<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Issues with line con 0 auth when entering aaa commands in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/issues-with-line-con-0-auth-when-entering-aaa-commands/m-p/5015532#M587222</link>
    <description>&lt;P&gt;You are welcome. Sure you can. Instead of using the "default" method list which applies automatically to the VTY lines and the console, you can use custom method lists similar to the following, please note that I'm gonna only focused in these examples on the minimum authentication and authorization commands required not on the additions nor the other global aaa commands:&lt;/P&gt;
&lt;P&gt;aaa authentication login ISE group &lt;SPAN&gt;TACSRV&amp;nbsp;&lt;/SPAN&gt;local &lt;BR /&gt;aaa authorization exec ISE group &lt;SPAN&gt;TACSRV&amp;nbsp;&lt;/SPAN&gt;local&lt;BR /&gt;&lt;SPAN&gt;aaa accounting exec ISE start-stop group &lt;SPAN&gt;TACSRV&lt;/SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;aaa authorization commands 0 ISE group &lt;SPAN&gt;TACSRV&lt;/SPAN&gt; if-authenticated&lt;BR /&gt;aaa authorization commands 1 ISE group &lt;SPAN&gt;TACSRV&lt;/SPAN&gt; if-authenticated&lt;BR /&gt;aaa authorization commands 15 ISE group &lt;SPAN&gt;TACSRV&lt;/SPAN&gt; if-authenticated&lt;/P&gt;
&lt;P&gt;line vty 0 98&lt;BR /&gt;&amp;nbsp; &amp;nbsp;login authentication ISE&lt;BR /&gt;&amp;nbsp; &amp;nbsp;authorization exec ISE&lt;/P&gt;
&lt;P&gt;The above will allow you to use the custom method list ISE for the VTY accesses such as SSH. SSH sessions will also be authorized by the ISE method list.&lt;/P&gt;
&lt;P&gt;aaa authentication login CON local &lt;BR /&gt;aaa authorization exec CON&amp;nbsp;local&lt;/P&gt;
&lt;P&gt;line con 0&lt;BR /&gt;&amp;nbsp; &amp;nbsp;login authentication CON&lt;BR /&gt;&amp;nbsp; &amp;nbsp;authorization exec CON&lt;BR /&gt;&amp;nbsp; &amp;nbsp;privilege level 15&lt;/P&gt;
&lt;P&gt;The above should allow you to connect through console without being subject to any authentication nor authorization against ISE.&lt;/P&gt;
&lt;P&gt;As I mentioned above, there are other commands that you can apply depending on how restrictive you want to be such as authorizing the config terminal commands and enable secret.&lt;/P&gt;</description>
    <pubDate>Fri, 09 Feb 2024 13:58:06 GMT</pubDate>
    <dc:creator>Aref Alsouqi</dc:creator>
    <dc:date>2024-02-09T13:58:06Z</dc:date>
    <item>
      <title>Issues with line con 0 auth when entering aaa commands</title>
      <link>https://community.cisco.com/t5/network-access-control/issues-with-line-con-0-auth-when-entering-aaa-commands/m-p/5015455#M587212</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;We are experiencing an authorization issue when entering a certain command in our global config on to fresh switches via the console cable.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Switch Model = 9300&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Switch Ver = 17.9.4a&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Although this seems to be happening on other switches and versions as well.&lt;/P&gt;&lt;P&gt;&lt;U&gt;&lt;STRONG&gt;The below commands are accepted fine&lt;/STRONG&gt;&lt;/U&gt;&lt;/P&gt;&lt;P&gt;!-- SERVICES --!&lt;BR /&gt;!&lt;BR /&gt;service nagle&lt;BR /&gt;no service pad&lt;BR /&gt;service tcp-keepalives-in&lt;BR /&gt;service tcp-keepalives-out&lt;BR /&gt;service timestamps debug datetime msec localtime show-timezone&lt;BR /&gt;service timestamps log datetime msec localtime show-timezone&lt;BR /&gt;service password-encryption&lt;BR /&gt;service counters max age 10&lt;BR /&gt;!&lt;BR /&gt;logging buffered 100000&lt;BR /&gt;no logging console&lt;BR /&gt;no logging monitor&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;ip pim rp-address xx.xx.xx.xx&lt;BR /&gt;ip multicast-routing&lt;BR /&gt;!&lt;BR /&gt;!-- LOCAL LOGINS --!&lt;BR /&gt;!&lt;BR /&gt;no username Admin&lt;BR /&gt;no username admin&lt;BR /&gt;username user1 privilege 15 secret xxxx&lt;BR /&gt;username user2 privilege 15 secret xxxx&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!-- ENABLE SECRET --!&lt;BR /&gt;!&lt;BR /&gt;enable secret xxxx&lt;BR /&gt;!&lt;BR /&gt;!-- AAA --!&lt;BR /&gt;!&lt;BR /&gt;aaa new-model&lt;BR /&gt;!