<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: CiscoISE policy applying on switch problem in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ciscoise-policy-applying-on-switch-problem/m-p/5075116#M588889</link>
    <description>&lt;P&gt;Revised aaa, and vty:&lt;/P&gt;&lt;P&gt;aaa group server tacacs+ TACACS-SERVERS&lt;BR /&gt;server 192.168.2.25&lt;BR /&gt;ip vrf forwarding MGMT&lt;BR /&gt;!&lt;BR /&gt;aaa authentication login VTY group TACACS-SERVERS local&lt;BR /&gt;aaa authentication enable default enable group tacacs+&lt;BR /&gt;aaa authentication dot1x default group tacacs+&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;aaa authorization config-commands&lt;BR /&gt;aaa authorization exec VTY group TACACS-SERVERS local&lt;BR /&gt;aaa authorization exec CONSOLE local&lt;BR /&gt;aaa authorization commands 0 VTY group TACACS-SERVERS local&lt;BR /&gt;aaa authorization commands 1 VTY group TACACS-SERVERS local&lt;BR /&gt;aaa authorization commands 15 VTY group TACACS-SERVERS local&lt;BR /&gt;aaa authorization network default group tacacs+&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;aaa accounting update newinfo periodic 2880&lt;BR /&gt;aaa accounting exec default start-stop group TACACS-SERVERS&lt;BR /&gt;aaa accounting commands 0 default start-stop group TACACS-SERVERS&lt;BR /&gt;aaa accounting commands 1 default start-stop group TACACS-SERVERS&lt;BR /&gt;aaa accounting commands 15 default start-stop group TACACS-SERVERS&lt;BR /&gt;aaa accounting system default start-stop group TACACS-SERVERS&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;line con 0&lt;BR /&gt;logging synchronous&lt;BR /&gt;login authentication CONSOLE&lt;BR /&gt;stopbits 1&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;line vty 0 4&lt;BR /&gt;authorization commands 0 VTY&lt;BR /&gt;authorization commands 1 VTY&lt;BR /&gt;authorization commands 15 VTY&lt;BR /&gt;authorization exec VTY&lt;BR /&gt;logging synchronous&lt;BR /&gt;login authentication VTY&lt;BR /&gt;transport preferred none&lt;BR /&gt;transport input ssh&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;line vty 5 15&lt;BR /&gt;authorization commands 0 VTY&lt;BR /&gt;authorization commands 1 VTY&lt;BR /&gt;authorization commands 15 VTY&lt;BR /&gt;authorization exec VTY&lt;BR /&gt;logging synchronous&lt;BR /&gt;login authentication VTY&lt;BR /&gt;transport preferred none&lt;BR /&gt;transport input ssh&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;No success yet...&lt;/P&gt;</description>
    <pubDate>Mon, 22 Apr 2024 10:54:44 GMT</pubDate>
    <dc:creator>mitros</dc:creator>
    <dc:date>2024-04-22T10:54:44Z</dc:date>
    <item>
      <title>CiscoISE policy applying on switch problem</title>
      <link>https://community.cisco.com/t5/network-access-control/ciscoise-policy-applying-on-switch-problem/m-p/5074983#M588876</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;I have a problem with applying policies from CiscoISE 3.2 on switch C3750. It simply doesn't stop the unauthenticated users from logging in to switch, nor it prevent commands that are forbidden by the created policy.&amp;nbsp;&lt;/P&gt;&lt;P&gt;In Live Logs I can see that CiscoISE recognizes not allowed attempt, it gives a red status and describes that authentication (or authorization) failed, but I can still do whatever I want on the switch.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2024-04-22 at 08-57-04 Identity Services Engine.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/216440iF208F494BDC3F26D/image-size/large?v=v2&amp;amp;px=999" role="button" title="Screenshot 2024-04-22 at 08-57-04 Identity Services Engine.png" alt="Screenshot 2024-04-22 at 08-57-04 Identity Services Engine.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;As You can see, it throws "Command failed to match a Permit rule" but switch execute it anyway. Same with "INVALID" identity, it fails to authenticate, but the switch let it log in successfully...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Could You please give me advice what could be misconfigured when it acts like this.&lt;/P&gt;&lt;P&gt;TIA&lt;/P&gt;</description>
      <pubDate>Mon, 22 Apr 2024 07:07:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ciscoise-policy-applying-on-switch-problem/m-p/5074983#M588876</guid>
      <dc:creator>mitros</dc:creator>
