<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: TACACS+ authentication asking for enable password -- CISCO ACS in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/tacacs-authentication-asking-for-enable-password-cisco-acs/m-p/3697488#M494821</link>
    <description>&lt;P&gt;The only setting that absolutely have to have a backup method of local is your authentication line.&amp;nbsp; That is what allows the device to fail back to the local user database.&amp;nbsp; The accounting would never really have a backup method.&amp;nbsp; The authorization you can use none, local, if-authenticated and they will all let you in I believe.&amp;nbsp; The best choice is local though because it will also take the privilege level you set on the local username and pass you into # prompt of you want.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I would also start using the newest style syntax if your devices support it.&amp;nbsp; Here is the newest style:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;username&amp;nbsp;&amp;lt;backdoor account&amp;gt; privilege 15 secret 0 &amp;lt;password&amp;gt;&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;tacacs server&amp;nbsp;SERVER-1&lt;BR /&gt;&amp;nbsp; key 0&amp;nbsp;&amp;lt;TACACS Key&amp;gt;&lt;BR /&gt;&amp;nbsp; address ipv4&amp;nbsp;&amp;lt;IP&amp;gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp; single-connection&lt;BR /&gt;!&lt;/P&gt;
&lt;P&gt;tacacs server&amp;nbsp;SERVER-2&lt;BR /&gt;&amp;nbsp; key 0&amp;nbsp;&amp;lt;TACACS Key&amp;gt;&lt;BR /&gt;&amp;nbsp; address ipv4&amp;nbsp;&amp;lt;IP&amp;gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp; single-connection&lt;/P&gt;
&lt;P&gt;!&lt;BR /&gt;aaa group server tacacs+ TACACS&lt;BR /&gt;&amp;nbsp; server name &lt;SPAN&gt;SERVER-1&lt;/SPAN&gt;&lt;BR /&gt;&amp;nbsp; server name &lt;SPAN&gt;SERVER-2&lt;/SPAN&gt;&lt;BR /&gt;&amp;nbsp; ip tacacs source-interface&amp;lt;source VLAN/interface&amp;gt;&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;aaa authentication login default group TACACS local&lt;BR /&gt;aaa authorization exec default group TACACS&amp;nbsp;local&lt;BR /&gt;aaa authorization commands 15 default group TACACS if-authenticated&lt;BR /&gt;!aaa authorization config-commands (I don't use this unless specific use case&lt;BR /&gt;aaa accounting exec default start-stop group TACACS&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;aaa accounting commands&amp;nbsp;0 default stop-only group TACACS&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;aaa accounting commands 1 default stop-only group TACACS&lt;/SPAN&gt;&lt;BR /&gt;aaa accounting commands 15 default stop-only group TACACS&lt;/P&gt;</description>
    <pubDate>Thu, 30 Aug 2018 03:01:56 GMT</pubDate>
    <dc:creator>paul</dc:creator>
    <dc:date>2018-08-30T03:01:56Z</dc:date>
    <item>
      <title>TACACS+ authentication asking for enable password -- CISCO ACS</title>
      <link>https://community.cisco.com/t5/network-access-control/tacacs-authentication-asking-for-enable-password-cisco-acs/m-p/3696667#M494665</link>
      <description>&lt;P&gt;Hi Cisco Community,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I'm new on configuring tacacs, hope you can help me.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have a issue, every time I log in using my TACACS+ account it still ask me for the&amp;nbsp;&lt;STRONG&gt;enable password&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;based on the config below, what is the command here that still asks me for the enable password? or should I delete the enable password itself to bypass that?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;my goal is:&lt;/P&gt;
&lt;P&gt;1. whenever I logged in my credentials using my tacacs+ account, i can proceed already to priv mode and the device should not ask for the enable password.&lt;/P&gt;
