<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ISE 2.3 - TACACS Device Administration with 2FA (Safenet / RSA) in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-2-3-tacacs-device-administration-with-2fa-safenet-rsa/m-p/3607321#M521304</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Have tested using &lt;STRONG&gt;DUO&lt;/STRONG&gt; with &lt;STRONG&gt;ISE&lt;/STRONG&gt;2.3 and &lt;STRONG&gt;ACS&lt;/STRONG&gt; 5.6 for network device access using 2FA.&amp;nbsp; Here are the steps for your reference:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;SPAN style="font-family: Calibri; font-size: 11.0pt; background: white;"&gt;Setup&lt;/SPAN&gt;&lt;SPAN style="font-weight: bold; font-family: Calibri; font-size: 11.0pt; background: white;"&gt; DUO proxy server&lt;/SPAN&gt;&lt;SPAN style="font-family: Calibri; font-size: 11.0pt; background: white;"&gt; and add ISE IPs as DUO proxy clients &lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN style="font-family: Calibri; font-size: 11.0pt; background: white;"&gt;In &lt;STRONG&gt;ISE&lt;/STRONG&gt;, add &lt;/SPAN&gt;&lt;SPAN style="font-weight: bold; font-family: Calibri; font-size: 11.0pt; background: white;"&gt;DUO&lt;/SPAN&gt;&lt;SPAN style="font-family: Calibri; font-size: 11.0pt; background: white;"&gt; as a &lt;/SPAN&gt;&lt;SPAN style="font-weight: bold; font-family: Calibri; font-size: 11.0pt; background: white;"&gt;RADIUS Token&lt;/SPAN&gt;&lt;SPAN style="font-family: Calibri; font-size: 11.0pt; background: white;"&gt; in &lt;/SPAN&gt;&lt;SPAN style="font-weight: bold; font-family: Calibri; font-size: 11.0pt; background: white;"&gt;Administration&lt;/SPAN&gt;&lt;SPAN style="font-family: Calibri; font-size: 11.0pt; background: white;"&gt; &amp;gt;&lt;/SPAN&gt;&lt;SPAN style="font-weight: bold; font-family: Calibri; font-size: 11.0pt; background: white;"&gt; Identity Management&lt;/SPAN&gt;&lt;SPAN style="font-family: Calibri; font-size: 11.0pt; background: white;"&gt; &amp;gt; &lt;/SPAN&gt;&lt;SPAN style="font-weight: bold; font-family: Calibri; font-size: 11.0pt; background: white;"&gt;External Identity Sources&lt;/SPAN&gt;&lt;SPAN style="font-family: Calibri; font-size: 11.0pt; background: white;"&gt;.&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN style="font-family: Calibri; font-size: 11.0pt; background: white;"&gt;Change&lt;/SPAN&gt;&lt;SPAN style="font-weight: bold; font-family: Calibri; font-size: 11.0pt; background: white;"&gt; Server Timeout&lt;/SPAN&gt;&lt;SPAN style="font-family: Calibri; font-size: 11.0pt; background: white;"&gt; value to 30 (or other appropriate value) seconds from default to relax user input timeout under &lt;/SPAN&gt;&lt;SPAN style="font-weight: bold; font-family: Calibri; font-size: 11.0pt; background: white;"&gt;Connection&lt;/SPAN&gt;&lt;SPAN style="font-family: Calibri; font-size: 11.0pt; background: white;"&gt; tab, make sure you have the correct &lt;STRONG&gt;DUO&lt;/STRONG&gt; proxy server IP address and &lt;/SPAN&gt;&lt;SPAN style="font-weight: bold; font-family: Calibri; font-size: 11.0pt; background: white;"&gt;Shared Secret&lt;/SPAN&gt;&lt;SPAN style="font-family: Calibri; font-size: 11.0pt; background: white;"&gt; value entered there. Add the secondary server info if you have HA setup for the &lt;STRONG&gt;DUO&lt;/STRONG&gt; proxy servers&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN style="font-family: Calibri; font-size: 11.0pt; background: white;"&gt;Add network admins under &lt;/SPAN&gt;&lt;SPAN style="font-weight: bold; font-family: Calibri; font-size: 11.0pt; background: white;"&gt;Identities &amp;gt; Users&lt;/SPAN&gt;&lt;SPAN style="font-family: Calibri; font-size: 11.0pt; background: white;"&gt; and Create an Identity group, such as Net Admin; add all network admin users you created under&lt;/SPAN&gt;&lt;SPAN style="font-weight: bold; font-family: Calibri; font-size: 11.0pt; background: