<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: aaa configuration with Radius in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/aaa-configuration-with-radius/m-p/3339677#M549986</link>
    <description>&lt;P&gt;Try adding something like:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;aaa authorization exec default group radius&lt;/P&gt;</description>
    <pubDate>Wed, 28 Feb 2018 15:38:12 GMT</pubDate>
    <dc:creator>Philip D'Ath</dc:creator>
    <dc:date>2018-02-28T15:38:12Z</dc:date>
    <item>
      <title>aaa configuration with Radius</title>
      <link>https://community.cisco.com/t5/network-access-control/aaa-configuration-with-radius/m-p/3339645#M549984</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have a problem in AAA configuration on switch Cisco 3560 the IOS is C3560-ADVIPSERVICESK9-M, Version 12.2(25)SE.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The AAA configuration is working fine with &lt;STRONG&gt;Radius&lt;/STRONG&gt; but after Authenticating the switch is login and entering in enable mode instead of entering in privilege mode.&lt;/P&gt;
&lt;P&gt;When providing the Enable it asking for enable password then entering to privilege mode.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Can any help me to configure which should not ask for enable password which should directly enter in privilege mode&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Presently AAA configuration on switch is as below.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;aaa new-model&lt;BR /&gt;aaa authentication login default group radius local&lt;BR /&gt;aaa authentication login NOAUTH none&lt;BR /&gt;aaa accounting exec default start-stop group radius&lt;BR /&gt;aaa accounting connection default start-stop group radius&lt;BR /&gt;!&lt;BR /&gt;aaa session-id common&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;radius-server host X.X.2.100 auth-port 1645 acct-port 1646 key 7&amp;nbsp;ABCD&lt;BR /&gt;radius-server source-ports 1645-1646&lt;BR /&gt;radius-server timeout 2&lt;BR /&gt;radius-server key 7&amp;nbsp;ABCD&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 18:46:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/aaa-configuration-with-radius/m-p/3339645#M549984</guid>
      <dc:creator>Raghavendra.P</dc:creator>
      <dc:date>2020-02-21T18:46:52Z</dc:date>
    </item>
    <item>
      <title>Re: aaa configuration with Radius</title>
      <link>https://community.cisco.com/t5/network-access-control/aaa-configuration-with-radius/m-p/3339653#M549985</link>
      <description>&lt;P&gt;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;What is the configuration on the Radius server?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;
&lt;P&gt;John&lt;/P&gt;</description>
      <pubDate>Wed, 28 Feb 2018 15:18:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/aaa-configuration-with-radius/m-p/3339653#M549985</guid>
      <dc:creator>johnd2310</dc:creator>
      <dc:date>2018-02-28T15:18:49Z</dc:date>
    </item>
    <item>
      <title>Re: aaa configuration with Radius</title>
      <link>https://community.cisco.com/t5/network-access-control/aaa-configuration-with-radius/m-p/3339677#M549986</link>
      <description>&lt;P&gt;Try adding something like:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;aaa authorization exec default group radius&lt;/P&gt;</description>
      <pubDate>Wed, 28 Feb 2018 15:38:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/aaa-configuration-with-radius/m-p/3339677#M549986</guid>
      <dc:creator>Philip D'Ath</dc:creator>
      <dc:date>2018-02-28T15:38:12Z</dc:date>
    </item>
    <item>
      <title>Re: aaa configuration with Radius</title>
      <link>https://community.cisco.com/t5/network-access-control/aaa-configuration-with-radius/m-p/3339788#M549987</link>
      <description>line vty 0 15&lt;BR /&gt;privilege level 15&lt;BR /&gt;&lt;BR /&gt;Or configure aaa authentication login default group tacacs , aaa&lt;BR /&gt;authentication enable default group tacacs along with your exec&lt;BR /&gt;authorization command. Then in radius server configure Shell(Exec) level to&lt;BR /&gt;15&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Wed, 28 Feb 2018 17:33:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/aaa-configuration-with-radius/m-p/3339788#M549987</guid>
      <dc:creator>Mohammed al Baqari</dc:creator>
      <dc:date>2018-02-28T17:33:43Z</dc:date>
    </item>
    <item>
      <title>Re: aaa configuration with Radius</title>
      <link>https://community.cisco.com/t5/network-access-control/aaa-configuration-with-radius/m-p/3339871#M549988</link>
      <description>&lt;P&gt;In addition to what Philip suggested, ensure that you are pushing attribute - &lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Service-Type = Administrative &lt;/STRONG&gt;in the authorization profile. Please refer the attached screen shot.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 28 Feb 2018 19:33:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/aaa-configuration-with-radius/m-p/3339871#M549988</guid>
      <dc:creator>Jatin Katyal</dc:creator>
      <dc:date>2018-02-28T19:33:33Z</dc:date>
    </item>
  </channel>
</rss>

