<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Alternate SSH port on a switch IOS. in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/alternate-ssh-port-on-a-switch-ios/m-p/4441385#M568770</link>
    <description>&lt;P&gt;&lt;SPAN&gt;These accounts only become active when the switches connection to ISE goes down for any reason, allowing access to the switch by a field tech.&lt;BR /&gt;&lt;/SPAN&gt;This is the default behavior if you set ISE first in AAA, but you can set up &lt;STRONG&gt;local&lt;/STRONG&gt; as primary authentication for AAA and TACACS+ as fallback method.&lt;BR /&gt;&lt;BR /&gt;If i understand you clearly you want to access with local account AND ISE, while it's reachable.&lt;BR /&gt;if so you may need this assuming you're using tacacs+ in your deployment :&lt;BR /&gt;&lt;BR /&gt;aaa authentication login default &lt;STRONG&gt;local&lt;/STRONG&gt; group &lt;STRONG&gt;ISE_T+_G&lt;/STRONG&gt;&lt;BR /&gt;aaa authorization exec default &lt;STRONG&gt;local&lt;/STRONG&gt; group &lt;STRONG&gt;ISE_T+_G&lt;/STRONG&gt;&lt;BR /&gt;aaa authorization commands 0 default &lt;STRONG&gt;local&lt;/STRONG&gt; group &lt;STRONG&gt;ISE_T+_G&lt;/STRONG&gt;&lt;BR /&gt;aaa authorization commands 1 default &lt;STRONG&gt;local&lt;/STRONG&gt; group &lt;STRONG&gt;ISE_T+_G&lt;/STRONG&gt;&lt;BR /&gt;aaa authorization commands 15 default &lt;STRONG&gt;local&lt;/STRONG&gt; group &lt;STRONG&gt;ISE_T+_G&lt;BR /&gt;&lt;BR /&gt;&lt;/STRONG&gt;-Debug using local account :&lt;BR /&gt;&lt;BR /&gt;*Jul 29 19:18:52.378: AAA/AUTHOR (0x38): &lt;STRONG&gt;Pick method list 'default'&lt;/STRONG&gt;&lt;BR /&gt;*Jul 29 19:18:52.378: AAA/AUTHOR/EXEC(00000038): processing AV cmd=&lt;BR /&gt;*Jul 29 19:18:52.378: AAA/AUTHOR/EXEC(00000038): processing AV priv-lvl=15&lt;BR /&gt;*Jul 29 19:18:52.378: AAA/AUTHOR/EXEC(00000038): Authorization successful&lt;BR /&gt;*Jul 29 19:20:09.230: AAA/AUTHOR/CMD: tty2 (70473958) &lt;STRONG&gt;user='cisco'&lt;/STRONG&gt;&lt;BR /&gt;*Jul 29 19:20:09.230: tty2 AAA/AUTHOR/CMD (70473958): &lt;STRONG&gt;Method=LOCAL&lt;/STRONG&gt;&lt;BR /&gt;*Jul 29 19:20:09.230: AAA/AUTHOR (70473958): &lt;STRONG&gt;Post authorization status = PASS_ADD&lt;/STRONG&gt;&lt;BR /&gt;&lt;BR /&gt;-Debug using account in ISE :&lt;BR /&gt;*Jul 29 19:19:22.095: AAA/AUTHEN/LOGIN (00000039): Pick method list 'default'&lt;BR /&gt;*Jul 29 19:19:25.583: AAA/AUTHOR (0x39): &lt;STRONG&gt;Pick method list 'default'&lt;/STRONG&gt;&lt;BR /&gt;*Jul 29 19:19:34.740: tty4 AAA/AUTHOR/CMD (3610061040): &lt;STRONG&gt;Method=LOCAL&lt;/STRONG&gt;&lt;BR /&gt;*Jul 29 19:19:34.740: AAA/AUTHOR/LOCAL: &lt;STRONG&gt;no entry for vdc-helpdesk&lt;/STRONG&gt;&lt;BR /&gt;*Jul 29 19:19:34.740: AAA/AUTHOR (3610061040): &lt;STRONG&gt;Post authorization status = ERROR ( Here the method will fallback to ISE)&lt;/STRONG&gt;&lt;BR /&gt;*Jul 29 19:19:34.740: tty4 AAA/AUTHOR/CMD (3610061040): &lt;STRONG&gt;Method=ISE_T+_G (tacacs+) &lt;/STRONG&gt;(Switch Picked the group ISE_T+_G)&lt;BR /&gt;*Jul 29 19:19:34.950: TAC+: (-684906256): &lt;STRONG&gt;received author response status = PASS_ADD&lt;/STRONG&gt;&lt;BR /&gt;*Jul 29 19:19:34.950: AAA/AUTHOR (3610061040): &lt;STRONG&gt;Post authorization status = PASS_ADD&lt;/STRONG&gt;&lt;BR /&gt;&lt;BR /&gt;Hope that helps!&lt;/P&gt;</description>
    <pubDate>Thu, 29 Jul 2021 20:42:53 GMT</pubDate>
    <dc:creator>Amine ZAKARIA</dc:creator>
    <dc:date>2021-07-29T20:42:53Z</dc:date>
    <item>
      <title>Alternate SSH port on a switch IOS.</title>
      <link>https://community.cisco.com/t5/network-access-control/alternate-ssh-port-on-a-switch-ios/m-p/4434602#M568517</link>
