<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Authentication passed - authorization failed - IOS bug? in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/authentication-passed-authorization-failed-ios-bug/m-p/2394283#M88397</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Javier,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Not a problem and will get the captures to you ASAP (with non-production shared key).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 30 Jan 2014 12:59:32 GMT</pubDate>
    <dc:creator>Eric Varner</dc:creator>
    <dc:date>2014-01-30T12:59:32Z</dc:date>
    <item>
      <title>Authentication passed - authorization failed - IOS bug?</title>
      <link>https://community.cisco.com/t5/network-access-control/authentication-passed-authorization-failed-ios-bug/m-p/2394281#M88387</link>
      <description>&lt;P&gt;Bear with me as I cut/paste information gathered while trying to find a solution to our agency issue.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Platforms:&amp;nbsp; Cisco 2821 Router&amp;nbsp; &amp;amp; Cisco 2911 Router&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Will provide IOS level/revision at the start of each segment.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Problem discussion:&amp;nbsp; We use TACACS+ to authenticate end-users at remote locations and depending on which group they belong will determine if they have Internet access or Intranet Only access.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2821 with IOS: c2800nm-advsecurityk9-mz.124-20.T2&lt;/P&gt;&lt;P&gt;Has no issue authenticating and authorizing end-users.&amp;nbsp; However, with the 200+ remote sites we have noticed an issue with auth cache not clearning correctly and we are spending a lot of time clearing IP addresses from the router manually.&amp;nbsp; Thus, the hunt for an updated IOS that might be better suited and alleviate the cache clear issue.&amp;nbsp;&amp;nbsp; We have tested two routers with IOS c2800nm-advsecurityk9-mz.151-4.M7 and have not had to clear auth cache from these routers in over a month using ACS server 4.2&amp;nbsp; Now, here's where things get interesting.&amp;nbsp;&amp;nbsp; We are currently using ACS 4.2, but have two new 5.4 ACS appliances that will work in conjuntion with AD for end-user authentication (leaving authorization to ACS).&amp;nbsp; The two routers with 15.1 code will not work.&amp;nbsp; They authenticate just fine, but fail during authorization.&amp;nbsp; I can load the old IOS on the router with the same exact config and it will work just fine.&amp;nbsp; I've tried&amp;nbsp; c2800nm-advsecurityk9-mz.150-1.M10 code and it does indeed work (authorization), but we still have the same issue with clearing auth cache IP addresses.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here's the working 15.0 code debug:&amp;nbsp; (tacacs/aaa authentication and authorization) using ACS 5.4&lt;/P&gt;&lt;P&gt;[Debug TACACS &amp;amp; AAA authentication and authorization] &amp;lt;I've changed the workstation IP address to something other than production&amp;gt;&lt;/P&gt;&lt;P&gt;Jan 29 13:47:28.361: AAA: parse name=GigabitEthernet0/1 idb type=-1 tty=-1&lt;/P&gt;&lt;P&gt;Jan 29 13:47:28.361: AAA: name=GigabitEthernet0/1 flags=0x15 type=22 shelf=0 slot=0 adapter=0 port=1 channel=0&lt;/P&gt;&lt;P&gt;Jan 29 13:47:28.361: AAA: parse name=&amp;lt;no string&amp;gt; idb type=-1 tty=-1&lt;/P&gt;&lt;P&gt;Jan 29 13:47:28.361: AAA/MEMORY: create_user (0x45667B40) user='NULL' ruser='NULL' ds0=0 port='GigabitEthernet0/1' rem_addr='192.168.1.11' authen_type=ASCII service=LOGIN priv=0 initial_task_id='0', vrf= (id=0)&lt;/P&gt;&lt;P&gt;Jan 29 13:47:28.361: AAA/AUTHEN/START (3899021442): port='GigabitEthernet0/1' list='default' action=LOGIN service=LOGIN&lt;/P&gt;&lt;P&gt;Jan 29 13:47:28.361: AAA/AUTHEN/START (3899021442): found list default&lt;/P&gt;&lt;P&gt;Jan 29 13:47:28.361: AAA/AUTHEN/START (3899021442): Method=LOCAL&lt;/P&gt;&lt;P&gt;Jan 29 13:47:28.365: AAA/AUTHEN (3899021442): status = GETUSER&lt;/P&gt;&lt;P&gt;Jan 29 13:47:28.365: AAA/AUTHEN/CONT (3899021442): continue_login (user='(undef)')&lt;/P&gt;&lt;P&gt;Jan 29 13:47:28.365: AAA/AUTHEN (3899021442): status = GETUSER&lt;/P&gt;&lt;P&gt;Jan 29 13:47:28.365: AAA/AUTHEN/CONT (3899021442): Method=LOCAL&lt;/P&gt;&lt;P&gt;Jan 29 13:47:28.365: AAA/AUTHEN(3899021442): User not found, emulating local-override&lt;/P&gt;&lt;P&gt;Jan 29 13:47:28.365: AAA/AUTHEN (3899021442): status = ERROR&lt;/P&gt;&lt;P&gt;Jan 29 13:47:28.365: AAA/AUTHEN/START (3776193362): port='GigabitEthernet0/1' list='' action=LOGIN service=LOGIN&lt;/P&gt;&lt;P&gt;Jan 29 13:47:28.365: AAA/AUTHEN/START (3776193362): Restart&lt;/P&gt;&lt;P&gt;Jan 29 13:47:28.365: AAA/AUTHEN/START (3776193362): Method=TACACS_GRP1 (tacacs+)&lt;/P&gt;&lt;P&gt;Jan 29 13:47:28.365: TAC+: send AUTHEN/START packet ver=192 id=-518773934&lt;/P&gt;&lt;P&gt;Jan 29 13:47:28.365: TAC+: Using default tacacs server-group "TACACS_GRP1" list.