<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: tacacs+ authorization in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/tacacs-authorization/m-p/3388063#M548822</link>
    <description>I'm not working for Cisco TAC. &lt;BR /&gt;I'm also within the same timezone (EST). If you're available this WE, send me a PM and we will do a webex.</description>
    <pubDate>Thu, 24 May 2018 00:24:41 GMT</pubDate>
    <dc:creator>Francesco Molino</dc:creator>
    <dc:date>2018-05-24T00:24:41Z</dc:date>
    <item>
      <title>tacacs+ authorization</title>
      <link>https://community.cisco.com/t5/network-access-control/tacacs-authorization/m-p/3382115#M548803</link>
      <description>&lt;P&gt;Dears,&lt;/P&gt;
&lt;P&gt;whenever a ISE server fails I am able to login in the switches and firewall but I m not able to change any configuration becz it says me that authorization failed,&lt;/P&gt;
&lt;P&gt;so I have to configure the privilege level commands in the switch&amp;nbsp;and firewall also for successful authorization , If so then what is the use of ISE working as central place of authentication &amp;amp; authorization&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 18:55:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tacacs-authorization/m-p/3382115#M548803</guid>
      <dc:creator>adamgibs7</dc:creator>
      <dc:date>2020-02-21T18:55:52Z</dc:date>
    </item>
    <item>
      <title>Re: tacacs+ authorization</title>
      <link>https://community.cisco.com/t5/network-access-control/tacacs-authorization/m-p/3382169#M548804</link>
      <description>Hi&lt;BR /&gt;&lt;BR /&gt;What do you mean by you had to configure privilege command on the switch?&lt;BR /&gt;Which privilege are you using?&lt;BR /&gt;Can you please share your aaa config of the switch for example?</description>
      <pubDate>Sat, 12 May 2018 03:44:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tacacs-authorization/m-p/3382169#M548804</guid>
      <dc:creator>Francesco Molino</dc:creator>
      <dc:date>2018-05-12T03:44:51Z</dc:date>
    </item>
    <item>
      <title>Re: tacacs+ authorization</title>
      <link>https://community.cisco.com/t5/network-access-control/tacacs-authorization/m-p/3382174#M548805</link>
      <description>&lt;P&gt;Dear Francesco&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I had not configured any privileges on the switch or firewall, but I want to know do I have to configure in the below situations:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;when a ISE fails his reachability to the AD&lt;/P&gt;
&lt;P&gt;OR&lt;/P&gt;
&lt;P&gt;WHEN the ISE itself is out of the network ( crashed) situation.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Sat, 12 May 2018 04:38:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tacacs-authorization/m-p/3382174#M548805</guid>
      <dc:creator>adamgibs7</dc:creator>
      <dc:date>2018-05-12T04:38:35Z</dc:date>
    </item>
    <item>
      <title>Re: tacacs+ authorization</title>
      <link>https://community.cisco.com/t5/network-access-control/tacacs-authorization/m-p/3382334#M548806</link>
      <description>Ok got it. Can you please share your switch config?</description>
      <pubDate>Sun, 13 May 2018 02:28:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tacacs-authorization/m-p/3382334#M548806</guid>
      <dc:creator>Francesco Molino</dc:creator>
      <dc:date>2018-05-13T02:28:10Z</dc:date>
    </item>
    <item>
      <title>Re: tacacs+ authorization</title>
      <link>https://community.cisco.com/t5/network-access-control/tacacs-authorization/m-p/3382455#M548807</link>
      <description>&lt;P&gt;Dear&lt;/P&gt;
&lt;P&gt;Please find the below config&lt;/P&gt;
&lt;P&gt;below config for asa&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;aaa-server TACACS+ protocol tacacs+&lt;BR /&gt;aaa-server TACACS+ (INSIDE) host 1.1.1.&lt;BR /&gt;aaa-server RADIUS protocol radius&lt;BR /&gt;aaa-server RADIUS (INSIDE) host 1.1.1.1&lt;BR /&gt;aaa authentication ssh console TACACS+ LOCAL&lt;BR /&gt;aaa authentication http console TACACS+ LOCAL&lt;BR /&gt;aaa authentication serial console TACACS+ LOCAL&lt;BR /&gt;aaa authentication enable console TACACS+ LOCAL&lt;BR /&gt;aaa authorization command TACACS+ LOCAL&lt;BR /&gt;aaa accounting ssh console TACACS+&lt;BR /&gt;aaa accounting command privilege 15 TACACS+&lt;BR /&gt;aaa local authentication attempts max-fail 5&lt;BR /&gt;aaa authorization exec authentication-server &lt;BR /&gt;aaa authentication login-history&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;below