<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic I know this is an old in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/privilege-level-assignment-via-radius/m-p/2221822#M349446</link>
    <description>&lt;P&gt;I know this is an old discussion, but it matches my issue perfectly and I'm desparate. &amp;nbsp;I am on ASA 9.4(2) and using NPS for RADIUS. &amp;nbsp;I am sending&amp;nbsp;shell:priv-lvl=2 for a particular user group. &amp;nbsp;This part is working according to radius debug output. &amp;nbsp;But as you can see below, the priv level is not set.&lt;/P&gt;
&lt;P&gt;RADIUS debug:&lt;/P&gt;
&lt;P&gt;RADIUS packet decode (response)&lt;/P&gt;
&lt;P&gt;--------------------------------------&lt;BR /&gt;Raw packet data (length = 96).....&lt;BR /&gt;02 0a 00 60 2b 6f 13 93 24 10 07 da e4 ec 53 e5 | ...`+o..$.....S.&lt;BR /&gt;8b e0 97 5e 06 06 00 00 00 06 19 2e 59 f6 06 95 | ...^........Y...&lt;BR /&gt;00 00 01 37 00 01 02 00 0a 64 64 13 00 00 00 00 | ...7.....dd.....&lt;BR /&gt;00 00 00 00 00 00 00 00 01 d1 ff 4d a2 dc 01 88 | ...........M....&lt;BR /&gt;00 00 00 00 00 00 bc 93 1a 18 00 00 00 09 01 12 | ................&lt;BR /&gt;73 68 65 6c 6c 3a 70 72 69 76 2d 6c 76 6c 3d 32 | shell:priv-lvl=2&lt;/P&gt;
&lt;P&gt;Parsed packet data.....&lt;BR /&gt;Radius: Code = 2 (0x02)&lt;BR /&gt;Radius: Identifier = 10 (0x0A)&lt;BR /&gt;Radius: Length = 96 (0x0060)&lt;BR /&gt;Radius: Vector: 2B6F1393241007DAE4EC53E58BE0975E&lt;BR /&gt;Radius: Type = 6 (0x06) Service-Type&lt;BR /&gt;Radius: Length = 6 (0x06)&lt;BR /&gt;Radius: Value (Hex) = 0x6&lt;BR /&gt;Radius: Type = 25 (0x19) Class&lt;BR /&gt;Radius: Length = 46 (0x2E)&lt;BR /&gt;Radius: Value (String) = &lt;BR /&gt;59 f6 06 95 00 00 01 37 00 01 02 00 0a 64 64 13 | Y......7.....dd.&lt;BR /&gt;00 00 00 00 00 00 00 00 00 00 00 00 01 d1 ff 4d | ...............M&lt;BR /&gt;a2 dc 01 88 00 00 00 00 00 00 bc 93 | ............&lt;BR /&gt;Radius: Type = 26 (0x1A) Vendor-Specific&lt;BR /&gt;Radius: Length = 24 (0x18)&lt;BR /&gt;Radius: Vendor ID = 9 (0x00000009)&lt;BR /&gt;Radius: Type = 1 (0x01) Cisco-AV-pair&lt;BR /&gt;Radius: Length = 18 (0x12)&lt;BR /&gt;Radius: Value (String) = &lt;BR /&gt;73 68 65 6c 6c 3a 70 72 69 76 2d 6c 76 6c 3d 32 | shell:priv-lvl=2&lt;BR /&gt;rad_procpkt: ACCEPT&lt;BR /&gt;Got AV-Pair with value shell:priv-lvl=2&lt;BR /&gt;RADIUS_ACCESS_ACCEPT: normal termination&lt;BR /&gt;RADIUS_DELETE&lt;BR /&gt;remove_req 0x00007fffd5ec38d8 session 0x28f09 id 10&lt;BR /&gt;free_rip 0x00007fffd5ec38d8&lt;BR /&gt;radius: send queue empty&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;asa&amp;gt; sh curpriv&lt;/STRONG&gt;&lt;BR /&gt;Username :&amp;nbsp;domain_user&lt;BR /&gt;Current privilege level : 1&lt;BR /&gt;Current Mode/s : P_UNPR&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Here is my sanitized AAA config. &amp;nbsp;There are some other configurations for ldap that are being used for other things.&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;aaa-server COMPANY protocol radius&lt;BR /&gt; max-failed-attempts 5&lt;BR /&gt;aaa-server COMPANY (company) host 10.10.10.11&lt;BR /&gt; key *****&lt;BR /&gt;aaa-server COMPANY (company) host 10.10.10.10&lt;BR /&gt; key *****&lt;BR /&gt;aaa-server COMPANY_LDAP protocol ldap&lt;BR /&gt;aaa-server COMPANY_LDAP (company) host 10.10.10.11&lt;BR /&gt; server-port 636&lt;BR /&gt; ldap-base-dn OU=COMPANY,DC=company,DC=local&lt;BR /&gt; ldap-group-base-dn CN=VPN,OU=Groups,OU=COMPANY,DC=company,DC=local&lt;BR /&gt; ldap-scope subtree&lt;BR /&gt; ldap-naming-attribute sAMAccountName&lt;BR /&gt; ldap-login-password *****&lt;BR /&gt; ldap-login-dn CN=ldap,OU=Service Accounts,OU=COMPANY,DC=company,DC=local&lt;BR /&gt; ldap-over-ssl enable&lt;BR /&gt; server-type microsoft&lt;BR /&gt;user-identity default-domain LOCAL&lt;BR /&gt;aaa authentication http console COMPANY LOCAL&lt;BR /&gt;aaa authentication ssh console COMPANY LOCAL&lt;BR /&gt;aaa authorization exec authentication-server auto-enable&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I must be missing something here. &amp;nbsp;Care to take a look?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;</description>