      <description>&lt;P&gt;Is there a solution to the inability to program a separate "alternate" port for SSH connections within a v12.x Cisco Switch IOS?&lt;/P&gt;&lt;P&gt;SITUATION:&lt;/P&gt;&lt;P&gt;Attempting to coordinate with CyberArk admin to facilitate automated password changes for our two local-auth reserve accounts.&amp;nbsp; These accounts only become active when the switches connection to ISE goes down for any reason, allowing access to the switch by a field tech.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We have a method that works for routers, but does not seem to work on our&amp;nbsp; switches.&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; IOS version:&amp;nbsp;&lt;EM&gt;WS-C2960-24-S, 12.2(46)SE&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; command “&lt;STRONG&gt;&lt;FONT face="courier new,courier"&gt;ip ssh port 3333 rotary 1&lt;/FONT&gt;&lt;/STRONG&gt;" Is not accepted&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; on the switch.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any ideas?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 16 Jul 2021 19:28:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/alternate-ssh-port-on-a-switch-ios/m-p/4434602#M568517</guid>
      <dc:creator>Santa.Hawes</dc:creator>
      <dc:date>2021-07-16T19:28:23Z</dc:date>
    </item>
    <item>
      <title>Re: Alternate SSH port on a switch IOS.</title>
      <link>https://community.cisco.com/t5/network-access-control/alternate-ssh-port-on-a-switch-ios/m-p/4434720#M568518</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;- Presumably not all platforms and or IOS &lt;STRONG&gt;versions&lt;/STRONG&gt; will accept that command, &lt;EM&gt;check this thread as an example :&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;A href="https://community.cisco.com/t5/switching/how-to-change-ports-to-access/td-p/2102105" target="_blank"&gt;https://community.cisco.com/t5/switching/how-to-change-ports-to-access/td-p/2102105&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;M.&lt;/P&gt;</description>
      <pubDate>Sat, 17 Jul 2021 06:05:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/alternate-ssh-port-on-a-switch-ios/m-p/4434720#M568518</guid>
      <dc:creator>Mark Elsen</dc:creator>
      <dc:date>2021-07-17T06:05:10Z</dc:date>
    </item>
    <item>
      <title>Re: Alternate SSH port on a switch IOS.</title>
      <link>https://community.cisco.com/t5/network-access-control/alternate-ssh-port-on-a-switch-ios/m-p/4434763#M568519</link>
      <description>&lt;P&gt;as per i know the command only introduced 15.X&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 17 Jul 2021 09:44:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/alternate-ssh-port-on-a-switch-ios/m-p/4434763#M568519</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2021-07-17T09:44:16Z</dc:date>
    </item>
    <item>
      <title>Re: Alternate SSH port on a switch IOS.</title>
      <link>https://community.cisco.com/t5/network-access-control/alternate-ssh-port-on-a-switch-ios/m-p/4440395#M568756</link>
      <description>&lt;P&gt;&lt;STRONG&gt;As this function is limited only to IOS v15.x, is there a work-around to enable a similar functionality for IOS v12,x?&amp;nbsp; &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;As I have stated, we have MANY thousands of Cisco devices on our network, and a compliance mandate to manage and change the local-login user passwords, which actually are only used when the connection to ISE goes down.&lt;/P&gt;&lt;P&gt;Our implementation cannot be the only place that these issues have come up.&lt;/P&gt;</description>
      <pubDate>Wed, 28 Jul 2021 14:02:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/alternate-ssh-port-on-a-switch-ios/m-p/4440395#M568756</guid>
      <dc:creator>Santa.Hawes</dc:creator>
      <dc:date>2021-07-28T14:02:21Z</dc:date>
    </item>
    <item>
      <title>Re: Alternate SSH port on a switch IOS.</title>
      <link>https://community.cisco.com/t5/network-access-control/alternate-ssh-port-on-a-switch-ios/m-p/4441385#M568770</link>