&lt;P&gt;2. are all the config here are necessary? if no, can you help me identify what are the unnecessary commands to achieve goal 1?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;CONFIG:&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;aaa new-model&lt;BR /&gt;aaa group server tacacs+ default&lt;BR /&gt;server 172.x.x.x&lt;BR /&gt;!&lt;BR /&gt;aaa group server tacacs+ ciscosecure&lt;BR /&gt;server 172.x.x.x.x&lt;BR /&gt;!&lt;BR /&gt;aaa authentication login default group tacacs+ line&lt;BR /&gt;aaa authentication login console line none&lt;BR /&gt;aaa authorization config-commands&lt;BR /&gt;aaa authorization commands 0 default group tacacs+ none&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt;aaa authorization commands 15 default group tacacs+ none&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt;aaa accounting exec default start-stop group tacacs+&lt;BR /&gt;aaa accounting commands 0 default start-stop group tacacs+&lt;BR /&gt;aaa accounting commands 1 default start-stop group tacacs+&lt;BR /&gt;aaa accounting commands 15 default start-stop group tacacs+&lt;BR /&gt;!&lt;BR /&gt;aaa session-id common&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;tacacs-server host 172.x.x.x&lt;BR /&gt;tacacs-server directed-request&lt;BR /&gt;tacacs-server key 7 030A0B090A1A2F481D1B&lt;BR /&gt;radius-server source-ports 1645-1646&lt;/P&gt;</description>
      <pubDate>Wed, 29 Aug 2018 02:57:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tacacs-authentication-asking-for-enable-password-cisco-acs/m-p/3696667#M494665</guid>
      <dc:creator>joseluis</dc:creator>
      <dc:date>2018-08-29T02:57:07Z</dc:date>
    </item>
    <item>
      <title>Re: TACACS+ authentication asking for enable password -- CISCO ACS</title>
      <link>https://community.cisco.com/t5/network-access-control/tacacs-authentication-asking-for-enable-password-cisco-acs/m-p/3696897#M494666</link>
      <description>&lt;P&gt;You need to set this in ISE:&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot_1.png" style="width: 596px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/17667i93C8876720812A77/image-size/large?v=v2&amp;amp;px=999" role="button" title="Screenshot_1.png" alt="Screenshot_1.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 29 Aug 2018 11:41:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tacacs-authentication-asking-for-enable-password-cisco-acs/m-p/3696897#M494666</guid>
      <dc:creator>Cory Peterson</dc:creator>
      <dc:date>2018-08-29T11:41:01Z</dc:date>
    </item>
    <item>
      <title>Re: TACACS+ authentication asking for enable password -- CISCO ACS</title>
      <link>https://community.cisco.com/t5/network-access-control/tacacs-authentication-asking-for-enable-password-cisco-acs/m-p/3696970#M494667</link>
      <description>&lt;P&gt;Actually you are missing the key line to do privilege level modification:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;aaa authorization exec &lt;SPAN&gt;default group tacacs+ none&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Also I would question why you are authorizing level 0 commands.&amp;nbsp; There are no commands there that can do any changes or hurt the functioning of the device.&amp;nbsp; I usually authorize levevl 15, but account for 0, 1 and 15.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Finally, do you have a use case to specifically authorize configuration commands?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 29 Aug 2018 12:54:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tacacs-authentication-asking-for-enable-password-cisco-acs/m-p/3696970#M494667</guid>
      <dc:creator>paul</dc:creator>
      <dc:date>2018-08-29T12:54:17Z</dc:date>
    </item>
    <item>
      <title>Re: TACACS+ authentication asking for enable password -- CISCO ACS</title>
      <link>https://community.cisco.com/t5/network-access-control/tacacs-authentication-asking-for-enable-password-cisco-acs/m-p/3696971#M494668</link>
      <description>&lt;P&gt;I missed that one, thanks Paul!&lt;/P&gt;</description>
      <pubDate>Wed, 29 Aug 2018 12:57:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tacacs-authentication-asking-for-enable-password-cisco-acs/m-p/3696971#M494668</guid>
      <dc:creator>Cory Peterson</dc:creator>
      <dc:date>2018-08-29T12:57:03Z</dc:date>
    </item>
    <item>
      <title>Re: TACACS+ authentication asking for enable password -- CISCO ACS</title>
      <link>https://community.cisco.com/t5/network-access-control/tacacs-authentication-asking-for-enable-password-cisco-acs/m-p/3697441#M494815</link>
      <description>&lt;P&gt;Hi Cory,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Apparently im using an old version of ACS. &lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 30 Aug 2018 00:44:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tacacs-authentication-asking-for-enable-password-cisco-acs/m-p/3697441#M494815</guid>