config for switch&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;sh run | in aaa&lt;BR /&gt;aaa new-model&lt;BR /&gt;aaa group server tacacs+ xyz&lt;BR /&gt;aaa group server radius xyz-ISE&lt;BR /&gt;aaa authentication login default group xyz local&lt;BR /&gt;aaa authentication login no-auth local&lt;BR /&gt;aaa authentication enable default enable&lt;BR /&gt;aaa authentication dot1x default group xyz-ISE local&lt;BR /&gt;aaa authorization config-commands&lt;BR /&gt;aaa authorization exec default group xyz local &lt;BR /&gt;aaa authorization commands 1 default group xyz local &lt;BR /&gt;aaa authorization commands 15 default group xyz local &lt;BR /&gt;aaa authorization network default group xyz-ISE local &lt;BR /&gt;aaa accounting dot1x default start-stop group xyz-ISE&lt;BR /&gt;aaa accounting exec default start-stop group xyz&lt;BR /&gt;aaa accounting commands 1 default start-stop group xyz&lt;BR /&gt;aaa accounting commands 15 default start-stop group xyz&lt;BR /&gt;aaa server radius dynamic-author&lt;/P&gt;</description>
      <pubDate>Sun, 13 May 2018 16:09:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tacacs-authorization/m-p/3382455#M548807</guid>
      <dc:creator>adamgibs7</dc:creator>
      <dc:date>2018-05-13T16:09:07Z</dc:date>
    </item>
    <item>
      <title>Re: tacacs+ authorization</title>
      <link>https://community.cisco.com/t5/network-access-control/tacacs-authorization/m-p/3382520#M548808</link>
      <description>&lt;P&gt;Can you change your config with following lines and test again please:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;aaa authorization exec default group xyz local if-authenticated&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;aaa authorization commands 1 default group xyz local if-authenticated&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;aaa authorization commands 15 default group xyz local&amp;nbsp;if-authenticated&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Can you share your local user config please?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Try using the following before testing again:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;username test privilege 15 secret 0 test&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 14 May 2018 02:36:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tacacs-authorization/m-p/3382520#M548808</guid>
      <dc:creator>Francesco Molino</dc:creator>
      <dc:date>2018-05-14T02:36:03Z</dc:date>
    </item>
    <item>
      <title>Re: tacacs+ authorization</title>
      <link>https://community.cisco.com/t5/network-access-control/tacacs-authorization/m-p/3383088#M548809</link>
      <description>&lt;P&gt;Dear Francesco&lt;/P&gt;
&lt;P&gt;Thanks for the reply&lt;/P&gt;
&lt;P&gt;before applying I read the below, also what is the replace of this command in ASA FW&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;if-authenticated Allows the user to access the requested function if the user is authenticated. The if-authenticated method is a terminating method. Therefore, if it is listed as a method, any methods listed after it will never be evaluated. Using if-authenticated as the first method is equivalent to not having an&lt;BR /&gt;authorization if authentication has succeeded.&lt;/P&gt;</description>
      <pubDate>Mon, 14 May 2018 20:20:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tacacs-authorization/m-p/3383088#M548809</guid>
      <dc:creator>adamgibs7</dc:creator>
      <dc:date>2018-05-14T20:20:27Z</dc:date>
    </item>
    <item>
      <title>Re: tacacs+ authorization</title>
      <link>https://community.cisco.com/t5/network-access-control/tacacs-authorization/m-p/3383183#M548810</link>
      <description>Yes that's why it is at the end of each authorization command. Can you share your local user config?&lt;BR /&gt;&lt;BR /&gt;Also when trying while tacacs is down, can you run a debug aaa to see what happens?</description>
      <pubDate>Tue, 15 May 2018 04:26:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tacacs-authorization/m-p/3383183#M548810</guid>
      <dc:creator>Francesco Molino</dc:creator>
      <dc:date>2018-05-15T04:26:10Z</dc:date>
    </item>
    <item>
      <title>Re: tacacs+ authorization</title>
      <link>https://community.cisco.com/t5/network-access-control/tacacs-authorization/m-p/3383739#M548811</link>
      <description>&lt;P&gt;username xyz secret password cisco&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;can't provide debugs as couldn't able to schedule a downtime&lt;/P&gt;</description>
