<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Help with TACACS in ISE 3.00 in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/help-with-tacacs-in-ise-3-00/m-p/4451201#M569109</link>
    <description>&lt;P&gt;You would use AD section because ISE is capable of talking native language with AD. LDAP is also ok and you can make it working, but AD comes with more features and is more flexible. One of the things crosses my mind is usage of Global Catalog in AD, where you don't need to specify any specific AD server, you just use domain name, and AD would know how to talk to relevant servers. Another one is usage of Sites and Services, where you'll always communicate with 'closest' DC (depending on how your AD admin configured it), meaning that ISE in one datacenter can talk to closes one, while another in possibly different region would talk to different one. With LDAP you don't have such option.&lt;/P&gt;&lt;P&gt;Another thing that I noticed - what is the content of your condition in policy set, called 'Full device access'? I can't see it from the attached screenshots? Could you please try to go to deafult policy set and to configure default rule with permit statement? This way you can test it for sure if your TACACS+ is working properly, and then you are probably failing on some conditions.&lt;/P&gt;&lt;P&gt;In case your TACACS is licensed and enabled properly, you must always see some live logs and/or reports. They would state that authentication failed, but they must be there. I personally never seen working TACACS deployment in which there are no logs at all, which could be an indication that your service is not running properly.&lt;/P&gt;&lt;P&gt;BR,&lt;/P&gt;&lt;P&gt;Milos&lt;/P&gt;</description>
    <pubDate>Wed, 18 Aug 2021 13:22:22 GMT</pubDate>
    <dc:creator>Milos_Jovanovic</dc:creator>
    <dc:date>2021-08-18T13:22:22Z</dc:date>
    <item>
      <title>Help with TACACS in ISE 3.00</title>
      <link>https://community.cisco.com/t5/network-access-control/help-with-tacacs-in-ise-3-00/m-p/4450099#M569062</link>
      <description>&lt;P&gt;Can someone help me with this query.&lt;/P&gt;&lt;P&gt;I have read and seen videos on the Internet about how to enable TACACS+ in ISE.&lt;/P&gt;&lt;P&gt;I have followed all the steps as indicated, from the licensing to creating the authentication and authorisation rules but still doesn't work.&lt;/P&gt;&lt;P&gt;Every time I try to login to the switch, it denies access if I use the account in AD and jumps to use the local account. The sniffer shows there is some communication between ISE and the switch up to Authentication step when it denies access and then falls back to use the local account. I do not see any activity in the TACACS live logs that could help me.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Please note that a contractor installed ISE but we didn't have the license sorted before he left, so it is now up to me to make it work. So, he enabled device admin with RADIUS.&lt;/P&gt;&lt;P&gt;In the attached word document I pasted some screenshots of everything I have done.&lt;/P&gt;&lt;P&gt;Can someone please have a look and tell me what I am missing?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have done all the pre-checks.&lt;/P&gt;&lt;P&gt;ISE is listening on port 49.&lt;/P&gt;&lt;P&gt;I can see the TCP handshake complets OK&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This is the config in the switch:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;aaa group server tacacs+ ISE-TACACS&lt;BR /&gt;server name NWGB-H2P-ISE01&lt;BR /&gt;server name NWGB-H2P-ISE02&lt;BR /&gt;server-private 10.0.8.61 key 7 1543394F3318221571&lt;BR /&gt;server-private 10.0.8.62 key 7 075E130F793B10344E&lt;BR /&gt;ip tacacs source-interface Vlan7&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;aaa new-model&lt;BR /&gt;!&lt;BR /&gt;aaa authentication login VTY group ISE-TACACS local&lt;BR /&gt;aaa authorization network VTY group ISE-TACACS local&lt;BR /&gt;aaa authorization exec VTY group ISE-TACACS local&lt;BR /&gt;aaa session-id common&lt;BR /&gt;!&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;ip tacacs source-interface Vlan7&lt;BR /&gt;tacacs-server host 10.0.8.61&lt;BR /&gt;tacacs-server host 10.0.8.62&lt;BR /&gt;tacacs-server key 7 06573D627B7C00285C&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;line vty 0 4&lt;BR /&gt;exec-timeout 0 0&lt;BR /&gt;logging synchronous&lt;BR /&gt;login authentication VTY&lt;BR /&gt;transport preferred none&lt;BR /&gt;transport input ssh&lt;/P&gt;</description>
