<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Thank you all for your in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/radius-authentication-with-local-access-at-the-same-time/m-p/2632814#M56170</link>
    <description>&lt;P&gt;Thank you all for your response.&lt;/P&gt;&lt;P&gt;I have checked the user is already in RADIUS with level 8 access, now how do i allow them to run specific command? Thanks&lt;/P&gt;</description>
    <pubDate>Wed, 01 Apr 2015 14:53:29 GMT</pubDate>
    <dc:creator>Beermania</dc:creator>
    <dc:date>2015-04-01T14:53:29Z</dc:date>
    <item>
      <title>RADIUS authentication with local access at the same time</title>
      <link>https://community.cisco.com/t5/network-access-control/radius-authentication-with-local-access-at-the-same-time/m-p/2632811#M56165</link>
      <description>&lt;P&gt;&lt;SPAN style="font-size:14px;"&gt;Hi Everyone,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:14px;"&gt;Is there anyway i can configure RADIUS and local account authentication to work at the same time? &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:14px;"&gt;Here is the scenario.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:14px;"&gt;Currently, access to all our cisco device is tied up using AD account via RADIUS with the fall back being the local authentication. It works perfectly fine. However, i have a requirement wherein i have specific users that will need to access the devices to run specific command. Ive been reading several thread saying to use privilege level 8 and specify the command that the user is only allowed to run .&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:14px;"&gt;!&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:14px;"&gt;username john privilege 8 password 0 john&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:14px;"&gt;privilege exec level 8 debug ip ospf adj&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:14px;"&gt;!&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:14px;"&gt;but what about&amp;nbsp; if the user needs to run more than one command? And how its going to work since the AAA authentication method will require to lookup to RADIUS first and only if the RADIUS is not reachable it will allow to authenticate using the local login.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:14px;"&gt;Here is some of the current config i have.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:14px;"&gt;!&lt;BR /&gt;aaa authentication login default group radius local&lt;BR /&gt;aaa authorization console&lt;BR /&gt;aaa authorization exec default group radius local if-authenticated&lt;BR /&gt;aaa authorization network default group radius local if-authenticated&lt;BR /&gt;aaa accounting exec default start-stop group radius&lt;BR /&gt;aaa accounting network default start-stop group radius&lt;BR /&gt;!&lt;BR /&gt;aaa session-id common&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:14px;"&gt;!&lt;BR /&gt;username Jose privilege 15 password 7 022789034567244&lt;BR /&gt;username john privilege 8 password 0 john&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:14px;"&gt;line con 0&lt;BR /&gt;&amp;nbsp;exec-timeout 0 0&lt;BR /&gt;&amp;nbsp;logging synchronous&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;SPAN style="font-size:14px;"&gt;line aux 0&lt;BR /&gt;&amp;nbsp;exec-timeout 0 0&lt;BR /&gt;&amp;nbsp;privilege level 15&lt;BR /&gt;&amp;nbsp;logging synchronous&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:14px;"&gt;line vty 0 4&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:14px;"&gt;exec-timeout 30 0&lt;BR /&gt;&amp;nbsp;privilege level 15&lt;BR /&gt;&amp;nbsp;transport input telnet ssh&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;SPAN style="font-size:14px;"&gt;line vty 5 15&lt;BR /&gt;&amp;nbsp;exec-timeout 30 0&lt;BR /&gt;&amp;nbsp;privilege level 15&lt;BR /&gt;&amp;nbsp;transport input telnet ssh&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Looking forward to your response guys.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 05:36:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/radius-authentication-with-local-access-at-the-same-time/m-p/2632811#M56165</guid>
