<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Tacacs Configuration on the Switch in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/tacacs-configuration-on-the-switch/m-p/5020484#M587428</link>
    <description>&lt;P&gt;Depends on the model of the Switch IOS code running - I use all the time below config on IOS XE and works as expected, when there is no ISE reachability :&lt;/P&gt;
&lt;P&gt;username cisco privilege 15 secret 5 cisco&lt;/P&gt;
&lt;P style="margin: 0in; line-height: 18pt; font-family: Calibri; font-size: 12.0pt; color: #1b1c1d;"&gt;&lt;SPAN&gt;aaa new-model&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; line-height: 18pt; font-family: Calibri; font-size: 12.0pt; color: #1b1c1d;"&gt;&lt;SPAN&gt;tacacs server ISE1&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; line-height: 18pt; font-family: Calibri; font-size: 12.0pt; color: #1b1c1d;"&gt;&lt;SPAN&gt;address ipv4 192.100.1.1&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; line-height: 18pt; font-family: Calibri; font-size: 12.0pt; color: #1b1c1d;"&gt;&lt;SPAN&gt;key Mykey&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; line-height: 18pt; font-family: Calibri; font-size: 12.0pt; color: #1b1c1d;"&gt;&lt;SPAN&gt;tacacs server ISE2&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; line-height: 18pt; font-family: Calibri; font-size: 12.0pt; color: #1b1c1d;"&gt;&lt;SPAN&gt;address ipv4 192.200.1.1&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; line-height: 18pt; font-family: Calibri; font-size: 12.0pt; color: #1b1c1d;"&gt;&lt;SPAN&gt;key MyKey&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; line-height: 18pt; font-family: Calibri; font-size: 12.0pt; color: #1b1c1d;"&gt;&lt;SPAN&gt;ip tacacs source-interface Loopback0&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; line-height: 18pt; font-family: Calibri; font-size: 12.0pt; color: #1b1c1d;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="margin: 0in; line-height: 18pt; font-family: Calibri; font-size: 12.0pt; color: #1b1c1d;"&gt;&lt;SPAN&gt;aaa group server tacacs+ ISE_GRP&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; line-height: 18pt; font-family: Calibri; font-size: 12.0pt; color: #1b1c1d;"&gt;&lt;SPAN&gt;server name ISE1&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; line-height: 18pt; font-family: Calibri; font-size: 12.0pt; color: #1b1c1d;"&gt;&lt;SPAN&gt;server name ISE2&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; line-height: 18pt; font-family: Calibri; font-size: 12.0pt; color: #1b1c1d;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="margin: 0in; line-height: 18pt; font-family: Calibri; font-size: 12.0pt; color: #1b1c1d;"&gt;&lt;SPAN&gt;aaa authentication login default group ISE_GRP local&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; line-height: 18pt; font-family: Calibri; font-size: 12.0pt; color: #1b1c1d;"&gt;&lt;SPAN&gt;aaa authorization config-commands&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; line-height: 18pt; font-family: Calibri; font-size: 12.0pt; color: #1b1c1d;"&gt;&lt;SPAN&gt;aaa authorization exec default group ISE_GRP local&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; line-height: 18pt; font-family: Calibri; font-size: 12.0pt; color: #1b1c1d;"&gt;&lt;SPAN&gt;aaa authorization commands 0 default group ISE_GRP local&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; line-height: 18pt; font-family: Calibri; font-size: 12.0pt; color: #1b1c1d;"&gt;&lt;SPAN&gt;aaa authorization commands 1 default group ISE_GRP local&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; line-height: 18pt; font-family: Calibri; font-size: 12.0pt; color: #1b1c1d;"&gt;&lt;SPAN&gt;aaa authorization commands 15 default group ISE_GRP local&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; line-height: 18pt; font-family: Calibri; font-size: 12.0pt; color: #1b1c1d;"&gt;&lt;SPAN&gt;aaa accounting exec default start-stop group ISE_GRP&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; line-height: 18pt; font-family: Calibri; font-size: 12.0pt; color: #1b1c1d;"&gt;&lt;SPAN&gt;aaa accounting commands 0 default start-stop group ISE_GRP&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; line-height: 18pt; font-family: Calibri; font-size: 12.0pt; color: #1b1c1d;"&gt;&lt;SPAN&gt;aaa accounting commands 1 default start-stop group ISE_GRP&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; line-height: 18pt; font-family: Calibri; font-size: 12.0pt; color: #1b1c1d;"&gt;&lt;SPAN&gt;aaa accounting commands 15 default start-stop group ISE_GRP&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;"&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 19 Feb 2024 07:36:10 GMT</pubDate>