white;"&gt; Identities&lt;/SPAN&gt;&lt;SPAN style="font-family: Calibri; font-size: 11.0pt; background: white;"&gt; to the group. Note: make sure that the user you added in pick &lt;STRONG&gt;DUO&lt;/STRONG&gt; as the &lt;STRONG&gt;Password Type&lt;/STRONG&gt; under &lt;/SPAN&gt;&lt;SPAN style="font-weight: bold; font-family: Calibri; font-size: 11.0pt; background: white;"&gt;Passwords&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN style="font-family: Calibri; font-size: 11.0pt; background: white;"&gt;Create a policy set for network admin access with condition DEVICE: Network Device Profile EQUALS: Cisco, where Cisco includes all your Cisco network devices and this just an example for Cisco. Note: Make sure that you put the new policy set at the bottom of Policy sets if you have multiple policy sets, such as VPN clients, wireless clients, and so on since you do not want to use the same admin user names as other user names, such as AD domain user name.&lt;/SPAN&gt;&lt;UL style="margin-left: 0.375in; list-style-type: disc;"&gt;&lt;LI&gt;&lt;SPAN style="font-family: Calibri; font-size: 11.0pt; background: white;"&gt;Authentication Policy:&amp;nbsp; set protocol match condition equal to Radius&lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;UL style="margin-left: 0.375in; list-style-type: disc;"&gt;&lt;LI&gt;&lt;SPAN style="font-family: Calibri; font-size: 11.0pt; background: white;"&gt;Authorization Policy: set Identity group equal to network admin group which you have created above&lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN style="font-family: Calibri; font-size: 11.0pt; background: white;"&gt;Configure Cisco device AAA section&lt;/SPAN&gt;&lt;UL&gt;&lt;LI&gt;&lt;SPAN style="font-family: Calibri; font-size: 11.0pt; background: white;"&gt;Create a Radius server group and add &lt;STRONG&gt;ISE&lt;/STRONG&gt; servers under that group&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN style="font-family: Calibri; font-size: 11.0pt; background: white;"&gt;Configure authentication login default group using radius with optional local after radius failed&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN style="font-family: Calibri; font-size: 11.0pt; background: white;"&gt;Configure authorization commands default group using&lt;STRONG&gt; tacacs+&lt;/STRONG&gt; assuming you already have this group with &lt;STRONG&gt;ACS&lt;/STRONG&gt; IPs configured.&lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;SPAN style="font-family: Calibri; font-size: 11.0pt; background: white;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: Calibri; font-size: 11.0pt; background: white;"&gt;Test it out and enjoy it&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 15 Feb 2018 18:23:11 GMT</pubDate>
    <dc:creator>Mountain Man</dc:creator>
    <dc:date>2018-02-15T18:23:11Z</dc:date>
    <item>
      <title>ISE 2.3 - TACACS Device Administration with 2FA (Safenet / RSA)</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-2-3-tacacs-device-administration-with-2fa-safenet-rsa/m-p/3607316#M521299</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We are currently researching on integrating ISE with Safenet / RSA for Device Administration and two factor authentication. Below is the sample flow of what we expect to test. Can you confirm if ISE supports this type of deployment&lt;/P&gt;&lt;P&gt;R1 is configured for TACACS to go ISE.&lt;/P&gt;&lt;P&gt;Administrator to SSH on R1&lt;/P&gt;&lt;P&gt;1) Authenticate with AD credential&lt;/P&gt;&lt;P&gt;2) After user validated using AD, 2FA OTP / Passcode using Safenet Radius will happen.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG alt="pic.JPG" class="image-1 jive-image" src="https://community.cisco.com/legacyfs/online/fusion/111593_pic.JPG" style="height: 328px; width: 620px;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Davesh&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 27 Sep 2017 12:01:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-2-3-tacacs-device-administration-with-2fa-safenet-rsa/m-p/3607316#M521299</guid>
