<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic If you have an Cisco ACS 5.x, in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/local-login-when-tacacs-is-up/m-p/2478965#M90280</link>
    <description>&lt;P&gt;If you have an Cisco ACS 5.x, if you find a way to push your requests to a particular access service, you can go to the service--&amp;gt;identity and there open up the advanced options.&lt;/P&gt;&lt;P&gt;In there, there is an option to drop the request when the authentication will fail, if you do this.&lt;/P&gt;&lt;P&gt;In case of the authentication failure, instead of a reject, ACS will drop he packet, therefore replicating a "server not responding" scenario.&lt;/P&gt;&lt;P&gt;Eventually, you will fallback to local at the switch side and this will get you what you want.&lt;/P&gt;&lt;P&gt;Rate if Useful &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Sharing knowledge makes you Immortal.&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Ed&lt;/P&gt;</description>
    <pubDate>Thu, 29 May 2014 07:01:24 GMT</pubDate>
    <dc:creator>edwardcollins7</dc:creator>
    <dc:date>2014-05-29T07:01:24Z</dc:date>
    <item>
      <title>Local login when tacacs is up</title>
      <link>https://community.cisco.com/t5/network-access-control/local-login-when-tacacs-is-up/m-p/2478962#M90277</link>
      <description>&lt;P&gt;I have my switch configured for tacas then local:&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; aaa authentication login default group MYGROUP local&lt;/P&gt;&lt;P&gt;And that works fine -- I can log in via tacas, and when the servers are down, I can log in via a local account.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;However, is it possible to use local if you fail tacacs authentication? &amp;nbsp;For example the servers are up, but rejecting all authentication? &amp;nbsp;I'd like it to check local credentials if it gets an access denied from tacacs.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 04:45:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/local-login-when-tacacs-is-up/m-p/2478962#M90277</guid>
      <dc:creator>billmatthews</dc:creator>
      <dc:date>2019-03-11T04:45:22Z</dc:date>
    </item>
    <item>
      <title>However, is it possible to</title>
      <link>https://community.cisco.com/t5/network-access-control/local-login-when-tacacs-is-up/m-p/2478963#M90278</link>
      <description>&lt;P&gt;However, is it possible to use local if you fail tacacs authentication?&lt;/P&gt;&lt;P&gt;is not possible, as the server will send an Reject message with failed auth and the device will not fallback to next method in case of reject.&lt;/P&gt;&lt;P&gt;Now, there is still slight catch with Cisco Tacacs+ server, if you have one, I can show you that.&lt;/P&gt;&lt;P&gt;Rate if Useful &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Sharing knowledge makes you Immortal.&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Ed&lt;/P&gt;</description>
      <pubDate>Wed, 28 May 2014 15:03:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/local-login-when-tacacs-is-up/m-p/2478963#M90278</guid>
      <dc:creator>edwardcollins7</dc:creator>
      <dc:date>2014-05-28T15:03:15Z</dc:date>
    </item>
    <item>
      <title>Not possible unless the</title>
      <link>https://community.cisco.com/t5/network-access-control/local-login-when-tacacs-is-up/m-p/2478964#M90279</link>
      <description>&lt;P&gt;Not possible unless the servers are down/unreachable.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Ed, I am interested to know about the "catch" that you are talking about &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; I have a TACACS+ server so pls share!&lt;/P&gt;</description>
      <pubDate>Wed, 28 May 2014 18:41:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/local-login-when-tacacs-is-up/m-p/2478964#M90279</guid>
      <dc:creator>nspasov</dc:creator>
      <dc:date>2014-05-28T18:41:29Z</dc:date>
    </item>
    <item>
      <title>If you have an Cisco ACS 5.x,</title>
      <link>https://community.cisco.com/t5/network-access-control/local-login-when-tacacs-is-up/m-p/2478965#M90280</link>
