<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Unable to acces a Switch through SSH in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/unable-to-acces-a-switch-through-ssh/m-p/4087511#M1070304</link>
    <description>&lt;P&gt;Hi everyone!&lt;/P&gt;&lt;P&gt;I have this switch with a username called "Backup" with default priviledges, then i applied TACACS and worked, i can access trough usernames declared in tacacs server or through the Backup user cofnigured locally.&lt;/P&gt;&lt;P&gt;Then i wanted to configure a new user called "david" like this:&lt;/P&gt;&lt;P&gt;username david secret [Password]&lt;/P&gt;&lt;P&gt;but when i try to access through SSH with the user david i can't access, it says Access denied...&lt;/P&gt;&lt;P&gt;So my question is, why the user "Backup" can access, but "David" cannot? They are configured the same way&lt;/P&gt;</description>
    <pubDate>Sun, 17 May 2020 22:02:00 GMT</pubDate>
    <dc:creator>David Calvillo</dc:creator>
    <dc:date>2020-05-17T22:02:00Z</dc:date>
    <item>
      <title>Unable to acces a Switch through SSH</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-acces-a-switch-through-ssh/m-p/4087511#M1070304</link>
      <description>&lt;P&gt;Hi everyone!&lt;/P&gt;&lt;P&gt;I have this switch with a username called "Backup" with default priviledges, then i applied TACACS and worked, i can access trough usernames declared in tacacs server or through the Backup user cofnigured locally.&lt;/P&gt;&lt;P&gt;Then i wanted to configure a new user called "david" like this:&lt;/P&gt;&lt;P&gt;username david secret [Password]&lt;/P&gt;&lt;P&gt;but when i try to access through SSH with the user david i can't access, it says Access denied...&lt;/P&gt;&lt;P&gt;So my question is, why the user "Backup" can access, but "David" cannot? They are configured the same way&lt;/P&gt;</description>
      <pubDate>Sun, 17 May 2020 22:02:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-acces-a-switch-through-ssh/m-p/4087511#M1070304</guid>
      <dc:creator>David Calvillo</dc:creator>
      <dc:date>2020-05-17T22:02:00Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to acces a Switch through SSH</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-acces-a-switch-through-ssh/m-p/4087781#M1070311</link>
      <description>&lt;P&gt;Normally a device uses the aaa method list in order. If there is a TACACS server defined and available we cannot normally use the local username to login.&lt;/P&gt;
&lt;P&gt;Can you share your aaa configuration?&lt;/P&gt;</description>
      <pubDate>Mon, 18 May 2020 12:21:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-acces-a-switch-through-ssh/m-p/4087781#M1070311</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2020-05-18T12:21:40Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to acces a Switch through SSH</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-acces-a-switch-through-ssh/m-p/4088458#M1070333</link>
      <description>&lt;P&gt;As Marvin has mentioned, if a TACACS server is configured for device login and available (i.e. online and reachable) locally defined users are not available.&amp;nbsp; It is possible that the Backup user is also defined on the TACACS server.&lt;/P&gt;</description>
      <pubDate>Tue, 19 May 2020 07:05:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-acces-a-switch-through-ssh/m-p/4088458#M1070333</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2020-05-19T07:05:32Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to acces a Switch through SSH</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-acces-a-switch-through-ssh/m-p/4089057#M1070354</link>
      <description>&lt;P&gt;I realized that my configuration for vty lines changed the login parameter (login local) after i turned on AAA, so all i had to do is turned off TACACS and type:&lt;/P&gt;&lt;P&gt;Line vty 0 15&lt;/P&gt;&lt;P&gt;login local&lt;/P&gt;&lt;P&gt;and thats it&lt;/P&gt;&lt;P&gt;Thanks anyway!&lt;/P&gt;</description>
      <pubDate>Wed, 20 May 2020 03:23:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-acces-a-switch-through-ssh/m-p/4089057#M1070354</guid>
      <dc:creator>David Calvillo</dc:creator>
      <dc:date>2020-05-20T03:23:49Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to acces a Switch through SSH</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-acces-a-switch-through-ssh/m-p/4835831#M1100431</link>
