<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: 2FA with ISE and CAC - Is it possible for the login to fallback? in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/2fa-with-ise-and-cac-is-it-possible-for-the-login-to-fallback/m-p/4000091#M454986</link>
    <description>&lt;P&gt;Thanks for the reply Colby, but I'm not sure that will work, unless I'm misunderstanding something. With the following commands configured on the switch:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ip ssh server algorithm hostkey ssh-rsa&lt;BR /&gt;ip ssh server algorithm authentication publickey&lt;BR /&gt;ip ssh server algorithm publickey x509v3-ssh-rsa&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Won't the switch reject any SSH attempt that doesn't provide a digital certificate that can't be verified by the pki trustpoint configured on the switch? I'm not sure if the authentication request will be sent to ISE until the switch can verify the the User certificate first... I don't have a way to lab this up right now to test it out.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 17 Dec 2019 17:04:11 GMT</pubDate>
    <dc:creator>shane.vickers</dc:creator>
    <dc:date>2019-12-17T17:04:11Z</dc:date>
    <item>
      <title>2FA with ISE and CAC - Is it possible for the login to fallback?</title>
      <link>https://community.cisco.com/t5/network-access-control/2fa-with-ise-and-cac-is-it-possible-for-the-login-to-fallback/m-p/3999542#M454982</link>
      <description>&lt;P&gt;When implementing 2FA authentication to networking devices using CAC/Pin (from this guide: &lt;A href="https://www.pragmasys.com/products/support/cisco-2-factor" target="_blank" rel="noopener"&gt;https://www.pragmasys.com/products/support/cisco-2-factor )&lt;/A&gt;&amp;nbsp;is it possible for the login attempt to fallback to a non-CAC TACACS user or a local user account?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;For example: If I have a Cisco Prime or SolarWinds deployment that is configured to SSH into the switches to execute scripts/jobs, how would I go about keeping that same functionality since the network management software will not be able to provide the publickey/pin?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 19:12:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/2fa-with-ise-and-cac-is-it-possible-for-the-login-to-fallback/m-p/3999542#M454982</guid>
      <dc:creator>shane.vickers</dc:creator>
      <dc:date>2020-02-21T19:12:33Z</dc:date>
    </item>
    <item>
      <title>Re: 2FA with ISE and CAC - Is it possible for the login to fallback?</title>
      <link>https://community.cisco.com/t5/network-access-control/2fa-with-ise-and-cac-is-it-possible-for-the-login-to-fallback/m-p/3999645#M454984</link>
      <description>&lt;P&gt;You can use an Identity Source Sequence in your authentication policy.&amp;nbsp; It can check the internal database of ISE first and if the user is not found, it can then use 2FA, AD, or whatever else you put in the list to try.&lt;/P&gt;</description>
      <pubDate>Mon, 16 Dec 2019 21:28:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/2fa-with-ise-and-cac-is-it-possible-for-the-login-to-fallback/m-p/3999645#M454984</guid>
      <dc:creator>Colby LeMaire</dc:creator>
      <dc:date>2019-12-16T21:28:29Z</dc:date>
    </item>
    <item>
      <title>Re: 2FA with ISE and CAC - Is it possible for the login to fallback?</title>
      <link>https://community.cisco.com/t5/network-access-control/2fa-with-ise-and-cac-is-it-possible-for-the-login-to-fallback/m-p/4000091#M454986</link>
      <description>&lt;P&gt;Thanks for the reply Colby, but I'm not sure that will work, unless I'm misunderstanding something. With the following commands configured on the switch:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ip ssh server algorithm hostkey ssh-rsa&lt;BR /&gt;ip ssh server algorithm authentication publickey&lt;BR /&gt;ip ssh server algorithm publickey x509v3-ssh-rsa&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Won't the switch reject any SSH attempt that doesn't provide a digital certificate that can't be verified by the pki trustpoint configured on the switch? I'm not sure if the authentication request will be sent to ISE until the switch can verify the the User certificate first... I don't have a way to lab this up right now to test it out.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 17 Dec 2019 17:04:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/2fa-with-ise-and-cac-is-it-possible-for-the-login-to-fallback/m-p/4000091#M454986</guid>
      <dc:creator>shane.vickers</dc:creator>
      <dc:date>2019-12-17T17:04:11Z</dc:date>
    </item>
    <item>
      <title>Re: 2FA with ISE and CAC - Is it possible for the login to fallback?</title>
      <link>https://community.cisco.com/t5/network-access-control/2fa-with-ise-and-cac-is-it-possible-for-the-login-to-fallback/m-p/4000130#M455083</link>
      <description>&lt;P&gt;That's a good point.&amp;nbsp; My response was based on ISE being the authenticator for both the certificate and the user/password. &amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 17 Dec 2019 17:39:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/2fa-with-ise-and-cac-is-it-possible-for-the-login-to-fallback/m-p/4000130#M455083</guid>
      <dc:creator>Colby LeMaire</dc:creator>
      <dc:date>2019-12-17T17:39:25Z</dc:date>
    </item>
    <item>
      <title>Re: 2FA with ISE and CAC - Is it possible for the login to fallback?</title>
      <link>https://community.cisco.com/t5/network-access-control/2fa-with-ise-and-cac-is-it-possible-for-the-login-to-fallback/m-p/4000135#M455084</link>
      <description>I probably wasn't clear enough in my original question, sorry about that.</description>
      <pubDate>Tue, 17 Dec 2019 17:44:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/2fa-with-ise-and-cac-is-it-possible-for-the-login-to-fallback/m-p/4000135#M455084</guid>
      <dc:creator>shane.vickers</dc:creator>
      <dc:date>2019-12-17T17:44:22Z</dc:date>
    </item>
    <item>
      <title>Re: 2FA with ISE and CAC - Is it possible for the login to fallback?</title>
      <link>https://community.cisco.com/t5/network-access-control/2fa-with-ise-and-cac-is-it-possible-for-the-login-to-fallback/m-p/4000189#M455085</link>
      <description>In order to accomplish what you are searching for you need to append 'password' as shown below:&lt;BR /&gt;ip ssh server algorithm authentication publickey password&lt;BR /&gt;This will allow cac auth and/or user/pass. It will also allow you to be able to use either a local or ISE t+ user account. HTH!&lt;BR /&gt;</description>
      <pubDate>Tue, 17 Dec 2019 18:37:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/2fa-with-ise-and-cac-is-it-possible-for-the-login-to-fallback/m-p/4000189#M455085</guid>
      <dc:creator>Mike.Cifelli</dc:creator>
      <dc:date>2019-12-17T18:37:19Z</dc:date>
    </item>
  </channel>
</rss>