&lt;/P&gt;&lt;P&gt;Jan 29 13:47:28.365: TAC+: Opening TCP/IP to 192.168.1.2/49 timeout=2&lt;/P&gt;&lt;P&gt;Jan 29 13:47:28.365: TAC+: Opened TCP/IP handle 0x470E8E58 to 192.168.1.2/49&lt;/P&gt;&lt;P&gt;Jan 29 13:47:28.365: TAC+: 10.2.22.20 (3776193362) AUTHEN/START/LOGIN/ASCII queued&lt;/P&gt;&lt;P&gt;Jan 29 13:47:28.565: TAC+: (3776193362) AUTHEN/START/LOGIN/ASCII processed&lt;/P&gt;&lt;P&gt;Jan 29 13:47:28.565: TAC+: ver=192 id=-518773934 received AUTHEN status = GETPASS&lt;/P&gt;&lt;P&gt;Jan 29 13:47:28.565: AAA/AUTHEN (3776193362): status = GETPASS&lt;/P&gt;&lt;P&gt;Jan 29 13:47:28.565: AAA/AUTHEN/CONT (3776193362): continue_login (user='testuser')&lt;/P&gt;&lt;P&gt;Jan 29 13:47:28.565: AAA/AUTHEN (3776193362): status = GETPASS&lt;/P&gt;&lt;P&gt;Jan 29 13:47:28.565: AAA/AUTHEN (3776193362): Method=TACACS_GRP1 (tacacs+)&lt;/P&gt;&lt;P&gt;Jan 29 13:47:28.565: TAC+: send AUTHEN/CONT packet id=-518773934&lt;/P&gt;&lt;P&gt;Jan 29 13:47:28.565: TAC+: 192.168.1.2 (3776193362) AUTHEN/CONT queued&lt;/P&gt;&lt;P&gt;Jan 29 13:47:28.765: TAC+: (3776193362) AUTHEN/CONT processed&lt;/P&gt;&lt;P&gt;Jan 29 13:47:28.765: TAC+: ver=192 id=-518773934 received AUTHEN status = PASS&lt;/P&gt;&lt;P&gt;Jan 29 13:47:28.765: AAA/AUTHEN (3776193362): status = PASS&lt;/P&gt;&lt;P&gt;Jan 29 13:47:28.765: TAC+: Closing TCP/IP 0x470E8E58 connection to 192.168.1.2/49&lt;/P&gt;&lt;P&gt;Jan 29 13:47:28.765: GigabitEthernet0/1 AAA/AUTHOR/HTTP (2372033975): Port='GigabitEthernet0/1' list='default' service=AUTH-PROXY&lt;/P&gt;&lt;P&gt;Jan 29 13:47:28.765: AAA/AUTHOR/HTTP: GigabitEthernet0/1 (2372033975) user='testuser'&lt;/P&gt;&lt;P&gt;Jan 29 13:47:28.765: GigabitEthernet0/1 AAA/AUTHOR/HTTP (2372033975): send AV service=auth-proxy&lt;/P&gt;&lt;P&gt;Jan 29 13:47:28.765: GigabitEthernet0/1 AAA/AUTHOR/HTTP (2372033975): send AV cmd*&lt;/P&gt;&lt;P&gt;Jan 29 13:47:28.765: GigabitEthernet0/1 AAA/AUTHOR/HTTP(2372033975): found list "default"&lt;/P&gt;&lt;P&gt;Jan 29 13:47:28.765: GigabitEthernet0/1 AAA/AUTHOR/HTTP (2372033975): Method=TACACS_GRP1 (tacacs+)&lt;/P&gt;&lt;P&gt;Jan 29 13:47:28.765: AAA/AUTHOR/TAC+: (2372033975): user=he00020&lt;/P&gt;&lt;P&gt;Jan 29 13:47:28.765: AAA/AUTHOR/TAC+: (2372033975): send AV service=auth-proxy&lt;/P&gt;&lt;P&gt;Jan 29 13:47:28.765: AAA/AUTHOR/TAC+: (2372033975): send AV cmd*&lt;/P&gt;&lt;P&gt;Jan 29 13:47:28.765: TAC+: using previously set server 192.168.1.2 from group TACACS_GRP1&lt;/P&gt;&lt;P&gt;Jan 29 13:47:28.765: TAC+: lookup 192.168.1.2 in DNS local cache&lt;/P&gt;&lt;P&gt;Jan 29 13:47:28.765: TAC+: Using default tacacs server-group "TACACS_GRP1" list.&lt;/P&gt;&lt;P&gt;Jan 29 13:47:28.765: TAC+: Opening TCP/IP to 192.168.1.2/49 timeout=2&lt;/P&gt;&lt;P&gt;Jan 29 13:47:28.765: TAC+: Opened TCP/IP handle 0x470E24F4 to 192.168.1.2/49&lt;/P&gt;&lt;P&gt;Jan 29 13:47:28.765: TAC+: 192.168.1.2 (2372033975) AUTHOR/START queued&lt;/P&gt;&lt;P&gt;Jan 29 13:47:28.965: TAC+: (2372033975) AUTHOR/START processed&lt;/P&gt;&lt;P&gt;Jan 29 13:47:28.965: TAC+: (-1922933321): received author response status = PASS_ADD&lt;/P&gt;&lt;P&gt;Jan 29 13:47:28.965: TAC+: Closing TCP/IP 0x470E24F4 connection to 192.168.1.2/49&lt;/P&gt;&lt;P&gt;Jan 29 13:47:28.965: TAC+: Received Attribute "priv-lvl=15"&lt;/P&gt;&lt;P&gt;Jan 29 13:47:28.965: TAC+: Received Attribute "proxyacl#1=permit ip any any"&lt;/P&gt;&lt;P&gt;Jan 29 13:47:28.965: AAA/AUTHOR (2372033975): Post authorization status = PASS_ADD&lt;/P&gt;&lt;P&gt;Jan 29 13:47:31.969: %AP-6-AUTH_PROXY_AUDIT_START: initiator (192.168.1.11) start&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is the same router with the same config but updated IOS (15.1) and using ACS 5.4&lt;/P&gt;&lt;P&gt;[Debug TACACS &amp;amp; AAA authentication and authorization] FAILED TEST&lt;/P&gt;&lt;P&gt;Jan 29 15:06:27.726: AAA/BIND(00000010): Bind i/f&amp;nbsp; &lt;/P&gt;&lt;P&gt;Jan 29 15:06:27.730: AAA/AUTHEN/AUTH-PROXY (00000010): Pick method list 'default' &lt;/P&gt;&lt;P&gt;Jan 29 15:06:27.730: TPLUS: Queuing AAA Authentication request 16 for processing&lt;/P&gt;&lt;P&gt;Jan 29 15:06:27.730: TPLUS: processing authentication start request id 16&lt;/P&gt;&lt;P&gt;Jan 29 15:06:27.730: TPLUS: Authentication start packet created for 16(testuser)&lt;/P&gt;&lt;P&gt;Jan 29 15:06:27.730: TPLUS: Using server 192.168.1.2&lt;/P&gt;&lt;P&gt;Jan 29 15:06:27.734: TPLUS(00000010)/0/NB_WAIT/47823D9C: Started 2 sec timeout&lt;/P&gt;&lt;P&gt;Jan 29 15:06:27.734: TPLUS(00000010)/0/NB_WAIT: socket event 2&lt;/P&gt;&lt;P&gt;Jan 29 15:06:27.734: TPLUS(00000010)/0/NB_WAIT: wrote entire 27 bytes request&lt;/P&gt;&lt;P&gt;Jan 29 15:06:27.734: TPLUS(00000010)/0/READ: socket event 1&lt;/P&gt;&lt;P&gt;Jan 29 15:06:27.734: TPLUS(00000010)/0/READ: Would block while reading&lt;/P&gt;&lt;P&gt;Jan 29 15:06:27.742: TPLUS(00000010)/0/READ: socket event 1&lt;/P&gt;&lt;P&gt;Jan 29 15:06:27.742: TPLUS(00000010)/0/READ: read entire 12 header bytes (expect 16 bytes data)&lt;/P&gt;&lt;P&gt;Jan 29 15:06:27.742: TPLUS(00000010)/0/READ: socket event 1&lt;/P&gt;&lt;P&gt;Jan 29 15:06:27.742: TPLUS(00000010)/0/READ: read entire 28 bytes response&lt;/P&gt;&lt;P&gt;Jan 29 15:06:27.742: TPLUS(00000010)/0/47823D9C: Processing the reply packet&lt;/P&gt;&lt;P&gt;Jan 29 15:06:27.742: TPLUS: Received authen response status GET_PASSWORD (8)&lt;/P&gt;&lt;P&gt;Jan 29 15:06:27.742: TPLUS: Queuing AAA Authentication request 16 for processing&lt;/P&gt;&lt;P&gt;Jan 29 15:06:27.742: TPLUS: processing authentication continue request id 16&lt;/P&gt;&lt;P&gt;Jan 29 15:06:27.742: TPLUS: Authentication continue packet generated for 16&lt;/P&gt;&lt;P&gt;Jan 29 15:06:27.742: TPLUS(00000010)/0/WRITE/47823D9C: Started 2 sec timeout&lt;/P&gt;&lt;P&gt;Jan 29 15:06:27.742: TPLUS(00000010)/0/WRITE: wrote entire 27 bytes request&lt;/P&gt;&lt;P&gt;Jan 29 15:06:27.766: TPLUS(00000010)/0/READ: socket event 1&lt;/P&gt;&lt;P&gt;Jan 29 15:06:27.766: TPLUS(00000010)/0/READ: read entire 12 header bytes (expect 6 bytes data)&lt;/P&gt;&lt;P&gt;Jan 29 15:06:27.766: TPLUS(00000010)/0/READ: socket event 1&lt;/P&gt;&lt;P&gt;Jan 29 15:06:27.766: TPLUS(00000010)/0/READ: read entire 18 bytes response&lt;/P&gt;&lt;P&gt;Jan 29 15:06:27.770: TPLUS(00000010)/0/47823D9C: Processing the reply packet&lt;/P&gt;&lt;P&gt;Jan 29 15:06:27.770: TPLUS: Received authen response status PASS (2)&lt;/P&gt;&lt;P&gt;Jan 29 15:06:27.770: AAA/AUTHOR (0x10): Pick method list 'default'&lt;/P&gt;&lt;P&gt;Jan 29 15:06:27.770: TPLUS: Queuing AAA Authorization request 16 for processing&lt;/P&gt;&lt;P&gt;Jan 29 15:06:27.770: TPLUS: processing authorization request id 16&lt;/P&gt;&lt;P&gt;Jan 29 15:06:27.770: TPLUS: Sending AV service=auth-proxy&lt;/P&gt;&lt;P&gt;Jan 29 15:06:27.770: TPLUS: Sending AV protocol=ip&lt;/P&gt;&lt;P&gt;Jan 29 15:06:27.770: TPLUS: Authorization request created for 16(testuser)&lt;/P&gt;&lt;P&gt;Jan 29 15:06:27.770: TPLUS: using previously set server 192.168.1.2 from group TACACS_GRP1&lt;/P&gt;&lt;P&gt;Jan 29 15:06:27.774: TPLUS(00000010)/0/NB_WAIT/47823D9C: Started 2 sec timeout&lt;/P&gt;&lt;P&gt;Jan 29 15:06:27.774: TPLUS(00000010)/0/NB_WAIT: socket event 2&lt;/P&gt;&lt;P&gt;Jan 29 15:06:27.774: TPLUS(00000010)/0/NB_WAIT: wrote entire 58 bytes request&lt;/P&gt;&lt;P&gt;Jan 29 15:06:27.774: TPLUS(00000010)/0/READ: socket event 1&lt;/P&gt;&lt;P&gt;Jan 29 15:06:27.774: TPLUS(00000010)/0/READ: Would block while reading&lt;/P&gt;&lt;P&gt;Jan 29 15:06:27.778: TPLUS(00000010)/0/READ: socket event 1&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Jan 29 15:06:27.778: TPLUS(00000010)/0/READ: read 0 bytes&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Jan 29 15:06:29.774: TPLUS(00000010)/0/READ/47823D9C: timed out&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Jan 29 15:06:29.774: TPLUS: Sending AV service=auth-proxy&lt;/P&gt;&lt;P&gt;Jan 29 15:06:29.774: TPLUS: Sending AV protocol=ip&lt;/P&gt;&lt;P&gt;Jan 29 15:06:29.774: TPLUS: Authorization request created for 16(testuser)&lt;/P&gt;&lt;P&gt;Jan 29 15:06:29.774: TPLUS(00000010)/0/READ/47823D9C: timed out, clean up&lt;/P&gt;&lt;P&gt;Jan 29 15:06:29.774: TPLUS(00000010)/0/47823D9C: Processing the reply packet - FAIL&lt;/P&gt;&lt;P&gt;Jan 29 15:06:29.802: AAA/AUTHEN/AUTH-PROXY (00000010): Pick method list 'default' &lt;/P&gt;&lt;P&gt;Jan 29 15:06:29.806: TPLUS: Queuing AAA Authentication request 16 for processing&lt;/P&gt;&lt;P&gt;Jan 29 15:06:29.806: TPLUS: processing authentication start request id 16&lt;/P&gt;&lt;P&gt;Jan 29 15:06:29.806: TPLUS: Authentication start packet created for 16(testuser)&lt;/P&gt;&lt;P&gt;Jan 29 15:06:29.806: TPLUS: Using server 