      <dc:creator>Davesh.Borasi</dc:creator>
      <dc:date>2017-09-27T12:01:11Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 2.3 - TACACS Device Administration with 2FA (Safenet / RSA)</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-2-3-tacacs-device-administration-with-2fa-safenet-rsa/m-p/3607317#M521300</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;A _jive_internal="true" href="https://community.cisco.com/thread/85177"&gt;Cisco ISE Two Factor Authentication / Authorisation with different User Identity Store&lt;/A&gt;&lt;SPAN style="font-size: 10pt;"&gt; shows what ISE is supporting today.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;If needing it supported in one single login authentication, the best I can think of is that some RADIUS OTP vendors also connecting to AD/LDAP so they would accept AD+OTP together.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 27 Sep 2017 15:47:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-2-3-tacacs-device-administration-with-2fa-safenet-rsa/m-p/3607317#M521300</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2017-09-27T15:47:42Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 2.3 - TACACS Device Administration with 2FA (Safenet / RSA)</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-2-3-tacacs-device-administration-with-2fa-safenet-rsa/m-p/3607318#M521301</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;In addition to what Hsing said I would also ask what is the point of doing the AD authentication when you have 2FA implemented?&amp;nbsp; You can involve AD authorization without asking them for their credentials.&amp;nbsp; So the authentication phase can simply be ISE sending the RADIUS call to Safenet.&amp;nbsp; The authorization phase can be an AD group check, check to verify their AD account is still enabled, etc.&amp;nbsp; &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 27 Sep 2017 16:56:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-2-3-tacacs-device-administration-with-2fa-safenet-rsa/m-p/3607318#M521301</guid>
      <dc:creator>paul</dc:creator>
      <dc:date>2017-09-27T16:56:29Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 2.3 - TACACS Device Administration with 2FA (Safenet / RSA)</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-2-3-tacacs-device-administration-with-2fa-safenet-rsa/m-p/3607319#M521302</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for the info. I further checked and found that 2FA (RSA/Safenet etc..) shall do AD+OTP authentication and then &lt;SPAN style="font-size: 10pt;"&gt;using ISE we can perform the authorization for limiting device access privileges. The 2FA needs to be completed in a single Radius Request which might not happen with above &lt;/SPAN&gt;scenario&lt;SPAN style="font-size: 10pt;"&gt; presented and would further complicate the setup.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;So I believe the optiomal flow would be when Admin SSH to R1&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) R1 sends TACACS Request to ISE for validation&lt;/P&gt;&lt;P&gt;2) ISE checks the authentication profile to go to 2FA (RSA or Safenet) using Radius Service&lt;/P&gt;&lt;P&gt;3) RSA/Safenet perform the AD + OTP check&amp;nbsp; (2FA)&lt;/P&gt;&lt;P&gt;4) Upon Access_Accept, ISE applies the authorization profiles for access restrictions.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;Best Regards,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;Davesh&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 28 Sep 2017 09:49:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-2-3-tacacs-device-administration-with-2fa-safenet-rsa/m-p/3607319#M521302</guid>
      <dc:creator>Davesh.Borasi</dc:creator>
