<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: AAA &amp; Radius in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/aaa-radius/m-p/556440#M427310</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you for your post.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I did test this and it does work.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;However I would prefer to have AAA/Radius control this by doing it this way instead:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa authorization console&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Again, thank you for your help,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Take care,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sat, 06 May 2006 17:59:44 GMT</pubDate>
    <dc:creator>87305</dc:creator>
    <dc:date>2006-05-06T17:59:44Z</dc:date>
    <item>
      <title>AAA &amp; Radius</title>
      <link>https://community.cisco.com/t5/network-access-control/aaa-radius/m-p/556433#M427276</link>
      <description>&lt;P&gt;In a lab, when I configure the following there is no issue logging into the switch using telnet/ssh:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa new-model&lt;/P&gt;&lt;P&gt;aaa authentication login default group radius&lt;/P&gt;&lt;P&gt;aaa authorization exec default group radius if-authenticated&lt;/P&gt;&lt;P&gt;aaa accounting exec default start-stop group radius&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have configured the following Cisco AV-pair on the AAA server:&lt;/P&gt;&lt;P&gt;shell:priv-lvl=15&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When I login via telnet/ssh, there is no problem at all.  However, when I login via console I do not get priv level?  It authenticates me to user exec but no further.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If anyone has seen this I would greatly appreciate any help.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 21:34:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/aaa-radius/m-p/556433#M427276</guid>
      <dc:creator>87305</dc:creator>
      <dc:date>2019-03-10T21:34:25Z</dc:date>
    </item>
    <item>
      <title>Re: AAA &amp; Radius</title>
      <link>https://community.cisco.com/t5/network-access-control/aaa-radius/m-p/556434#M427285</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;By right, with 'login default..', it should be applied to all interfaces, .e.g vty 0 4.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Anyway, maybe you can try to manually apply the 'login authentication default' under console (con 0), or create separate aaa authentication with different name and apply it to con 0.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Rgds,&lt;/P&gt;&lt;P&gt;AK&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 06 May 2006 08:30:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/aaa-radius/m-p/556434#M427285</guid>
      <dc:creator>a.kiprawih</dc:creator>
      <dc:date>2006-05-06T08:30:59Z</dc:date>
    </item>
    <item>
      <title>Re: AAA &amp; Radius</title>
      <link>https://community.cisco.com/t5/network-access-control/aaa-radius/m-p/556435#M427290</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Got your point, will test it in my lab.. &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 06 May 2006 08:41:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/aaa-radius/m-p/556435#M427290</guid>
      <dc:creator>a.kiprawih</dc:creator>
      <dc:date>2006-05-06T08:41:20Z</dc:date>
    </item>
    <item>
      <title>Re: AAA &amp; Radius</title>
      <link>https://community.cisco.com/t5/network-access-control/aaa-radius/m-p/556436#M427295</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hii christ &lt;/P&gt;&lt;P&gt;try this command aaa authorization console&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;where u  defined the av pair value  in shell or in ietf radius Att. &lt;/P&gt;&lt;P&gt;Try one thing just mark the exec button and then in previll level define 15 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; Regards&lt;/P&gt;&lt;P&gt;Manish&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 06 May 2006 09:07:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/aaa-radius/m-p/556436#M427295</guid>
      <dc:creator>manish.gaur</dc:creator>
      <dc:date>2006-05-06T09:07:41Z</dc:date>
    </item>
    <item>
      <title>Re: AAA &amp; Radius</title>
      <link>https://community.cisco.com/t5/network-access-control/aaa-radius/m-p/556437#M427299</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Christopher&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;By default Cisco does the authorization on the vty and not on the console. It is intended that way to give you access to the device if you misconfigure aaa authorization and lock yourself out of the device (it is not unusual for that to happen in the early stages of learning how to configure aaa). If you want it to authorize on the console (and put users directly into privilege mode) the command aaa authorization console should work for you.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Rick&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 06 May 2006 13:45:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/aaa-radius/m-p/556437#M427299</guid>
      <dc:creator>Richard Burts</dc:creator>
      <dc:date>2006-05-06T13:45:19Z</dc:date>
    </item>
    <item>
      <title>Re: AAA &amp; Radius</title>
