<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: aaa new-model in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/aaa-new-model/m-p/4058652#M1068718</link>
    <description>I appreciate both suggestions.&lt;BR /&gt;&lt;BR /&gt;Thanks again!</description>
    <pubDate>Fri, 03 Apr 2020 18:55:25 GMT</pubDate>
    <dc:creator>BigK</dc:creator>
    <dc:date>2020-04-03T18:55:25Z</dc:date>
    <item>
      <title>aaa new-model</title>
      <link>https://community.cisco.com/t5/network-security/aaa-new-model/m-p/4058594#M1068707</link>
      <description>&lt;P&gt;Hello,&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;what is the suggested method to configure aaa new-model and 802.x on a remote router without locking myself out of the router and if I did lock myself, what is the process to recover and access the device again.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Here is my current config&amp;nbsp;&lt;/P&gt;&lt;P&gt;aaa new-model&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;aaa group server tacacs+ TACACS-GROUP&lt;BR /&gt;server name SITE1-ISE1&lt;BR /&gt;server name SITE2-ISE2&lt;BR /&gt;!&lt;BR /&gt;aaa authentication password-prompt TACACS.server.failed-Use.enable.password:&lt;BR /&gt;aaa authentication login default group TACACS-GROUP local-case enable&lt;BR /&gt;aaa authentication enable default group TACACS-GROUP enable&lt;BR /&gt;aaa authorization console&lt;BR /&gt;aaa authorization config-commands&lt;BR /&gt;aaa authorization exec default group TACACS-GROUP local&lt;BR /&gt;aaa authorization commands 15 default group TACACS-GROUP local&lt;BR /&gt;aaa accounting exec default start-stop group TACACS-GROUP&lt;BR /&gt;aaa accounting commands 15 default start-stop group TACACS-GROUP&lt;BR /&gt;aaa accounting network default start-stop group TACACS-GROUP&lt;BR /&gt;aaa accounting connection default start-stop group TACACS-GROUP&lt;BR /&gt;aaa accounting system default start-stop group TACACS-GROUP&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;line con 0&lt;BR /&gt;password 7 05080F1C9961&lt;BR /&gt;logging synchronous&lt;BR /&gt;transport output none&lt;BR /&gt;stopbits 1&lt;/P&gt;&lt;P&gt;line vty 0 15&lt;BR /&gt;password 7 124D4&lt;BR /&gt;logging synchronous&lt;BR /&gt;transport input ssh&lt;BR /&gt;transport output all&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks !&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 03 Apr 2020 18:38:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/aaa-new-model/m-p/4058594#M1068707</guid>
      <dc:creator>BigK</dc:creator>
      <dc:date>2020-04-03T18:38:04Z</dc:date>
    </item>
    <item>
      <title>Re: aaa new-model</title>
      <link>https://community.cisco.com/t5/network-security/aaa-new-model/m-p/4058605#M1068710</link>
      <description>&lt;P&gt;As Long as you are not saved the configuration, some one can reboot the device you can still able to Login using Local username and password.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;you can have 2 Open Session one you can try with radius and one open already with Local account.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 03 Apr 2020 18:14:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/aaa-new-model/m-p/4058605#M1068710</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2020-04-03T18:14:34Z</dc:date>
    </item>
    <item>
      <title>Re: aaa new-model</title>
      <link>https://community.cisco.com/t5/network-security/aaa-new-model/m-p/4058631#M1068715</link>
      <description>&lt;P&gt;Thanks BB.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am planning on sending the router with aaa config and saved config. any other suggestions?&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 03 Apr 2020 18:36:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/aaa-new-model/m-p/4058631#M1068715</guid>
      <dc:creator>BigK</dc:creator>
      <dc:date>2020-04-03T18:36:06Z</dc:date>
    </item>
    <item>
      <title>Re: aaa new-model</title>
      <link>https://community.cisco.com/t5/network-security/aaa-new-model/m-p/4058645#M1068717</link>
      <description>Hi,&lt;BR /&gt;Ideally you should test the configuration on a local device, but...&lt;BR /&gt;&lt;BR /&gt;Before you make the changes use the "reload in X" command, which would reload the device in X minutes if you were to be locked out. Open a new ssh connection (don't close the old session), test the changes work as expected then cancel the reload command using "reload cancel". If you were to have issues and you were locked out you just need to wait until the reload command reboots the router and it reloads - obviously don't save the the configuration until you confirms it works as expected.&lt;BR /&gt;&lt;BR /&gt;HTH</description>
      <pubDate>Fri, 03 Apr 2020 18:49:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/aaa-new-model/m-p/4058645#M1068717</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2020-04-03T18:49:16Z</dc:date>
    </item>
    <item>
      <title>Re: aaa new-model</title>
      <link>https://community.cisco.com/t5/network-security/aaa-new-model/m-p/4058652#M1068718</link>
      <description>I appreciate both suggestions.&lt;BR /&gt;&lt;BR /&gt;Thanks again!</description>
      <pubDate>Fri, 03 Apr 2020 18:55:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/aaa-new-model/m-p/4058652#M1068718</guid>
      <dc:creator>BigK</dc:creator>
      <dc:date>2020-04-03T18:55:25Z</dc:date>
    </item>
    <item>
      <title>Re: aaa new-model</title>
      <link>https://community.cisco.com/t5/network-security/aaa-new-model/m-p/4058892#M1068727</link>