192.168.1.2&lt;/P&gt;&lt;P&gt;Jan 29 15:06:29.810: TPLUS(00000010)/0/NB_WAIT/478F7640: Started 2 sec timeout&lt;/P&gt;&lt;P&gt;Jan 29 15:06:29.810: TPLUS(00000010)/0/NB_WAIT: socket event 2&lt;/P&gt;&lt;P&gt;Jan 29 15:06:29.810: TPLUS(00000010)/0/NB_WAIT: wrote entire 27 bytes request&lt;/P&gt;&lt;P&gt;Jan 29 15:06:29.810: TPLUS(00000010)/0/READ: socket event 1&lt;/P&gt;&lt;P&gt;Jan 29 15:06:29.810: TPLUS(00000010)/0/READ: Would block while reading&lt;/P&gt;&lt;P&gt;Jan 29 15:06:29.814: TPLUS(00000010)/0/READ: socket event 1&lt;/P&gt;&lt;P&gt;Jan 29 15:06:29.814: TPLUS(00000010)/0/READ: read entire 12 header bytes (expect 16 bytes data)&lt;/P&gt;&lt;P&gt;Jan 29 15:06:29.814: TPLUS(00000010)/0/READ: socket event 1&lt;/P&gt;&lt;P&gt;Jan 29 15:06:29.814: TPLUS(00000010)/0/READ: read entire 28 bytes response&lt;/P&gt;&lt;P&gt;Jan 29 15:06:29.814: TPLUS(00000010)/0/478F7640: Processing the reply packet&lt;/P&gt;&lt;P&gt;Jan 29 15:06:29.814: TPLUS: Received authen response status GET_PASSWORD (8)&lt;/P&gt;&lt;P&gt;Jan 29 15:06:29.818: TPLUS: Queuing AAA Authentication request 16 for processing&lt;/P&gt;&lt;P&gt;Jan 29 15:06:29.818: TPLUS: processing authentication continue request id 16&lt;/P&gt;&lt;P&gt;Jan 29 15:06:29.818: TPLUS: Authentication continue packet generated for 16&lt;/P&gt;&lt;P&gt;Jan 29 15:06:29.818: TPLUS(00000010)/0/WRITE/478F7640: Started 2 sec timeout&lt;/P&gt;&lt;P&gt;Jan 29 15:06:29.818: TPLUS(00000010)/0/WRITE: wrote entire 27 bytes request&lt;/P&gt;&lt;P&gt;Jan 29 15:06:29.834: TPLUS(00000010)/0/READ: socket event 1&lt;/P&gt;&lt;P&gt;Jan 29 15:06:29.834: TPLUS(00000010)/0/READ: read entire 12 header bytes (expect 6 bytes data)&lt;/P&gt;&lt;P&gt;Jan 29 15:06:29.834: TPLUS(00000010)/0/READ: socket event 1&lt;/P&gt;&lt;P&gt;Jan 29 15:06:29.834: TPLUS(00000010)/0/READ: read entire 18 bytes response&lt;/P&gt;&lt;P&gt;Jan 29 15:06:29.838: TPLUS(00000010)/0/478F7640: Processing the reply packet&lt;/P&gt;&lt;P&gt;Jan 29 15:06:29.838: TPLUS: Received authen response status PASS (2)&lt;/P&gt;&lt;P&gt;Jan 29 15:06:29.838: AAA/AUTHOR (0x10): Pick method list 'default'&lt;/P&gt;&lt;P&gt;Jan 29 15:06:29.838: TPLUS: Queuing AAA Authorization request 16 for processing&lt;/P&gt;&lt;P&gt;Jan 29 15:06:29.838: TPLUS: processing authorization request id 16&lt;/P&gt;&lt;P&gt;Jan 29 15:06:29.838: TPLUS: Sending AV service=auth-proxy&lt;/P&gt;&lt;P&gt;Jan 29 15:06:29.838: TPLUS: Sending AV protocol=ip&lt;/P&gt;&lt;P&gt;Jan 29 15:06:29.838: TPLUS: Authorization request created for 16(testuser)&lt;/P&gt;&lt;P&gt;Jan 29 15:06:29.838: TPLUS: using previously set server 192.168.1.2 from group TACACS_GRP1&lt;/P&gt;&lt;P&gt;Jan 29 15:06:29.842: TPLUS(00000010)/0/NB_WAIT/478F7640: Started 2 sec timeout&lt;/P&gt;&lt;P&gt;Jan 29 15:06:29.842: TPLUS(00000010)/0/NB_WAIT: socket event 2&lt;/P&gt;&lt;P&gt;Jan 29 15:06:29.842: TPLUS(00000010)/0/NB_WAIT: wrote entire 58 bytes request&lt;/P&gt;&lt;P&gt;Jan 29 15:06:29.842: TPLUS(00000010)/0/READ: socket event 1&lt;/P&gt;&lt;P&gt;Jan 29 15:06:29.842: TPLUS(00000010)/0/READ: Would block while reading&lt;/P&gt;&lt;P&gt;Jan 29 15:06:29.846: TPLUS(00000010)/0/READ: socket event 1&lt;/P&gt;&lt;P&gt;Jan 29 15:06:29.846: TPLUS(00000010)/0/READ: read 0 bytes&lt;/P&gt;&lt;P&gt;Jan 29 15:06:31.838: TPLUS(00000010)/0/READ/478F7640: timed out&lt;/P&gt;&lt;P&gt;Jan 29 15:06:31.838: TPLUS: Sending AV service=auth-proxy&lt;/P&gt;&lt;P&gt;Jan 29 15:06:31.838: TPLUS: Sending AV protocol=ip&lt;/P&gt;&lt;P&gt;Jan 29 15:06:31.838: TPLUS: Authorization request created for 16(testuser)&lt;/P&gt;&lt;P&gt;Jan 29 15:06:31.838: TPLUS(00000010)/0/READ/478F7640: timed out, clean up&lt;/P&gt;&lt;P&gt;Jan 29 15:06:31.838: TPLUS(00000010)/0/478F7640: Processing the reply packet - FAIL&lt;/P&gt;&lt;P&gt;Jan 29 15:06:31.898: AAA/AUTHEN/AUTH-PROXY (00000010): Pick method list 'default' &lt;/P&gt;&lt;P&gt;Jan 29 15:06:31.902: TPLUS: Queuing AAA Authentication request 16 for processing&lt;/P&gt;&lt;P&gt;Jan 29 15:06:31.902: TPLUS: processing authentication start request id 16&lt;/P&gt;&lt;P&gt;Jan 29 15:06:31.902: TPLUS: Authentication start packet created for 16(testuser)&lt;/P&gt;&lt;P&gt;Jan 29 15:06:31.902: TPLUS: Using server 192.168.1.2&lt;/P&gt;&lt;P&gt;Jan 29 15:06:31.906: TPLUS(00000010)/0/NB_WAIT/478F2274: Started 2 sec timeout&lt;/P&gt;&lt;P&gt;Jan 29 15:06:31.906: TPLUS(00000010)/0/NB_WAIT: socket event 2&lt;/P&gt;&lt;P&gt;Jan 29 15:06:31.906: TPLUS(00000010)/0/NB_WAIT: wrote entire 27 bytes request&lt;/P&gt;&lt;P&gt;Jan 29 15:06:31.906: TPLUS(00000010)/0/READ: socket event 1&lt;/P&gt;&lt;P&gt;Jan 29 15:06:31.906: TPLUS(00000010)/0/READ: Would block while reading&lt;/P&gt;&lt;P&gt;Jan 29 15:06:31.910: TPLUS(00000010)/0/READ: socket event 1&lt;/P&gt;&lt;P&gt;Jan 29 15:06:31.910: TPLUS(00000010)/0/READ: read entire 12 header bytes (expect 16 bytes data)&lt;/P&gt;&lt;P&gt;Jan 29 15:06:31.910: TPLUS(00000010)/0/READ: socket event 1&lt;/P&gt;&lt;P&gt;Jan 29 15:06:31.910: TPLUS(00000010)/0/READ: read entire 28 bytes response&lt;/P&gt;&lt;P&gt;Jan 29 15:06:31.910: TPLUS(00000010)/0/478F2274: Processing the reply packet&lt;/P&gt;&lt;P&gt;Jan 29 15:06:31.910: TPLUS: Received authen response status GET_PASSWORD (8)&lt;/P&gt;&lt;P&gt;Jan 29 15:06:31.910: TPLUS: Queuing AAA Authentication request 16 for processing&lt;/P&gt;&lt;P&gt;Jan 29 15:06:31.914: TPLUS: processing authentication continue request id 16&lt;/P&gt;&lt;P&gt;Jan 29 15:06:31.914: TPLUS: Authentication continue packet generated for 16&lt;/P&gt;&lt;P&gt;Jan 29 15:06:31.914: TPLUS(00000010)/0/WRITE/478F2274: Started 2 sec timeout&lt;/P&gt;&lt;P&gt;Jan 29 15:06:31.914: TPLUS(00000010)/0/WRITE: wrote entire 27 bytes request&lt;/P&gt;&lt;P&gt;Jan 29 15:06:31.930: TPLUS(00000010)/0/READ: socket event 1&lt;/P&gt;&lt;P&gt;Jan 29 15:06:31.930: TPLUS(00000010)/0/READ: read entire 12 header bytes (expect 6 bytes data)&lt;/P&gt;&lt;P&gt;Jan 29 15:06:31.934: TPLUS(00000010)/0/READ: socket event 1&lt;/P&gt;&lt;P&gt;Jan 29 15:06:31.934: TPLUS(00000010)/0/READ: read entire 18 bytes response&lt;/P&gt;&lt;P&gt;Jan 29 15:06:31.934: TPLUS(00000010)/0/478F2274: Processing the reply packet&lt;/P&gt;&lt;P&gt;Jan 29 15:06:31.934: TPLUS: Received authen response status PASS (2)&lt;/P&gt;&lt;P&gt;Jan 29 15:06:31.934: AAA/AUTHOR (0x10): Pick method list 'default'&lt;/P&gt;&lt;P&gt;Jan 29 15:06:31.934: TPLUS: Queuing AAA Authorization request 16 for processing&lt;/P&gt;&lt;P&gt;Jan 29 15:06:31.934: TPLUS: processing authorization request id 16&lt;/P&gt;&lt;P&gt;Jan 29 15:06:31.934: TPLUS: Sending AV service=auth-proxy&lt;/P&gt;&lt;P&gt;Jan 29 15:06:31.934: TPLUS: Sending AV protocol=ip&lt;/P&gt;&lt;P&gt;Jan 29 15:06:31.934: TPLUS: Authorization request created for 16(testuser)&lt;/P&gt;&lt;P&gt;Jan 29 15:06:31.934: TPLUS: using previously set server 192.168.1.2 from group TACACS_GRP1&lt;/P&gt;&lt;P&gt;Jan 29 15:06:31.938: TPLUS(00000010)/0/NB_WAIT/478F2274: Started 2 sec timeout&lt;/P&gt;&lt;P&gt;Jan 29 15:06:31.938: TPLUS(00000010)/0/NB_WAIT: socket event 2&lt;/P&gt;&lt;P&gt;Jan 29 15:06:31.938: TPLUS(00000010)/0/NB_WAIT: wrote entire 58 bytes request&lt;/P&gt;&lt;P&gt;Jan 29 15:06:31.938: TPLUS(00000010)/0/READ: socket event 1&lt;/P&gt;&lt;P&gt;Jan 29 15:06:31.938: TPLUS(00000010)/0/READ: Would block while reading&lt;/P&gt;&lt;P&gt;Jan 29 15:06:31.942: TPLUS(00000010)/0/READ: socket event 1&lt;/P&gt;&lt;P&gt;Jan 29 15:06:31.942: TPLUS(00000010)/0/READ: read 0 bytes&lt;/P&gt;&lt;P&gt;Jan 29 15:06:33.938: TPLUS(00000010)/0/READ/478F2274: timed out&lt;/P&gt;&lt;P&gt;Jan 29 15:06:33.938: TPLUS: Sending AV service=auth-proxy&lt;/P&gt;&lt;P&gt;Jan 29 15:06:33.938: TPLUS: Sending AV protocol=ip&lt;/P&gt;&lt;P&gt;Jan 29 15:06:33.938: TPLUS: Authorization request created for 16(testuser)&lt;/P&gt;&lt;P&gt;Jan 29 15:06:33.938: TPLUS(00000010)/0/READ/478F2274: timed out, clean up&lt;/P&gt;&lt;P&gt;Jan 29 15:06:33.938: TPLUS(00000010)/0/478F2274: Processing the reply packet - FAIL&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've bolded (above) where the problem is and hoping someone much smarter can tell me why it's failing and of course a solution.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've tried three different routers to eliminate possible hardware issues.&amp;nbsp; Started fresh with a clean slate with no config and then rebuilt it from scratch.&amp;nbsp; Same results.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ACS 5.4 authorization reports this: &lt;/P&gt;&lt;P&gt;&lt;A href="https://10.2.22.20/avreports/servlet/GenericRedirector?command=submit&amp;amp;__requesttype=immediate&amp;amp;invokeSubmit=true&amp;amp;__executableName=%2Fhome%2Feva2908%2FFailure_Reason%2FAuthentication_Failure_Code_Lookup.rptdesign&amp;amp;rptFailureReason=13011+Invalid+TACACS%2B+request+packet+-+possibly+mismatched+Shared+Secrets&amp;amp;__locale=en_US&amp;amp;iportalID=SNFLOWOX&amp;amp;__masterpage=false&amp;amp;__newWindow=false" style="display: block; color: #ff0000;" target="_self"&gt;13011 Invalid TACACS+ request packet - possibly mismatched Shared Secrets&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But, before anyone pinpoints that as the issue - it's NOT!&amp;nbsp; I know what I have typed in and it matches perfectly 100%. Besides, I can take the code to 15.0 with the EXACT same config and it works just fine on ACS 5.4 (and 4.2)&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 04:20:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/authentication-passed-authorization-failed-ios-bug/m-p/2394281#M88387</guid>