      <dc:creator>joseluis</dc:creator>
      <dc:date>2018-08-30T00:44:36Z</dc:date>
    </item>
    <item>
      <title>Re: TACACS+ authentication asking for enable password -- CISCO ACS</title>
      <link>https://community.cisco.com/t5/network-access-control/tacacs-authentication-asking-for-enable-password-cisco-acs/m-p/3697443#M494816</link>
      <description>&lt;P&gt;Hi Paul,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I just saw the configuration here and planning also to remove the "0" since it cant do anything.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;aaa authorization exec&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;default group tacacs+ none&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;--&amp;gt; for this one, shouldn't I use local instead of none on all my configs? so If the tacacs server is down, i can still access the device using the local password?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 30 Aug 2018 00:47:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tacacs-authentication-asking-for-enable-password-cisco-acs/m-p/3697443#M494816</guid>
      <dc:creator>joseluis</dc:creator>
      <dc:date>2018-08-30T00:47:28Z</dc:date>
    </item>
    <item>
      <title>Re: TACACS+ authentication asking for enable password -- CISCO ACS</title>
      <link>https://community.cisco.com/t5/network-access-control/tacacs-authentication-asking-for-enable-password-cisco-acs/m-p/3697446#M494817</link>
      <description>Yep local is good.  None works too but I usually use local.  I must have copied from old template &lt;BR /&gt;</description>
      <pubDate>Thu, 30 Aug 2018 00:51:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tacacs-authentication-asking-for-enable-password-cisco-acs/m-p/3697446#M494817</guid>
      <dc:creator>paul</dc:creator>
      <dc:date>2018-08-30T00:51:48Z</dc:date>
    </item>
    <item>
      <title>Re: TACACS+ authentication asking for enable password -- CISCO ACS</title>
      <link>https://community.cisco.com/t5/network-access-control/tacacs-authentication-asking-for-enable-password-cisco-acs/m-p/3697449#M494818</link>
      <description>&lt;P&gt;Yes sir, but that's the use of "local" right? if the tacacs server is not reachable from the network device, it will use the local credentials. If I use the "none" command, if the device cannot reach the tacacs server it will not look for the local credentials also, so no way of accessing it? Please correct me if I'm wrong.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 30 Aug 2018 00:55:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tacacs-authentication-asking-for-enable-password-cisco-acs/m-p/3697449#M494818</guid>
      <dc:creator>joseluis</dc:creator>
      <dc:date>2018-08-30T00:55:48Z</dc:date>
    </item>
    <item>
      <title>Re: TACACS+ authentication asking for enable password -- CISCO ACS</title>
      <link>https://community.cisco.com/t5/network-access-control/tacacs-authentication-asking-for-enable-password-cisco-acs/m-p/3697450#M494819</link>
      <description>I haven’t used none in a while but I believe you are saying don’t run authorization exec.  Local allows you to set privilege level on your back door account and go right to # when tacacs is down.  &lt;BR /&gt;</description>
      <pubDate>Thu, 30 Aug 2018 00:58:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tacacs-authentication-asking-for-enable-password-cisco-acs/m-p/3697450#M494819</guid>
      <dc:creator>paul</dc:creator>
      <dc:date>2018-08-30T00:58:48Z</dc:date>
    </item>
    <item>
      <title>Re: TACACS+ authentication asking for enable password -- CISCO ACS</title>
      <link>https://community.cisco.com/t5/network-access-control/tacacs-authentication-asking-for-enable-password-cisco-acs/m-p/3697454#M494820</link>
      <description>Sorry can you elaborate more please? I'm new on tacacs topic. Your feedback is highly appreciated &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Thu, 30 Aug 2018 01:12:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tacacs-authentication-asking-for-enable-password-cisco-acs/m-p/3697454#M494820</guid>
      <dc:creator>joseluis</dc:creator>
      <dc:date>2018-08-30T01:12:56Z</dc:date>
    </item>
    <item>
      <title>Re: TACACS+ authentication asking for enable password -- CISCO ACS</title>