&lt;BR /&gt;aaa group server tacacs+ TACSRV&lt;BR /&gt;server name ISE01&lt;BR /&gt;server name ISE02&lt;BR /&gt;ip tacacs source-interface Loopback0&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;ip radius source-interface Loopback0&lt;/P&gt;&lt;P&gt;aaa group server radius RADSRV&lt;BR /&gt;server name SER-ISE-02&lt;BR /&gt;server name SER-ISE-02&lt;BR /&gt;server name SEV-ISE-01&lt;BR /&gt;server name SEV-ISE-01&lt;BR /&gt;ip radius source-interface Loopback0&lt;BR /&gt;!&lt;BR /&gt;aaa authentication login default group TACSRV local&lt;BR /&gt;aaa authentication login console local&lt;BR /&gt;aaa authentication dot1x default group RADSRV&lt;BR /&gt;aaa authorization exec default group TACSRV local&lt;BR /&gt;aaa authorization commands 0 default group TACSRV local&lt;BR /&gt;aaa authorization commands 1 default group TACSRV local&lt;/P&gt;&lt;P&gt;&lt;U&gt;&lt;STRONG&gt;This next command causes the issue:&lt;/STRONG&gt;&lt;/U&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#FF0000"&gt;&lt;STRONG&gt;aaa authorization commands 15 default group TACSRV local&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#000000"&gt;At this point we get an &lt;STRONG&gt;authorization failed&lt;/STRONG&gt; when we try anymore commands&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#000000"&gt;We have tried adding some other commands to remediate this for example:&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;FONT color="#000000"&gt;&lt;SPAN class=""&gt;line con 0&lt;BR /&gt;privilege level 15&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;FONT color="#000000"&gt;&lt;SPAN class=""&gt;!&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#000000"&gt;&lt;SPAN&gt;&lt;SPAN class=""&gt;&lt;STRONG&gt;aaa authorization exec CON0 if-authenticated&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#000000"&gt;&lt;SPAN&gt;&lt;SPAN class=""&gt;&lt;STRONG&gt;aaa authorization console&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;!&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Any guidance would be greatly appreciated, we are not sure why this is happening, this part of the config has been rolled out previously and never had this issue&lt;/P&gt;&lt;P&gt;The switch in this example is sitting on a desk with no network connectivity&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;&lt;P&gt;Iain&lt;/P&gt;</description>
      <pubDate>Fri, 09 Feb 2024 12:14:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/issues-with-line-con-0-auth-when-entering-aaa-commands/m-p/5015455#M587212</guid>
      <dc:creator>Eager_2_Learn</dc:creator>
      <dc:date>2024-02-09T12:14:56Z</dc:date>
    </item>
    <item>
      <title>Re: Issues with line con 0 auth when entering aaa commands</title>
      <link>https://community.cisco.com/t5/network-access-control/issues-with-line-con-0-auth-when-entering-aaa-commands/m-p/5015488#M587214</link>
      <description>&lt;P&gt;Are you looking to Authenticate Console using TACACS and fall back to Local&amp;nbsp; - or always Local ?&lt;/P&gt;
&lt;P&gt;i use below standard config works for all Cisco switches :&lt;/P&gt;
&lt;P&gt;aaa new-model&lt;/P&gt;
&lt;P&gt;tacacs server ISE1&lt;BR /&gt;address ipv4 192.100.1.1&lt;BR /&gt;key Mykey&lt;BR /&gt;tacacs server ISE2&lt;BR /&gt;address ipv4 192.200.1.1&lt;BR /&gt;key MyKey&lt;/P&gt;
&lt;P&gt;ip tacacs source-interface Loopback0&lt;/P&gt;
&lt;P&gt;aaa group server tacacs+ ISE_GRP&lt;BR /&gt;server name ISE1&lt;BR /&gt;server name ISE2&lt;/P&gt;
&lt;P&gt;aaa authentication login default group ISE_GRP local&lt;BR /&gt;aaa authorization config-commands&lt;BR /&gt;aaa authorization exec default group ISE_GRP local&lt;BR /&gt;aaa authorization commands 0 default group ISE_GRP local&lt;BR /&gt;aaa authorization commands 1 default group ISE_GRP local&lt;BR /&gt;aaa authorization commands 15 default group ISE_GRP local&lt;BR /&gt;aaa accounting exec default start-stop group ISE_GRP&lt;BR /&gt;aaa accounting commands 0 default start-stop group ISE_GRP&lt;BR /&gt;aaa accounting commands 1 default start-stop group ISE_GRP&lt;BR /&gt;aaa accounting commands 15 default start-stop group ISE_GRP&lt;/P&gt;</description>
      <pubDate>Fri, 09 Feb 2024 13:07:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/issues-with-line-con-0-auth-when-entering-aaa-commands/m-p/5015488#M587214</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2024-02-09T13:07:09Z</dc:date>
