<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Exec Authorization for router's console and Radius in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/exec-authorization-for-router-s-console-and-radius/m-p/267437#M435599</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Authorization on the console port is turned off by default, even with authorization enabled globally.  This was done on purpose as we had a large number of people lock themselves out of their router when configuring authorization, and we wanted the console port to always be a backdoor entry.  The theory is that if someone has access to your console port, you have a lot more to worry about than command or exec authorization  &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you really, really want to enable authorization on the console port, add the following hidden command into your router and you should be good to go:&lt;/P&gt;&lt;P&gt;&lt;B&gt;&lt;/B&gt;&lt;/P&gt;&lt;P&gt;aaa authorization console&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 20 May 2004 02:33:14 GMT</pubDate>
    <dc:creator>gfullage</dc:creator>
    <dc:date>2004-05-20T02:33:14Z</dc:date>
    <item>
      <title>Exec Authorization for router's console and Radius</title>
      <link>https://community.cisco.com/t5/network-access-control/exec-authorization-for-router-s-console-and-radius/m-p/267436#M435597</link>
      <description>&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i've configured my router's authentication and authorization in this fashion:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;username test privilege 15 password test&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa authentication password-prompt password:&lt;/P&gt;&lt;P&gt;aaa authentication username-prompt login:&lt;/P&gt;&lt;P&gt;aaa authentication login vty group radius local&lt;/P&gt;&lt;P&gt;aaa authentication login console group radius local&lt;/P&gt;&lt;P&gt;aaa authorization exec default group radius local&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;line con 0&lt;/P&gt;&lt;P&gt; login authentication console&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;line vty 0 4&lt;/P&gt;&lt;P&gt; login authentication vty&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and i've configured Microsoft IAS radius server with two groups:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;admin with shell-priv-level= 15 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and Operator with shell-priv-level= 1.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When I try on vty, all works well: admin log on router with privilege 15 (already in enable mode) and operator with privilege 1... &lt;/P&gt;&lt;P&gt;but on console all users have level 1 privilege... &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;any ideas?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks in advance,&lt;/P&gt;&lt;P&gt;Graz.&lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 14:48:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/exec-authorization-for-router-s-console-and-radius/m-p/267436#M435597</guid>
      <dc:creator>g.rodegari</dc:creator>
      <dc:date>2019-03-10T14:48:30Z</dc:date>
    </item>
    <item>
      <title>Re: Exec Authorization for router's console and Radius</title>
      <link>https://community.cisco.com/t5/network-access-control/exec-authorization-for-router-s-console-and-radius/m-p/267437#M435599</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Authorization on the console port is turned off by default, even with authorization enabled globally.  This was done on purpose as we had a large number of people lock themselves out of their router when configuring authorization, and we wanted the console port to always be a backdoor entry.  The theory is that if someone has access to your console port, you have a lot more to worry about than command or exec authorization  &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you really, really want to enable authorization on the console port, add the following hidden command into your router and you should be good to go:&lt;/P&gt;&lt;P&gt;&lt;B&gt;&lt;/B&gt;&lt;/P&gt;&lt;P&gt;aaa authorization console&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 20 May 2004 02:33:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/exec-authorization-for-router-s-console-and-radius/m-p/267437#M435599</guid>
      <dc:creator>gfullage</dc:creator>
      <dc:date>2004-05-20T02:33:14Z</dc:date>
    </item>
    <item>
      <title>Re: Exec Authorization for router's console and Radius</title>
      <link>https://community.cisco.com/t5/network-access-control/exec-authorization-for-router-s-console-and-radius/m-p/267438#M435600</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Glenn,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thank you very much!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm completely agree with you: &lt;/P&gt;&lt;P&gt;to have console security, first you should have physical security...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;regards,&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Graz.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 20 May 2004 06:27:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/exec-authorization-for-router-s-console-and-radius/m-p/267438#M435600</guid>
      <dc:creator>g.rodegari</dc:creator>
      <dc:date>2004-05-20T06:27:36Z</dc:date>
    </item>
  </channel>
</rss>

