<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Explanation AAA Commands in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/explanation-aaa-commands/m-p/4872651#M582841</link>
    <description>&lt;P&gt;...&lt;/P&gt;</description>
    <pubDate>Wed, 12 Jul 2023 16:29:33 GMT</pubDate>
    <dc:creator>MHM Cisco World</dc:creator>
    <dc:date>2023-07-12T16:29:33Z</dc:date>
    <item>
      <title>Explanation AAA Commands</title>
      <link>https://community.cisco.com/t5/network-access-control/explanation-aaa-commands/m-p/4872640#M582838</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;unfortunately I did not get smart from google. With the following command configure AAA so that I can log in from a Radius server. I understand that and if I add enable at the end, then the enable password is virtually fallback. Now our configuration looks like this and when I log in I get directly into the enable mode.&lt;/P&gt;
&lt;P&gt;aaa authentication login default local group RADIUS_AUTH&lt;/P&gt;
&lt;P&gt;aaa authorization exec default local group RADIUS_AUTH if-authenticated&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;But what is the following configuration good for? We do not have this in use, but it is always written so that it is the login to the enable mode. What is the difference here?&lt;/P&gt;
&lt;P&gt;aaa authentication enable default group RADIUS_AUTH&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Why do I get automatically into the enalbe mode, without the above mentioned command? Is there something additional configured on the AAA server?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;BR&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 12 Jul 2023 15:56:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/explanation-aaa-commands/m-p/4872640#M582838</guid>
      <dc:creator>mgollob</dc:creator>
      <dc:date>2023-07-12T15:56:35Z</dc:date>
    </item>
    <item>
      <title>Re: Explanation AAA Commands</title>
      <link>https://community.cisco.com/t5/network-access-control/explanation-aaa-commands/m-p/4872646#M582840</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1478687"&gt;@mgollob&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;The "aaa authentication enable" command is used to configure authentication for accessing the enable mode on a Cisco device. &lt;U&gt;By default&lt;/U&gt;, if you have not explicitly configured authentication for the enable mode, the device will allow direct access to the enable mode without requiring any additional authentication.&lt;/P&gt;&lt;P&gt;In your current configuration, you have the following authentication configuration:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;aaa authentication login default local group RADIUS_AUTH
aaa authorization exec default local group RADIUS_AUTH if-authenticated&lt;/LI-CODE&gt;&lt;P&gt;This configuration specifies that the login authentication should be performed using the local database first, and if that fails, it should fall back to the RADIUS server specified in the RADIUS_AUTH group.&lt;/P&gt;&lt;P&gt;The "aaa authentication enable" command is not present in your configuration, which means that authentication is not explicitly configured for the enable mode. &lt;U&gt;In this case, the device allows direct access to the enable mode without any additional authentication.&lt;/U&gt;&lt;/P&gt;&lt;P&gt;If you want to require authentication for the enable mode as well, you can add the following command:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;aaa authentication enable default group RADIUS_AUTH&lt;/LI-CODE&gt;&lt;P&gt;This configuration would then use the RADIUS server specified in the RADIUS_AUTH group for authentication when accessing the enable mode.&lt;/P&gt;&lt;P&gt;It's possible that there might be additional configuration on the AAA server (such as group settings or permissions) that automatically grants access to the enable mode after successful authentication. You may need to check the configuration on the AAA server to determine if there are any additional settings influencing the behavior you are experiencing.&lt;/P&gt;</description>
      <pubDate>Wed, 12 Jul 2023 16:18:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/explanation-aaa-commands/m-p/4872646#M582840</guid>
      <dc:creator>M02@rt37</dc:creator>
      <dc:date>2023-07-12T16:18:45Z</dc:date>
    </item>
    <item>
      <title>Re: Explanation AAA Commands</title>
      <link>https://community.cisco.com/t5/network-access-control/explanation-aaa-commands/m-p/4872651#M582841</link>
      <description>&lt;P&gt;...&lt;/P&gt;</description>
      <pubDate>Wed, 12 Jul 2023 16:29:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/explanation-aaa-commands/m-p/4872651#M582841</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-07-12T16:29:33Z</dc:date>
    </item>
  </channel>
</rss>

