<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: 2FA + Static Login with IP Restriction in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/2fa-static-login-with-ip-restriction/m-p/4669220#M576670</link>
    <description>&lt;P&gt;Within the Device Admin policy, add the IP in the authentication condition and set the Identity store to internal users. Configure the security scanning tool username/pw in the local identity store.&lt;/P&gt;</description>
    <pubDate>Mon, 15 Aug 2022 14:12:26 GMT</pubDate>
    <dc:creator>Walker</dc:creator>
    <dc:date>2022-08-15T14:12:26Z</dc:date>
    <item>
      <title>2FA + Static Login with IP Restriction</title>
      <link>https://community.cisco.com/t5/network-access-control/2fa-static-login-with-ip-restriction/m-p/4666263#M576603</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;We have setup 2FA on our switches using Duo auth proxy. This is working fine.&lt;/P&gt;&lt;P&gt;However we would like to be able to add a static account with no 2FA so that our security scanning tool can login to the device to retrive config details etc. This login would come from a single IP address therefore we would like to restrict this login to that IP address.&lt;/P&gt;&lt;P&gt;This would need to work alongside our existing 2FA logins. Has anyone done this and can show us what we would need to do?&lt;/P&gt;&lt;P&gt;Below is our current login config:&lt;/P&gt;&lt;P&gt;aaa authentication login default group DUO&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 09 Aug 2022 09:54:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/2fa-static-login-with-ip-restriction/m-p/4666263#M576603</guid>
      <dc:creator>eshaq786</dc:creator>
      <dc:date>2022-08-09T09:54:49Z</dc:date>
    </item>
    <item>
      <title>Re: 2FA + Static Login with IP Restriction</title>
      <link>https://community.cisco.com/t5/network-access-control/2fa-static-login-with-ip-restriction/m-p/4666273#M576604</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/235967"&gt;@eshaq786&lt;/a&gt; you could configure a specific VTY line with a different authentication method list, which uses a different authentication server. Use the rotary command under VTY line and configure SSH on a specific port, which references the rotary number for that specific VTY line. You can also configure a specific ACL on that VTY line.&lt;/P&gt;
&lt;P&gt;Example:&lt;/P&gt;
&lt;PRE&gt;line vty 15&lt;BR /&gt; access-class 102 in&lt;BR /&gt;&amp;nbsp;rotary &lt;STRONG&gt;16&lt;/STRONG&gt;&lt;BR /&gt;&amp;nbsp;transport input ssh&lt;BR /&gt;&amp;nbsp;login authentication METHOD-LIST&lt;BR /&gt; !&lt;BR /&gt;ip ssh port 2016 rotary &lt;STRONG&gt;16&lt;/STRONG&gt;&lt;/PRE&gt;
&lt;P&gt;You connect to the device using port SSH to port 2016&lt;/P&gt;</description>
      <pubDate>Tue, 09 Aug 2022 10:34:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/2fa-static-login-with-ip-restriction/m-p/4666273#M576604</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2022-08-09T10:34:18Z</dc:date>
    </item>
    <item>
      <title>Re: 2FA + Static Login with IP Restriction</title>
      <link>https://community.cisco.com/t5/network-access-control/2fa-static-login-with-ip-restriction/m-p/4666309#M576605</link>
      <description>&lt;P&gt;Can i use this method but use a static username stored locally on the device? Furthermore, can i then restrict this so that only a specified ip address can login using this method as it would be deemed insecure since it had no 2FA.&lt;/P&gt;</description>
      <pubDate>Tue, 09 Aug 2022 10:33:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/2fa-static-login-with-ip-restriction/m-p/4666309#M576605</guid>
      <dc:creator>eshaq786</dc:creator>
      <dc:date>2022-08-09T10:33:40Z</dc:date>
    </item>
    <item>
      <title>Re: 2FA + Static Login with IP Restriction</title>
      <link>https://community.cisco.com/t5/network-access-control/2fa-static-login-with-ip-restriction/m-p/4666314#M576606</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/235967"&gt;@eshaq786&lt;/a&gt; yes you just reference a method list that uses local authentication. Yes you can apply an ACL just to that VTY line.&lt;/P&gt;</description>
      <pubDate>Tue, 09 Aug 2022 10:54:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/2fa-static-login-with-ip-restriction/m-p/4666314#M576606</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2022-08-09T10:54:25Z</dc:date>
    </item>
    <item>
      <title>Re: 2FA + Static Login with IP Restriction</title>
      <link>https://community.cisco.com/t5/network-access-control/2fa-static-login-with-ip-restriction/m-p/4666399#M576608</link>