      <pubDate>Tue, 17 Aug 2021 05:51:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/help-with-tacacs-in-ise-3-00/m-p/4450099#M569062</guid>
      <dc:creator>a.maldonado</dc:creator>
      <dc:date>2021-08-17T05:51:38Z</dc:date>
    </item>
    <item>
      <title>Re: Help with TACACS in ISE 3.00</title>
      <link>https://community.cisco.com/t5/network-access-control/help-with-tacacs-in-ise-3-00/m-p/4450104#M569063</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/177536"&gt;@a.maldonado&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You are missing the "aaa authorisation commands......" and "aaa accounting commands....."&lt;/P&gt;
&lt;P&gt;Example:-&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;aaa authorization exec ISE-MLIST group ISE-TACACS local if-authenticated &lt;BR /&gt;aaa authorization commands 1 ISE-MLIST group ISE-TACACS local if-authenticated &lt;BR /&gt;aaa authorization commands 15 ISE-MLIST group ISE-TACACS local if-authenticated &lt;BR /&gt;aaa accounting exec default start-stop group ISE-TACACS&lt;BR /&gt;aaa accounting commands 1 default start-stop group ISE-TACACS&lt;BR /&gt;aaa accounting commands 15 default start-stop group ISE-TACACS&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Checkout the ISE Device Administration guide, this has more information to help you.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.cisco.com/t5/security-documents/cisco-ise-device-administration-prescriptive-deployment-guide/ta-p/3738365#toc-hId-759088769" target="_blank"&gt;https://community.cisco.com/t5/security-documents/cisco-ise-device-administration-prescriptive-deployment-guide/ta-p/3738365#toc-hId-759088769&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 16 Aug 2021 19:23:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/help-with-tacacs-in-ise-3-00/m-p/4450104#M569063</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2021-08-16T19:23:49Z</dc:date>
    </item>
    <item>
      <title>Re: Help with TACACS in ISE 3.00</title>
      <link>https://community.cisco.com/t5/network-access-control/help-with-tacacs-in-ise-3-00/m-p/4450118#M569064</link>
      <description>&lt;P&gt;Inside ISE you're also missing solid Authorization Policies, as an example my Lab uses AD groups as shown below:&lt;/P&gt;&lt;P&gt;It looked like your screen shot was looking again for the Network Device again and not for a User or Group.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Auth.PNG" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/128090iC3370F76528F302E/image-size/large?v=v2&amp;amp;px=999" role="button" title="Auth.PNG" alt="Auth.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 16 Aug 2021 19:48:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/help-with-tacacs-in-ise-3-00/m-p/4450118#M569064</guid>
      <dc:creator>mitchp75</dc:creator>
      <dc:date>2021-08-16T19:48:42Z</dc:date>
    </item>
    <item>
      <title>Re: Help with TACACS in ISE 3.00</title>
      <link>https://community.cisco.com/t5/network-access-control/help-with-tacacs-in-ise-3-00/m-p/4450267#M569068</link>
      <description>&lt;P&gt;Hi Rob,&lt;/P&gt;&lt;P&gt;THank you for your message, my problem is that it does not pass authentication. I pasted the commands you sent me anyway but still doesn't work.&lt;/P&gt;&lt;P&gt;When I try to login, the switch denies access to the user account in the AD domain and jumps straight to the local account of the switch.&lt;/P&gt;&lt;P&gt;I do not see any activity in the TACACS live logs that could help me. Any other idea?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;End of banner message from server&lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt;Keyboard-interactive authentication prompts from server:&lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt;End of keyboard-interactive prompts from server&lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt;Access denied&lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt;Keyboard-interactive authentication prompts from server:&lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt;| Password:&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 17 Aug 2021 05:48:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/help-with-tacacs-in-ise-3-00/m-p/4450267#M569068</guid>