      <dc:date>2024-04-22T07:07:03Z</dc:date>
    </item>
    <item>
      <title>Re: CiscoISE policy applying on switch problem</title>
      <link>https://community.cisco.com/t5/network-access-control/ciscoise-policy-applying-on-switch-problem/m-p/5074989#M588877</link>
      <description>&lt;P&gt;Share the config in SW'&lt;/P&gt;
&lt;P&gt;The aaa and vty line&amp;nbsp;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Mon, 22 Apr 2024 07:09:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ciscoise-policy-applying-on-switch-problem/m-p/5074989#M588877</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-04-22T07:09:28Z</dc:date>
    </item>
    <item>
      <title>Re: CiscoISE policy applying on switch problem</title>
      <link>https://community.cisco.com/t5/network-access-control/ciscoise-policy-applying-on-switch-problem/m-p/5075080#M588884</link>
      <description>&lt;P&gt;aaa group server tacacs+ TACACS-SERVERS&lt;BR /&gt;server 192.168.2.25&lt;BR /&gt;ip vrf forwarding MGMT&lt;BR /&gt;!&lt;BR /&gt;aaa authentication login default group TACACS-SERVERS local&lt;BR /&gt;aaa authentication login VTY group TACACS-SERVERS local&lt;BR /&gt;aaa authentication login CONSOLE local&lt;BR /&gt;aaa authentication enable default enable&lt;BR /&gt;aaa authentication dot1x default group tacacs+&lt;BR /&gt;aaa authorization config-commands&lt;BR /&gt;aaa authorization exec VTY group TACACS-SERVERS local if-authenticated&lt;BR /&gt;aaa authorization exec CONSOLE local&lt;BR /&gt;aaa authorization commands 0 VTY group TACACS-SERVERS local if-authenticated&lt;BR /&gt;aaa authorization commands 1 VTY group TACACS-SERVERS local if-authenticated&lt;BR /&gt;aaa authorization commands 15 VTY group TACACS-SERVERS local if-authenticated&lt;BR /&gt;aaa authorization network default group tacacs+&lt;BR /&gt;aaa accounting update newinfo periodic 2880&lt;BR /&gt;aaa accounting exec default start-stop group TACACS-SERVERS&lt;BR /&gt;aaa accounting commands 0 default start-stop group TACACS-SERVERS&lt;BR /&gt;aaa accounting commands 1 default start-stop group TACACS-SERVERS&lt;BR /&gt;aaa accounting commands 15 default start-stop group TACACS-SERVERS&lt;BR /&gt;aaa accounting system default start-stop group TACACS-SERVERS&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;!&lt;BR /&gt;line con 0&lt;BR /&gt;logging synchronous&lt;BR /&gt;login authentication CONSOLE&lt;BR /&gt;stopbits 1&lt;BR /&gt;line vty 0 4&lt;BR /&gt;authorization commands 1 VTY&lt;BR /&gt;authorization commands 15 VTY&lt;BR /&gt;authorization exec VTY&lt;BR /&gt;logging synchronous&lt;BR /&gt;transport preferred none&lt;BR /&gt;transport input ssh&lt;BR /&gt;line vty 5 15&lt;BR /&gt;authorization commands 1 VTY&lt;BR /&gt;authorization commands 15 VTY&lt;BR /&gt;authorization exec VTY&lt;BR /&gt;logging synchronous&lt;BR /&gt;transport preferred none&lt;BR /&gt;transport input ssh&lt;BR /&gt;!&lt;/P&gt;</description>
      <pubDate>Mon, 22 Apr 2024 09:29:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ciscoise-policy-applying-on-switch-problem/m-p/5075080#M588884</guid>
      <dc:creator>mitros</dc:creator>
      <dc:date>2024-04-22T09:29:24Z</dc:date>
    </item>
    <item>
      <title>Re: CiscoISE policy applying on switch problem</title>
      <link>https://community.cisco.com/t5/network-access-control/ciscoise-policy-applying-on-switch-problem/m-p/5075084#M588885</link>
      <description>&lt;P&gt;Since you change the auth from default to VTY&lt;/P&gt;
&lt;P&gt;You need to specify that under vty lines&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Mon, 22 Apr 2024 09:31:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ciscoise-policy-applying-on-switch-problem/m-p/5075084#M588885</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-04-22T09:31:53Z</dc:date>
    </item>
    <item>
      <title>Re: CiscoISE policy applying on switch problem</title>
      <link>https://community.cisco.com/t5/network-access-control/ciscoise-policy-applying-on-switch-problem/m-p/5075092#M588886</link>
      <description>&lt;P&gt;The line should already take care of that "&lt;SPAN&gt;aaa authentication login default group TACACS-SERVERS local".&lt;/SPAN&gt;&lt;BR /&gt;.&lt;/P&gt;</description>