      <description>&lt;P&gt;Hello, we are having a similar issue using ISE based TACACS+ with dot1x on our edge devices, 9300's. Our aaa new-model setup has local following our aaa authentication&amp;nbsp; and authorization entries. Some time ago it was stated that if we had local at the end of these lines then if the username wasn't discovered in TACACS+ it will drop through and eventually check the local username and allow SSH; however, we haven't experienced this. Our line con 0 looks like this:&lt;/P&gt;&lt;P&gt;line con 0&lt;BR /&gt;exec-timeout 9 0&lt;BR /&gt;privilege level 0&lt;BR /&gt;logging synchronous&lt;BR /&gt;login authentication CONSOLE&lt;BR /&gt;stopbits 1&lt;BR /&gt;line vty 0 4&lt;BR /&gt;access-class 3 in&lt;BR /&gt;exec-timeout 9 0&lt;BR /&gt;privilege level 0&lt;BR /&gt;logging synchronous&lt;BR /&gt;login authentication VTY&lt;BR /&gt;transport input ssh&lt;BR /&gt;transport output ssh&lt;/P&gt;&lt;P&gt;should the priv level change from 0 to 15 or is it just not possible to access an edge device that uses RADIUS/TACACS+ by local user name either via ssh or console connection?&lt;/P&gt;</description>
      <pubDate>Mon, 15 May 2023 21:21:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-acces-a-switch-through-ssh/m-p/4835831#M1100431</guid>
      <dc:creator>Eric R. Jones</dc:creator>
      <dc:date>2023-05-15T21:21:30Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to acces a Switch through SSH</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-acces-a-switch-through-ssh/m-p/4835940#M1100433</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/152665"&gt;@Eric R. Jones&lt;/a&gt; the line "login authentication CONSOLE" implies your have a aaa method named "CONSOLE" elsewhere in the configuration. If TACACS is in that method prior to local AND a defined TACACS server is available, then the local user(s) will never be allowed to authenticate.&lt;/P&gt;</description>
      <pubDate>Tue, 16 May 2023 03:59:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-acces-a-switch-through-ssh/m-p/4835940#M1100433</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2023-05-16T03:59:27Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to acces a Switch through SSH</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-acces-a-switch-through-ssh/m-p/4837120#M1100464</link>
      <description>&lt;P&gt;I changed the line to "aaa authentication login CONSOLE local" and it began working on our test switches and one production switch. So far no errors.&lt;/P&gt;</description>
      <pubDate>Wed, 17 May 2023 00:58:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-acces-a-switch-through-ssh/m-p/4837120#M1100464</guid>
      <dc:creator>Eric R. Jones</dc:creator>
      <dc:date>2023-05-17T00:58:16Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to acces a Switch through SSH</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-acces-a-switch-through-ssh/m-p/4837175#M1100466</link>
      <description>&lt;P&gt;So the other shoe dropped. I changed our aaa settings from&amp;nbsp;aaa authentication login CONSOLE group tacacs+ local, to aaa authentication login CONSOLE local matching our line con 0 configuration only to be meet with aaa authorization console (all lower case) which stopped me from logging in via the console port. My test switch didn't have this line and a few others. I had to go line by line until I found the offending one.&amp;nbsp;&lt;/P&gt;&lt;P&gt;I figured this was allowing access for line con 0. The reading I did stated "&lt;SPAN&gt;aaa authorization console is a hidden command. We have to execute this command to enable authorization for console line. If you create a method list&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;"aaa authorization exec CONSOLE group radius local"&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;for console and try to apply it on line console 0, it will throw an error that without&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;"aaa authorization console"&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;all authorization commands for console is useless. You have to first enable authorization for console with the help of aaa authorization console."&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Not sure why we have it as removing that line but keeping the other setting doesn't stop us from logging in via console port nor prevent the use of commands in config t mode.&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'll have to play around with it a bit more and see what happens.&lt;/P&gt;</description>
      <pubDate>Wed, 17 May 2023 04:47:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-acces-a-switch-through-ssh/m-p/4837175#M1100466</guid>
      <dc:creator>Eric R. Jones</dc:creator>
      <dc:date>2023-05-17T04:47:50Z</dc:date>
    </item>
  </channel>
</rss>