      <description>&lt;P&gt;hi,&lt;/P&gt;&lt;P&gt;is this a new device or already in production?&lt;/P&gt;&lt;P&gt;don't forget these lines:&lt;/P&gt;&lt;P&gt;&lt;EM&gt;tacacs-server host TACACS-1&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;tacacs-server host TACACS-2&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;tacacs-server directed-request&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;tacacs-server key &amp;lt;KEY STRING&amp;gt;&lt;/EM&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 04 Apr 2020 04:13:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/aaa-new-model/m-p/4058892#M1068727</guid>
      <dc:creator>johnlloyd_13</dc:creator>
      <dc:date>2020-04-04T04:13:00Z</dc:date>
    </item>
    <item>
      <title>Re: aaa new-model</title>
      <link>https://community.cisco.com/t5/network-security/aaa-new-model/m-p/4058948#M1068729</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp;I understand that you want to remotely enable AAA, without loosing access to the device, completely. I've done some changes to your config, explained below:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;1. Ensure you have your TACACS servers defined as below:&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;tacacs server SITE1-ISE1&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp;&lt;/SPAN&gt;address ipv4 x.x.x.x&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp;&lt;/SPAN&gt;key xxx&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;!&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;tacacs server SITE2-ISE2&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp;&lt;/SPAN&gt;address ipv4 x.x.x.x&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp;&lt;/SPAN&gt;key xxx&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;aaa group server tacacs+ TACACS-GROUP&lt;/SPAN&gt;&lt;BR /&gt;&amp;nbsp;ip tacacs source-interface xxx&amp;nbsp;&lt;STRONG&gt;(ensure to hardcode this,&amp;nbsp;otherwise, depending on your routing design, it may happen that the&amp;nbsp;device uses different source IP's to speak with&amp;nbsp;the TACACS server and it's&amp;nbsp;gonna get rejected)&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;2. If you would use "non-default" AAA lists, you would not loose access at all. With "default" AAA list follow this order of commands:&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;aaa new-model&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;tacacs server SITE1-ISE1&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp;&lt;/SPAN&gt;address ipv4 1.1.1.1&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp;&lt;/SPAN&gt;key xxx&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;!&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;tacacs server SITE2-ISE2&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp;&lt;/SPAN&gt;address ipv4 2.2.2.2&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp;&lt;/SPAN&gt;key xxx&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;aaa group server tacacs+ TACACS-GROUP&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;!&lt;BR /&gt;aaa group server tacacs+ TACACS-GROUP&lt;BR /&gt;server name SITE1-ISE1&lt;BR /&gt;server name SITE2-ISE2&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;BR /&gt;At this point stop and use the "test aaa group&amp;nbsp;&lt;SPAN&gt;TACACS-GROUP server 1.1.1.1 xyz xyz legacy" and "test aaa group&amp;nbsp;TACACS-GROUP server 2.2.2.2 xyz xyz legacy". If authentication is not successful, fix the TACACS integration configuration and move on only after having this functional.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;!&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;!&lt;BR /&gt;!&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;aaa authentication password-prompt TACACS.server.failed-Use.enable.password:&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;aaa authentication login default group TACACS-GROUP local-case enable&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;aaa authentication enable default group TACACS-GROUP enable&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;aaa authorization console&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;aaa authorization commands 15 default group TACACS-GROUP local&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;aaa accounting exec default start-stop group TACACS-GROUP&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;aaa accounting commands 15 default start-stop group TACACS-GROUP&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;aaa accounting network default start-stop group TACACS-GROUP&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;aaa accounting connection default start-stop group TACACS-GROUP&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;aaa accounting system default start-stop group TACACS-GROUP&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;aaa authorization exec default group TACACS-GROUP local&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;aaa authorization config-commands&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;You should not loose access, but you would reconnect in order to authenticate and test now the TACACS functionality.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Cristian Matei.&lt;/P&gt;</description>
      <pubDate>Sat, 04 Apr 2020 09:00:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/aaa-new-model/m-p/4058948#M1068729</guid>
      <dc:creator>Cristian Matei</dc:creator>
      <dc:date>2020-04-04T09:00:43Z</dc:date>
    </item>
  </channel>
</rss>