    <dc:creator>balaji.bandi</dc:creator>
    <dc:date>2024-02-19T07:36:10Z</dc:date>
    <item>
      <title>Tacacs Configuration on the Switch</title>
      <link>https://community.cisco.com/t5/network-access-control/tacacs-configuration-on-the-switch/m-p/5020449#M587425</link>
      <description>&lt;P&gt;Dear Community,&lt;/P&gt;&lt;P&gt;We are currently encountering a challenge in accessing the switch command-line interface (CLI) using user credentials from the Active Directory when the connection between the switch and the TACACS server is unavailable (Cisco ISE). The error message indicates that the switch cannot establish communication with the Cisco ISE. We seek guidance on configuring the scenario wherein, in the event of TACACS being unreachable, the switch automatically checks for the existence of local usernames accessing through Console or SSH&amp;nbsp;&lt;/P&gt;&lt;P&gt;like sequence checking first from TACACS then the Local database on the switch&lt;/P&gt;&lt;P&gt;Below is our configuration on the switch&lt;/P&gt;&lt;P&gt;==================================================================&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;aaa new-model&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;aaa authentication login default group ISE local&lt;BR /&gt;aaa authentication login console group ISE local&lt;BR /&gt;aaa authorization config-commands default group ISE local&lt;BR /&gt;aaa authorization commands default group ISE local&lt;BR /&gt;aaa accounting default group ISE local&lt;BR /&gt;aaa authentication login error-enable&lt;BR /&gt;tacacs-server directed-request&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;tacacs-server key 7 "*********"&lt;BR /&gt;tacacs-server host x.x.x.x key 7 "*******"&lt;BR /&gt;aaa group server tacacs+ ISE&lt;BR /&gt;server x.x.x.x&lt;/P&gt;&lt;P&gt;============================================================&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Omran Mohamed&lt;/P&gt;</description>
      <pubDate>Mon, 19 Feb 2024 07:18:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tacacs-configuration-on-the-switch/m-p/5020449#M587425</guid>
      <dc:creator>Faresnani</dc:creator>
      <dc:date>2024-02-19T07:18:45Z</dc:date>
    </item>
    <item>
      <title>Re: Tacacs Configuration on the Switch</title>
      <link>https://community.cisco.com/t5/network-access-control/tacacs-configuration-on-the-switch/m-p/5020453#M587426</link>
      <description>&lt;P&gt;""If tacacs not send privilege with access-accept""&lt;/P&gt;
&lt;P&gt;The local user and user in AD will auth and access to 1-level 1 from there you need enable password to access te level 15.&lt;/P&gt;
&lt;P&gt;So you need &lt;STRONG&gt;enable&lt;/STRONG&gt; &lt;STRONG&gt;password&lt;/STRONG&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Mon, 19 Feb 2024 07:27:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tacacs-configuration-on-the-switch/m-p/5020453#M587426</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-02-19T07:27:21Z</dc:date>
    </item>
    <item>
      <title>Re: Tacacs Configuration on the Switch</title>
      <link>https://community.cisco.com/t5/network-access-control/tacacs-configuration-on-the-switch/m-p/5020474#M587427</link>
      <description>&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security-vpn/terminal-access-controller-access-control-system-tacacs-/10384-security.html" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/security-vpn/terminal-access-controller-access-control-system-tacacs-/10384-security.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;In example 2 of this guide&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Which you config same (you add tacacs)&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;aaa authentication login &lt;STRONG&gt;console&lt;/STRONG&gt; group ISE local&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Here the &lt;STRONG&gt;console&lt;/STRONG&gt;&amp;nbsp;is method list and since it not defualt you need to add this list under console. Correct me if I am wrong.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;For more info check example 2 in&amp;nbsp; link I share&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Thanks&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;MHM&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 19 Feb 2024 07:34:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tacacs-configuration-on-the-switch/m-p/5020474#M587427</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-02-19T07:34:01Z</dc:date>
    </item>
    <item>
      <title>Re: Tacacs Configuration on the Switch</title>
      <link>https://community.cisco.com/t5/network-access-control/tacacs-configuration-on-the-switch/m-p/5020484#M587428</link>
