<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: AAA order of Authentication in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/aaa-order-of-authentication/m-p/518521#M426788</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Unfortunately, it doesn't quite work that way.  When a method list is used (in your case, the default method list), then it will user the first method in that list.  For your config, the attempt will  authenticate against the TACACS+ server.  If the TACACS+ server is responsive and actually responds with a reject message, the authentication will not fall back to local and fail the user.  This is intended behavior.  Only when the TACACS+ server is unresponsive or not sending back valid responses will authentication ever fall back to local.  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If the local database was being used due to fallback and you wanted to automatically be placed in enable mode, you need to add "local" to your authorization exec so that shell exec privilege is passed:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa authorization exec default group tacacs+ local if-authenticated&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is there a specific need to have your local user gui_id to be able to authenticate at all times?  For best practices, your users should all authenticate to tacacs.  Only if tacacs goes down should you need to use the local database as a backdoor in this failure scenario.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sincerely,&lt;/P&gt;&lt;P&gt;Annie&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 28 Jul 2006 16:04:26 GMT</pubDate>
    <dc:creator>annnguy</dc:creator>
    <dc:date>2006-07-28T16:04:26Z</dc:date>
    <item>
      <title>AAA order of Authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/aaa-order-of-authentication/m-p/518520#M426787</link>
      <description>&lt;P&gt;What do I need to modify or add to the following so the locally defined userid gui_id can succeed when logging into this router at all times even if communication with the TACACS+ server is up.  (gui_id does not exist in the TACACS+ server).  Order of authentication for other defined user ids and the default group should stay the same.  Also, if possible, can the user gui_id be automatically enabled when authenticated and how:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;enable secret router_enable&lt;/P&gt;&lt;P&gt;username nst_id privilege 15 password nst_password&lt;/P&gt;&lt;P&gt;username gui_id privilege 15 password gui_password&lt;/P&gt;&lt;P&gt;username solv_id  privilege 1  password solv_password&lt;/P&gt;&lt;P&gt;aaa new-model&lt;/P&gt;&lt;P&gt;aaa authentication username-prompt "Local Username: "&lt;/P&gt;&lt;P&gt;aaa authentication login default group tacacs+ local&lt;/P&gt;&lt;P&gt;aaa authorization exec default group tacacs+ if-authenticated&lt;/P&gt;&lt;P&gt;aaa authorization commands 1 default group tacacs+ if-authenticated&lt;/P&gt;&lt;P&gt;aaa authorization commands 15 default group tacacs+ if-authenticated&lt;/P&gt;&lt;P&gt;aaa authorization console       &lt;/P&gt;&lt;P&gt;aaa accounting exec default start-stop tacacs+ &lt;/P&gt;&lt;P&gt;aaa accounting commands 0 default stop-only tacacs+ &lt;/P&gt;&lt;P&gt;aaa accounting commands 1 default stop-only tacacs+ &lt;/P&gt;&lt;P&gt;aaa accounting commands 15 default stop-only tacacs+&lt;/P&gt;&lt;P&gt;tacacs-server host xxx.xxx.xxx.xxx&lt;/P&gt;&lt;P&gt;tacacs-server key *******&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 21:40:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/aaa-order-of-authentication/m-p/518520#M426787</guid>
      <dc:creator>hadbihas</dc:creator>
      <dc:date>2019-03-10T21:40:56Z</dc:date>
    </item>
    <item>
      <title>Re: AAA order of Authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/aaa-order-of-authentication/m-p/518521#M426788</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Unfortunately, it doesn't quite work that way.  When a method list is used (in your case, the default method list), then it will user the first method in that list.  For your config, the attempt will  authenticate against the TACACS+ server.  If the TACACS+ server is responsive and actually responds with a reject message, the authentication will not fall back to local and fail the user.  This is intended behavior.  Only when the TACACS+ server is unresponsive or not sending back valid responses will authentication ever fall back to local.  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If the local database was being used due to fallback and you wanted to automatically be placed in enable mode, you need to add "local" to your authorization exec so that shell exec privilege is passed:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa authorization exec default group tacacs+ local if-authenticated&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is there a specific need to have your local user gui_id to be able to authenticate at all times?  For best practices, your users should all authenticate to tacacs.  Only if tacacs goes down should you need to use the local database as a backdoor in this failure scenario.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sincerely,&lt;/P&gt;&lt;P&gt;Annie&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 28 Jul 2006 16:04:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/aaa-order-of-authentication/m-p/518521#M426788</guid>
      <dc:creator>annnguy</dc:creator>
      <dc:date>2006-07-28T16:04:26Z</dc:date>
    </item>
  </channel>
</rss>

