<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cisco Secure ACS integration issue on Cisco router in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/cisco-secure-acs-integration-issue-on-cisco-router/m-p/4856854#M582292</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I already add the code that you mentioned, i can get into system but my enable password won't accept. The system prompts "error in authentication" although my enable password is correct. Here is my latest config:&lt;/P&gt;&lt;P&gt;aaa new-model&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;aaa group server tacacs+ ACS&lt;BR /&gt;server-private 10.0.29.20 key cisco.123&lt;BR /&gt;ip tacacs source-interface GigabitEthernet0/1&lt;BR /&gt;!&lt;BR /&gt;aaa authentication login default group ACS local&lt;BR /&gt;aaa authentication enable default group ACS enable&lt;BR /&gt;aaa authorization console&lt;BR /&gt;aaa authorization exec default group ACS local&lt;BR /&gt;!&lt;BR /&gt;aaa session-id common&lt;BR /&gt;!&lt;BR /&gt;mmi polling-interval 60&lt;BR /&gt;no mmi auto-configure&lt;BR /&gt;no mmi pvc&lt;BR /&gt;mmi snmp-timeout 180&lt;BR /&gt;!&lt;BR /&gt;ip dhcp pool VLAN 29&lt;BR /&gt;network 10.0.29.0 255.255.255.0&lt;BR /&gt;default-router 10.0.29.1&lt;BR /&gt;dns-server 1.1.1.1 1.0.0.1&lt;BR /&gt;lease 0 8&lt;BR /&gt;!&lt;BR /&gt;no ip domain lookup&lt;BR /&gt;ip cef&lt;BR /&gt;no ipv6 cef&lt;BR /&gt;!&lt;BR /&gt;multilink bundle-name authenticated&lt;BR /&gt;!&lt;BR /&gt;username admin secret 8 $8$FKBJ7IAYZw0CTv$3rpxxATLk/TLwynvKBabFPKTdVjhV5L1NVttF5jgPJQ&lt;BR /&gt;!&lt;BR /&gt;redundancy&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/0&lt;BR /&gt;ip address 172.18.200.166 255.255.255.0&lt;BR /&gt;ip nat outside&lt;BR /&gt;ip virtual-reassembly in&lt;BR /&gt;duplex auto&lt;BR /&gt;speed auto&lt;BR /&gt;media-type rj45&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1&lt;BR /&gt;ip address 10.2.27.1 255.255.255.0&lt;BR /&gt;ip nat inside&lt;BR /&gt;ip virtual-reassembly in&lt;BR /&gt;duplex auto&lt;BR /&gt;speed auto&lt;BR /&gt;media-type rj45&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/2&lt;BR /&gt;no ip address&lt;BR /&gt;duplex auto&lt;BR /&gt;speed auto&lt;BR /&gt;media-type rj45&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/3&lt;BR /&gt;no ip address&lt;BR /&gt;duplex auto&lt;BR /&gt;speed auto&lt;BR /&gt;media-type rj45&lt;BR /&gt;!&lt;BR /&gt;ip forward-protocol nd&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;no ip http server&lt;BR /&gt;no ip http secure-server&lt;BR /&gt;ip nat inside source list 1 interface GigabitEthernet0/0 overload&lt;BR /&gt;ip route 0.0.0.0 0.0.0.0 172.18.200.1&lt;BR /&gt;ip route 10.0.29.0 255.255.255.0 10.2.27.2&lt;BR /&gt;!&lt;BR /&gt;ipv6 ioam timestamp&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;access-list 1 permit any&lt;BR /&gt;!&lt;BR /&gt;control-plane&lt;BR /&gt;!&lt;BR /&gt;line con 0&lt;BR /&gt;line aux 0&lt;BR /&gt;line vty 0 4&lt;BR /&gt;transport input all&lt;BR /&gt;line vty 5 15&lt;BR /&gt;transport input all&lt;BR /&gt;!&lt;BR /&gt;no scheduler allocate&lt;BR /&gt;!&lt;BR /&gt;end&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;</description>
    <pubDate>Sun, 18 Jun 2023 00:41:04 GMT</pubDate>
    <dc:creator>Mikee Hendricks</dc:creator>
    <dc:date>2023-06-18T00:41:04Z</dc:date>
    <item>
      <title>Cisco Secure ACS integration issue on Cisco router</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-secure-acs-integration-issue-on-cisco-router/m-p/4855902#M582268</link>