      <dc:creator>Eric Varner</dc:creator>
      <dc:date>2019-03-11T04:20:19Z</dc:date>
    </item>
    <item>
      <title>Authentication passed - authorization failed - IOS bug?</title>
      <link>https://community.cisco.com/t5/network-access-control/authentication-passed-authorization-failed-ios-bug/m-p/2394282#M88390</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Eric,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Would you be able to capture the traffic between the router and ACS? Ideally you'd get two captures, one with each version of IOS, so we can compare both.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We will need the TACACS+ shared key to decode the packet capture, so you may want to make that something trivial while testing (ie, not something you're using on your production routers).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you prefer, you can send me the packet capture and shared key directly, and we can summarize our findings here for the benefit of anyone else who might be following this thread.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Javier Henderson&lt;/P&gt;&lt;P&gt;Cisco Systems&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 29 Jan 2014 23:31:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/authentication-passed-authorization-failed-ios-bug/m-p/2394282#M88390</guid>
      <dc:creator>Javier Henderson</dc:creator>
      <dc:date>2014-01-29T23:31:42Z</dc:date>
    </item>
    <item>
      <title>Authentication passed - authorization failed - IOS bug?</title>
      <link>https://community.cisco.com/t5/network-access-control/authentication-passed-authorization-failed-ios-bug/m-p/2394283#M88397</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Javier,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Not a problem and will get the captures to you ASAP (with non-production shared key).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 30 Jan 2014 12:59:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/authentication-passed-authorization-failed-ios-bug/m-p/2394283#M88397</guid>
      <dc:creator>Eric Varner</dc:creator>
      <dc:date>2014-01-30T12:59:32Z</dc:date>
    </item>
    <item>
      <title>Authentication passed - authorization failed - IOS bug?</title>
      <link>https://community.cisco.com/t5/network-access-control/authentication-passed-authorization-failed-ios-bug/m-p/2394284#M88401</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Please go through the link below may help you to touble shooting for the router with version 15&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.cisco.com/en/US/products/ps9911/products_tech_note09186a0080bb8100.shtml#p47"&gt;http://www.cisco.com/en/US/products/ps9911/products_tech_note09186a0080bb8100.shtml#p47&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Problem: TACACS+ Auth-Proxy authentication is not working on a router running IOS 15.x from ACS 5.x server &lt;BR /&gt;TACACS+ Auth-Proxy authentication is not working on a router that runs Cisco IOS Software Release 15.x from an ACS 5.x server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Solution &lt;BR /&gt;TACACS+ Auth-Proxy is only supported after ACS 5.3 patch 5. Upgrade your ACS 5.x, or use RADIUS for Auth-Proxy.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 30 Jan 2014 22:48:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/authentication-passed-authorization-failed-ios-bug/m-p/2394284#M88401</guid>
      <dc:creator>blenka</dc:creator>
      <dc:date>2014-01-30T22:48:42Z</dc:date>
    </item>
    <item>
      <title>Authentication passed - authorization failed - IOS bug?</title>