      <pubDate>Mon, 22 Apr 2024 09:50:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ciscoise-policy-applying-on-switch-problem/m-p/5075092#M588886</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2024-04-22T09:50:42Z</dc:date>
    </item>
    <item>
      <title>Re: CiscoISE policy applying on switch problem</title>
      <link>https://community.cisco.com/t5/network-access-control/ciscoise-policy-applying-on-switch-problem/m-p/5075093#M588887</link>
      <description>&lt;P&gt;Your shared configs look good to me. Please share the TACACS command sets and authorization policies from ISE for review.&lt;/P&gt;</description>
      <pubDate>Mon, 22 Apr 2024 09:51:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ciscoise-policy-applying-on-switch-problem/m-p/5075093#M588887</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2024-04-22T09:51:53Z</dc:date>
    </item>
    <item>
      <title>Re: CiscoISE policy applying on switch problem</title>
      <link>https://community.cisco.com/t5/network-access-control/ciscoise-policy-applying-on-switch-problem/m-p/5075095#M588888</link>
      <description>&lt;P&gt;Change the Auth method from defualt to VTY under vty line' the exec level is send in auth process.&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Mon, 22 Apr 2024 09:54:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ciscoise-policy-applying-on-switch-problem/m-p/5075095#M588888</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-04-22T09:54:14Z</dc:date>
    </item>
    <item>
      <title>Re: CiscoISE policy applying on switch problem</title>
      <link>https://community.cisco.com/t5/network-access-control/ciscoise-policy-applying-on-switch-problem/m-p/5075116#M588889</link>
      <description>&lt;P&gt;Revised aaa, and vty:&lt;/P&gt;&lt;P&gt;aaa group server tacacs+ TACACS-SERVERS&lt;BR /&gt;server 192.168.2.25&lt;BR /&gt;ip vrf forwarding MGMT&lt;BR /&gt;!&lt;BR /&gt;aaa authentication login VTY group TACACS-SERVERS local&lt;BR /&gt;aaa authentication enable default enable group tacacs+&lt;BR /&gt;aaa authentication dot1x default group tacacs+&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;aaa authorization config-commands&lt;BR /&gt;aaa authorization exec VTY group TACACS-SERVERS local&lt;BR /&gt;aaa authorization exec CONSOLE local&lt;BR /&gt;aaa authorization commands 0 VTY group TACACS-SERVERS local&lt;BR /&gt;aaa authorization commands 1 VTY group TACACS-SERVERS local&lt;BR /&gt;aaa authorization commands 15 VTY group TACACS-SERVERS local&lt;BR /&gt;aaa authorization network default group tacacs+&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;aaa accounting update newinfo periodic 2880&lt;BR /&gt;aaa accounting exec default start-stop group TACACS-SERVERS&lt;BR /&gt;aaa accounting commands 0 default start-stop group TACACS-SERVERS&lt;BR /&gt;aaa accounting commands 1 default start-stop group TACACS-SERVERS&lt;BR /&gt;aaa accounting commands 15 default start-stop group TACACS-SERVERS&lt;BR /&gt;aaa accounting system default start-stop group TACACS-SERVERS&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;line con 0&lt;BR /&gt;logging synchronous&lt;BR /&gt;login authentication CONSOLE&lt;BR /&gt;stopbits 1&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;line vty 0 4&lt;BR /&gt;authorization commands 0 VTY&lt;BR /&gt;authorization commands 1 VTY&lt;BR /&gt;authorization commands 15 VTY&lt;BR /&gt;authorization exec VTY&lt;BR /&gt;logging synchronous&lt;BR /&gt;login authentication VTY&lt;BR /&gt;transport preferred none&lt;BR /&gt;transport input ssh&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;line vty 5 15&lt;BR /&gt;authorization commands 0 VTY&lt;BR /&gt;authorization commands 1 VTY&lt;BR /&gt;authorization commands 15 VTY&lt;BR /&gt;authorization exec VTY&lt;BR /&gt;logging synchronous&lt;BR /&gt;login authentication VTY&lt;BR /&gt;transport preferred none&lt;BR /&gt;transport input ssh&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;No success yet...&lt;/P&gt;</description>
      <pubDate>Mon, 22 Apr 2024 10:54:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ciscoise-policy-applying-on-switch-problem/m-p/5075116#M588889</guid>
      <dc:creator>mitros</dc:creator>
      <dc:date>2024-04-22T10:54:44Z</dc:date>
    </item>
    <item>
      <title>Re: CiscoISE policy applying on switch problem</title>
