<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: GUI - https -  WLC 9800 local Autentication when ISE Fail in Wireless</title>
    <link>https://community.cisco.com/t5/wireless/gui-https-wlc-9800-local-autentication-when-ise-fail/m-p/5132480#M272769</link>
    <description>&lt;P&gt;&lt;SPAN&gt;Thanks Rich !!!&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;This is my config, the config is good to VTY and CONSOLE, That's why I think that changing the order of writing first local and then group, will not serve any purpose,&amp;nbsp;But I haven't tried it yet.&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;If it works fine for VTY and CONSOLE, it should also work fine for HTTP GUI.&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;I understand that the configuration I have is fine.&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;I will try to do a new test as is and debug triple A in the WLC&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Mon, 17 Jun 2024 10:04:27 GMT</pubDate>
    <dc:creator>lacemi</dc:creator>
    <dc:date>2024-06-17T10:04:27Z</dc:date>
    <item>
      <title>GUI - https -  WLC 9800 local Autentication when ISE Fail</title>
      <link>https://community.cisco.com/t5/wireless/gui-https-wlc-9800-local-autentication-when-ise-fail/m-p/5128959#M272573</link>
      <description>&lt;P&gt;Hi every one, I have tipical aaa for login, enable and commnads. It´s&amp;nbsp;applied to interfaces VTY and Console and Its work fine&lt;BR /&gt;when ISE fail I can login with local user, the config is right:&lt;BR /&gt;aaa authentication login LOGIN group Tacacs local&lt;BR /&gt;aaa authorization exec LOGINEXEC group Tacacs enable local if-authenticated&amp;nbsp;&lt;BR /&gt;etc ...&lt;BR /&gt;All works fine.&lt;BR /&gt;I also have http configuration with tipical config:&lt;BR /&gt;ip http server&lt;BR /&gt;ip http authentication aaa login-authentication LOGIN&lt;BR /&gt;ip http authentication aaa exec-authorization LOGINEXEC&lt;BR /&gt;ip http secure-server&lt;BR /&gt;etc ...&lt;BR /&gt;but if ISE fail I can not login fot HTTPS in GUI with my local user.&lt;BR /&gt;&lt;BR /&gt;I can't find a clear document that I can see how to configure, in case the ISE goes down, access it through the local user.&lt;BR /&gt;If I configured "ip http authentication local"&amp;nbsp;Logically, the prevoius triple-a http configuration is lost.&lt;BR /&gt;&lt;BR /&gt;Do you know where there is a CISCO document with these configurations?&lt;/P&gt;
&lt;P&gt;Thanks a lot&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 12 Jun 2024 12:06:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/gui-https-wlc-9800-local-autentication-when-ise-fail/m-p/5128959#M272573</guid>
      <dc:creator>lacemi</dc:creator>
      <dc:date>2024-06-12T12:06:38Z</dc:date>
    </item>
    <item>
      <title>Re: GUI - https -  WLC 9800 local Autentication when ISE Fail</title>
      <link>https://community.cisco.com/t5/wireless/gui-https-wlc-9800-local-autentication-when-ise-fail/m-p/5128972#M272578</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &lt;FONT color="#FF6600"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;U&gt; &amp;nbsp;&amp;nbsp;&lt;EM&gt; &amp;gt;...aaa authentication login LOGIN group Tacacs local&lt;/EM&gt;&lt;/U&gt;&lt;/FONT&gt;&lt;BR /&gt;&amp;nbsp; You may try to switch that into :&amp;nbsp;&lt;STRONG&gt;aaa authentication login LOGIN group &lt;FONT color="#008000"&gt;local Tacacs&amp;nbsp;&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#000000"&gt;&amp;nbsp;M.&lt;/FONT&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 12 Jun 2024 12:09:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/gui-https-wlc-9800-local-autentication-when-ise-fail/m-p/5128972#M272578</guid>
      <dc:creator>Mark Elsen</dc:creator>
      <dc:date>2024-06-12T12:09:57Z</dc:date>
    </item>
    <item>
      <title>Re: GUI - https -  WLC 9800 local Autentication when ISE Fail</title>
      <link>https://community.cisco.com/t5/wireless/gui-https-wlc-9800-local-autentication-when-ise-fail/m-p/5129046#M272585</link>
      <description>&lt;P&gt;Hi Marce,&amp;nbsp;&lt;BR /&gt;First, Very thanks for replay!!!!!!!!!!!&lt;BR /&gt;Second, I thinks if I&amp;nbsp;Without doing a test I couldn't tell you for sure but I don't think it will affect the order.&lt;/P&gt;
&lt;P&gt;If you are trying to change the authentication order to help me, in this case it would not be the most correct way. The normal validation is to have the ISE (tacacs) working. So I would always try to validate first locally as it will fail because it should go through ISE, then I would send it to ISE, which would waste time in authentication.&lt;/P&gt;