      <description>&lt;P&gt;If you have an Cisco ACS 5.x, if you find a way to push your requests to a particular access service, you can go to the service--&amp;gt;identity and there open up the advanced options.&lt;/P&gt;&lt;P&gt;In there, there is an option to drop the request when the authentication will fail, if you do this.&lt;/P&gt;&lt;P&gt;In case of the authentication failure, instead of a reject, ACS will drop he packet, therefore replicating a "server not responding" scenario.&lt;/P&gt;&lt;P&gt;Eventually, you will fallback to local at the switch side and this will get you what you want.&lt;/P&gt;&lt;P&gt;Rate if Useful &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Sharing knowledge makes you Immortal.&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Ed&lt;/P&gt;</description>
      <pubDate>Thu, 29 May 2014 07:01:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/local-login-when-tacacs-is-up/m-p/2478965#M90280</guid>
      <dc:creator>edwardcollins7</dc:creator>
      <dc:date>2014-05-29T07:01:24Z</dc:date>
    </item>
    <item>
      <title> </title>
      <link>https://community.cisco.com/t5/network-access-control/local-login-when-tacacs-is-up/m-p/2478966#M90281</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="pB1_Body1"&gt;&lt;SPAN style="font-size: small;"&gt;&lt;SPAN style="font-family: Times New Roman;"&gt;Suppose the system administrator has decided on a security solution where all interfaces will use the same authentication methods to authenticate PPP connections. In the RADIUS group, R1 is contacted first for authentication information, then if there is no response, R2 is contacted. If R2 does not respond, T1 in the TACACS+ group is contacted; if T1 does not respond, T2 is contacted. If all designated servers fail to respond, authentication falls to the local username database on the access server itself. To implement this solution, the system administrator would create a default method list by entering the following command:&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;A name="wp1000947"&gt;&lt;/A&gt;&lt;/P&gt;
&lt;P class="pB1_Body1"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="pB1_Body1"&gt;&lt;A name="wp1000947"&gt;&lt;SPAN style="font-size: small;"&gt;&lt;SPAN style="font-family: Times New Roman;"&gt;aaa authentication ppp default group radius group tacacs+ local &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;
&lt;DIV class="pPreformatted"&gt;
&lt;PRE class="pPreformatted"&gt;

&amp;nbsp;&lt;/PRE&gt;
&lt;/DIV&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="pB1_Body1"&gt;&lt;SPAN style="font-size: small;"&gt;&lt;SPAN style="font-family: Times New Roman;"&gt;In this example, "default" is the name of the method list. The protocols included in this method list are listed after the name, in the order they are to be queried. The default list is automatically applied to all interfaces. &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="pB1_Body1"&gt;&lt;SPAN style="font-size: small;"&gt;&lt;SPAN style="font-family: Times New Roman;"&gt;When a remote user attempts to dial in to the network, the network access server first queries R1 for authentication information. If R1 authenticates the user, it issues a PASS response to the network access server and the user is allowed to access the network. If R1 returns a FAIL response, the user is denied access and the session is terminated. If R1 does not respond, then the network access server processes that as an ERROR and queries R2 for authentication information. This pattern would continue through the remaining designated methods until the user is either authenticated or rejected, or until the session is terminated.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="pB1_Body1"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="pB1_Body1"&gt;&lt;A _fcksavedurl="http://www.cisco.com/c/en/us/td/docs/ios/12_2/security/configuration/guide/fsecur_c/scfathen.html" href="http://www.cisco.com/c/en/us/td/docs/ios/12_2/security/configuration/guide/fsecur_c/scfathen.html" name="wp1000951"&gt;&lt;SPAN style="font-size: small;"&gt;&lt;SPAN style="font-family: Times New Roman;"&gt;It is important to remember that a FAIL response is significantly different from an ERROR. A FAIL means that the user has not met the criteria contained in the applicable authentication database to be successfully authenticated. Authentication ends with a FAIL response. An ERROR means that the security server has not responded to an authentication query. Because of this, no authentication has been attempted. Only when an ERROR is detected will AAA select the next authentication method defined in the authentication method list.&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;