      <link>https://community.cisco.com/t5/network-access-control/aaa-radius/m-p/556438#M427306</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Tested by adding one line to console 0:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;line con 0&lt;/P&gt;&lt;P&gt; privilege level 15&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;*Access authentication will still go through radius.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;From the test, I can see that access via telnet &amp;amp; ssh will automatically give you the "#" (router#), but when you access it via console, your prvilege level is limited to "router&amp;gt;".&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you intend to manage your router, tacacs+ is probably best option to use (more control over commands). And also, you might consider to use local database as the last resort/option to authenticate access to router in case your AAA server unreachable/down.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Pls rate if you find this solution useful. Thanks.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Rgds,&lt;/P&gt;&lt;P&gt;AK&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 06 May 2006 14:01:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/aaa-radius/m-p/556438#M427306</guid>
      <dc:creator>a.kiprawih</dc:creator>
      <dc:date>2006-05-06T14:01:21Z</dc:date>
    </item>
    <item>
      <title>Re: AAA &amp; Radius</title>
      <link>https://community.cisco.com/t5/network-access-control/aaa-radius/m-p/556439#M427308</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Gents,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you all for the tremendous feedback, you have all been of a great help.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa authorization console worked as anticipated.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This was one of those unlisted IOS commands that drove me crazy.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Again thank you to everyone for all your help.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have one last question.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Would anyone happen to know how to secure the web management (http secure server) in the same manor?  I want to give users the ability to login to the web interface via radius.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I thought the command was aaa authorization websomething?  But I can not remember?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks again&lt;/P&gt;&lt;P&gt;,&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 06 May 2006 17:50:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/aaa-radius/m-p/556439#M427308</guid>
      <dc:creator>87305</dc:creator>
      <dc:date>2006-05-06T17:50:46Z</dc:date>
    </item>
    <item>
      <title>Re: AAA &amp; Radius</title>
      <link>https://community.cisco.com/t5/network-access-control/aaa-radius/m-p/556440#M427310</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you for your post.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I did test this and it does work.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;However I would prefer to have AAA/Radius control this by doing it this way instead:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa authorization console&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Again, thank you for your help,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Take care,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 06 May 2006 17:59:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/aaa-radius/m-p/556440#M427310</guid>
      <dc:creator>87305</dc:creator>
      <dc:date>2006-05-06T17:59:44Z</dc:date>
    </item>
    <item>
      <title>Re: AAA &amp; Radius</title>
      <link>https://community.cisco.com/t5/network-access-control/aaa-radius/m-p/556441#M427312</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Christopher&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have not used this on a live router so can not speak from much experience. But I believe that you will find your solution in this command:&lt;/P&gt;&lt;P&gt;router_vpn(config)#ip http authentication aaa ?&lt;/P&gt;&lt;P&gt;command-authorization  Set method list for command authorization&lt;/P&gt;&lt;P&gt;exec-authorization     Set method list for exec authorization&lt;/P&gt;&lt;P&gt;login-authentication   Set method list for login authentication&lt;/P&gt;&lt;P&gt;&lt;CR&gt;&lt;/CR&gt;&lt;/P&gt;&lt;P&gt;I believe that it will set authentication for http secure server as well as the http server (though since I have not done it I can not say for sure).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Rick&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 06 May 2006 19:08:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/aaa-radius/m-p/556441#M427312</guid>
      <dc:creator>Richard Burts</dc:creator>
      <dc:date>2006-05-06T19:08:15Z</dc:date>
    </item>
    <item>
      <title>Re: AAA &amp; Radius</title>
      <link>https://community.cisco.com/t5/network-access-control/aaa-radius/m-p/556442#M427314</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you for the prompt response once again.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have tried the following to no avail:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa authentication login abc group radius local&lt;/P&gt;&lt;P&gt;aaa authorization exec abc group radius if-authenticated local &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip http authentication aaa login-authentication abc&lt;/P&gt;&lt;P&gt;ip http authentication aaa exec-authorization abc&lt;/P&gt;&lt;P&gt;ip http authentication aaa command-authorization 15 abc&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The following is not support in the IOS that I am running:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa authorization commands 15 abc group radius if-authenticated local&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The only option for me is:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa authorization commands 15 abc group tacacs+ if-authenticated local&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There must be a way to configure this.  I will continue to research.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you for your help again.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Take care,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 08 May 2006 11:32:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/aaa-radius/m-p/556442#M427314</guid>
      <dc:creator>87305</dc:creator>
      <dc:date>2006-05-08T11:32:10Z</dc:date>
    </item>
  </channel>
</rss>