      <description>&lt;P&gt;&lt;SPAN&gt;These accounts only become active when the switches connection to ISE goes down for any reason, allowing access to the switch by a field tech.&lt;BR /&gt;&lt;/SPAN&gt;This is the default behavior if you set ISE first in AAA, but you can set up &lt;STRONG&gt;local&lt;/STRONG&gt; as primary authentication for AAA and TACACS+ as fallback method.&lt;BR /&gt;&lt;BR /&gt;If i understand you clearly you want to access with local account AND ISE, while it's reachable.&lt;BR /&gt;if so you may need this assuming you're using tacacs+ in your deployment :&lt;BR /&gt;&lt;BR /&gt;aaa authentication login default &lt;STRONG&gt;local&lt;/STRONG&gt; group &lt;STRONG&gt;ISE_T+_G&lt;/STRONG&gt;&lt;BR /&gt;aaa authorization exec default &lt;STRONG&gt;local&lt;/STRONG&gt; group &lt;STRONG&gt;ISE_T+_G&lt;/STRONG&gt;&lt;BR /&gt;aaa authorization commands 0 default &lt;STRONG&gt;local&lt;/STRONG&gt; group &lt;STRONG&gt;ISE_T+_G&lt;/STRONG&gt;&lt;BR /&gt;aaa authorization commands 1 default &lt;STRONG&gt;local&lt;/STRONG&gt; group &lt;STRONG&gt;ISE_T+_G&lt;/STRONG&gt;&lt;BR /&gt;aaa authorization commands 15 default &lt;STRONG&gt;local&lt;/STRONG&gt; group &lt;STRONG&gt;ISE_T+_G&lt;BR /&gt;&lt;BR /&gt;&lt;/STRONG&gt;-Debug using local account :&lt;BR /&gt;&lt;BR /&gt;*Jul 29 19:18:52.378: AAA/AUTHOR (0x38): &lt;STRONG&gt;Pick method list 'default'&lt;/STRONG&gt;&lt;BR /&gt;*Jul 29 19:18:52.378: AAA/AUTHOR/EXEC(00000038): processing AV cmd=&lt;BR /&gt;*Jul 29 19:18:52.378: AAA/AUTHOR/EXEC(00000038): processing AV priv-lvl=15&lt;BR /&gt;*Jul 29 19:18:52.378: AAA/AUTHOR/EXEC(00000038): Authorization successful&lt;BR /&gt;*Jul 29 19:20:09.230: AAA/AUTHOR/CMD: tty2 (70473958) &lt;STRONG&gt;user='cisco'&lt;/STRONG&gt;&lt;BR /&gt;*Jul 29 19:20:09.230: tty2 AAA/AUTHOR/CMD (70473958): &lt;STRONG&gt;Method=LOCAL&lt;/STRONG&gt;&lt;BR /&gt;*Jul 29 19:20:09.230: AAA/AUTHOR (70473958): &lt;STRONG&gt;Post authorization status = PASS_ADD&lt;/STRONG&gt;&lt;BR /&gt;&lt;BR /&gt;-Debug using account in ISE :&lt;BR /&gt;*Jul 29 19:19:22.095: AAA/AUTHEN/LOGIN (00000039): Pick method list 'default'&lt;BR /&gt;*Jul 29 19:19:25.583: AAA/AUTHOR (0x39): &lt;STRONG&gt;Pick method list 'default'&lt;/STRONG&gt;&lt;BR /&gt;*Jul 29 19:19:34.740: tty4 AAA/AUTHOR/CMD (3610061040): &lt;STRONG&gt;Method=LOCAL&lt;/STRONG&gt;&lt;BR /&gt;*Jul 29 19:19:34.740: AAA/AUTHOR/LOCAL: &lt;STRONG&gt;no entry for vdc-helpdesk&lt;/STRONG&gt;&lt;BR /&gt;*Jul 29 19:19:34.740: AAA/AUTHOR (3610061040): &lt;STRONG&gt;Post authorization status = ERROR ( Here the method will fallback to ISE)&lt;/STRONG&gt;&lt;BR /&gt;*Jul 29 19:19:34.740: tty4 AAA/AUTHOR/CMD (3610061040): &lt;STRONG&gt;Method=ISE_T+_G (tacacs+) &lt;/STRONG&gt;(Switch Picked the group ISE_T+_G)&lt;BR /&gt;*Jul 29 19:19:34.950: TAC+: (-684906256): &lt;STRONG&gt;received author response status = PASS_ADD&lt;/STRONG&gt;&lt;BR /&gt;*Jul 29 19:19:34.950: AAA/AUTHOR (3610061040): &lt;STRONG&gt;Post authorization status = PASS_ADD&lt;/STRONG&gt;&lt;BR /&gt;&lt;BR /&gt;Hope that helps!&lt;/P&gt;</description>
      <pubDate>Thu, 29 Jul 2021 20:42:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/alternate-ssh-port-on-a-switch-ios/m-p/4441385#M568770</guid>
      <dc:creator>Amine ZAKARIA</dc:creator>
      <dc:date>2021-07-29T20:42:53Z</dc:date>
    </item>
    <item>
      <title>Re: Alternate SSH port on a switch IOS.</title>
      <link>https://community.cisco.com/t5/network-access-control/alternate-ssh-port-on-a-switch-ios/m-p/4441413#M568771</link>
      <description>&lt;P&gt;Sorry forget to mention, If you using different method than "default" dont forget to add it into line vty&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 29 Jul 2021 22:38:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/alternate-ssh-port-on-a-switch-ios/m-p/4441413#M568771</guid>
      <dc:creator>Amine ZAKARIA</dc:creator>
      <dc:date>2021-07-29T22:38:03Z</dc:date>
    </item>
  </channel>
</rss>