      <dc:creator>a.maldonado</dc:creator>
      <dc:date>2021-08-17T05:48:31Z</dc:date>
    </item>
    <item>
      <title>Re: Help with TACACS in ISE 3.00</title>
      <link>https://community.cisco.com/t5/network-access-control/help-with-tacacs-in-ise-3-00/m-p/4450270#M569069</link>
      <description>&lt;P&gt;Hi Mitch,&lt;/P&gt;&lt;P&gt;As stated above, my problem is that I do not even pass the authentication state. However, you gave me an idea and started messing around with the authentication rules, which now look like the attachment.&lt;/P&gt;&lt;P&gt;I did change the condition in the authorization rule to point to the AD group that will have full access to the IOS. However, none of this made any difference.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;DIV class="mceNonEditable lia-copypaste-placeholder"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 17 Aug 2021 06:00:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/help-with-tacacs-in-ise-3-00/m-p/4450270#M569069</guid>
      <dc:creator>a.maldonado</dc:creator>
      <dc:date>2021-08-17T06:00:17Z</dc:date>
    </item>
    <item>
      <title>Re: Help with TACACS in ISE 3.00</title>
      <link>https://community.cisco.com/t5/network-access-control/help-with-tacacs-in-ise-3-00/m-p/4450283#M569071</link>
      <description>&lt;P&gt;Hi &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/177536"&gt;@a.maldonado&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;I believe you are missing AD-ISE integration part (at least I don't see it in your screenshots). You need to join ISE to AD (under Administration / Identity Management / External Identity Sources / Active Directory), followed by importing your prefered AD groups, which can then later be used in the authorization policies.&lt;/P&gt;&lt;P&gt;All_AD_Join_Points is predefined Identity Store Sequence, which probably has no ADs inside, untill you do AD join.&lt;/P&gt;&lt;P&gt;BR,&lt;/P&gt;&lt;P&gt;Milos&lt;/P&gt;</description>
      <pubDate>Tue, 17 Aug 2021 06:24:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/help-with-tacacs-in-ise-3-00/m-p/4450283#M569071</guid>
      <dc:creator>Milos_Jovanovic</dc:creator>
      <dc:date>2021-08-17T06:24:36Z</dc:date>
    </item>
    <item>
      <title>Re: Help with TACACS in ISE 3.00</title>
      <link>https://community.cisco.com/t5/network-access-control/help-with-tacacs-in-ise-3-00/m-p/4450906#M569097</link>
      <description>&lt;P&gt;Please check ISE TACACS+ Live logs and run the detail reports.&lt;/P&gt;
&lt;P&gt;As you already took some packet captures,&amp;nbsp;&lt;A href="https://support.f5.com/csp/article/K40341514" target="_self"&gt;K40341514: How to decrypt the encrypted portion of TACACS+ traffic (AskF5)&lt;/A&gt;&amp;nbsp;to examine the T+ exchanges.&lt;/P&gt;</description>
      <pubDate>Wed, 18 Aug 2021 05:48:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/help-with-tacacs-in-ise-3-00/m-p/4450906#M569097</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2021-08-18T05:48:30Z</dc:date>
    </item>
    <item>
      <title>Re: Help with TACACS in ISE 3.00</title>
      <link>https://community.cisco.com/t5/network-access-control/help-with-tacacs-in-ise-3-00/m-p/4450952#M569101</link>
      <description>&lt;P&gt;Hi Milos,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you for your comments.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I checked where you said and yes! there is an entry for the AD. Please see attachment. Please note that I removed the domain name from all screenshots but they are there.&lt;/P&gt;&lt;P&gt;I changed the authentication to usee that entry but still does not work. The switch returns the denied after trying to use the username that should work.&lt;/P&gt;&lt;P&gt;By the way, the contractor left our switches workinmgn with Radius which get our credentials from AD and so I know this is the username that should be working.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any other ideas?&lt;/P&gt;</description>
