<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Radius + local accounts and privilege in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/radius-local-accounts-and-privilege/m-p/4939195#M584578</link>
    <description>&lt;P&gt;&lt;SPAN&gt;line vty 0 15&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;login authentication default&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;you should execute&amp;nbsp; the above command under line vty&amp;nbsp; mode....&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Best regards&lt;/SPAN&gt;&lt;STRONG&gt;&lt;BR /&gt;******* If This Helps, Please Rate *******&lt;/STRONG&gt;&lt;/P&gt;</description>
    <pubDate>Thu, 12 Oct 2023 13:18:26 GMT</pubDate>
    <dc:creator>Blue_Bird</dc:creator>
    <dc:date>2023-10-12T13:18:26Z</dc:date>
    <item>
      <title>Radius + local accounts and privilege</title>
      <link>https://community.cisco.com/t5/network-access-control/radius-local-accounts-and-privilege/m-p/4938162#M584558</link>
      <description>&lt;P&gt;Hej,&lt;/P&gt;&lt;P&gt;I am trying to configure authentication so that at any time I can authenticate using either Radius or a local admin account. When someone logins with radius, I expect him to be with regular low privilege (prompt '&amp;gt;') and have to type 'enable' to get higher privilege. When authenticating with local account 'admin' I want to login directly with privilege 15 in enable mode with prompt '#'&lt;BR /&gt;&lt;BR /&gt;At the moment authentication works both with radius and local 'admin' account. But I get the '&amp;gt;' prompt with 'admin' and have to type 'enable' to get higher privilege despite the privilege 15 in username command line.&lt;/P&gt;&lt;P&gt;What am I doing wrong please ?&lt;/P&gt;&lt;P&gt;Here is my config:&lt;/P&gt;&lt;P&gt;&lt;FONT face="courier new,courier"&gt;enable secret 9 xxxx&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT face="courier new,courier"&gt;aaa new-model&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;aaa authentication login default local group radius&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT face="courier new,courier"&gt;username admin privilege 15 secret xxxx&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT face="courier new,courier"&gt;line vty 0 4&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;&amp;nbsp; transport input ssh&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;line vty 5 15&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;&amp;nbsp; transport input ssh&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;</description>
      <pubDate>Wed, 11 Oct 2023 14:55:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/radius-local-accounts-and-privilege/m-p/4938162#M584558</guid>
      <dc:creator>gahe</dc:creator>
      <dc:date>2023-10-11T14:55:42Z</dc:date>
    </item>
    <item>
      <title>Re: Radius + local accounts and privilege</title>
      <link>https://community.cisco.com/t5/network-access-control/radius-local-accounts-and-privilege/m-p/4939168#M584576</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp; - Could you also &lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;STRONG&gt;add&amp;nbsp;aaa authorization&lt;U&gt; exec&lt;/U&gt; default group radius local&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;M.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 12 Oct 2023 12:43:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/radius-local-accounts-and-privilege/m-p/4939168#M584576</guid>
      <dc:creator>Mark Elsen</dc:creator>
      <dc:date>2023-10-12T12:43:03Z</dc:date>
    </item>
    <item>
      <title>Re: Radius + local accounts and privilege</title>
      <link>https://community.cisco.com/t5/network-access-control/radius-local-accounts-and-privilege/m-p/4939177#M584577</link>
      <description>&lt;P&gt;Thanks for your help. I added "aaa authorization exec default group radius local" and now:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;when I try to login with local 'admin' account I get "% Authorization failed. Connection to xxx closed"&lt;/LI&gt;&lt;LI&gt;when I try with a radius account I get "Line has invalid autocommand " ppp negotiate" Connection to xxx closed"&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;PS: I don't have any config line with "ppp" or "negotiate".&lt;/P&gt;</description>
      <pubDate>Thu, 12 Oct 2023 12:59:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/radius-local-accounts-and-privilege/m-p/4939177#M584577</guid>
      <dc:creator>gahe</dc:creator>
      <dc:date>2023-10-12T12:59:24Z</dc:date>
    </item>
    <item>
      <title>Re: Radius + local accounts and privilege</title>
      <link>https://community.cisco.com/t5/network-access-control/radius-local-accounts-and-privilege/m-p/4939195#M584578</link>