      <link>https://community.cisco.com/t5/network-access-control/tacacs-authentication-asking-for-enable-password-cisco-acs/m-p/3697488#M494821</link>
      <description>&lt;P&gt;The only setting that absolutely have to have a backup method of local is your authentication line.&amp;nbsp; That is what allows the device to fail back to the local user database.&amp;nbsp; The accounting would never really have a backup method.&amp;nbsp; The authorization you can use none, local, if-authenticated and they will all let you in I believe.&amp;nbsp; The best choice is local though because it will also take the privilege level you set on the local username and pass you into # prompt of you want.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I would also start using the newest style syntax if your devices support it.&amp;nbsp; Here is the newest style:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;username&amp;nbsp;&amp;lt;backdoor account&amp;gt; privilege 15 secret 0 &amp;lt;password&amp;gt;&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;tacacs server&amp;nbsp;SERVER-1&lt;BR /&gt;&amp;nbsp; key 0&amp;nbsp;&amp;lt;TACACS Key&amp;gt;&lt;BR /&gt;&amp;nbsp; address ipv4&amp;nbsp;&amp;lt;IP&amp;gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp; single-connection&lt;BR /&gt;!&lt;/P&gt;
&lt;P&gt;tacacs server&amp;nbsp;SERVER-2&lt;BR /&gt;&amp;nbsp; key 0&amp;nbsp;&amp;lt;TACACS Key&amp;gt;&lt;BR /&gt;&amp;nbsp; address ipv4&amp;nbsp;&amp;lt;IP&amp;gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp; single-connection&lt;/P&gt;
&lt;P&gt;!&lt;BR /&gt;aaa group server tacacs+ TACACS&lt;BR /&gt;&amp;nbsp; server name &lt;SPAN&gt;SERVER-1&lt;/SPAN&gt;&lt;BR /&gt;&amp;nbsp; server name &lt;SPAN&gt;SERVER-2&lt;/SPAN&gt;&lt;BR /&gt;&amp;nbsp; ip tacacs source-interface&amp;lt;source VLAN/interface&amp;gt;&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;aaa authentication login default group TACACS local&lt;BR /&gt;aaa authorization exec default group TACACS&amp;nbsp;local&lt;BR /&gt;aaa authorization commands 15 default group TACACS if-authenticated&lt;BR /&gt;!aaa authorization config-commands (I don't use this unless specific use case&lt;BR /&gt;aaa accounting exec default start-stop group TACACS&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;aaa accounting commands&amp;nbsp;0 default stop-only group TACACS&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;aaa accounting commands 1 default stop-only group TACACS&lt;/SPAN&gt;&lt;BR /&gt;aaa accounting commands 15 default stop-only group TACACS&lt;/P&gt;</description>
      <pubDate>Thu, 30 Aug 2018 03:01:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tacacs-authentication-asking-for-enable-password-cisco-acs/m-p/3697488#M494821</guid>
      <dc:creator>paul</dc:creator>
      <dc:date>2018-08-30T03:01:56Z</dc:date>
    </item>
    <item>
      <title>Re: TACACS+ authentication asking for enable password -- CISCO ACS</title>
      <link>https://community.cisco.com/t5/network-access-control/tacacs-authentication-asking-for-enable-password-cisco-acs/m-p/3698350#M494822</link>
      <description>&lt;P style="text-align: left;"&gt;Hi Paul,&lt;/P&gt;
&lt;P style="text-align: left;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="text-align: left;"&gt;I appreciate your answer so much. Thank you sir!&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 31 Aug 2018 00:45:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tacacs-authentication-asking-for-enable-password-cisco-acs/m-p/3698350#M494822</guid>
      <dc:creator>joseluis</dc:creator>
      <dc:date>2018-08-31T00:45:39Z</dc:date>
    </item>
    <item>
      <title>Re: TACACS+ authentication asking for enable password -- CISCO ACS</title>
      <link>https://community.cisco.com/t5/network-access-control/tacacs-authentication-asking-for-enable-password-cisco-acs/m-p/5236557#M593759</link>
      <description>&lt;P&gt;configure below and test&lt;/P&gt;
&lt;P&gt;tacacs-server attribute allow unknown&lt;/P&gt;</description>
      <pubDate>Fri, 13 Dec 2024 12:45:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tacacs-authentication-asking-for-enable-password-cisco-acs/m-p/5236557#M593759</guid>
      <dc:creator>ambeshkumar-tripathi</dc:creator>
      <dc:date>2024-12-13T12:45:21Z</dc:date>
    </item>
  </channel>
</rss>