      <pubDate>Wed, 18 Aug 2021 07:03:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/help-with-tacacs-in-ise-3-00/m-p/4450952#M569101</guid>
      <dc:creator>a.maldonado</dc:creator>
      <dc:date>2021-08-18T07:03:02Z</dc:date>
    </item>
    <item>
      <title>Re: Help with TACACS in ISE 3.00</title>
      <link>https://community.cisco.com/t5/network-access-control/help-with-tacacs-in-ise-3-00/m-p/4451002#M569102</link>
      <description>&lt;P&gt;Hi &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/177536"&gt;@a.maldonado&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;Yes, your AD-ISE integration part looks fine.&lt;/P&gt;&lt;P&gt;Please run TACACS+ Live logs (as &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/113005"&gt;@hslai&lt;/a&gt; advised) or report, and get into detailed report and share that info. Based on detailed report, hopefully, we should be able to see at which point is failing.&lt;/P&gt;&lt;P&gt;BR,&lt;/P&gt;&lt;P&gt;Milos&lt;/P&gt;</description>
      <pubDate>Wed, 18 Aug 2021 07:40:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/help-with-tacacs-in-ise-3-00/m-p/4451002#M569102</guid>
      <dc:creator>Milos_Jovanovic</dc:creator>
      <dc:date>2021-08-18T07:40:42Z</dc:date>
    </item>
    <item>
      <title>Re: Help with TACACS in ISE 3.00</title>
      <link>https://community.cisco.com/t5/network-access-control/help-with-tacacs-in-ise-3-00/m-p/4451169#M569105</link>
      <description>&lt;P&gt;I do not get anything in the TACACs live logs section, it is as if it never makes it to ISE but in wireshark I can see some packet excahnge.&lt;/P&gt;&lt;P&gt;Anyway, why should I be using the AD section to integrate the ISE with AD. Why not the LDAP section? that's what I have seen in most documentation. I just assume I could use AD because tha is what is was there.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 18 Aug 2021 12:18:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/help-with-tacacs-in-ise-3-00/m-p/4451169#M569105</guid>
      <dc:creator>a.maldonado</dc:creator>
      <dc:date>2021-08-18T12:18:19Z</dc:date>
    </item>
    <item>
      <title>Re: Help with TACACS in ISE 3.00</title>
      <link>https://community.cisco.com/t5/network-access-control/help-with-tacacs-in-ise-3-00/m-p/4451172#M569106</link>
      <description>&lt;P&gt;Unfortunately, I am not seeing any activity in the TACACs live logs section. the packets that I captured were from wire shark and it was just the tcp handshake completed and then an Authentication packet. Unfortunately, those traces were left in a machine in the office.&lt;/P&gt;</description>
      <pubDate>Wed, 18 Aug 2021 12:19:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/help-with-tacacs-in-ise-3-00/m-p/4451172#M569106</guid>
      <dc:creator>a.maldonado</dc:creator>
      <dc:date>2021-08-18T12:19:41Z</dc:date>
    </item>
    <item>
      <title>Re: Help with TACACS in ISE 3.00</title>
      <link>https://community.cisco.com/t5/network-access-control/help-with-tacacs-in-ise-3-00/m-p/4451201#M569109</link>
      <description>&lt;P&gt;You would use AD section because ISE is capable of talking native language with AD. LDAP is also ok and you can make it working, but AD comes with more features and is more flexible. One of the things crosses my mind is usage of Global Catalog in AD, where you don't need to specify any specific AD server, you just use domain name, and AD would know how to talk to relevant servers. Another one is usage of Sites and Services, where you'll always communicate with 'closest' DC (depending on how your AD admin configured it), meaning that ISE in one datacenter can talk to closes one, while another in possibly different region would talk to different one. With LDAP you don't have such option.&lt;/P&gt;&lt;P&gt;Another thing that I noticed - what is the content of your condition in policy set, called 'Full device access'? I can't see it from the attached screenshots? Could you please try to go to deafult policy set and to configure default rule with permit statement? This way you can test it for sure if your TACACS+ is working properly, and then you are probably failing on some conditions.&lt;/P&gt;&lt;P&gt;In case your TACACS is licensed and enabled properly, you must always see some live logs and/or reports. They would state that authentication failed, but they must be there. I personally never seen working TACACS deployment in which there are no logs at all, which could be an indication that your service is not running properly.&lt;/P&gt;&lt;P&gt;BR,&lt;/P&gt;&lt;P&gt;Milos&lt;/P&gt;</description>