      <description>&lt;P&gt;&lt;SPAN&gt;line vty 0 15&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;login authentication default&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;you should execute&amp;nbsp; the above command under line vty&amp;nbsp; mode....&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Best regards&lt;/SPAN&gt;&lt;STRONG&gt;&lt;BR /&gt;******* If This Helps, Please Rate *******&lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 12 Oct 2023 13:18:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/radius-local-accounts-and-privilege/m-p/4939195#M584578</guid>
      <dc:creator>Blue_Bird</dc:creator>
      <dc:date>2023-10-12T13:18:26Z</dc:date>
    </item>
    <item>
      <title>Re: Radius + local accounts and privilege</title>
      <link>https://community.cisco.com/t5/network-access-control/radius-local-accounts-and-privilege/m-p/4939203#M584580</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;- As per&amp;nbsp;&lt;A href="https://community.cisco.com/t5/network-access-control/line-has-invalid-autocommand-quot-ppp-negotiate-quot/m-p/737030#M420861" target="_blank"&gt;https://community.cisco.com/t5/network-access-control/line-has-invalid-autocommand-quot-ppp-negotiate-quot/m-p/737030#M420861&lt;/A&gt;&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;EM&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;This may be caused by settings on the radius server ,&amp;nbsp;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;M.&lt;/P&gt;</description>
      <pubDate>Thu, 12 Oct 2023 13:23:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/radius-local-accounts-and-privilege/m-p/4939203#M584580</guid>
      <dc:creator>Mark Elsen</dc:creator>
      <dc:date>2023-10-12T13:23:22Z</dc:date>
    </item>
    <item>
      <title>Re: Radius + local accounts and privilege</title>
      <link>https://community.cisco.com/t5/network-access-control/radius-local-accounts-and-privilege/m-p/4939205#M584582</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I added the line as you suggested:&lt;/P&gt;&lt;P&gt;switch(config)#line vty 0 15&lt;BR /&gt;switch(config-line)#login authentication default&lt;/P&gt;&lt;P&gt;But it still behaves the same as in the original situation, that is : I get '&amp;gt;' prompt whether I login with local 'admin' account or a radius account.&lt;/P&gt;</description>
      <pubDate>Thu, 12 Oct 2023 13:24:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/radius-local-accounts-and-privilege/m-p/4939205#M584582</guid>
      <dc:creator>gahe</dc:creator>
      <dc:date>2023-10-12T13:24:07Z</dc:date>
    </item>
    <item>
      <title>Re: Radius + local accounts and privilege</title>
      <link>https://community.cisco.com/t5/network-access-control/radius-local-accounts-and-privilege/m-p/4939208#M584583</link>
      <description>&lt;P&gt;The behavior I am trying to change is for when the local 'admin' account is used.&lt;BR /&gt;When I added the line to suggested, I got a "Authorization failed" for local 'admin' account.&lt;BR /&gt;&lt;BR /&gt;When I use a radius account it already behaves as I expect now.&lt;/P&gt;</description>
      <pubDate>Thu, 12 Oct 2023 13:28:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/radius-local-accounts-and-privilege/m-p/4939208#M584583</guid>
      <dc:creator>gahe</dc:creator>
      <dc:date>2023-10-12T13:28:20Z</dc:date>
    </item>
    <item>
      <title>Re: Radius + local accounts and privilege</title>
      <link>https://community.cisco.com/t5/network-access-control/radius-local-accounts-and-privilege/m-p/4939212#M584584</link>
      <description>&lt;P&gt;Here is the sample configuration...&lt;/P&gt;&lt;P&gt;username admin password cisco&lt;/P&gt;&lt;P&gt;aaa new-model&lt;/P&gt;&lt;P&gt;radius-server host x.x.x.x auth-port 1812 key xyz123&lt;/P&gt;&lt;P&gt;aaa authentication login default group radius local line&lt;BR /&gt;&lt;BR /&gt;line vty 0 15&lt;/P&gt;&lt;P&gt;login authentication default&lt;/P&gt;&lt;P&gt;---------------------------------&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;aaa authentication login default local group radius&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;could you please replace the above command with &lt;STRONG&gt;aaa authentication login default group local radius&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;STRONG&gt;Best regards&lt;BR /&gt;******* If This Helps, Please Rate *******&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 12 Oct 2023 13:36:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/radius-local-accounts-and-privilege/m-p/4939212#M584584</guid>
      <dc:creator>Blue_Bird</dc:creator>
      <dc:date>2023-10-12T13:36:15Z</dc:date>
    </item>
    <item>
      <title>Re: Radius + local accounts and privilege</title>
      <link>https://community.cisco.com/t5/network-access-control/radius-local-accounts-and-privilege/m-p/4939217#M584585</link>
      <description>&lt;P&gt;Will that enable the local account 'admin' to login into privilege 15 (with prompt '#') directly when login in ?&lt;BR /&gt;Because - I am a cisco beginner but - I don't see how in the config lines.&lt;/P&gt;</description>