      <link>https://community.cisco.com/t5/network-access-control/ciscoise-policy-applying-on-switch-problem/m-p/5075120#M588890</link>
      <description>&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2024-04-22 at 12-50-12 Identity Services Engine.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/216473iD4FB5079F3B34C95/image-size/large?v=v2&amp;amp;px=999" role="button" title="Screenshot 2024-04-22 at 12-50-12 Identity Services Engine.png" alt="Screenshot 2024-04-22 at 12-50-12 Identity Services Engine.png" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2024-04-22 at 12-49-38 Identity Services Engine.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/216472iF48577BF8FE3622A/image-size/large?v=v2&amp;amp;px=999" role="button" title="Screenshot 2024-04-22 at 12-49-38 Identity Services Engine.png" alt="Screenshot 2024-04-22 at 12-49-38 Identity Services Engine.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 22 Apr 2024 10:55:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ciscoise-policy-applying-on-switch-problem/m-p/5075120#M588890</guid>
      <dc:creator>mitros</dc:creator>
      <dc:date>2024-04-22T10:55:21Z</dc:date>
    </item>
    <item>
      <title>Re: CiscoISE policy applying on switch problem</title>
      <link>https://community.cisco.com/t5/network-access-control/ciscoise-policy-applying-on-switch-problem/m-p/5075139#M588892</link>
      <description>&lt;P&gt;I can't see anything wrong with your configs so far. Could you please click on both TACACS logs in ISE, the one with the green icon and the one with the red icon and share those pages for review?&lt;/P&gt;
&lt;P&gt;Also, the "Default" authorization rule should be configured with the deny "DenyAllCommands" command set, but this should be irrelevant to your issue.&lt;/P&gt;
&lt;P&gt;Another thing I would recommend would be to configure a new authentication method list for console accesses and apply it to the console line, but again this shouldn't be relevant to your issue.&lt;/P&gt;</description>
      <pubDate>Mon, 22 Apr 2024 11:31:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ciscoise-policy-applying-on-switch-problem/m-p/5075139#M588892</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2024-04-22T11:31:24Z</dc:date>
    </item>
    <item>
      <title>Re: CiscoISE policy applying on switch problem</title>
      <link>https://community.cisco.com/t5/network-access-control/ciscoise-policy-applying-on-switch-problem/m-p/5075168#M588893</link>
      <description>&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2024-04-22 at 13-42-21 Cisco Identity Services Engine.png" style="width: 696px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/216483iF9713A6E73A18F62/image-size/large?v=v2&amp;amp;px=999" role="button" title="Screenshot 2024-04-22 at 13-42-21 Cisco Identity Services Engine.png" alt="Screenshot 2024-04-22 at 13-42-21 Cisco Identity Services Engine.png" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2024-04-22 at 13-41-14 Cisco Identity Services Engine.png" style="width: 672px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/216484i1A01C6899F277906/image-size/large?v=v2&amp;amp;px=999" role="button" title="Screenshot 2024-04-22 at 13-41-14 Cisco Identity Services Engine.png" alt="Screenshot 2024-04-22 at 13-41-14 Cisco Identity Services Engine.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 22 Apr 2024 11:50:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ciscoise-policy-applying-on-switch-problem/m-p/5075168#M588893</guid>
      <dc:creator>mitros</dc:creator>
      <dc:date>2024-04-22T11:50:25Z</dc:date>
    </item>
    <item>
      <title>Re: CiscoISE policy applying on switch problem</title>
      <link>https://community.cisco.com/t5/network-access-control/ciscoise-policy-applying-on-switch-problem/m-p/5075191#M588899</link>
      <description>&lt;P&gt;The successful log shows that the session of the user "admin2" did not match any command set, you can see that in the overview section on that page.&lt;/P&gt;
&lt;P&gt;Could you please also share the "admin2" failed log, the one right below the one with the green icon?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 22 Apr 2024 12:23:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ciscoise-policy-applying-on-switch-problem/m-p/5075191#M588899</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2024-04-22T12:23:49Z</dc:date>