      <description>&lt;P&gt;Good Day,&lt;/P&gt;&lt;P&gt;Please help me with my Cisco ACS integration issue. I already configured ACS, but when im trying to configure AAA on cisco router and try to login to the router remotely using telnet, i can't login with the credentials that i created on ACS, but the credentials that i created on the router works. Please take a look at the router's config file for reference. I hope someone can resolve my issue.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Current configuration : 5496 bytes&lt;BR /&gt;!&lt;BR /&gt;! Last configuration change at 00:37:43 UTC Fri Jun 16 2023 by admin&lt;BR /&gt;!&lt;BR /&gt;version 15.2&lt;BR /&gt;service timestamps debug datetime msec&lt;BR /&gt;service timestamps log datetime msec&lt;BR /&gt;service password-encryption&lt;BR /&gt;service compress-config&lt;BR /&gt;!&lt;BR /&gt;hostname CS01&lt;BR /&gt;!&lt;BR /&gt;boot-start-marker&lt;BR /&gt;boot-end-marker&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;enable password 7 13061E0108034A7B7977&lt;BR /&gt;!&lt;BR /&gt;username admin password 7 121A0C04110442557878&lt;BR /&gt;aaa new-model&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;aaa authentication login default group tacacs+ local&lt;BR /&gt;aaa authentication enable default group tacacs+ enable&lt;BR /&gt;aaa authorization console&lt;BR /&gt;aaa authorization exec default group tacacs+ local&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;aaa session-id common&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;ip dhcp excluded-address 192.168.10.1 192.168.10.20&lt;BR /&gt;ip dhcp excluded-address 192.168.11.1 192.168.11.20&lt;BR /&gt;ip dhcp excluded-address 192.168.11.21&lt;BR /&gt;ip dhcp excluded-address 192.168.10.20 192.168.10.254&lt;BR /&gt;ip dhcp excluded-address 192.168.11.20 192.168.11.254&lt;BR /&gt;ip dhcp excluded-address 192.168.50.1 192.168.50.20&lt;BR /&gt;!&lt;BR /&gt;ip dhcp pool VLAN10&lt;BR /&gt;network 192.168.10.0 255.255.255.0&lt;BR /&gt;default-router 192.168.10.1&lt;BR /&gt;dns-server 1.1.1.1 1.0.0.1&lt;BR /&gt;lease 0 8&lt;BR /&gt;!&lt;BR /&gt;ip dhcp pool VLAN11&lt;BR /&gt;network 192.168.11.0 255.255.255.0&lt;BR /&gt;default-router 192.168.11.1&lt;BR /&gt;dns-server 1.1.1.1 1.0.0.1&lt;BR /&gt;lease 0 8&lt;BR /&gt;!&lt;BR /&gt;ip dhcp pool VLAN50&lt;BR /&gt;network 192.168.50.0 255.255.255.0&lt;BR /&gt;default-router 192.168.50.1&lt;BR /&gt;dns-server 1.1.1.1 1.0.0.1&lt;BR /&gt;lease 0 8&lt;BR /&gt;!&lt;BR /&gt;no ip domain-lookup&lt;BR /&gt;ip cef&lt;BR /&gt;no ipv6 cef&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;spanning-tree mode pvst&lt;BR /&gt;spanning-tree extend system-id&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/0&lt;BR /&gt;no switchport&lt;BR /&gt;ip address 10.0.28.2 255.255.255.0&lt;BR /&gt;negotiation auto&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1&lt;BR /&gt;switchport trunk allowed vlan 10,11&lt;BR /&gt;switchport trunk encapsulation dot1q&lt;BR /&gt;switchport mode trunk&lt;BR /&gt;negotiation auto&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/2&lt;BR /&gt;switchport trunk allowed vlan 10,11&lt;BR /&gt;switchport trunk encapsulation dot1q&lt;BR /&gt;switchport mode trunk&lt;BR /&gt;negotiation auto&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/3&lt;BR /&gt;negotiation auto&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/0&lt;BR /&gt;negotiation auto&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/1&lt;BR /&gt;negotiation auto&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/2&lt;BR /&gt;switchport access vlan 666&lt;BR /&gt;switchport mode access&lt;BR /&gt;negotiation auto&lt;BR /&gt;spanning-tree portfast edge&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/3&lt;BR /&gt;negotiation auto&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet2/0&lt;BR /&gt;negotiation auto&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet2/1&lt;BR /&gt;negotiation auto&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet2/2&lt;BR /&gt;shutdown&lt;BR /&gt;negotiation auto&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet2/3&lt;BR /&gt;switchport access vlan 50&lt;BR /&gt;switchport mode access&lt;BR /&gt;shutdown&lt;BR /&gt;negotiation auto&lt;BR /&gt;spanning-tree portfast edge&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet3/0&lt;BR /&gt;switchport access vlan 50&lt;BR /&gt;switchport mode access&lt;BR /&gt;negotiation auto&lt;BR /&gt;spanning-tree portfast edge&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet3/1&lt;BR /&gt;switchport access vlan 50&lt;BR /&gt;switchport mode access&lt;BR /&gt;negotiation auto&lt;BR /&gt;spanning-tree portfast edge&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet3/2&lt;BR /&gt;switchport access vlan 50&lt;BR /&gt;switchport mode access&lt;BR /&gt;negotiation auto&lt;BR /&gt;spanning-tree portfast edge&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet3/3&lt;BR /&gt;switchport access vlan 50&lt;BR /&gt;switchport mode access&lt;BR /&gt;negotiation auto&lt;BR /&gt;spanning-tree portfast edge&lt;BR /&gt;!&lt;BR /&gt;interface Vlan10&lt;BR /&gt;ip address 192.168.10.1 255.255.255.0&lt;BR /&gt;ip helper-address 192.168.50.2&lt;BR /&gt;ip helper-address 192.168.50.3&lt;BR /&gt;!&lt;BR /&gt;interface Vlan11&lt;BR /&gt;ip address 192.168.11.1 255.255.255.0&lt;BR /&gt;ip helper-address 192.168.50.2&lt;BR /&gt;ip helper-address 192.168.50.3&lt;BR /&gt;!&lt;BR /&gt;interface Vlan50&lt;BR /&gt;ip address 192.168.50.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Vlan666&lt;BR /&gt;ip address 10.1.50.6 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;ip default-gateway 10.0.28.1&lt;BR /&gt;ip forward-protocol nd&lt;BR /&gt;!&lt;BR /&gt;ip http server&lt;BR /&gt;ip http secure-server&lt;BR /&gt;!&lt;BR /&gt;ip route 0.0.0.0 0.0.0.0 10.0.28.1&lt;BR /&gt;ip ssh server algorithm encryption aes128-ctr aes192-ctr aes256-ctr&lt;BR /&gt;ip ssh client algorithm encryption aes128-ctr aes192-ctr aes256-ctr&lt;/P&gt;&lt;P&gt;!&lt;BR /&gt;tacacs server CS01&lt;BR /&gt;tacacs server TAC&lt;BR /&gt;address ipv4 192.168.10.20&lt;BR /&gt;key 7 0307521805006F1D1C5A&lt;BR /&gt;!&lt;BR /&gt;control-plane&lt;BR /&gt;!&lt;BR /&gt;line con 0&lt;BR /&gt;line aux 0&lt;BR /&gt;line vty 5 15&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;end&lt;/P&gt;&lt;P&gt;Thank you.&lt;/P&gt;</description>
      <pubDate>Fri, 16 Jun 2023 01:00:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-secure-acs-integration-issue-on-cisco-router/m-p/4855902#M582268</guid>
      <dc:creator>Mikee Hendricks</dc:creator>
      <dc:date>2023-06-16T01:00:02Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Secure ACS integration issue on Cisco router</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-secure-acs-integration-issue-on-cisco-router/m-p/4855913#M582269</link>
      <description>&lt;P&gt;&lt;SPAN&gt;tacacs server CS01&amp;lt;&amp;lt;- REMOVE THIS&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;AND CHECK AGAIN&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Also please specify the source of aaa,&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;İp tacacs source ip &amp;lt;mgmt vlan svi ip&amp;gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 16 Jun 2023 01:28:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-secure-acs-integration-issue-on-cisco-router/m-p/4855913#M582269</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-06-16T01:28:14Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Secure ACS integration issue on Cisco router</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-secure-acs-integration-issue-on-cisco-router/m-p/4855917#M582270</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;