    </item>
    <item>
      <title>Re: Issues with line con 0 auth when entering aaa commands</title>
      <link>https://community.cisco.com/t5/network-access-control/issues-with-line-con-0-auth-when-entering-aaa-commands/m-p/5015489#M587215</link>
      <description>&lt;P&gt;You use local user to access and not config command allow for each privilege.&lt;/P&gt;
&lt;P&gt;You can use with&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Aaa authz command&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Keyword if-auth instead of local to override this case&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Note:- please dont wr the config until you sure the config is work' this give us retrun point if config not work (by reload)&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Fri, 09 Feb 2024 13:08:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/issues-with-line-con-0-auth-when-entering-aaa-commands/m-p/5015489#M587215</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-02-09T13:08:41Z</dc:date>
    </item>
    <item>
      <title>Re: Issues with line con 0 auth when entering aaa commands</title>
      <link>https://community.cisco.com/t5/network-access-control/issues-with-line-con-0-auth-when-entering-aaa-commands/m-p/5015514#M587216</link>
      <description>&lt;P&gt;Hi Iain, as&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1065752"&gt;@MHM Cisco World&lt;/a&gt;&amp;nbsp;mentioned, you seem to be connected to the switch with a local user account. When you apply the "aaa authorization commands 15", the switch will then relay any authorization request to ISE, and because you are connected with a local user account, there wouldn't be any match on ISE TACACS rules to authorize your commands.&lt;/P&gt;
&lt;P&gt;As a best practice, you should connect to the switch via console, amend all the TACACS commands to the VTY lines, and then test by logging into the switch via SSH with a user that exists on your AD or ISE local database, that depends on your configs on ISE TACACS policy set. Once you are happy with everything, you can save the configs to the switch and then as a final stage you amend the changes to the console line.&lt;/P&gt;
&lt;P&gt;If you don't have console access to the switch at this stage, then once you applied the "aaa authorization commands 15" command, you should open up an SSH session to the switch with an AD or local ISE account which should allow you to continue your configs from there.&lt;/P&gt;</description>
      <pubDate>Fri, 09 Feb 2024 13:24:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/issues-with-line-con-0-auth-when-entering-aaa-commands/m-p/5015514#M587216</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2024-02-09T13:24:30Z</dc:date>
    </item>
    <item>
      <title>Re: Issues with line con 0 auth when entering aaa commands</title>
      <link>https://community.cisco.com/t5/network-access-control/issues-with-line-con-0-auth-when-entering-aaa-commands/m-p/5015515#M587217</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1065752"&gt;@MHM Cisco World&lt;/a&gt;&amp;nbsp;the "if-authenticated" keyword shouldn't be a replacement for the "local" keyword. "if-authenticated" is used to bypass the authorization requests in case ISE TACACS services are not available anymore after the user has authenticated to the switch. For instance, say you have authenticated to the switch, and right after ISE went down, so instead of denying all your authorization requests (because ISE is down) the switch will allow any command in that case. It is sort of a fall-back method.&lt;/P&gt;</description>
      <pubDate>Fri, 09 Feb 2024 13:27:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/issues-with-line-con-0-auth-when-entering-aaa-commands/m-p/5015515#M587217</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2024-02-09T13:27:57Z</dc:date>
    </item>
    <item>
      <title>Re: Issues with line con 0 auth when entering aaa commands</title>
      <link>https://community.cisco.com/t5/network-access-control/issues-with-line-con-0-auth-when-entering-aaa-commands/m-p/5015521#M587218</link>