    </item>
    <item>
      <title>Re: CiscoISE policy applying on switch problem</title>
      <link>https://community.cisco.com/t5/network-access-control/ciscoise-policy-applying-on-switch-problem/m-p/5075228#M588901</link>
      <description>&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2024-04-22 at 15-17-55 Cisco Identity Services Engine.png" style="width: 644px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/216489iB2C04CD46ABE01CB/image-size/large?v=v2&amp;amp;px=999" role="button" title="Screenshot 2024-04-22 at 15-17-55 Cisco Identity Services Engine.png" alt="Screenshot 2024-04-22 at 15-17-55 Cisco Identity Services Engine.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 22 Apr 2024 13:18:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ciscoise-policy-applying-on-switch-problem/m-p/5075228#M588901</guid>
      <dc:creator>mitros</dc:creator>
      <dc:date>2024-04-22T13:18:59Z</dc:date>
    </item>
    <item>
      <title>Re: CiscoISE policy applying on switch problem</title>
      <link>https://community.cisco.com/t5/network-access-control/ciscoise-policy-applying-on-switch-problem/m-p/5075279#M588902</link>
      <description>&lt;P&gt;Thanks for that. Based on the provided logs it seems that the command authorization should work as expected, ISE is clearly showing that there was a command authorization failure, so the switch should fail the authorization of that command as well. This leads me to think that maybe the switch is hitting a software bug that is causing this anomaly, or maybe the switch is continuously losing connection to ISE and it falls back to the local authorization?&lt;/P&gt;
&lt;P&gt;You can look at the exact commands that were associated to the sessions by looking at TACACS report logs in "Operations &amp;gt; Reports &amp;gt; Reports &amp;gt; Device Administration &amp;gt; TACACS Authorization".&lt;/P&gt;
&lt;P&gt;I would try to enable TACACS debugs and look at the output while trying to issue a command that shouldn't be allowed and see what the switch returns.&amp;nbsp;To enable TACACS debugs you would need these commands:&lt;/P&gt;
&lt;P&gt;debug aaa authorization&lt;BR /&gt;&lt;SPAN&gt;debug tacacs&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Also, you mentioned in your original post that the unauthenticated users are able to log into the switch? could you elaborate more on this please?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 22 Apr 2024 14:11:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ciscoise-policy-applying-on-switch-problem/m-p/5075279#M588902</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2024-04-22T14:11:44Z</dc:date>
    </item>
    <item>
      <title>Re: CiscoISE policy applying on switch problem</title>
      <link>https://community.cisco.com/t5/network-access-control/ciscoise-policy-applying-on-switch-problem/m-p/5075297#M588903</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Access to device and then show privilege' check in which privilege thenuser is&lt;/P&gt;
&lt;P&gt;Also' in auth under thr policy set' there is option can you mention which selection you use for unknown user? The ISE live logs show that user is not found in internal identity db' can you you the selection and action of defualt authorization in ISE&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Mon, 22 Apr 2024 14:47:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ciscoise-policy-applying-on-switch-problem/m-p/5075297#M588903</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-04-22T14:47:51Z</dc:date>
    </item>
    <item>
      <title>Re: CiscoISE policy applying on switch problem</title>
      <link>https://community.cisco.com/t5/network-access-control/ciscoise-policy-applying-on-switch-problem/m-p/5075791#M588914</link>