      <pubDate>Tue, 15 May 2018 19:02:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tacacs-authorization/m-p/3383739#M548811</guid>
      <dc:creator>adamgibs7</dc:creator>
      <dc:date>2018-05-15T19:02:43Z</dc:date>
    </item>
    <item>
      <title>Re: tacacs+ authorization</title>
      <link>https://community.cisco.com/t5/network-access-control/tacacs-authorization/m-p/3383870#M548812</link>
      <description>Ok. how are you testing then tacacs failover to local? When do you have a maintenance window to test it?&lt;BR /&gt;Your secret looks weird.&lt;BR /&gt;Normally you would use the following command to configure your user:&lt;BR /&gt;username xxxx privilege 15 secret xxxxx&lt;BR /&gt;</description>
      <pubDate>Wed, 16 May 2018 01:29:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tacacs-authorization/m-p/3383870#M548812</guid>
      <dc:creator>Francesco Molino</dc:creator>
      <dc:date>2018-05-16T01:29:20Z</dc:date>
    </item>
    <item>
      <title>Re: tacacs+ authorization</title>
      <link>https://community.cisco.com/t5/network-access-control/tacacs-authorization/m-p/3383902#M548813</link>
      <description>&lt;P&gt;Dear Francesco&lt;/P&gt;
&lt;P&gt;username xxxx privilege 15 secret xxxxx&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;this command will directly land the user in privy 15&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;thanks&lt;/P&gt;</description>
      <pubDate>Wed, 16 May 2018 04:18:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tacacs-authorization/m-p/3383902#M548813</guid>
      <dc:creator>adamgibs7</dc:creator>
      <dc:date>2018-05-16T04:18:44Z</dc:date>
    </item>
    <item>
      <title>Re: tacacs+ authorization</title>
      <link>https://community.cisco.com/t5/network-access-control/tacacs-authorization/m-p/3384125#M548814</link>
      <description>Yes this is what you want when your tacacs fails?&lt;BR /&gt;Otherwise, put it in any other privilege and you'll need to type in enable to move to privilege 15.&lt;BR /&gt;</description>
      <pubDate>Wed, 16 May 2018 12:00:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tacacs-authorization/m-p/3384125#M548814</guid>
      <dc:creator>Francesco Molino</dc:creator>
      <dc:date>2018-05-16T12:00:49Z</dc:date>
    </item>
    <item>
      <title>Re: tacacs+ authorization</title>
      <link>https://community.cisco.com/t5/network-access-control/tacacs-authorization/m-p/3384490#M548815</link>
      <description>&lt;P&gt;Dear Francesco&lt;/P&gt;
&lt;P&gt;The authentication will drop me on privilege mode but when i will execute command it will prompt by authorization failed Hence the if-authentication command will work for switches but what about ASA firewall's ????&lt;/P&gt;
&lt;P&gt;thanks&lt;/P&gt;</description>
      <pubDate>Wed, 16 May 2018 19:46:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tacacs-authorization/m-p/3384490#M548815</guid>
      <dc:creator>adamgibs7</dc:creator>
      <dc:date>2018-05-16T19:46:42Z</dc:date>
    </item>
    <item>
      <title>Re: tacacs+ authorization</title>
      <link>https://community.cisco.com/t5/network-access-control/tacacs-authorization/m-p/3384576#M548816</link>
      <description>Normally it should work. Your ise is down and not reachable when you tested right?&lt;BR /&gt;&lt;BR /&gt;Attach your asa and switch config file in text and I'll reproduce your infrastructure in lab to see what's going on</description>
      <pubDate>Wed, 16 May 2018 22:42:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tacacs-authorization/m-p/3384576#M548816</guid>
      <dc:creator>Francesco Molino</dc:creator>
      <dc:date>2018-05-16T22:42:11Z</dc:date>
    </item>
    <item>
      <title>Re: tacacs+ authorization</title>
      <link>https://community.cisco.com/t5/network-access-control/tacacs-authorization/m-p/3385911#M548817</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Dear Francesco&lt;/P&gt;
&lt;P&gt;Have already shared the configs in the above post&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Sat, 19 May 2018 14:04:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tacacs-authorization/m-p/3385911#M548817</guid>
      <dc:creator>adamgibs7</dc:creator>
      <dc:date>2018-05-19T14:04:08Z</dc:date>
    </item>
    <item>
      <title>Re: tacacs+ authorization</title>
      <link>https://community.cisco.com/t5/network-access-control/tacacs-authorization/m-p/3386157#M548818</link>