      <link>https://community.cisco.com/t5/network-access-control/authentication-passed-authorization-failed-ios-bug/m-p/2394285#M88405</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Thank you for the reply.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We are using an ACS appliance Build ID: B.221&amp;nbsp; with Patches: 5-4-0-46-5&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Not sure what upgrade other than what we are at is available??&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Authentications works great! &lt;STRONG&gt; Authorizaton&lt;/STRONG&gt; fails!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;IOS 15.0.x works fine with the above ACS appliance.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;IOS 15.1.x&amp;nbsp; does not work with the above ACS appliance (authorization fails)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please check again (I've already sent the packet captures to Javier).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 31 Jan 2014 12:59:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/authentication-passed-authorization-failed-ios-bug/m-p/2394285#M88405</guid>
      <dc:creator>Eric Varner</dc:creator>
      <dc:date>2014-01-31T12:59:13Z</dc:date>
    </item>
    <item>
      <title>Authentication passed - authorization failed - IOS bug?</title>
      <link>https://community.cisco.com/t5/network-access-control/authentication-passed-authorization-failed-ios-bug/m-p/2394286#M88409</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Do you really use AAA cache feature? What kind of service do you provide with TACACS? Can you post your config?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 31 Jan 2014 19:48:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/authentication-passed-authorization-failed-ios-bug/m-p/2394286#M88409</guid>
      <dc:creator>Peter Koltl</dc:creator>
      <dc:date>2014-01-31T19:48:28Z</dc:date>
    </item>
    <item>
      <title>Authentication passed - authorization failed - IOS bug?</title>
      <link>https://community.cisco.com/t5/network-access-control/authentication-passed-authorization-failed-ios-bug/m-p/2394287#M88411</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This is as much as I can provide.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa group server tacacs+ TACACS_GRP1&lt;/P&gt;&lt;P&gt; server 10.x.x.x&lt;/P&gt;&lt;P&gt; server 204.x.x.x.x&lt;/P&gt;&lt;P&gt; server 204.x.x.x&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;aaa authentication login default local group TACACS_GRP1 enable&lt;/P&gt;&lt;P&gt;aaa authentication login &lt;NAME&gt; local group TACACS_GRP1 enable&lt;/NAME&gt;&lt;/P&gt;&lt;P&gt;aaa authentication login no_tacacs enable&lt;/P&gt;&lt;P&gt;aaa authorization exec default group TACACS_GRP1 &lt;/P&gt;&lt;P&gt;aaa authorization commands 15 default if-authenticated &lt;/P&gt;&lt;P&gt;aaa authorization auth-proxy default group TACACS_GRP1 &lt;/P&gt;&lt;P&gt;aaa accounting exec default start-stop group TACACS_GRP1&lt;/P&gt;&lt;P&gt;aaa accounting commands 0 default start-stop group TACACS_GRP1&lt;/P&gt;&lt;P&gt;aaa accounting commands 1 default start-stop group TACACS_GRP1&lt;/P&gt;&lt;P&gt;aaa accounting commands 15 default start-stop group TACACS_GRP1&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;aaa session-id common&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;dot11 syslog&lt;/P&gt;&lt;P&gt;no ip source-route&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ip cef&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;no ip bootp server&lt;/P&gt;&lt;P&gt;no ip domain lookup&lt;/P&gt;&lt;P&gt;ip domain name &lt;DOMAIN name=""&gt;&lt;/DOMAIN&gt;&lt;/P&gt;&lt;P&gt;ip name-server 10.x.x.x&lt;/P&gt;&lt;P&gt;ip auth-proxy auth-proxy-banner http ^Clash:acs.htm ^C&lt;/P&gt;&lt;P&gt;ip auth-proxy auth-proxy-audit&lt;/P&gt;&lt;P&gt;ip auth-proxy inactivity-timer 10&lt;/P&gt;&lt;P&gt;ip auth-proxy absolute-timer 720&lt;/P&gt;&lt;P&gt;ip auth-proxy name ACS http inactivity-time 60 list AUTH_TRAFFIC&lt;/P&gt;&lt;P&gt;ip admission auth-proxy-banner http ^Clash:acs.htm ^C&lt;/P&gt;&lt;P&gt;ip admission auth-proxy-audit&lt;/P&gt;&lt;P&gt;ip admission inactivity-timer 10&lt;/P&gt;&lt;P&gt;ip admission absolute-timer 720&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;multilink bundle-name authenticated&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/0&lt;/P&gt;&lt;P&gt; description LAN&lt;/P&gt;&lt;P&gt; ip address x.x.x.x 255.255.252.0&lt;/P&gt;&lt;P&gt; ip access-group ACS_USERS in&lt;/P&gt;&lt;P&gt; ip helper-address x.x.x.x&lt;/P&gt;&lt;P&gt; ip helper-address x.x.x.x&lt;/P&gt;&lt;P&gt; no ip redirects&lt;/P&gt;&lt;P&gt; no ip unreachables&lt;/P&gt;&lt;P&gt; no ip proxy-arp&lt;/P&gt;&lt;P&gt; ip accounting output-packets&lt;/P&gt;&lt;P&gt; ip auth-proxy ACS&lt;/P&gt;&lt;P&gt; ip policy route-map Traffic&lt;/P&gt;&lt;P&gt; duplex auto&lt;/P&gt;&lt;P&gt; speed