      <description>&lt;P&gt;Hi Aref,&lt;/P&gt;&lt;P&gt;Thanks for your explanation, we did think that the auth 15 command was coming into play for the reason you mentioned, that the switch was trying to authorise our commands against ISE, but it has no connectivity.&lt;/P&gt;&lt;P&gt;Since we are configuring the switch via Console, is there a command we could enter that eliminates aaa commands from interfering with the console? Or if TACACS servers are unavailable, like in this scenario, can you configure fallback to the switch local database to ensure you can always enter commands via the console?&lt;/P&gt;&lt;P&gt;Because what we have noticed on some of our legacy switches we have to password recover on the console if the switch is off the network, I am guessing now due to some of our aaa config&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Cheers&lt;/P&gt;&lt;P&gt;Iain&lt;/P&gt;</description>
      <pubDate>Fri, 09 Feb 2024 13:36:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/issues-with-line-con-0-auth-when-entering-aaa-commands/m-p/5015521#M587218</guid>
      <dc:creator>Eager_2_Learn</dc:creator>
      <dc:date>2024-02-09T13:36:38Z</dc:date>
    </item>
    <item>
      <title>Re: Issues with line con 0 auth when entering aaa commands</title>
      <link>https://community.cisco.com/t5/network-access-control/issues-with-line-con-0-auth-when-entering-aaa-commands/m-p/5015522#M587219</link>
      <description>&lt;P&gt;I mention if he use local user then he need to override authz command.&lt;/P&gt;
&lt;P&gt;Local keyword dont work if he dont config command allow for each privilege&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If-auth can override whole authz command if he auth by local if he auth by ISE then method order first check command with ISE.&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Fri, 09 Feb 2024 13:37:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/issues-with-line-con-0-auth-when-entering-aaa-commands/m-p/5015522#M587219</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-02-09T13:37:41Z</dc:date>
    </item>
    <item>
      <title>Re: Issues with line con 0 auth when entering aaa commands</title>
      <link>https://community.cisco.com/t5/network-access-control/issues-with-line-con-0-auth-when-entering-aaa-commands/m-p/5015532#M587222</link>
      <description>&lt;P&gt;You are welcome. Sure you can. Instead of using the "default" method list which applies automatically to the VTY lines and the console, you can use custom method lists similar to the following, please note that I'm gonna only focused in these examples on the minimum authentication and authorization commands required not on the additions nor the other global aaa commands:&lt;/P&gt;
&lt;P&gt;aaa authentication login ISE group &lt;SPAN&gt;TACSRV&amp;nbsp;&lt;/SPAN&gt;local &lt;BR /&gt;aaa authorization exec ISE group &lt;SPAN&gt;TACSRV&amp;nbsp;&lt;/SPAN&gt;local&lt;BR /&gt;&lt;SPAN&gt;aaa accounting exec ISE start-stop group &lt;SPAN&gt;TACSRV&lt;/SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;aaa authorization commands 0 ISE group &lt;SPAN&gt;TACSRV&lt;/SPAN&gt; if-authenticated&lt;BR /&gt;aaa authorization commands 1 ISE group &lt;SPAN&gt;TACSRV&lt;/SPAN&gt; if-authenticated&lt;BR /&gt;aaa authorization commands 15 ISE group &lt;SPAN&gt;TACSRV&lt;/SPAN&gt; if-authenticated&lt;/P&gt;
&lt;P&gt;line vty 0 98&lt;BR /&gt;&amp;nbsp; &amp;nbsp;login authentication ISE&lt;BR /&gt;&amp;nbsp; &amp;nbsp;authorization exec ISE&lt;/P&gt;
&lt;P&gt;The above will allow you to use the custom method list ISE for the VTY accesses such as SSH. SSH sessions will also be authorized by the ISE method list.&lt;/P&gt;
&lt;P&gt;aaa authentication login CON local &lt;BR /&gt;aaa authorization exec CON&amp;nbsp;local&lt;/P&gt;
&lt;P&gt;line con 0&lt;BR /&gt;&amp;nbsp; &amp;nbsp;login authentication CON&lt;BR /&gt;&amp;nbsp; &amp;nbsp;authorization exec CON&lt;BR /&gt;&amp;nbsp; &amp;nbsp;privilege level 15&lt;/P&gt;
&lt;P&gt;The above should allow you to connect through console without being subject to any authentication nor authorization against ISE.&lt;/P&gt;
&lt;P&gt;As I mentioned above, there are other commands that you can apply depending on how restrictive you want to be such as authorizing the config terminal commands and enable secret.&lt;/P&gt;</description>