      <dc:date>2017-09-28T09:49:14Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 2.3 - TACACS Device Administration with 2FA (Safenet / RSA)</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-2-3-tacacs-device-administration-with-2fa-safenet-rsa/m-p/3607320#M521303</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;That should work perfectly.  Let 2FA server run the whole authentication process proxied through ISE and have just do authorization.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Paul Haferman&lt;/P&gt;&lt;P&gt;Office- 920.996.3011&lt;/P&gt;&lt;P&gt;Cell- 920.284.9250&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 28 Sep 2017 16:50:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-2-3-tacacs-device-administration-with-2fa-safenet-rsa/m-p/3607320#M521303</guid>
      <dc:creator>paul</dc:creator>
      <dc:date>2017-09-28T16:50:26Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 2.3 - TACACS Device Administration with 2FA (Safenet / RSA)</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-2-3-tacacs-device-administration-with-2fa-safenet-rsa/m-p/3607321#M521304</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Have tested using &lt;STRONG&gt;DUO&lt;/STRONG&gt; with &lt;STRONG&gt;ISE&lt;/STRONG&gt;2.3 and &lt;STRONG&gt;ACS&lt;/STRONG&gt; 5.6 for network device access using 2FA.&amp;nbsp; Here are the steps for your reference:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;SPAN style="font-family: Calibri; font-size: 11.0pt; background: white;"&gt;Setup&lt;/SPAN&gt;&lt;SPAN style="font-weight: bold; font-family: Calibri; font-size: 11.0pt; background: white;"&gt; DUO proxy server&lt;/SPAN&gt;&lt;SPAN style="font-family: Calibri; font-size: 11.0pt; background: white;"&gt; and add ISE IPs as DUO proxy clients &lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN style="font-family: Calibri; font-size: 11.0pt; background: white;"&gt;In &lt;STRONG&gt;ISE&lt;/STRONG&gt;, add &lt;/SPAN&gt;&lt;SPAN style="font-weight: bold; font-family: Calibri; font-size: 11.0pt; background: white;"&gt;DUO&lt;/SPAN&gt;&lt;SPAN style="font-family: Calibri; font-size: 11.0pt; background: white;"&gt; as a &lt;/SPAN&gt;&lt;SPAN style="font-weight: bold; font-family: Calibri; font-size: 11.0pt; background: white;"&gt;RADIUS Token&lt;/SPAN&gt;&lt;SPAN style="font-family: Calibri; font-size: 11.0pt; background: white;"&gt; in &lt;/SPAN&gt;&lt;SPAN style="font-weight: bold; font-family: Calibri; font-size: 11.0pt; background: white;"&gt;Administration&lt;/SPAN&gt;&lt;SPAN style="font-family: Calibri; font-size: 11.0pt; background: white;"&gt; &amp;gt;&lt;/SPAN&gt;&lt;SPAN style="font-weight: bold; font-family: Calibri; font-size: 11.0pt; background: white;"&gt; Identity Management&lt;/SPAN&gt;&lt;SPAN style="font-family: Calibri; font-size: 11.0pt; background: white;"&gt; &amp;gt; &lt;/SPAN&gt;&lt;SPAN style="font-weight: bold; font-family: Calibri; font-size: 11.0pt; background: white;"&gt;External Identity Sources&lt;/SPAN&gt;&lt;SPAN style="font-family: Calibri; font-size: 11.0pt; background: white;"&gt;.&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN style="font-family: Calibri; font-size: 11.0pt; background: white;"&gt;Change&lt;/SPAN&gt;&lt;SPAN style="font-weight: bold; font-family: Calibri; font-size: 11.0pt; background: white;"&gt; Server Timeout&lt;/SPAN&gt;&lt;SPAN style="font-family: Calibri; font-size: 11.0pt; background: white;"&gt; value to 30 (or other appropriate value) seconds from default to relax user input timeout under &lt;/SPAN&gt;&lt;SPAN style="font-weight: bold; font-family: Calibri; font-size: 11.0pt; background: white;"&gt;Connection&lt;/SPAN&gt;&lt;SPAN style="font-family: Calibri; font-size: 11.0pt; background: white;"&gt; tab, make sure you have the correct &lt;STRONG&gt;DUO&lt;/STRONG&gt; proxy server IP address and &lt;/SPAN&gt;&lt;SPAN