      <description>The config looks like ok but we need to troubleshoot when you've the issue.&lt;BR /&gt;Let me know when we can TS your issue in PM. We can do a webex.</description>
      <pubDate>Sun, 20 May 2018 21:04:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tacacs-authorization/m-p/3386157#M548818</guid>
      <dc:creator>Francesco Molino</dc:creator>
      <dc:date>2018-05-20T21:04:29Z</dc:date>
    </item>
    <item>
      <title>Re: tacacs+ authorization</title>
      <link>https://community.cisco.com/t5/network-access-control/tacacs-authorization/m-p/3387244#M548820</link>
      <description>&lt;P&gt;Dear Francesco&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I'm in the country with time zone GMT +4, I can arrange according to your timezone, can i know your time zone and are you working for Cisco TAC, i have case opened for the EAP chaining and the TAC is not able to solve since one month has passed, if you are in Cisco TAC i can provide you the case number.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;thanks&lt;/P&gt;</description>
      <pubDate>Tue, 22 May 2018 19:16:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tacacs-authorization/m-p/3387244#M548820</guid>
      <dc:creator>adamgibs7</dc:creator>
      <dc:date>2018-05-22T19:16:21Z</dc:date>
    </item>
    <item>
      <title>Re: tacacs+ authorization</title>
      <link>https://community.cisco.com/t5/network-access-control/tacacs-authorization/m-p/3388063#M548822</link>
      <description>I'm not working for Cisco TAC. &lt;BR /&gt;I'm also within the same timezone (EST). If you're available this WE, send me a PM and we will do a webex.</description>
      <pubDate>Thu, 24 May 2018 00:24:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tacacs-authorization/m-p/3388063#M548822</guid>
      <dc:creator>Francesco Molino</dc:creator>
      <dc:date>2018-05-24T00:24:41Z</dc:date>
    </item>
    <item>
      <title>Re: tacacs+ authorization</title>
      <link>https://community.cisco.com/t5/network-access-control/tacacs-authorization/m-p/3388760#M548824</link>
      <description>&lt;P&gt;Dears&lt;/P&gt;
&lt;P&gt;WebEx will not be possible in EST time hence I don't have full access to the devices, but instead you can instruct me for the future actions that I can be carried out by me,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;so you are confirming that with ASA I shld not fall into the case that when the ISE is not reachable and when I m trying to do any changes on the ASA it shld not prompt me with an &lt;STRONG&gt;&lt;FONT color="#ff0000"&gt;authorization failed error&lt;/FONT&gt;&lt;/STRONG&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;thanks&lt;/P&gt;</description>
      <pubDate>Thu, 24 May 2018 20:06:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tacacs-authorization/m-p/3388760#M548824</guid>
      <dc:creator>adamgibs7</dc:creator>
      <dc:date>2018-05-24T20:06:50Z</dc:date>
    </item>
    <item>
      <title>Re: tacacs+ authorization</title>
      <link>https://community.cisco.com/t5/network-access-control/tacacs-authorization/m-p/3388863#M548827</link>
      <description>Here the config I would do for ASA:&lt;BR /&gt;&lt;BR /&gt;aaa-server TACACS+ protocol tacacs+&lt;BR /&gt;aaa-server TACACS+ (INSIDE) host 1.1.1.&lt;BR /&gt;!&lt;BR /&gt;aaa authentication ssh console TACACS+ LOCAL&lt;BR /&gt;aaa authentication http console TACACS+ LOCAL&lt;BR /&gt;aaa authentication serial console TACACS+ LOCAL  --&amp;gt; Do you want serial connections being allowed through tacacs+?&lt;BR /&gt;aaa authentication secure-http-client&lt;BR /&gt;aaa authentication enable console TACACS+ LOCAL&lt;BR /&gt;!&lt;BR /&gt;aaa authorization exec authentication-server auto-enable --&amp;gt; is ASA 9.2(1) and above&lt;BR /&gt;aaa authorization http console TACACS+ --&amp;gt; If ASA 9.4 and above because since them exec is separated for ASDM from other types of connections.&lt;BR /&gt;aaa authorization command TACACS+ LOCAL&lt;BR /&gt;aaa accounting ssh console TACACS+&lt;BR /&gt;aaa accounting command privilege 15 TACACS+&lt;BR /&gt;aaa local authentication attempts max-fail 5&lt;BR /&gt;aaa authentication login-history&lt;BR /&gt;&lt;BR /&gt;This config should work and not giving you any authorization failure when ISE is down/not reachable.&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Thu, 24 May 2018 23:12:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tacacs-authorization/m-p/3388863#M548827</guid>
      <dc:creator>Francesco Molino</dc:creator>
      <dc:date>2018-05-24T23:12:09Z</dc:date>
    </item>
  </channel>
</rss>