      <pubDate>Wed, 18 Aug 2021 13:22:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/help-with-tacacs-in-ise-3-00/m-p/4451201#M569109</guid>
      <dc:creator>Milos_Jovanovic</dc:creator>
      <dc:date>2021-08-18T13:22:22Z</dc:date>
    </item>
    <item>
      <title>Re: Help with TACACS in ISE 3.00</title>
      <link>https://community.cisco.com/t5/network-access-control/help-with-tacacs-in-ise-3-00/m-p/4452350#M569170</link>
      <description>&lt;P&gt;Hi Rob,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you for the aaa commands you pasted for me. I finally got the switches talking to ISE via TACACS. To cut a long story short, I rebooted the ISE boxes because after trying to time sync them with the AD domain box I lost access to the rest of the switches which were still using Radius. However, the clocks were back to being out of sync (a little more than an hour) .&lt;/P&gt;&lt;P&gt;My question for you is. I am simualting the ISE boxes are not reacheable and therefore, I need to use the local account. It is working but after typing the admin username and hitting enter, it sends me straight to priviliedge mode. It is not asking me for a password to authenticate. Do you know why? These are the commands currently in the switch.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I appreciate your help!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;aaa new-model&lt;BR /&gt;aaa group server tacacs+ ISE-TACACS&lt;BR /&gt;aaa authentication login VTY group ISE-TACACS local&lt;BR /&gt;aaa authentication login CON none&lt;BR /&gt;aaa authentication enable default group ISE-TACACS enable&lt;BR /&gt;aaa authorization exec VTY group ISE-TACACS local&lt;BR /&gt;aaa authorization exec ISE-MLIST group ISE-TACACS local if-authenticated&lt;BR /&gt;aaa authorization commands 1 ISE-MLIST group ISE-TACACS local if-authenticated&lt;BR /&gt;aaa authorization commands 15 ISE-MLIST group ISE-TACACS local if-authenticated&lt;BR /&gt;aaa authorization network VTY group ISE-TACACS local&lt;BR /&gt;aaa accounting exec default start-stop group ISE-TACACS&lt;BR /&gt;aaa accounting commands 1 default start-stop group ISE-TACACS&lt;BR /&gt;aaa accounting commands 15 default start-stop group ISE-TACACS&lt;BR /&gt;aaa session-id common&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 20 Aug 2021 10:04:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/help-with-tacacs-in-ise-3-00/m-p/4452350#M569170</guid>
      <dc:creator>a.maldonado</dc:creator>
      <dc:date>2021-08-20T10:04:56Z</dc:date>
    </item>
    <item>
      <title>Re: Help with TACACS in ISE 3.00</title>
      <link>https://community.cisco.com/t5/network-access-control/help-with-tacacs-in-ise-3-00/m-p/4452359#M569172</link>
      <description>&lt;P&gt;Hi Milos,&lt;/P&gt;&lt;P&gt;Thank you very much for your assistance.&lt;/P&gt;&lt;P&gt;You were right, the problem must have been in the Authentication section of the Policy Set. I changed it to use the AD_server but still didn't work.&lt;/P&gt;&lt;P&gt;I then read that the time should be synced with the AD domain and tried to sync them but when I did that I lost access to the rest of the switches that were already using Radius for Device Admin. I had to reboot both ISE boxes and when they came back up the clocks were again out of sync with the AD domain but TACACs started working on the Test switch and could see activity in the TACACS live logs section. The otehr switches previously using Radisu were also reachable still using Radius.