      <pubDate>Fri, 09 Feb 2024 13:58:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/issues-with-line-con-0-auth-when-entering-aaa-commands/m-p/5015532#M587222</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2024-02-09T13:58:06Z</dc:date>
    </item>
    <item>
      <title>Re: Issues with line con 0 auth when entering aaa commands</title>
      <link>https://community.cisco.com/t5/network-access-control/issues-with-line-con-0-auth-when-entering-aaa-commands/m-p/5015537#M587223</link>
      <description>&lt;P&gt;So in end you suggest if-auth as Me.&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Fri, 09 Feb 2024 13:57:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/issues-with-line-con-0-auth-when-entering-aaa-commands/m-p/5015537#M587223</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-02-09T13:57:40Z</dc:date>
    </item>
    <item>
      <title>Re: Issues with line con 0 auth when entering aaa commands</title>
      <link>https://community.cisco.com/t5/network-access-control/issues-with-line-con-0-auth-when-entering-aaa-commands/m-p/5015542#M587224</link>
      <description>&lt;P&gt;Yes indeed my friend, I aways use "if-authenticated" (unless the customer requests otherwise) because that would bypass any authorization requests if the TACACS server should go down after the users are authenticated. It is a protection mechanism I would say, so instead of blocking all the authorization requests until the TACACS server is back, the already connected admins to the network devices can keep doing their works until the TACACS server is back online or their sessions are timed out.&lt;/P&gt;</description>
      <pubDate>Fri, 09 Feb 2024 14:06:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/issues-with-line-con-0-auth-when-entering-aaa-commands/m-p/5015542#M587224</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2024-02-09T14:06:55Z</dc:date>
    </item>
    <item>
      <title>Re: Issues with line con 0 auth when entering aaa commands</title>
      <link>https://community.cisco.com/t5/network-access-control/issues-with-line-con-0-auth-when-entering-aaa-commands/m-p/5015568#M587228</link>
      <description>&lt;P&gt;Thank you, I have managed to put together some config from your instructions:&lt;/P&gt;&lt;P&gt;aaa authentication login ISE group TACSRV local&lt;BR /&gt;aaa authentication login CON local&lt;BR /&gt;aaa authentication dot1x default group RADSRV&lt;BR /&gt;aaa authorization exec ISE group TACSRV local&lt;BR /&gt;aaa authorization exec CON local&lt;BR /&gt;aaa authorization commands 0 ISE group TACSRV local if-authenticated&lt;BR /&gt;aaa authorization commands 1 ISE group TACSRV local if-authenticated&lt;BR /&gt;aaa authorization commands 15 ISE group TACSRV local if-authenticated&lt;BR /&gt;aaa authorization network default group RADSRV&lt;BR /&gt;aaa authorization network SGLIST group radius&lt;BR /&gt;aaa authorization auth-proxy default group RADSRV&lt;BR /&gt;aaa accounting update periodic 5&lt;BR /&gt;aaa accounting dot1x default start-stop group RADSRV&lt;BR /&gt;aaa accounting exec ISE start-stop group tacacs+&lt;BR /&gt;aaa accounting commands 0 ISE start-stop group TACSRV&lt;BR /&gt;aaa accounting commands 1 ISE start-stop group TACSRV&lt;BR /&gt;aaa accounting commands 15 ISE start-stop group TACSRV&lt;BR /&gt;aaa accounting system default start-stop group RADSRV&lt;/P&gt;&lt;P&gt;line con 0&lt;BR /&gt;session-timeout 15&lt;BR /&gt;exec-timeout 15 0&lt;BR /&gt;logging synchronous&lt;BR /&gt;history size 256&lt;BR /&gt;login authentication CON&lt;BR /&gt;authorization exec CON&lt;BR /&gt;privilege level 15&lt;/P&gt;&lt;P&gt;line vty 0 15&lt;BR /&gt;session-timeout 15&lt;BR /&gt;exec-timeout 15 0&lt;BR /&gt;logging synchronous&lt;BR /&gt;access-class vty-access in&lt;BR /&gt;login authentication ISE&lt;BR /&gt;authorization exec ISE&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Which has fixed our issue with console &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 10 Feb 2024 14:37:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/issues-with-line-con-0-auth-when-entering-aaa-commands/m-p/5015568#M587228</guid>
      <dc:creator>Eager_2_Learn</dc:creator>
      <dc:date>2024-02-10T14:37:02Z</dc:date>
    </item>
  </channel>
</rss>