      <description>&lt;P&gt;Depends on the model of the Switch IOS code running - I use all the time below config on IOS XE and works as expected, when there is no ISE reachability :&lt;/P&gt;
&lt;P&gt;username cisco privilege 15 secret 5 cisco&lt;/P&gt;
&lt;P style="margin: 0in; line-height: 18pt; font-family: Calibri; font-size: 12.0pt; color: #1b1c1d;"&gt;&lt;SPAN&gt;aaa new-model&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; line-height: 18pt; font-family: Calibri; font-size: 12.0pt; color: #1b1c1d;"&gt;&lt;SPAN&gt;tacacs server ISE1&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; line-height: 18pt; font-family: Calibri; font-size: 12.0pt; color: #1b1c1d;"&gt;&lt;SPAN&gt;address ipv4 192.100.1.1&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; line-height: 18pt; font-family: Calibri; font-size: 12.0pt; color: #1b1c1d;"&gt;&lt;SPAN&gt;key Mykey&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; line-height: 18pt; font-family: Calibri; font-size: 12.0pt; color: #1b1c1d;"&gt;&lt;SPAN&gt;tacacs server ISE2&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; line-height: 18pt; font-family: Calibri; font-size: 12.0pt; color: #1b1c1d;"&gt;&lt;SPAN&gt;address ipv4 192.200.1.1&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; line-height: 18pt; font-family: Calibri; font-size: 12.0pt; color: #1b1c1d;"&gt;&lt;SPAN&gt;key MyKey&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; line-height: 18pt; font-family: Calibri; font-size: 12.0pt; color: #1b1c1d;"&gt;&lt;SPAN&gt;ip tacacs source-interface Loopback0&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; line-height: 18pt; font-family: Calibri; font-size: 12.0pt; color: #1b1c1d;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="margin: 0in; line-height: 18pt; font-family: Calibri; font-size: 12.0pt; color: #1b1c1d;"&gt;&lt;SPAN&gt;aaa group server tacacs+ ISE_GRP&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; line-height: 18pt; font-family: Calibri; font-size: 12.0pt; color: #1b1c1d;"&gt;&lt;SPAN&gt;server name ISE1&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; line-height: 18pt; font-family: Calibri; font-size: 12.0pt; color: #1b1c1d;"&gt;&lt;SPAN&gt;server name ISE2&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; line-height: 18pt; font-family: Calibri; font-size: 12.0pt; color: #1b1c1d;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="margin: 0in; line-height: 18pt; font-family: Calibri; font-size: 12.0pt; color: #1b1c1d;"&gt;&lt;SPAN&gt;aaa authentication login default group ISE_GRP local&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; line-height: 18pt; font-family: Calibri; font-size: 12.0pt; color: #1b1c1d;"&gt;&lt;SPAN&gt;aaa authorization config-commands&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; line-height: 18pt; font-family: Calibri; font-size: 12.0pt; color: #1b1c1d;"&gt;&lt;SPAN&gt;aaa authorization exec default group ISE_GRP local&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; line-height: 18pt; font-family: Calibri; font-size: 12.0pt; color: #1b1c1d;"&gt;&lt;SPAN&gt;aaa authorization commands 0 default group ISE_GRP local&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; line-height: 18pt; font-family: Calibri; font-size: 12.0pt; color: #1b1c1d;"&gt;&lt;SPAN&gt;aaa authorization commands 1 default group ISE_GRP local&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; line-height: 18pt; font-family: Calibri; font-size: 12.0pt; color: #1b1c1d;"&gt;&lt;SPAN&gt;aaa authorization commands 15 default group ISE_GRP local&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; line-height: 18pt; font-family: Calibri; font-size: 12.0pt; color: #1b1c1d;"&gt;&lt;SPAN&gt;aaa accounting exec default start-stop group ISE_GRP&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; line-height: 18pt; font-family: Calibri; font-size: 12.0pt; color: #1b1c1d;"&gt;&lt;SPAN&gt;aaa accounting commands 0 default start-stop group ISE_GRP&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; line-height: 18pt; font-family: Calibri; font-size: 12.0pt; color: #1b1c1d;"&gt;&lt;SPAN&gt;aaa accounting commands 1 default start-stop group ISE_GRP&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; line-height: 18pt; font-family: Calibri; font-size: 12.0pt; color: #1b1c1d;"&gt;&lt;SPAN&gt;aaa accounting commands 15 default start-stop group ISE_GRP&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;"&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 19 Feb 2024 07:36:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tacacs-configuration-on-the-switch/m-p/5020484#M587428</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2024-02-19T07:36:10Z</dc:date>
    </item>
  </channel>
</rss>