      <pubDate>Thu, 12 Oct 2023 13:54:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/radius-local-accounts-and-privilege/m-p/4939217#M584585</guid>
      <dc:creator>gahe</dc:creator>
      <dc:date>2023-10-12T13:54:57Z</dc:date>
    </item>
    <item>
      <title>Re: Radius + local accounts and privilege</title>
      <link>https://community.cisco.com/t5/network-access-control/radius-local-accounts-and-privilege/m-p/4939243#M584586</link>
      <description>&lt;P&gt;yes..try and check....&lt;/P&gt;</description>
      <pubDate>Thu, 12 Oct 2023 14:19:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/radius-local-accounts-and-privilege/m-p/4939243#M584586</guid>
      <dc:creator>Blue_Bird</dc:creator>
      <dc:date>2023-10-12T14:19:58Z</dc:date>
    </item>
    <item>
      <title>Re: Radius + local accounts and privilege</title>
      <link>https://community.cisco.com/t5/network-access-control/radius-local-accounts-and-privilege/m-p/4939576#M584595</link>
      <description>&lt;P&gt;In order to dump a user into a specific privilege level, you need to authorize the EXEC session.&amp;nbsp; The command would be aaa authorization exec default group radius local.&amp;nbsp; However, I don't think that what you are trying to do specifically is possible with a simple straightforward AAA setup.&amp;nbsp; The way the AAA method list works is that the device will try the first method such as radius and if there is no response from radius, then it falls back to the next method of local.&amp;nbsp; Local only comes into play if the radius server does not respond at all.&amp;nbsp; Chances are it will respond with a reject for the local account since the radius server doesn't know the local account.&amp;nbsp; Even if you could switch the order to local first, local will always be available so the device would never use radius.&amp;nbsp; And since the radius user does not exist in the local database, you get % Authorization failed %.&lt;/P&gt;
&lt;P&gt;You could get fancy and use the "rotary" command and Telnet on a specific VTY line such as vty 15.&amp;nbsp; "rotary 5" would allow you to Telnet to the device on port "3005".&amp;nbsp; And then you assign a specific AAA method list to this VTY line only that only checks the local database.&amp;nbsp; Rotary only works with Telnet.&amp;nbsp; Which leads me to overall security and your approach.&lt;/P&gt;
&lt;P&gt;Telnet is obviously not a good idea.&amp;nbsp; The benefit of using AAA with an external server is that you increase security and ease of management by centralizing your policy on an authentication server.&amp;nbsp; And if a bad person keeps attempting to access your device, all of those attempts are logged on the server, away from the device.&amp;nbsp; If the bad person were successful after hundreds of attempts, they could just erase that information on the device and do whatever bad stuff they want such as locking you out of the device.&amp;nbsp; And if it were local authentication, it would be hard to know what really happened and why you can't get into your device anymore.&amp;nbsp; Assuming that the device is not sending syslog messages to an external server.&lt;/P&gt;
&lt;P&gt;The solution that most organizations use is to configure an account on the Radius server that is local to the Radius server and not in AD or some other external identity source.&amp;nbsp; That allows you to connect if the Radius server is unable to reach AD.&amp;nbsp; If the Radius server goes down, then you have a local account on the device that you can use.&amp;nbsp; Since Radius is down, the local device account works.&amp;nbsp; Then you can obviously configure your console port to only use local or no authentication at all as a last resort.&amp;nbsp; But you would want to ensure that the device is physically secure where only certain people have physical access to the device.&lt;/P&gt;
&lt;P&gt;HTH,&lt;/P&gt;
&lt;P&gt;Colby&lt;/P&gt;</description>
      <pubDate>Fri, 13 Oct 2023 04:58:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/radius-local-accounts-and-privilege/m-p/4939576#M584595</guid>
      <dc:creator>Colby LeMaire</dc:creator>
      <dc:date>2023-10-13T04:58:39Z</dc:date>
    </item>
    <item>
      <title>Re: Radius + local accounts and privilege</title>
      <link>https://community.cisco.com/t5/network-access-control/radius-local-accounts-and-privilege/m-p/4939768#M584602</link>
      <description>&lt;P&gt;Thanks for the detailed and clear answer. That explains that what I was trying to achieve is not possible "as such".&lt;/P&gt;&lt;P&gt;I'll workaround it based on your suggestions.&lt;/P&gt;</description>
      <pubDate>Fri, 13 Oct 2023 09:20:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/radius-local-accounts-and-privilege/m-p/4939768#M584602</guid>
      <dc:creator>gahe</dc:creator>
      <dc:date>2023-10-13T09:20:37Z</dc:date>
    </item>
  </channel>
</rss>