    <pubDate>Tue, 15 Nov 2016 15:12:39 GMT</pubDate>
    <dc:creator>stephensites</dc:creator>
    <dc:date>2016-11-15T15:12:39Z</dc:date>
    <item>
      <title>Privilege level assignment via RADIUS</title>
      <link>https://community.cisco.com/t5/network-security/privilege-level-assignment-via-radius/m-p/2221818#M349442</link>
      <description>&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm looking forward to use RADIUS Authentication for all user connecting to my ASA Firewall Version 8.6(4) and for a second customer Version 9.1(1)&lt;/P&gt;&lt;P&gt;Now i would like to set some privilege level for those users connecting to the ASA. Because one group should have Priv 15 rights and the other one should have Priv 1 (only read-access). But when i'm testing with the same RADIUS AV-pair as for Cisco IOS switches it doesn't assign any priviliege level. So the user always gets priv 15 level. Is it possible to set any privilege level via RADIUS. I'm using MS NPS 2008 for RADIUS and is working fine with the switches and routers. But still not for the ASA firewall.&lt;/P&gt;&lt;P&gt;We don't have command authorization applied yet on the firewall.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks a lot for feedback.&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 01:47:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/privilege-level-assignment-via-radius/m-p/2221818#M349442</guid>
      <dc:creator>Claudio Truttmann</dc:creator>
      <dc:date>2019-03-12T01:47:38Z</dc:date>
    </item>
    <item>
      <title>Privilege level assignment via RADIUS</title>
      <link>https://community.cisco.com/t5/network-security/privilege-level-assignment-via-radius/m-p/2221819#M349443</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Yes, you can do privilege level assignment using A/V pairs.&lt;/P&gt;&lt;P&gt;But you still have to manually set the privilege level for the ASA commands.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 29 May 2013 23:25:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/privilege-level-assignment-via-radius/m-p/2221819#M349443</guid>
      <dc:creator>Favaloro.</dc:creator>
      <dc:date>2013-05-29T23:25:31Z</dc:date>
    </item>
    <item>
      <title>Privilege level assignment via RADIUS</title>
      <link>https://community.cisco.com/t5/network-security/privilege-level-assignment-via-radius/m-p/2221820#M349444</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for your answer.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That means i had to activate the command authorization for proper working ?&lt;/P&gt;&lt;P&gt;Will exactly the same A/V pairs working as for switches and routers or is there any difference ?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 30 May 2013 08:10:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/privilege-level-assignment-via-radius/m-p/2221820#M349444</guid>
      <dc:creator>Claudio Truttmann</dc:creator>
      <dc:date>2013-05-30T08:10:06Z</dc:date>
    </item>
    <item>
      <title>Privilege level assignment via RADIUS</title>