      <description>&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2024-04-23 at 08-42-30 Identity Services Engine.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/216559iEDC76DD4582E81D2/image-size/large?v=v2&amp;amp;px=999" role="button" title="Screenshot 2024-04-23 at 08-42-30 Identity Services Engine.png" alt="Screenshot 2024-04-23 at 08-42-30 Identity Services Engine.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;TACACS report logs in "Operations &amp;gt; Reports &amp;gt; Reports &amp;gt; Device Administration &amp;gt; TACACS Authorization"&lt;/EM&gt;&amp;nbsp; shows empty past 7 days??&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Q:&lt;/STRONG&gt;&lt;EM&gt; Also, you mentioned in your original post that the unauthenticated users are able to log into the switch? could you elaborate more on this please?&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;A: &lt;/STRONG&gt;That is user which I created on switch, but didn't add it to CiscoISE identities. ISE doesn't know for it, so can't find it in Users Identity Groups. Therefore it call that user INVALID - cant pass authentication ( at least for ISE, in reality it can log in to switch no problem)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;LAB_SW_2.20#debug aaa authorization&lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt;AAA Authorization debugging is on&lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt;LAB_SW_2.20#debug tacacs&lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt;TACACS access control debugging is on&lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt;LAB_SW_2.20#conf t&lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt;Enter configuration commands, one per line. End with CNTL/Z.&lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt;LAB_SW_2.20(config)#&lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt;LAB_SW_2.20(config)#&lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt;LAB_SW_2.20(config)#&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;"configuration terminal" should be forbidden, but switch executes it. Logs in CiscoISE however reports fail authorization on that command, picture attached below:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2024-04-23 at 08-52-07 Cisco Identity Services Engine.png" style="width: 644px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/216561i8295E75DF0686874/image-size/large?v=v2&amp;amp;px=999" role="button" title="Screenshot 2024-04-23 at 08-52-07 Cisco Identity Services Engine.png" alt="Screenshot 2024-04-23 at 08-52-07 Cisco Identity Services Engine.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 23 Apr 2024 06:57:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ciscoise-policy-applying-on-switch-problem/m-p/5075791#M588914</guid>
      <dc:creator>mitros</dc:creator>
      <dc:date>2024-04-23T06:57:01Z</dc:date>
    </item>
    <item>
      <title>Re: CiscoISE policy applying on switch problem</title>
      <link>https://community.cisco.com/t5/network-access-control/ciscoise-policy-applying-on-switch-problem/m-p/5075796#M588915</link>
      <description>&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;LAB_SW_2.20#sh privilege&lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt;Current privilege level is 15&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Q:&lt;/STRONG&gt;&lt;EM&gt;The ISE live logs show that user is not found in internal identity db' can you you the selection and action of defualt authorization in ISE&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;A: &lt;/STRONG&gt;I've answered in previous post just above, there is one user created on switch that is not added to ISE, so it throws &lt;EM&gt;user is not found in internal identity db&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 23 Apr 2024 07:01:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ciscoise-policy-applying-on-switch-problem/m-p/5075796#M588915</guid>
      <dc:creator>mitros</dc:creator>
      <dc:date>2024-04-23T07:01:09Z</dc:date>
    </item>
    <item>
      <title>Re: CiscoISE policy applying on switch problem</title>
      <link>https://community.cisco.com/t5/network-access-control/ciscoise-policy-applying-on-switch-problem/m-p/5075936#M588918</link>
      <description>&lt;P&gt;Thanks for that. The "INVALID" users in the logs can be disclosed by changing the "Disclose invalid usernames" under Administration &amp;gt; System &amp;gt; Settings &amp;gt; Security Settings &amp;gt; Disclose invalid usernames" to always or for a limited amount of time.&lt;/P&gt;
&lt;P&gt;No debugs returned at all? if you are connected to the switch via SSH then please issue the command "terminal monitor" to replicate the output to the screen and share any debug output.&lt;/P&gt;
