<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Yep, also, if you want to in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/tacacs-and-local-login/m-p/2560793#M72249</link>
    <description>&lt;P&gt;Yep, also, if you want to keep track of changes/aaa accounting, you could create a local username/password on your TACACS+ server that your ISP can use&lt;/P&gt;</description>
    <pubDate>Fri, 07 Nov 2014 18:46:22 GMT</pubDate>
    <dc:creator>nspasov</dc:creator>
    <dc:date>2014-11-07T18:46:22Z</dc:date>
    <item>
      <title>TACACS+ and local login</title>
      <link>https://community.cisco.com/t5/network-access-control/tacacs-and-local-login/m-p/2560790#M72243</link>
      <description>&lt;P&gt;The basic Summary is that I want to have TACACS+ and local login to the router over the vty lines.&amp;nbsp; So I made the two groups below.&amp;nbsp; Goody obviously is what is going to use TACACS and Console uses the local logins.&amp;nbsp; I split them between 0-4 and 5-15.&amp;nbsp; It seems that whichever one is higher get the first priority for authentication.&amp;nbsp; If I move Console to 0-4, then local users work and TACACS do not. &amp;nbsp; If I have Goody at 0 4, then TACACS works, but local does not.&amp;nbsp; I know I'm probably missing something simple.&amp;nbsp; Having two TACACS servers, I doubt both will ever be down, but in the event I would like Local usernames to work.&amp;nbsp;&amp;nbsp; If I apply an access list to 0 4 and use SSH,&amp;nbsp; and a different access list to 5 15 and use telnet it seems to work that way but doesn't help me if the internet goes down and I am onsite trying to access the router via SSH.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks in advance.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;David&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;aaa authentication login Goody group tacacs+ local&lt;BR /&gt;aaa authentication login Console local&lt;/P&gt;&lt;P&gt;line con 0&lt;BR /&gt;&amp;nbsp;login authentication Console&lt;BR /&gt;line aux 0&lt;BR /&gt;line vty 0 4&lt;BR /&gt;&amp;nbsp;session-timeout 7&lt;BR /&gt;&amp;nbsp;exec-timeout 5 0&lt;BR /&gt;&amp;nbsp;login authentication Goody&lt;BR /&gt;&amp;nbsp;transport input ssh&lt;BR /&gt;line vty 5 15&lt;BR /&gt;&amp;nbsp;session-timeout 7&lt;BR /&gt;&amp;nbsp;exec-timeout 5 0&lt;BR /&gt;&amp;nbsp;login authentication Console&lt;BR /&gt;&amp;nbsp;transport input ssh&lt;/P&gt;</description>
      <pubDate>Wed, 13 Mar 2019 00:44:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tacacs-and-local-login/m-p/2560790#M72243</guid>
      <dc:creator>David Lee</dc:creator>
      <dc:date>2019-03-13T00:44:11Z</dc:date>
    </item>
    <item>
      <title>Hi David-Correct me if I not</title>
      <link>https://community.cisco.com/t5/network-access-control/tacacs-and-local-login/m-p/2560791#M72245</link>
      <description>&lt;P&gt;Hi David-&lt;/P&gt;&lt;P&gt;Correct me if I not understanding this correctly but you want to use&amp;nbsp;TACACS servers for ssh/console type authentication and if they fail, you want the network device to use its local database.&lt;/P&gt;&lt;P&gt;If that is correct then you should not need to split the lines and assign them different authentication lists. The first commend that you have:&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;SPAN style="font-size: 14px;"&gt;aaa authentication login Goody group tacacs+ local&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Lists both the tacacs+ and the local database as possible authentication methods. They will be processed in the order they are configured, so the device will:&lt;/P&gt;&lt;P&gt;1. Utilize your TACACS+ servers&lt;/P&gt;&lt;P&gt;2. If the TACACS+ servers become unreachable then the local data base will be used&lt;/P&gt;&lt;P&gt;You can test this by assigning "Goody" to all of your vty lines and then make your TACACS+ servers unavailable. To make that possible you can:&lt;/P&gt;&lt;P&gt;- Reboot the server&lt;/P&gt;&lt;P&gt;- Shutdown the server interface&lt;/P&gt;&lt;P&gt;- Disconnect the network device from its uplink&lt;/P&gt;&lt;P&gt;- Create an access-list on the uplink interface and block connection to the IP addresses of the TACACS+ servers&lt;/P&gt;&lt;P&gt;I hope all of this helps!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Thank you for rating helpful posts!&lt;/EM&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 07 Nov 2014 07:34:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tacacs-and-local-login/m-p/2560791#M72245</guid>
      <dc:creator>nspasov</dc:creator>
      <dc:date>2014-11-07T07:34:25Z</dc:date>
    </item>
    <item>
      <title>Neno, That answers one of my</title>
      <link>https://community.cisco.com/t5/network-access-control/tacacs-and-local-login/m-p/2560792#M72248</link>
      <description>&lt;P&gt;Neno,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;That answers one of my questions, but now I have another.&amp;nbsp; My ISP wants to have SSH into the router so that they can maintain their IP SLA agreement.&amp;nbsp; They have a local user account on each of my routers that they use for SSH access.&amp;nbsp; Is there a way to have the router look at both TACACS and if its not there then the local user database? &amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;edit-&amp;nbsp; ok.&amp;nbsp; I just found out that if I change the order to&lt;/P&gt;&lt;P&gt;aaa authentication login Goody local group tacacs+&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;that it will look in the local database first.&amp;nbsp; If the user is not there, it will query the tacacs+ servers.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 07 Nov 2014 18:15:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tacacs-and-local-login/m-p/2560792#M72248</guid>
      <dc:creator>David Lee</dc:creator>
      <dc:date>2014-11-07T18:15:40Z</dc:date>
    </item>
    <item>
      <title>Yep, also, if you want to</title>
      <link>https://community.cisco.com/t5/network-access-control/tacacs-and-local-login/m-p/2560793#M72249</link>
      <description>&lt;P&gt;Yep, also, if you want to keep track of changes/aaa accounting, you could create a local username/password on your TACACS+ server that your ISP can use&lt;/P&gt;</description>
      <pubDate>Fri, 07 Nov 2014 18:46:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tacacs-and-local-login/m-p/2560793#M72249</guid>
      <dc:creator>nspasov</dc:creator>
      <dc:date>2014-11-07T18:46:22Z</dc:date>
    </item>
  </channel>
</rss>