      <link>https://community.cisco.com/t5/network-security/privilege-level-assignment-via-radius/m-p/2221821#M349445</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;No, you don't need to configure command authorization because it only works with TACACS. Since you're using radius,you can assign the privilege levels on RADIUS server by using Service-Type attribute.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You need the below listed command on the ASA.&lt;/P&gt;&lt;P&gt;hostname(config)# &lt;STRONG&gt;aaa authorization exec authentication-server&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;–&lt;STRONG&gt;Service-Type 6 (Administrative)&lt;/STRONG&gt;—Allows full access to any services specified by the aaa authentication console commands.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;–&lt;STRONG&gt;Service-Type 7 (NAS prompt)&lt;/STRONG&gt;—Allows access to the CLI when you configure the aaa authentication {telnet | ssh} console command, but denies ASDM configuration access if you configure the aaa authentication http console command. ASDM monitoring access is allowed. If you configure enable authentication with the aaa authentication enable console command, the user cannot access privileged EXEC mode using the enable command.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;–&lt;STRONG&gt;Service-Type 5 (Outbound)&lt;/STRONG&gt;—Denies management access. The user cannot use any services specified by the aaa authentication console commands (excluding the serial keyword; serial access is allowed). Remote access (IPSec and SSL) users can still authenticate and terminate their remote access sessions. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Limiting User CLI and ASDM Access with Management Authorization &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/security/asa/asa82/configuration/guide/access_management.html"&gt;http://www.cisco.com/en/US/docs/security/asa/asa82/configuration/guide/access_management.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This command also enables support of administrative user privilege levels from RADIUS, which can be used in conjunction with local command privilege levels for command authorization.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Configuring local command authorization&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/security/asa/asa82/configuration/guide/access_management.html#wp1072168"&gt;http://www.cisco.com/en/US/docs/security/asa/asa82/configuration/guide/access_management.html#wp1072168&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let me know if you have any issues.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jatin Katyal &lt;BR /&gt; - Do rate helpful posts -&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 30 May 2013 10:23:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/privilege-level-assignment-via-radius/m-p/2221821#M349445</guid>
      <dc:creator>Jatin Katyal</dc:creator>
      <dc:date>2013-05-30T10:23:54Z</dc:date>
    </item>
    <item>
      <title>I know this is an old</title>
      <link>https://community.cisco.com/t5/network-security/privilege-level-assignment-via-radius/m-p/2221822#M349446</link>
      <description>&lt;P&gt;I know this is an old discussion, but it matches my issue perfectly and I'm desparate. &amp;nbsp;I am on ASA 9.4(2) and using NPS for RADIUS. &amp;nbsp;I am sending&amp;nbsp;shell:priv-lvl=2 for a particular user group. &amp;nbsp;This part is working according to radius debug output. &amp;nbsp;But as you can see below, the priv level is not set.&lt;/P&gt;
&lt;P&gt;RADIUS debug:&lt;/P&gt;
&lt;P&gt;RADIUS packet decode (response)&lt;/P&gt;