      <dc:creator>Beermania</dc:creator>
      <dc:date>2019-03-11T05:36:12Z</dc:date>
    </item>
    <item>
      <title>Hi,  On this case a</title>
      <link>https://community.cisco.com/t5/network-access-control/radius-authentication-with-local-access-at-the-same-time/m-p/2632812#M56166</link>
      <description>&lt;P&gt;&lt;SPAN style="font-size:16px;"&gt;&lt;SPAN style="font-family:courier new,courier,monospace;"&gt;Hi,&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:16px;"&gt;&lt;SPAN style="font-family:courier new,courier,monospace;"&gt;&lt;STRONG&gt;On this case a recommendation, would be to use the AAA authentication with Radius and the authorization list with Local database --&amp;gt; ASA.&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:16px;"&gt;&lt;SPAN style="font-family:courier new,courier,monospace;"&gt;&lt;EM&gt;Usually a best practice to manage Devices with certain commands is using TACACS+ that will create authorization for specific level of access and commands to be used.&amp;nbsp;&lt;/EM&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:16px;"&gt;&lt;SPAN style="font-family:courier new,courier,monospace;"&gt;&lt;EM&gt;&lt;STRONG&gt;Another simple workaround, will be to set up, a range of Line VTY to use local authentication and local authorization, though depending on the lines you assigned you will need to wait till the pertinent lines get occupied and then used the other ones. The other lines will use radius Authentication and authorization.&amp;nbsp;&lt;/STRONG&gt;&lt;/EM&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:16px;"&gt;&lt;SPAN style="font-family:courier new,courier,monospace;"&gt;For example:&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:16px;"&gt;&lt;SPAN style="font-family:courier new,courier,monospace;"&gt;&lt;U&gt;&lt;EM&gt;&lt;STRONG&gt;Local Database&lt;/STRONG&gt;&lt;/EM&gt;&lt;/U&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:16px;"&gt;&lt;SPAN style="font-family:courier new,courier,monospace;"&gt;&lt;EM&gt;&lt;STRONG&gt;&amp;nbsp;aaa authentication login LOCAL_AUTHEN local&lt;BR /&gt;&amp;nbsp;aaa authorization exec LOCAL_AUTHO local&lt;/STRONG&gt;&lt;/EM&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:16px;"&gt;&lt;SPAN style="font-family:courier new,courier,monospace;"&gt;&lt;EM&gt;&lt;STRONG&gt;line vty 0 4&lt;BR /&gt;&amp;nbsp;authorization exec LOCAL_AUTHO&lt;BR /&gt;&amp;nbsp;login authentication LOCAL_AUTHEN&lt;/STRONG&gt;&lt;/EM&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:16px;"&gt;&lt;SPAN style="font-family:courier new,courier,monospace;"&gt;&lt;U&gt;&lt;EM&gt;&lt;STRONG&gt;Radius Database:&lt;/STRONG&gt;&lt;/EM&gt;&lt;/U&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:16px;"&gt;&lt;SPAN style="font-family:courier new,courier,monospace;"&gt;&lt;EM&gt;&lt;STRONG&gt;&amp;nbsp;aaa authentication login RADIUS group radius&lt;BR /&gt;&amp;nbsp;aaa authorization exec RADIUS_AUTHOR group radius&lt;/STRONG&gt;&lt;/EM&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:16px;"&gt;&lt;SPAN style="font-family:courier new,courier,monospace;"&gt;&lt;EM&gt;&lt;STRONG&gt;line vty 5 15&lt;BR /&gt;&amp;nbsp;authorization exec RADIUS_AUTHOR&lt;BR /&gt;&amp;nbsp;login authentication RADIUS&lt;/STRONG&gt;&lt;/EM&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;STRONG&gt;&lt;SPAN style="font-family:courier new,courier,monospace;"&gt;Please proceed to rate and mark as correct this Post!&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family:courier new,courier,monospace;"&gt;David Castro,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family:courier new,courier,monospace;"&gt;Regards,&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 31 Mar 2015 19:19:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/radius-authentication-with-local-access-at-the-same-time/m-p/2632812#M56166</guid>
      <dc:creator>David Johan Castro Fernandez</dc:creator>
      <dc:date>2015-03-31T19:19:44Z</dc:date>
    </item>
    <item>
