<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic aaa authorization and unavailable TACACS server scenario in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/aaa-authorization-and-unavailable-tacacs-server-scenario/m-p/174789#M437042</link>
    <description>&lt;P&gt;I have setup a PIX to authentication users for telnet and enable access.  I have setup authorization so a subset of users can only run show commands.  This all works as expected.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The problem is when I simulate and network outage and try to get console access to the PIX.  I cannot run the enable command because the command cannot be authorized.  I would have to use password recovery means to gain access to the PIX.  How do I get around this?  Can I have the command authorization handled locally?  Can I associated the show command with a lower priveledge level?  If so, how and how do I  limit user to that privledge level (via TACACS)?  What do I forfeit by doing so?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
    <pubDate>Sun, 10 Mar 2019 14:12:24 GMT</pubDate>
    <dc:creator>dladen</dc:creator>
    <dc:date>2019-03-10T14:12:24Z</dc:date>
    <item>
      <title>aaa authorization and unavailable TACACS server scenario</title>
      <link>https://community.cisco.com/t5/network-access-control/aaa-authorization-and-unavailable-tacacs-server-scenario/m-p/174789#M437042</link>
      <description>&lt;P&gt;I have setup a PIX to authentication users for telnet and enable access.  I have setup authorization so a subset of users can only run show commands.  This all works as expected.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The problem is when I simulate and network outage and try to get console access to the PIX.  I cannot run the enable command because the command cannot be authorized.  I would have to use password recovery means to gain access to the PIX.  How do I get around this?  Can I have the command authorization handled locally?  Can I associated the show command with a lower priveledge level?  If so, how and how do I  limit user to that privledge level (via TACACS)?  What do I forfeit by doing so?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 14:12:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/aaa-authorization-and-unavailable-tacacs-server-scenario/m-p/174789#M437042</guid>
      <dc:creator>dladen</dc:creator>
      <dc:date>2019-03-10T14:12:24Z</dc:date>
    </item>
    <item>
      <title>Re: aaa authorization and unavailable TACACS server scenario</title>
      <link>https://community.cisco.com/t5/network-access-control/aaa-authorization-and-unavailable-tacacs-server-scenario/m-p/174790#M437043</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If the PIX is configured for TACACS authentiaction and TACACS server is not available to authenticate, there is no way to fallback or get around of this issue at this time.&lt;/P&gt;&lt;P&gt;You can configure the pix to fallback to local authentication if tacacs is not available.&lt;/P&gt;&lt;P&gt;Next release (i think 6.3 and above) will have a that feature available.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 18 Mar 2003 23:24:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/aaa-authorization-and-unavailable-tacacs-server-scenario/m-p/174790#M437043</guid>
      <dc:creator>tepatel</dc:creator>
      <dc:date>2003-03-18T23:24:07Z</dc:date>
    </item>
  </channel>
</rss>