auto&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/1&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; duplex auto&lt;/P&gt;&lt;P&gt; speed auto&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ip forward-protocol nd&lt;/P&gt;&lt;P&gt;ip route 0.0.0.0 0.0.0.0 x.x.x.x&lt;/P&gt;&lt;P&gt;ip http server&lt;/P&gt;&lt;P&gt;ip http authentication aaa login-authentication default&lt;/P&gt;&lt;P&gt;ip http authentication aaa exec-authorization default&lt;/P&gt;&lt;P&gt;no ip http secure-server&lt;/P&gt;&lt;P&gt;ip http timeout-policy idle 60 life 86400 requests 10000&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ip tacacs source-interface GigabitEthernet0/0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ip access-list extended AUTH_TRAFFIC&lt;/P&gt;&lt;P&gt; permit ip 10.0.0.0 0.255.255.255 host x.x.x.x&lt;/P&gt;&lt;P&gt; permit ip 10.0.0.0 0.255.255.255 x.x.x.x. 0.255.255.255&lt;/P&gt;&lt;P&gt; permit ip 10.0.0.0 0.255.255.255 x.x.x.x 0.0.255.255&lt;/P&gt;&lt;P&gt;ip access-list extended ACS_USERS&lt;/P&gt;&lt;P&gt; permit icmp any any&lt;/P&gt;&lt;P&gt; permit udp any eq bootpc any&lt;/P&gt;&lt;P&gt; permit tcp any any established&lt;/P&gt;&lt;P&gt; permit udp any any eq domain&lt;/P&gt;&lt;P&gt; permit tcp any any eq domain&lt;/P&gt;&lt;P&gt; permit udp any any eq snmptrap&lt;/P&gt;&lt;P&gt; permit ip host x.x.x.10 any&lt;/P&gt;&lt;P&gt; permit ip host x.x.x.11 any&lt;/P&gt;&lt;P&gt; permit ip host x.x.x.2 any&lt;/P&gt;&lt;P&gt; permit ip host x.x.x.33 any&lt;/P&gt;&lt;P&gt; permit ip host x.x.x.52 host x.x.x.x&lt;/P&gt;&lt;P&gt; permit ip host x.x.x.50 host x.x.x.x&lt;/P&gt;&lt;P&gt; permit ip host x.x.x.51 host x.x.x.x&lt;/P&gt;&lt;P&gt; permit ip host x.x.x.47 any&lt;/P&gt;&lt;P&gt; permit ip host x.x.x.5 any&lt;/P&gt;&lt;P&gt; permit ip host x.x.x.97 any&lt;/P&gt;&lt;P&gt; permit ip host x.x.x.100 any&lt;/P&gt;&lt;P&gt; permit ip host x.x.x.101 any&lt;/P&gt;&lt;P&gt; permit ip host x.x.x.102 any&lt;/P&gt;&lt;P&gt; permit ip host x.x.x.3 any&lt;/P&gt;&lt;P&gt; permit ip host x.x.x.193 any&lt;/P&gt;&lt;P&gt; permit ip host x.x.x.65 any&lt;/P&gt;&lt;P&gt; permit ip host x.x.x.4 any&lt;/P&gt;&lt;P&gt; permit ip host x.x.x.9 any&lt;/P&gt;&lt;P&gt; permit ip host x.x.x.8 any&lt;/P&gt;&lt;P&gt; deny&amp;nbsp;&amp;nbsp; ip any any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;tacacs-server host 10.x.x.x single-connection&lt;/P&gt;&lt;P&gt;tacacs-server host 204.x.x.x. single-connection&lt;/P&gt;&lt;P&gt;tacacs-server host 204.x.x.x single-connection&lt;/P&gt;&lt;P&gt;tacacs-server directed-request&lt;/P&gt;&lt;P&gt;tacacs-server key 123456&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;_______&lt;/P&gt;&lt;P&gt;Been using this type config to authenticate/authorize end-users for 10yrs.&amp;nbsp; Older code will work with ACS 5.4, but 15.1 code will not work.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 31 Jan 2014 20:36:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/authentication-passed-authorization-failed-ios-bug/m-p/2394287#M88411</guid>
      <dc:creator>Eric Varner</dc:creator>
      <dc:date>2014-01-31T20:36:27Z</dc:date>
    </item>
    <item>
      <title>Authentication passed - authorization failed - IOS bug?</title>
      <link>https://community.cisco.com/t5/network-access-control/authentication-passed-authorization-failed-ios-bug/m-p/2394288#M88413</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Need someone from Cisco to repond via PM with a valid e-mail address so I can send the packet captures.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 03 Feb 2014 16:00:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/authentication-passed-authorization-failed-ios-bug/m-p/2394288#M88413</guid>
      <dc:creator>Eric Varner</dc:creator>
      <dc:date>2014-02-03T16:00:32Z</dc:date>
    </item>
    <item>
      <title>Authentication passed - authorization failed - IOS bug?</title>
      <link>https://community.cisco.com/t5/network-access-control/authentication-passed-authorization-failed-ios-bug/m-p/2394289#M88414</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;PM sent.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Javier Henderson&lt;/P&gt;&lt;P&gt;Cisco Systems&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 03 Feb 2014 16:07:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/authentication-passed-authorization-failed-ios-bug/m-p/2394289#M88414</guid>
      <dc:creator>Javier Henderson</dc:creator>
      <dc:date>2014-02-03T16:07:53Z</dc:date>
    </item>
  </channel>
</rss>