      <title>I'm not sure what you really</title>
      <link>https://community.cisco.com/t5/network-access-control/radius-authentication-with-local-access-at-the-same-time/m-p/2632813#M56168</link>
      <description>&lt;P&gt;I'm not sure what you really want to achieve but perhaps there are some ways to achieve your goal ...&lt;/P&gt;
&lt;P&gt;1) You can configure your router to first consult the local user-accounts and only if the user is not found, to ask the radius:&lt;/P&gt;

&lt;PRE&gt;
aaa authentication login LOC_RADIUS local group radius&lt;/PRE&gt;

&lt;P&gt;With that, the local users need to have different usernames then the Radius-users.&lt;/P&gt;
&lt;P&gt;2) When allowing multiple commands to different users, using &lt;A href="http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/sec_usr_cfg/configuration/15-s/sec-usr-cfg-15-s-book/sec-role-base-cli.html"&gt;role-based access-control (RBAC)&lt;/A&gt; is much easier then using the old privilege-levels.&lt;/P&gt;</description>
      <pubDate>Tue, 31 Mar 2015 23:05:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/radius-authentication-with-local-access-at-the-same-time/m-p/2632813#M56168</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2015-03-31T23:05:02Z</dc:date>
    </item>
    <item>
      <title>Thank you all for your</title>
      <link>https://community.cisco.com/t5/network-access-control/radius-authentication-with-local-access-at-the-same-time/m-p/2632814#M56170</link>
      <description>&lt;P&gt;Thank you all for your response.&lt;/P&gt;&lt;P&gt;I have checked the user is already in RADIUS with level 8 access, now how do i allow them to run specific command? Thanks&lt;/P&gt;</description>
      <pubDate>Wed, 01 Apr 2015 14:53:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/radius-authentication-with-local-access-at-the-same-time/m-p/2632814#M56170</guid>
      <dc:creator>Beermania</dc:creator>
      <dc:date>2015-04-01T14:53:29Z</dc:date>
    </item>
    <item>
      <title>Hi All, Just an update. I got</title>
      <link>https://community.cisco.com/t5/network-access-control/radius-authentication-with-local-access-at-the-same-time/m-p/2632815#M56173</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Just an update. I got it working now.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Configure the user privilege level on RADIUS server first. for example level 2.&lt;/P&gt;&lt;P&gt;Then add the specific command on the cisco device using this format.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;privilege exec level 2 &amp;nbsp;debug ip ospf adj - will allow the user with privilege level 2 access to run the ip ospf debug&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;privilege exec level 2&amp;nbsp; undebug ip ospf adj - will allow the user with privilege level 2 access to run undebug ip ospf ad&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Just follow the same format specific command that you want the user to have access.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 02 Apr 2015 18:10:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/radius-authentication-with-local-access-at-the-same-time/m-p/2632815#M56173</guid>
      <dc:creator>Beermania</dc:creator>
      <dc:date>2015-04-02T18:10:04Z</dc:date>
    </item>
    <item>
      <title>Re: I'm not sure what you really</title>
      <link>https://community.cisco.com/t5/network-access-control/radius-authentication-with-local-access-at-the-same-time/m-p/5267929#M595342</link>
      <description>&lt;P&gt;Is there an XR equivalent of the "aaa authentication login default local group radius". for users to go for local login and also the radius login.&lt;/P&gt;
&lt;P&gt;The above command has no effect and it is behaving still as if Radius authentication is taking precedence.&lt;/P&gt;</description>
      <pubDate>Wed, 05 Mar 2025 19:40:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/radius-authentication-with-local-access-at-the-same-time/m-p/5267929#M595342</guid>
      <dc:creator>shreyrai</dc:creator>
      <dc:date>2025-03-05T19:40:16Z</dc:date>
    </item>
  </channel>
</rss>

