<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: how to test AAA device administration without getting locked out? in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/how-to-test-aaa-device-administration-without-getting-locked-out/m-p/4521317#M571819</link>
    <description>&lt;P&gt;Just an additional note on top of what &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/158532"&gt;@Arne Bier&lt;/a&gt; stated... most Cisco switches will only fallback to local auth if complete connectivity fails to the configured RADIUS/TACACS+ servers. If the switch can reach the ISE PSN and receive an ACCESS_REJECT (as would be the case of disabling RADIUS/TACACS settings for the NAD), the switch will treat this as an auth failure and not fall back to local auth. This can also cause big problems if you misconfigure command authorisation.&lt;/P&gt;
&lt;P&gt;You would need a way to block TACACS+/RADIUS traffic between the switch and ISE PSNs to cause connectivity to fail and timeout for the switch to fallback to local authentication/authorisation.&lt;/P&gt;
&lt;P&gt;Another common approach when configuring AAA remotely with no console access, and one I used many years ago during my CCIE Security lab exam, is the following:&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Save the configuration&lt;/LI&gt;
&lt;LI&gt;Issue the 'reload in &amp;lt;min&amp;gt;' command to schedule an automatic reload of the switch in case of lockout&lt;/LI&gt;
&lt;LI&gt;Apply your AAA configuration and open a second separate SSH session to test it&lt;/LI&gt;
&lt;LI&gt;If the configuration works as expected, issue the 'reload cancel' command to cancel the scheduled shutdown&lt;/LI&gt;
&lt;LI&gt;Save the updated configuration&lt;/LI&gt;
&lt;/OL&gt;</description>
    <pubDate>Mon, 20 Dec 2021 01:59:10 GMT</pubDate>
    <dc:creator>Greg Gibbs</dc:creator>
    <dc:date>2021-12-20T01:59:10Z</dc:date>
    <item>
      <title>how to test AAA device administration without getting locked out?</title>
      <link>https://community.cisco.com/t5/network-access-control/how-to-test-aaa-device-administration-without-getting-locked-out/m-p/4521116#M571809</link>
      <description>&lt;P&gt;I am playing with TACACS/RADIUS device administration, sometimes I configure the authentication / authorization as RADIUS / TACACS or a mix of both? how can I configure AAA to fall into the local method in case I had an issue with the misconfiguration? If I got locked out, I want to use the inernal user on the switch instead, is this possible?&lt;/P&gt;</description>
      <pubDate>Sun, 19 Dec 2021 10:59:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/how-to-test-aaa-device-administration-without-getting-locked-out/m-p/4521116#M571809</guid>
      <dc:creator>SMD28316</dc:creator>
      <dc:date>2021-12-19T10:59:57Z</dc:date>
    </item>
    <item>
      <title>Re: how to test AAA device administration without getting locked out?</title>
      <link>https://community.cisco.com/t5/network-access-control/how-to-test-aaa-device-administration-without-getting-locked-out/m-p/4521256#M571814</link>
      <description>&lt;P&gt;There are two approaches you can take&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;1) Add the "local" keyword to certain aaa commands which will be used if the aaa server (radius or tacacs) does not respond. If your aaa&amp;nbsp; config is wrong or gets messed up, causing you to be locked out of the IOS, then simply disable the tacacs/radius option for that device in ISE, which will cause ISE to not respond to the device - then the local user in IOS will be used. That always works.&lt;/P&gt;
&lt;PRE&gt;aaa authentication login default group aaa &lt;FONT color="#FF0000"&gt;local&lt;/FONT&gt;
aaa authorization exec default group aaa &lt;FONT color="#FF0000"&gt;local&lt;/FONT&gt; if-authenticated
&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;2) Use IOS Method Lists in aaa and line statement. Method Lists allow you to define multiple versions of the same aaa command, and then apply specific versions of the command to the the vty and con lines. E.g. a method list called "MYTACACS" that uses a TACACS+ Group can be applied to vty 0 -4 - but for the console line you assign a different method list like "LOCALCONSOLE" where the aaa auth and author is using local users only.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;aaa authentication login default group aaa local
