,: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa new-model&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;aaa authentication login USAUTH local&lt;/P&gt;&lt;P&gt;aaa authorization console&lt;/P&gt;&lt;P&gt;aaa authorization exec USAUTH local &lt;/P&gt;&lt;P&gt;aaa authorization commands 0 USAUTH local &lt;/P&gt;&lt;P&gt;aaa authorization commands 15 USAUTH local &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;username admin privilege 15 password 7 044D0E0D06&lt;/P&gt;&lt;P&gt;username user1 privilege 0 password 7 121013161C&lt;/P&gt;&lt;P&gt;username user2 privilege 0 password 7 121B0A051D&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;line con 0&lt;/P&gt;&lt;P&gt; authorization commands 0 USAUTH&lt;/P&gt;&lt;P&gt; authorization commands 15 USAUTH&lt;/P&gt;&lt;P&gt; authorization exec USAUTH&lt;/P&gt;&lt;P&gt; login authentication USAUTH&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 21:45:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/local-authorization/m-p/697679#M426533</guid>
      <dc:creator>Antonio_1_2</dc:creator>
      <dc:date>2019-03-10T21:45:42Z</dc:date>
    </item>
    <item>
      <title>Re: local authorization</title>
      <link>https://community.cisco.com/t5/network-access-control/local-authorization/m-p/697680#M426534</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Your config looks appropriate to accomplish what you are trying to. I use this (usually as backup for TACACS), and it works great. Have you tried your config and had issues? The only difference from my working configs is I do not have aaa authoriz commands 0 and 15 in my config. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;One side note, if it's a recent IOS I suggest using secret instead of password for your local users. That will prevent the password from being reversed if someone gets your config. For example:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;username admin priv 15 secret mypassword&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 24 Sep 2006 01:08:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/local-authorization/m-p/697680#M426534</guid>
      <dc:creator>ethiel</dc:creator>
      <dc:date>2006-09-24T01:08:01Z</dc:date>
    </item>
    <item>
      <title>Re: local authorization</title>
      <link>https://community.cisco.com/t5/network-access-control/local-authorization/m-p/697681#M426535</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes I tried that config and it doesn't work. It works with tacacs, but with local authentication/authorization all users regardless of privilege level, can enter privilege mod (enable) if they now appropriate enable secret. &lt;/P&gt;&lt;P&gt;Is there a way that I can acomplish this with local authorization: when user1 tries to enter enable mod, he will be rejected because whe has prevelege level 0.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Vedran&lt;/P&gt;&lt;P&gt;  &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 25 Sep 2006 06:32:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/local-authorization/m-p/697681#M426535</guid>
      <dc:creator>Antonio_1_2</dc:creator>
      <dc:date>2006-09-25T06:32:38Z</dc:date>
    </item>
    <item>
      <title>Re: local authorization</title>
      <link>https://community.cisco.com/t5/network-access-control/local-authorization/m-p/697682#M426536</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;hope I clear understand your need. User logging in different privilege level then 15 should use such way of enable command:&lt;/P&gt;&lt;P&gt;enable [privilege-level] [view [view-name]]&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So for priv.level 0 use command "enable 0"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope it will help you.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Michal&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 25 Sep 2006 06:46:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/local-authorization/m-p/697682#M426536</guid>
      <dc:creator>kidli</dc:creator>
      <dc:date>2006-09-25T06:46:36Z</dc:date>
    </item>
    <item>
      <title>Re: local authorization</title>
      <link>https://community.cisco.com/t5/network-access-control/local-authorization/m-p/697683#M426537</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I forgot to announce that you should also define permitted commands set for appropriate privilege level using commands privilege or privilege level. Link to reference guide is provided below:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/univercd/cc/td/doc/product/software/ios124/124tcr/tsec_r/sec_p1ht.htm#wp1215217" target="_blank"&gt;http://www.cisco.com/univercd/cc/td/doc/product/software/ios124/124tcr/tsec_r/sec_p1ht.htm#wp1215217&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Nice day.&lt;/P&gt;&lt;P&gt;Michal&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 25 Sep 2006 07:11:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/local-authorization/m-p/697683#M426537</guid>
      <dc:creator>kidli</dc:creator>
      <dc:date>2006-09-25T07:11:13Z</dc:date>
    </item>
  </channel>
</rss>