&lt;P&gt;--------------------------------------&lt;BR /&gt;Raw packet data (length = 96).....&lt;BR /&gt;02 0a 00 60 2b 6f 13 93 24 10 07 da e4 ec 53 e5 | ...`+o..$.....S.&lt;BR /&gt;8b e0 97 5e 06 06 00 00 00 06 19 2e 59 f6 06 95 | ...^........Y...&lt;BR /&gt;00 00 01 37 00 01 02 00 0a 64 64 13 00 00 00 00 | ...7.....dd.....&lt;BR /&gt;00 00 00 00 00 00 00 00 01 d1 ff 4d a2 dc 01 88 | ...........M....&lt;BR /&gt;00 00 00 00 00 00 bc 93 1a 18 00 00 00 09 01 12 | ................&lt;BR /&gt;73 68 65 6c 6c 3a 70 72 69 76 2d 6c 76 6c 3d 32 | shell:priv-lvl=2&lt;/P&gt;
&lt;P&gt;Parsed packet data.....&lt;BR /&gt;Radius: Code = 2 (0x02)&lt;BR /&gt;Radius: Identifier = 10 (0x0A)&lt;BR /&gt;Radius: Length = 96 (0x0060)&lt;BR /&gt;Radius: Vector: 2B6F1393241007DAE4EC53E58BE0975E&lt;BR /&gt;Radius: Type = 6 (0x06) Service-Type&lt;BR /&gt;Radius: Length = 6 (0x06)&lt;BR /&gt;Radius: Value (Hex) = 0x6&lt;BR /&gt;Radius: Type = 25 (0x19) Class&lt;BR /&gt;Radius: Length = 46 (0x2E)&lt;BR /&gt;Radius: Value (String) = &lt;BR /&gt;59 f6 06 95 00 00 01 37 00 01 02 00 0a 64 64 13 | Y......7.....dd.&lt;BR /&gt;00 00 00 00 00 00 00 00 00 00 00 00 01 d1 ff 4d | ...............M&lt;BR /&gt;a2 dc 01 88 00 00 00 00 00 00 bc 93 | ............&lt;BR /&gt;Radius: Type = 26 (0x1A) Vendor-Specific&lt;BR /&gt;Radius: Length = 24 (0x18)&lt;BR /&gt;Radius: Vendor ID = 9 (0x00000009)&lt;BR /&gt;Radius: Type = 1 (0x01) Cisco-AV-pair&lt;BR /&gt;Radius: Length = 18 (0x12)&lt;BR /&gt;Radius: Value (String) = &lt;BR /&gt;73 68 65 6c 6c 3a 70 72 69 76 2d 6c 76 6c 3d 32 | shell:priv-lvl=2&lt;BR /&gt;rad_procpkt: ACCEPT&lt;BR /&gt;Got AV-Pair with value shell:priv-lvl=2&lt;BR /&gt;RADIUS_ACCESS_ACCEPT: normal termination&lt;BR /&gt;RADIUS_DELETE&lt;BR /&gt;remove_req 0x00007fffd5ec38d8 session 0x28f09 id 10&lt;BR /&gt;free_rip 0x00007fffd5ec38d8&lt;BR /&gt;radius: send queue empty&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;asa&amp;gt; sh curpriv&lt;/STRONG&gt;&lt;BR /&gt;Username :&amp;nbsp;domain_user&lt;BR /&gt;Current privilege level : 1&lt;BR /&gt;Current Mode/s : P_UNPR&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Here is my sanitized AAA config. &amp;nbsp;There are some other configurations for ldap that are being used for other things.&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;aaa-server COMPANY protocol radius&lt;BR /&gt; max-failed-attempts 5&lt;BR /&gt;aaa-server COMPANY (company) host 10.10.10.11&lt;BR /&gt; key *****&lt;BR /&gt;aaa-server COMPANY (company) host 10.10.10.10&lt;BR /&gt; key *****&lt;BR /&gt;aaa-server COMPANY_LDAP protocol ldap&lt;BR /&gt;aaa-server COMPANY_LDAP (company) host 10.10.10.11&lt;BR /&gt; server-port 636&lt;BR /&gt; ldap-base-dn OU=COMPANY,DC=company,DC=local&lt;BR /&gt; ldap-group-base-dn CN=VPN,OU=Groups,OU=COMPANY,DC=company,DC=local&lt;BR /&gt; ldap-scope subtree&lt;BR /&gt; ldap-naming-attribute sAMAccountName&lt;BR /&gt; ldap-login-password *****&lt;BR /&gt; ldap-login-dn CN=ldap,OU=Service Accounts,OU=COMPANY,DC=company,DC=local&lt;BR /&gt; ldap-over-ssl enable&lt;BR /&gt; server-type microsoft&lt;BR /&gt;user-identity default-domain LOCAL&lt;BR /&gt;aaa authentication http console COMPANY LOCAL&lt;BR /&gt;aaa authentication ssh console COMPANY LOCAL&lt;BR /&gt;aaa authorization exec authentication-server auto-enable&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I must be missing something here. &amp;nbsp;Care to take a look?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Tue, 15 Nov 2016 15:12:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/privilege-level-assignment-via-radius/m-p/2221822#M349446</guid>
      <dc:creator>stephensites</dc:creator>
      <dc:date>2016-11-15T15:12:39Z</dc:date>
    </item>