&lt;P class="pB1_Body1"&gt;&lt;SPAN style="font-size: small;"&gt;&lt;SPAN style="font-family: Times New Roman;"&gt;Suppose the system administrator wants to apply a method list only to a particular interface or set of interfaces. In this case, the system administrator creates a named method list and then applies this named list to the applicable interfaces. The following example shows how the system administrator can implement an authentication method that will be applied only to interface 3: &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;DIV class="pEx1_Example1"&gt;
&lt;PRE&gt;
&lt;SPAN style="font-size: small;"&gt;&lt;SPAN style="font-family: Times New Roman;"&gt;aaa authentication ppp default group radius group tacacs+ local
&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/PRE&gt;
&lt;/DIV&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;DIV class="pEx1_Example1"&gt;
&lt;PRE&gt;
&lt;SPAN style="font-size: small;"&gt;&lt;SPAN style="font-family: Times New Roman;"&gt;aaa authentication ppp apple group radius group tacacs+ local none
&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/PRE&gt;
&lt;/DIV&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;DIV class="pEx1_Example1"&gt;
&lt;PRE&gt;
&lt;SPAN style="font-size: small;"&gt;&lt;SPAN style="font-family: Times New Roman;"&gt;&amp;nbsp;interface async 3
&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/PRE&gt;
&lt;/DIV&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;DIV class="pEx1_Example1"&gt;
&lt;PRE&gt;
&lt;SPAN style="font-size: small;"&gt;&lt;SPAN style="font-family: Times New Roman;"&gt;&amp;nbsp;ppp authentication chap apple
&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/PRE&gt;
&lt;/DIV&gt;
&lt;DIV class="pPreformatted"&gt;
&lt;PRE class="pPreformatted"&gt;

&amp;nbsp;&lt;/PRE&gt;
&lt;/DIV&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="pB1_Body1"&gt;&lt;SPAN style="font-size: small;"&gt;&lt;SPAN style="font-family: Times New Roman;"&gt;In this example, "apple" is the name of the method list, and the protocols included in this method list are listed after the name in the order in which they are to be performed. After the method list has been created, it is applied to the appropriate interface. Note that the method list name (apple) in both the AAA&lt;B class="cBold"&gt; &lt;/B&gt;and PPP authentication commands must match. &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;A href="http://www.cisco.com/c/en/us/td/docs/ios/12_2/security/configuration/guide/fsecur_c/scfathen.html"&gt;http://www.cisco.com/c/en/us/td/docs/ios/12_2/security/configuration/guide/fsecur_c/scfathen.html&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 29 May 2014 10:07:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/local-login-when-tacacs-is-up/m-p/2478966#M90281</guid>
      <dc:creator>mohanak</dc:creator>
      <dc:date>2014-05-29T10:07:01Z</dc:date>
    </item>
    <item>
      <title>Great advice, thanks all</title>
      <link>https://community.cisco.com/t5/network-access-control/local-login-when-tacacs-is-up/m-p/2478967#M90282</link>
      <description>&lt;P&gt;Great advice, thanks all&lt;/P&gt;</description>
      <pubDate>Thu, 29 May 2014 14:22:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/local-login-when-tacacs-is-up/m-p/2478967#M90282</guid>
      <dc:creator>billmatthews</dc:creator>
      <dc:date>2014-05-29T14:22:38Z</dc:date>
    </item>
    <item>
      <title>Pretty cool. Thank you for</title>
      <link>https://community.cisco.com/t5/network-access-control/local-login-when-tacacs-is-up/m-p/2478968#M90283</link>
      <description>&lt;P&gt;Pretty cool. Thank you for sharing! (+5 from me)&lt;/P&gt;</description>
      <pubDate>Thu, 29 May 2014 17:38:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/local-login-when-tacacs-is-up/m-p/2478968#M90283</guid>
      <dc:creator>nspasov</dc:creator>
      <dc:date>2014-05-29T17:38:41Z</dc:date>
    </item>
    <item>
      <title>Awesome :)</title>
      <link>https://community.cisco.com/t5/network-access-control/local-login-when-tacacs-is-up/m-p/2478969#M90284</link>
      <description>&lt;P&gt;Awesome &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 30 May 2014 06:57:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/local-login-when-tacacs-is-up/m-p/2478969#M90284</guid>
      <dc:creator>edwardcollins7</dc:creator>
      <dc:date>2014-05-30T06:57:57Z</dc:date>
    </item>
  </channel>
</rss>