      <description>&lt;P&gt;This is my existing VTY config&lt;/P&gt;&lt;P&gt;line con 0&lt;BR /&gt;password 7 xxxxx&lt;BR /&gt;logging synchronous&lt;BR /&gt;login authentication No-Radius-Login&lt;BR /&gt;line vty 0 4&lt;BR /&gt;password 7 xxxxxx&lt;BR /&gt;transport input ssh&lt;BR /&gt;line vty 5 15&lt;BR /&gt;password 7 xxxxxx&lt;BR /&gt;transport input ssh&lt;/P&gt;&lt;P&gt;If i issue just a line VTY 15, will that change the existing line vty 5 15 to vty 5 14?&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;access-list 1 permit 192.168.1.10&lt;/PRE&gt;&lt;PRE&gt;line vty 15&lt;BR /&gt;access-class 1 in&lt;BR /&gt;&amp;nbsp;rotary &lt;STRONG&gt;16&lt;/STRONG&gt;&lt;BR /&gt;&amp;nbsp;transport input ssh&lt;BR /&gt;&amp;nbsp;login authentication No-Radius-Login&lt;BR /&gt;!&lt;BR /&gt;ip ssh port 2016 rotary &lt;STRONG&gt;16&lt;/STRONG&gt;&lt;/PRE&gt;&lt;P&gt;Does the ACL look right? Or do i need to add a deny in there as well?&lt;/P&gt;</description>
      <pubDate>Tue, 09 Aug 2022 12:17:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/2fa-static-login-with-ip-restriction/m-p/4666399#M576608</guid>
      <dc:creator>eshaq786</dc:creator>
      <dc:date>2022-08-09T12:17:41Z</dc:date>
    </item>
    <item>
      <title>Re: 2FA + Static Login with IP Restriction</title>
      <link>https://community.cisco.com/t5/network-access-control/2fa-static-login-with-ip-restriction/m-p/4666403#M576609</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/235967"&gt;@eshaq786&lt;/a&gt; if you configure line 15, then lines 5 - 14 will remain the same. &lt;/P&gt;
&lt;P&gt;Configuration looks ok.&lt;/P&gt;</description>
      <pubDate>Tue, 09 Aug 2022 12:20:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/2fa-static-login-with-ip-restriction/m-p/4666403#M576609</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2022-08-09T12:20:59Z</dc:date>
    </item>
    <item>
      <title>Re: 2FA + Static Login with IP Restriction</title>
      <link>https://community.cisco.com/t5/network-access-control/2fa-static-login-with-ip-restriction/m-p/4669166#M576665</link>
      <description>&lt;P&gt;Hi.&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you have a static source IP for the scanning tool you easily can define a rule above the main rule in authentication section of ISE policy with source IP as condition in TACACS.Remote-Address Equals &amp;lt;scanning tool server ip&amp;gt; and choose ID store local or ID whatever is applicable. By this way you avoid modifying config on all devices.&lt;/P&gt;</description>
      <pubDate>Mon, 15 Aug 2022 11:45:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/2fa-static-login-with-ip-restriction/m-p/4669166#M576665</guid>
      <dc:creator>PSM</dc:creator>
      <dc:date>2022-08-15T11:45:54Z</dc:date>
    </item>
    <item>
      <title>Re: 2FA + Static Login with IP Restriction</title>
      <link>https://community.cisco.com/t5/network-access-control/2fa-static-login-with-ip-restriction/m-p/4669220#M576670</link>
      <description>&lt;P&gt;Within the Device Admin policy, add the IP in the authentication condition and set the Identity store to internal users. Configure the security scanning tool username/pw in the local identity store.&lt;/P&gt;</description>
      <pubDate>Mon, 15 Aug 2022 14:12:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/2fa-static-login-with-ip-restriction/m-p/4669220#M576670</guid>
      <dc:creator>Walker</dc:creator>
      <dc:date>2022-08-15T14:12:26Z</dc:date>
    </item>
    <item>
      <title>Re: 2FA + Static Login with IP Restriction</title>
      <link>https://community.cisco.com/t5/network-access-control/2fa-static-login-with-ip-restriction/m-p/4718907#M578146</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;Should have specified that I am not using TACACS to manage the switches.&lt;/P&gt;</description>
      <pubDate>Wed, 09 Nov 2022 19:57:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/2fa-static-login-with-ip-restriction/m-p/4718907#M578146</guid>
      <dc:creator>eshaq786</dc:creator>
      <dc:date>2022-11-09T19:57:07Z</dc:date>
    </item>
    <item>
      <title>Re: 2FA + Static Login with IP Restriction</title>
      <link>https://community.cisco.com/t5/network-access-control/2fa-static-login-with-ip-restriction/m-p/5286637#M596170</link>
      <description>&lt;P&gt;So i finally got around to implementing this. However i can getting strange errors when attempting to login. The SSH client just disconnects with the message&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;% Authorization failed.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;The logs show that the username and password was accepted. Not sure why its behaving like this.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Apr 30 16:19:16.988: %SEC_LOGIN-5-LOGIN_SUCCESS: Login Success [user: cisco] [Source: 192.168.1.10] [localport: 2016] at 16:19:16 BST Wed Apr 30 2025&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 30 Apr 2025 15:27:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/2fa-static-login-with-ip-restriction/m-p/5286637#M596170</guid>
      <dc:creator>eshaq786</dc:creator>
      <dc:date>2025-04-30T15:27:54Z</dc:date>
    </item>
  </channel>
</rss>

