<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: tacacs user via console? in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/tacacs-user-via-console/m-p/472525#M428986</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;How do you in the router configured via vty in the router with authentication via TACACS+ &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 28 Dec 2005 19:31:00 GMT</pubDate>
    <dc:creator>bugalde</dc:creator>
    <dc:date>2005-12-28T19:31:00Z</dc:date>
    <item>
      <title>tacacs user via console?</title>
      <link>https://community.cisco.com/t5/network-access-control/tacacs-user-via-console/m-p/472522#M428979</link>
      <description>&lt;P&gt;Hello all,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We encountered some strange problem with authentication via TACACS+. Logging into a switch via VTY works ok.... I enter my Username and PW and start at the priveledged exec prompt. But when I'm trying to log in via console, I won't get priviledge exec rights without entering an ena pass. This phenomenon occurs in diffrent IOS versions.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Config looks like that:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa new-model&lt;/P&gt;&lt;P&gt;aaa authentication login default group tacacs+ local&lt;/P&gt;&lt;P&gt;aaa authentication enable default group tacacs+ enable&lt;/P&gt;&lt;P&gt;aaa authorization exec default group tacacs+ none&lt;/P&gt;&lt;P&gt;aaa authorization network default group tacacs+ local&lt;/P&gt;&lt;P&gt;aaa accounting send stop-record authentication failure&lt;/P&gt;&lt;P&gt;aaa accounting update newinfo periodic 15&lt;/P&gt;&lt;P&gt;aaa accounting exec default start-stop group tacacs+&lt;/P&gt;&lt;P&gt;aaa accounting commands 15 default start-stop group tacacs+&lt;/P&gt;&lt;P&gt;aaa accounting connection default start-stop group tacacs+&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;username &amp;lt;User&amp;gt; privilege 15 password &amp;lt;somepass&amp;gt;&lt;/P&gt;&lt;P&gt;tacacs-server host x.x.x.x&lt;/P&gt;&lt;P&gt;tacacs-server host x.x.x.x&lt;/P&gt;&lt;P&gt;tacacs-server timeout 25&lt;/P&gt;&lt;P&gt;tacacs-server key &amp;lt;ourkey&amp;gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;line con 0&lt;/P&gt;&lt;P&gt;exec timeout 0 0&lt;/P&gt;&lt;P&gt;line vty 0 4  aso.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any Ideas?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sebastian&lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 21:11:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tacacs-user-via-console/m-p/472522#M428979</guid>
      <dc:creator>sebastian.wiegand</dc:creator>
      <dc:date>2019-03-10T21:11:34Z</dc:date>
    </item>
    <item>
      <title>Re: tacacs user via console?</title>
      <link>https://community.cisco.com/t5/network-access-control/tacacs-user-via-console/m-p/472523#M428981</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sebastian&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What you are experiencing is a behavior that Cisco implements purposely. As it has been explained to me, to enter directly into privilege mode is a combination of authentication and of authorization. For the vty ports this is enabled. For the console it does the authentication but not the authorization componenet. The reason for this is that it is easy to misconfigure the authorization part of the config. It is one thing to lock yourself out of the vty ports and it is something else (and much more serious) if you lock yourself out of the console. So as a safety mechanism Cisco does not by default apply authorization on the console. You will need to enter the enable password on the console.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Rick&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 16 Jun 2005 13:43:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tacacs-user-via-console/m-p/472523#M428981</guid>
      <dc:creator>Richard Burts</dc:creator>
      <dc:date>2005-06-16T13:43:13Z</dc:date>
    </item>
    <item>
      <title>Re: tacacs user via console?</title>
      <link>https://community.cisco.com/t5/network-access-control/tacacs-user-via-console/m-p/472524#M428983</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;While, this can be a good safety feature...  I beleive that adding this:&lt;/P&gt;&lt;P&gt;aaa authorization console&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;solved this same problem for me when I was setting this up on our Cat6500 switches.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 12 Jul 2005 11:49:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tacacs-user-via-console/m-p/472524#M428983</guid>
      <dc:creator>andy-gerace</dc:creator>
      <dc:date>2005-07-12T11:49:30Z</dc:date>
    </item>
    <item>
      <title>Re: tacacs user via console?</title>
      <link>https://community.cisco.com/t5/network-access-control/tacacs-user-via-console/m-p/472525#M428986</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;How do you in the router configured via vty in the router with authentication via TACACS+ &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 28 Dec 2005 19:31:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tacacs-user-via-console/m-p/472525#M428986</guid>
      <dc:creator>bugalde</dc:creator>
      <dc:date>2005-12-28T19:31:00Z</dc:date>
    </item>
  </channel>
</rss>