&lt;P&gt;Try this:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;aaa authentication login default group&amp;nbsp;CS01&amp;nbsp; local&lt;BR /&gt;aaa authentication enable default group&amp;nbsp;CS01 enable&lt;BR /&gt;aaa authorization console&lt;BR /&gt;aaa authorization exec default group&amp;nbsp;CS01 local&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;BR /&gt;tacacs server TAC&lt;BR /&gt;address ipv4 192.168.10.20&lt;BR /&gt;key 7 0307521805006F1D1C5A&lt;/P&gt;
&lt;P&gt;aaa group server tacacs+ CS01&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;server name TAC&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;line vty 0 4&lt;/P&gt;
&lt;P&gt;&amp;nbsp;transport input all&lt;/P&gt;</description>
      <pubDate>Fri, 16 Jun 2023 01:31:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-secure-acs-integration-issue-on-cisco-router/m-p/4855917#M582270</guid>
      <dc:creator>Flavio Miranda</dc:creator>
      <dc:date>2023-06-16T01:31:11Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Secure ACS integration issue on Cisco router</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-secure-acs-integration-issue-on-cisco-router/m-p/4856854#M582292</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I already add the code that you mentioned, i can get into system but my enable password won't accept. The system prompts "error in authentication" although my enable password is correct. Here is my latest config:&lt;/P&gt;&lt;P&gt;aaa new-model&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;aaa group server tacacs+ ACS&lt;BR /&gt;server-private 10.0.29.20 key cisco.123&lt;BR /&gt;ip tacacs source-interface GigabitEthernet0/1&lt;BR /&gt;!&lt;BR /&gt;aaa authentication login default group ACS local&lt;BR /&gt;aaa authentication enable default group ACS enable&lt;BR /&gt;aaa authorization console&lt;BR /&gt;aaa authorization exec default group ACS local&lt;BR /&gt;!&lt;BR /&gt;aaa session-id common&lt;BR /&gt;!&lt;BR /&gt;mmi polling-interval 60&lt;BR /&gt;no mmi auto-configure&lt;BR /&gt;no mmi pvc&lt;BR /&gt;mmi snmp-timeout 180&lt;BR /&gt;!&lt;BR /&gt;ip dhcp pool VLAN 29&lt;BR /&gt;network 10.0.29.0 255.255.255.0&lt;BR /&gt;default-router 10.0.29.1&lt;BR /&gt;dns-server 1.1.1.1 1.0.0.1&lt;BR /&gt;lease 0 8&lt;BR /&gt;!&lt;BR /&gt;no ip domain lookup&lt;BR /&gt;ip cef&lt;BR /&gt;no ipv6 cef&lt;BR /&gt;!&lt;BR /&gt;multilink bundle-name authenticated&lt;BR /&gt;!&lt;BR /&gt;username admin secret 8 $8$FKBJ7IAYZw0CTv$3rpxxATLk/TLwynvKBabFPKTdVjhV5L1NVttF5jgPJQ&lt;BR /&gt;!&lt;BR /&gt;redundancy&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/0&lt;BR /&gt;ip address 172.18.200.166 255.255.255.0&lt;BR /&gt;ip nat outside&lt;BR /&gt;ip virtual-reassembly in&lt;BR /&gt;duplex auto&lt;BR /&gt;speed auto&lt;BR /&gt;media-type rj45&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1&lt;BR /&gt;ip address 10.2.27.1 255.255.255.0&lt;BR /&gt;ip nat inside&lt;BR /&gt;ip virtual-reassembly in&lt;BR /&gt;duplex auto&lt;BR /&gt;speed auto&lt;BR /&gt;media-type rj45&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/2&lt;BR /&gt;no ip address&lt;BR /&gt;duplex auto&lt;BR /&gt;speed auto&lt;BR /&gt;media-type rj45&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/3&lt;BR /&gt;no ip address&lt;BR /&gt;duplex auto&lt;BR /&gt;speed auto&lt;BR /&gt;media-type rj45&lt;BR /&gt;!