&lt;P&gt;I am kinda running out of ideas here, my gut feeling is that this switch is not performing TACACS operations correctly. Or, as mentioned previously, it could be that the switch for some reason keeps losing the connection with ISE and accordingly falls back to the local database for both authentication and authorization.&lt;/P&gt;
&lt;P&gt;One thing you can do to test this would be to remove the "local" keyword for TACACS and see if the behaviour would still be the same, if so, I would say the switch is hitting a software bug, if not, then it would related to some communication issues with ISE. However, please make sure that you have at least console access and that is configured with local database, otherwise you might look yourself out and had to reload the switch before you get access to it. Alternatively you can schedule a reload before you apply any changes. But let's first try to get to the bottom of this by relying on TACACS debugs and see if we get anything.&lt;/P&gt;</description>
      <pubDate>Tue, 23 Apr 2024 08:45:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ciscoise-policy-applying-on-switch-problem/m-p/5075936#M588918</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2024-04-23T08:45:14Z</dc:date>
    </item>
    <item>
      <title>Re: CiscoISE policy applying on switch problem</title>
      <link>https://community.cisco.com/t5/network-access-control/ciscoise-policy-applying-on-switch-problem/m-p/5076018#M588923</link>
      <description>&lt;P&gt;It seems that I've found a problem.&lt;/P&gt;&lt;P&gt;In CiscoISE &lt;EM&gt;Administration&amp;gt;Network Devices&amp;gt;selected device&amp;gt; Edit&amp;nbsp; &amp;gt;&lt;/EM&gt; &lt;EM&gt;TACACS Authentication Settings&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;It should be checked &lt;EM&gt;Legacy Cisco Device&lt;/EM&gt;. I had other configured and it didn't work.&lt;/P&gt;&lt;P&gt;Pictures below :&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="tacacsNOwork.png" style="width: 585px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/216577iE4547EAB33576FF9/image-size/large?v=v2&amp;amp;px=999" role="button" title="tacacsNOwork.png" alt="tacacsNOwork.png" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="tacacsWORK.png" style="width: 657px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/216578iDDDC70C12495004F/image-size/large?v=v2&amp;amp;px=999" role="button" title="tacacsWORK.png" alt="tacacsWORK.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Now, unregistered user gets message:&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;STRONG&gt;login as: admin&lt;/STRONG&gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&lt;STRONG&gt;Keyboard-interactive authentication prompts from server:&lt;/STRONG&gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&lt;STRONG&gt;| Password:&lt;/STRONG&gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&lt;STRONG&gt;End of keyboard-interactive prompts from server&lt;/STRONG&gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&lt;STRONG&gt;Access denied&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;And unauthorized commands get note:&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;LAB_SW_2.20#conf t&lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt;Command authorization failed.&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;All that followed by adequate status in CiscoISE Live Logs. &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Thank You all for participating in troubleshooting!&lt;/P&gt;</description>
      <pubDate>Tue, 23 Apr 2024 10:15:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ciscoise-policy-applying-on-switch-problem/m-p/5076018#M588923</guid>
      <dc:creator>mitros</dc:creator>
      <dc:date>2024-04-23T10:15:42Z</dc:date>
    </item>
    <item>
      <title>Re: CiscoISE policy applying on switch problem</title>
      <link>https://community.cisco.com/t5/network-access-control/ciscoise-policy-applying-on-switch-problem/m-p/5076052#M588924</link>
      <description>&lt;P&gt;Thanks a lot for update us&lt;/P&gt;
&lt;P&gt;Have a nice day&amp;nbsp;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Tue, 23 Apr 2024 10:43:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ciscoise-policy-applying-on-switch-problem/m-p/5076052#M588924</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-04-23T10:43:39Z</dc:date>
    </item>
  </channel>
</rss>