    <item>
      <title>Re: Privilege level assignment via RADIUS</title>
      <link>https://community.cisco.com/t5/network-security/privilege-level-assignment-via-radius/m-p/3392105#M349447</link>
      <description>I get it, old post...but was getting very frustrated with the Cisco-AVpair command not working with my ASA(as for whatever reason it works on the switch w/RADIUS), and following your post and using the Service-Type 6 instead fixed it.  Thank you!!</description>
      <pubDate>Thu, 31 May 2018 18:07:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/privilege-level-assignment-via-radius/m-p/3392105#M349447</guid>
      <dc:creator>dsanchez81</dc:creator>
      <dc:date>2018-05-31T18:07:48Z</dc:date>
    </item>
    <item>
      <title>Re: Privilege level assignment via RADIUS</title>
      <link>https://community.cisco.com/t5/network-security/privilege-level-assignment-via-radius/m-p/3881580#M349448</link>
      <description>If it worked with service-type 6, where do you specify the privilege level for the user?</description>
      <pubDate>Fri, 28 Jun 2019 15:50:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/privilege-level-assignment-via-radius/m-p/3881580#M349448</guid>
      <dc:creator>BrianPersaud</dc:creator>
      <dc:date>2019-06-28T15:50:50Z</dc:date>
    </item>
    <item>
      <title>Re: Privilege level assignment via RADIUS</title>
      <link>https://community.cisco.com/t5/network-security/privilege-level-assignment-via-radius/m-p/3882754#M349449</link>
      <description>&lt;P&gt;So, this goes on the Cisco box:&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;aaa authorization exec authentication-server&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Then this goes on your RADIUS Server:&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;User-Name = CoolUserGuy&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;Service-Type = 6&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Not sure your radius server, and your ASA versions but that's what finally worked for me.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 01 Jul 2019 17:58:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/privilege-level-assignment-via-radius/m-p/3882754#M349449</guid>
      <dc:creator>dsanchez81</dc:creator>
      <dc:date>2019-07-01T17:58:44Z</dc:date>
    </item>
    <item>
      <title>Re: Privilege level assignment via RADIUS</title>
      <link>https://community.cisco.com/t5/network-security/privilege-level-assignment-via-radius/m-p/3886392#M349450</link>
      <description>&lt;P&gt;If you are using ISE as radius here are the results parameters to set:&lt;/P&gt;&lt;P&gt;Cisco-VPN3000:CVPN3000/ASA/PIX7x-Privilege-Level = 5&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Radius:Service-Type = Administrative&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Here are the commands used on the ASA:&lt;/P&gt;&lt;P&gt;aaa-server xxx protocol radius&lt;BR /&gt;aaa-server xxx (Inside) host xxx&lt;BR /&gt;aaa authentication http console xxx LOCAL&lt;BR /&gt;aaa authentication enable console xxx LOCAL&lt;BR /&gt;aaa authentication ssh console xxx LOCAL&lt;BR /&gt;aaa authorization command LOCAL&lt;BR /&gt;aaa authorization exec authentication-server auto-enable&lt;BR /&gt;aaa authorization http console xxx&lt;BR /&gt;aaa authentication login-history&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 08 Jul 2019 15:17:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/privilege-level-assignment-via-radius/m-p/3886392#M349450</guid>
      <dc:creator>BrianPersaud</dc:creator>
      <dc:date>2019-07-08T15:17:45Z</dc:date>
    </item>
  </channel>
</rss>