&lt;BR /&gt;ip forward-protocol nd&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;no ip http server&lt;BR /&gt;no ip http secure-server&lt;BR /&gt;ip nat inside source list 1 interface GigabitEthernet0/0 overload&lt;BR /&gt;ip route 0.0.0.0 0.0.0.0 172.18.200.1&lt;BR /&gt;ip route 10.0.29.0 255.255.255.0 10.2.27.2&lt;BR /&gt;!&lt;BR /&gt;ipv6 ioam timestamp&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;access-list 1 permit any&lt;BR /&gt;!&lt;BR /&gt;control-plane&lt;BR /&gt;!&lt;BR /&gt;line con 0&lt;BR /&gt;line aux 0&lt;BR /&gt;line vty 0 4&lt;BR /&gt;transport input all&lt;BR /&gt;line vty 5 15&lt;BR /&gt;transport input all&lt;BR /&gt;!&lt;BR /&gt;no scheduler allocate&lt;BR /&gt;!&lt;BR /&gt;end&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;</description>
      <pubDate>Sun, 18 Jun 2023 00:41:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-secure-acs-integration-issue-on-cisco-router/m-p/4856854#M582292</guid>
      <dc:creator>Mikee Hendricks</dc:creator>
      <dc:date>2023-06-18T00:41:04Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Secure ACS integration issue on Cisco router</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-secure-acs-integration-issue-on-cisco-router/m-p/4856866#M582294</link>
      <description>&lt;P&gt;You are missing the command&lt;/P&gt;
&lt;PRE&gt;aaa authorization commands 15 default group ACS  local
aaa authorization config-commands&lt;/PRE&gt;</description>
      <pubDate>Sun, 18 Jun 2023 02:19:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-secure-acs-integration-issue-on-cisco-router/m-p/4856866#M582294</guid>
      <dc:creator>Flavio Miranda</dc:creator>
      <dc:date>2023-06-18T02:19:56Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Secure ACS integration issue on Cisco router</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-secure-acs-integration-issue-on-cisco-router/m-p/4856897#M582296</link>
      <description>&lt;P&gt;&lt;SPAN&gt;ip tacacs source-interface GigabitEthernet0/1&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Giga0/1 is l2 port not l3 you can not use it here&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;You need either l3 port or SVI of mgmt vlan&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 18 Jun 2023 06:23:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-secure-acs-integration-issue-on-cisco-router/m-p/4856897#M582296</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-06-18T06:23:04Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Secure ACS integration issue on Cisco router</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-secure-acs-integration-issue-on-cisco-router/m-p/4861673#M582444</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1419760"&gt;@Mikee Hendricks&lt;/a&gt; ACS has reached the end of support a while ago, in case you are not aware.&lt;/P&gt;
&lt;P&gt;ISE inherited most of ACS features. One of T+ features is to allow different passwords (e.g., using different ID sources) for login and enable. Please confirm that.&lt;/P&gt;
&lt;P&gt;If the authentication or authorization request made it to ACS, you should see the event logged there. Please check for the event details and see if that result matches what you are seeing on the router side.&lt;/P&gt;</description>
      <pubDate>Sat, 24 Jun 2023 02:45:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-secure-acs-integration-issue-on-cisco-router/m-p/4861673#M582444</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2023-06-24T02:45:12Z</dc:date>
    </item>
  </channel>
</rss>