aaa authentication login &lt;FONT color="#FF0000"&gt;CONSOLE&lt;/FONT&gt; none
aaa authorization exec default group aaa local if-authenticated
aaa authorization exec &lt;FONT color="#FF0000"&gt;CONSOLE&lt;/FONT&gt; none&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;line con 0&lt;BR /&gt;authorization exec CONSOLE&lt;BR /&gt;login authentication CONSOLE&lt;BR /&gt;line aux 0&lt;BR /&gt;line vty 0 4&lt;BR /&gt;exec-timeout 0 0&lt;BR /&gt;transport input all&lt;BR /&gt;transport output all&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 19 Dec 2021 21:43:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/how-to-test-aaa-device-administration-without-getting-locked-out/m-p/4521256#M571814</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2021-12-19T21:43:56Z</dc:date>
    </item>
    <item>
      <title>Re: how to test AAA device administration without getting locked out?</title>
      <link>https://community.cisco.com/t5/network-access-control/how-to-test-aaa-device-administration-without-getting-locked-out/m-p/4521317#M571819</link>
      <description>&lt;P&gt;Just an additional note on top of what &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/158532"&gt;@Arne Bier&lt;/a&gt; stated... most Cisco switches will only fallback to local auth if complete connectivity fails to the configured RADIUS/TACACS+ servers. If the switch can reach the ISE PSN and receive an ACCESS_REJECT (as would be the case of disabling RADIUS/TACACS settings for the NAD), the switch will treat this as an auth failure and not fall back to local auth. This can also cause big problems if you misconfigure command authorisation.&lt;/P&gt;
&lt;P&gt;You would need a way to block TACACS+/RADIUS traffic between the switch and ISE PSNs to cause connectivity to fail and timeout for the switch to fallback to local authentication/authorisation.&lt;/P&gt;
&lt;P&gt;Another common approach when configuring AAA remotely with no console access, and one I used many years ago during my CCIE Security lab exam, is the following:&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Save the configuration&lt;/LI&gt;
&lt;LI&gt;Issue the 'reload in &amp;lt;min&amp;gt;' command to schedule an automatic reload of the switch in case of lockout&lt;/LI&gt;
&lt;LI&gt;Apply your AAA configuration and open a second separate SSH session to test it&lt;/LI&gt;
&lt;LI&gt;If the configuration works as expected, issue the 'reload cancel' command to cancel the scheduled shutdown&lt;/LI&gt;
&lt;LI&gt;Save the updated configuration&lt;/LI&gt;
&lt;/OL&gt;</description>
      <pubDate>Mon, 20 Dec 2021 01:59:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/how-to-test-aaa-device-administration-without-getting-locked-out/m-p/4521317#M571819</guid>
      <dc:creator>Greg Gibbs</dc:creator>
      <dc:date>2021-12-20T01:59:10Z</dc:date>
    </item>
    <item>
      <title>Re: how to test AAA device administration without getting locked out?</title>
      <link>https://community.cisco.com/t5/network-access-control/how-to-test-aaa-device-administration-without-getting-locked-out/m-p/4521326#M571821</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/388087"&gt;@Greg Gibbs&lt;/a&gt;&amp;nbsp;- I was proposing that to cut the connection between the NAS and ISE by unticking the RADIUS or TACACS tickbox in ISE (whichever is used for device admin). If that is done, then ISE will not respond to any requests from that NAS. And therefore the NAS will exhaust its server options and choose local.&lt;/P&gt;
&lt;P&gt;I would not advocate disabling the client's RADIUS tickbox in ISE if RADIUS is used for endpoint processing (802.1X, VPN etc) - but it sounds like&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1171789"&gt;@SMD28316&lt;/a&gt;&amp;nbsp;is possibly using TACACS+ anyway - or perhaps it's in a lab. I don't know. But I do know that this trick always gets me an my customers out of trouble in case someone fat fingers the NAS config and quickly needs to revert to the local accounts.&lt;/P&gt;</description>
      <pubDate>Mon, 20 Dec 2021 02:18:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/how-to-test-aaa-device-administration-without-getting-locked-out/m-p/4521326#M571821</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2021-12-20T02:18:11Z</dc:date>
    </item>
  </channel>
</rss>