style="font-weight: bold; font-family: Calibri; font-size: 11.0pt; background: white;"&gt;Shared Secret&lt;/SPAN&gt;&lt;SPAN style="font-family: Calibri; font-size: 11.0pt; background: white;"&gt; value entered there. Add the secondary server info if you have HA setup for the &lt;STRONG&gt;DUO&lt;/STRONG&gt; proxy servers&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN style="font-family: Calibri; font-size: 11.0pt; background: white;"&gt;Add network admins under &lt;/SPAN&gt;&lt;SPAN style="font-weight: bold; font-family: Calibri; font-size: 11.0pt; background: white;"&gt;Identities &amp;gt; Users&lt;/SPAN&gt;&lt;SPAN style="font-family: Calibri; font-size: 11.0pt; background: white;"&gt; and Create an Identity group, such as Net Admin; add all network admin users you created under&lt;/SPAN&gt;&lt;SPAN style="font-weight: bold; font-family: Calibri; font-size: 11.0pt; background: white;"&gt; Identities&lt;/SPAN&gt;&lt;SPAN style="font-family: Calibri; font-size: 11.0pt; background: white;"&gt; to the group. Note: make sure that the user you added in pick &lt;STRONG&gt;DUO&lt;/STRONG&gt; as the &lt;STRONG&gt;Password Type&lt;/STRONG&gt; under &lt;/SPAN&gt;&lt;SPAN style="font-weight: bold; font-family: Calibri; font-size: 11.0pt; background: white;"&gt;Passwords&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN style="font-family: Calibri; font-size: 11.0pt; background: white;"&gt;Create a policy set for network admin access with condition DEVICE: Network Device Profile EQUALS: Cisco, where Cisco includes all your Cisco network devices and this just an example for Cisco. Note: Make sure that you put the new policy set at the bottom of Policy sets if you have multiple policy sets, such as VPN clients, wireless clients, and so on since you do not want to use the same admin user names as other user names, such as AD domain user name.&lt;/SPAN&gt;&lt;UL style="margin-left: 0.375in; list-style-type: disc;"&gt;&lt;LI&gt;&lt;SPAN style="font-family: Calibri; font-size: 11.0pt; background: white;"&gt;Authentication Policy:&amp;nbsp; set protocol match condition equal to Radius&lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;UL style="margin-left: 0.375in; list-style-type: disc;"&gt;&lt;LI&gt;&lt;SPAN style="font-family: Calibri; font-size: 11.0pt; background: white;"&gt;Authorization Policy: set Identity group equal to network admin group which you have created above&lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN style="font-family: Calibri; font-size: 11.0pt; background: white;"&gt;Configure Cisco device AAA section&lt;/SPAN&gt;&lt;UL&gt;&lt;LI&gt;&lt;SPAN style="font-family: Calibri; font-size: 11.0pt; background: white;"&gt;Create a Radius server group and add &lt;STRONG&gt;ISE&lt;/STRONG&gt; servers under that group&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN style="font-family: Calibri; font-size: 11.0pt; background: white;"&gt;Configure authentication login default group using radius with optional local after radius failed&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN style="font-family: Calibri; font-size: 11.0pt; background: white;"&gt;Configure authorization commands default group using&lt;STRONG&gt; tacacs+&lt;/STRONG&gt; assuming you already have this group with &lt;STRONG&gt;ACS&lt;/STRONG&gt; IPs configured.&lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;SPAN style="font-family: Calibri; font-size: 11.0pt; background: white;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: Calibri; font-size: 11.0pt; background: white;"&gt;Test it out and enjoy it&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 15 Feb 2018 18:23:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-2-3-tacacs-device-administration-with-2fa-safenet-rsa/m-p/3607321#M521304</guid>
      <dc:creator>Mountain Man</dc:creator>
      <dc:date>2018-02-15T18:23:11Z</dc:date>
    </item>
  </channel>
</rss>