&lt;/P&gt;&lt;P&gt;Now, I am simulating the ISE being unreachable and using the local account to log in. The problem I have now is that after typing the admin username, it goes stright to privildege mode. It does not ask for password. Ideally, I would like it to prompt for a password. Do you know what I am missing from the configuration below?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you again for your help.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;aaa new-model&lt;BR /&gt;aaa group server tacacs+ ISE-TACACS&lt;BR /&gt;aaa authentication login VTY group ISE-TACACS local&lt;BR /&gt;aaa authentication login CON none&lt;BR /&gt;aaa authentication enable default group ISE-TACACS enable&lt;BR /&gt;aaa authorization exec VTY group ISE-TACACS local&lt;BR /&gt;aaa authorization exec ISE-MLIST group ISE-TACACS local if-authenticated&lt;BR /&gt;aaa authorization commands 1 ISE-MLIST group ISE-TACACS local if-authenticated&lt;BR /&gt;aaa authorization commands 15 ISE-MLIST group ISE-TACACS local if-authenticated&lt;BR /&gt;aaa authorization network VTY group ISE-TACACS local&lt;BR /&gt;aaa accounting exec default start-stop group ISE-TACACS&lt;BR /&gt;aaa accounting commands 1 default start-stop group ISE-TACACS&lt;BR /&gt;aaa accounting commands 15 default start-stop group ISE-TACACS&lt;BR /&gt;aaa session-id common&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;line vty 0 4&lt;BR /&gt;exec-timeout 0 0&lt;BR /&gt;authorization exec VTY&lt;BR /&gt;logging synchronous&lt;BR /&gt;login authentication VTY&lt;BR /&gt;transport preferred none&lt;BR /&gt;transport input ssh&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 20 Aug 2021 10:21:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/help-with-tacacs-in-ise-3-00/m-p/4452359#M569172</guid>
      <dc:creator>a.maldonado</dc:creator>
      <dc:date>2021-08-20T10:21:24Z</dc:date>
    </item>
    <item>
      <title>Re: Help with TACACS in ISE 3.00</title>
      <link>https://community.cisco.com/t5/network-access-control/help-with-tacacs-in-ise-3-00/m-p/4452369#M569173</link>
      <description>&lt;P&gt;Hi &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/177536"&gt;@a.maldonado&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;I'm glad to hear that you managed to resolve this.&lt;/P&gt;&lt;P&gt;I don't see your configuration of the local user, but I'm assuming it contains 'privilege 15' along with username and password. Given that you are using AAA list called VTY under vty lines for exec authorization (command 'authorization exec VTY'), and on your list (command 'aaa authorization exec VTY group ISE-TACACS local'), you are asking AAA server for authorization firstly, and, if unavaliable like in your test, it falls back to local DB. This is an expected behavior.&lt;/P&gt;&lt;P&gt;If you want to be prompted for enable password you need to remove it from vty config. I would also advise to enable exec-timeout, for at least 30 mins (in order not to end up with no available vty lines at some point):&lt;/P&gt;&lt;P class="lia-indent-padding-left-30px"&gt;&lt;EM&gt;line vty 0 4&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;exec-timeout 30&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;no authorization exec VTY&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;Please note that this change will also prompt for enable password even if you are using TACACS+.&lt;/P&gt;&lt;P&gt;BR&lt;/P&gt;&lt;P&gt;Milos&lt;/P&gt;</description>
      <pubDate>Fri, 20 Aug 2021 10:43:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/help-with-tacacs-in-ise-3-00/m-p/4452369#M569173</guid>
      <dc:creator>Milos_Jovanovic</dc:creator>
      <dc:date>2021-08-20T10:43:08Z</dc:date>
    </item>
    <item>
      <title>Re: Help with TACACS in ISE 3.00</title>
      <link>https://community.cisco.com/t5/network-access-control/help-with-tacacs-in-ise-3-00/m-p/4452629#M569186</link>
      <description>&lt;P&gt;Thank you Milos and to everyone who responded. You gave me some ideas.&lt;/P&gt;</description>
      <pubDate>Fri, 20 Aug 2021 17:36:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/help-with-tacacs-in-ise-3-00/m-p/4452629#M569186</guid>
      <dc:creator>a.maldonado</dc:creator>
      <dc:date>2021-08-20T17:36:26Z</dc:date>
    </item>
  </channel>
</rss>