&lt;P&gt;On the other hand, if the ISE fails, I do not think this order will affect HTTP, since now if the ISE fails it works correctly if you validate yourself locally through VTY and through the Console, which is also configured although I did not include the line for resume.&lt;/P&gt;</description>
      <pubDate>Wed, 12 Jun 2024 14:39:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/gui-https-wlc-9800-local-autentication-when-ise-fail/m-p/5129046#M272585</guid>
      <dc:creator>lacemi</dc:creator>
      <dc:date>2024-06-12T14:39:51Z</dc:date>
    </item>
    <item>
      <title>Re: GUI - https -  WLC 9800 local Autentication when ISE Fail</title>
      <link>https://community.cisco.com/t5/wireless/gui-https-wlc-9800-local-autentication-when-ise-fail/m-p/5129101#M272588</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;- In any case and according to my first reply , you should have setups where local authentications , either CLI or GUI remain possible if ISE fails , because of the importance to be able to access the controller for wireless management, therefore you may try my suggestion too ,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;M.&lt;/P&gt;</description>
      <pubDate>Wed, 12 Jun 2024 15:05:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/gui-https-wlc-9800-local-autentication-when-ise-fail/m-p/5129101#M272588</guid>
      <dc:creator>Mark Elsen</dc:creator>
      <dc:date>2024-06-12T15:05:57Z</dc:date>
    </item>
    <item>
      <title>Re: GUI - https -  WLC 9800 local Autentication when ISE Fail</title>
      <link>https://community.cisco.com/t5/wireless/gui-https-wlc-9800-local-autentication-when-ise-fail/m-p/5129719#M272640</link>
      <description>&lt;P&gt;When ISE fails, only GUI authentication fails for https, but I'm going to try changing the order as you suggest, although I don't understand the reason.&lt;BR /&gt;Since it is a production system, I cannot turn the ISE down and I cannot do an AAA debug and see the logs.&lt;BR /&gt;Thanks MARCE for your time !!!&lt;/P&gt;</description>
      <pubDate>Thu, 13 Jun 2024 15:48:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/gui-https-wlc-9800-local-autentication-when-ise-fail/m-p/5129719#M272640</guid>
      <dc:creator>lacemi</dc:creator>
      <dc:date>2024-06-13T15:48:17Z</dc:date>
    </item>
    <item>
      <title>Re: GUI - https -  WLC 9800 local Autentication when ISE Fail</title>
      <link>https://community.cisco.com/t5/wireless/gui-https-wlc-9800-local-autentication-when-ise-fail/m-p/5129735#M272641</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp;&lt;U&gt;&lt;STRONG&gt;&lt;EM&gt; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;gt;...Since it is a production system, I cannot turn the ISE down&amp;nbsp;&lt;/EM&gt;&lt;/STRONG&gt;&lt;/U&gt;&lt;BR /&gt;&amp;nbsp; - On the long run that is a reason more to make local authentication always work too and or&lt;FONT color="#008000"&gt;&lt;STRONG&gt; have priority.&lt;/STRONG&gt;&lt;/FONT&gt;&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;Testing could for instance be done on the cloud version of the 9800 (can be downloaded for free) which you could deploy as a VM and play as much as you want to get the desired settings!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;M.&lt;/P&gt;</description>
      <pubDate>Thu, 13 Jun 2024 16:07:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/gui-https-wlc-9800-local-autentication-when-ise-fail/m-p/5129735#M272641</guid>
      <dc:creator>Mark Elsen</dc:creator>
      <dc:date>2024-06-13T16:07:14Z</dc:date>
    </item>
    <item>
      <title>Re: GUI - https -  WLC 9800 local Autentication when ISE Fail</title>
      <link>https://community.cisco.com/t5/wireless/gui-https-wlc-9800-local-autentication-when-ise-fail/m-p/5132302#M272743</link>
      <description>&lt;P&gt;&lt;FONT face="courier new,courier"&gt;aaa group server tacacs+ management&lt;BR /&gt;&amp;nbsp;server name ise1&lt;BR /&gt;&amp;nbsp;server name ise2&lt;BR /&gt;&amp;nbsp;[ip vrf forwarding management] &amp;lt;- we have it in VRF&lt;BR /&gt;&amp;nbsp;ip tacacs source-interface vlXXX&lt;BR /&gt;aaa authentication login ise_authentication group management local&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;aaa authorization exec ise_authorization group management local&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;ip http authentication aaa login-authentication ise_authentication&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;ip http authentication aaa exec-authorization ise_authorization&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;Always try ISE first - if no response fall back to local.&lt;/P&gt;</description>
      <pubDate>Mon, 17 Jun 2024 00:20:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/gui-https-wlc-9800-local-autentication-when-ise-fail/m-p/5132302#M272743</guid>
      <dc:creator>Rich R</dc:creator>
      <dc:date>2024-06-17T00:20:38Z</dc:date>
    </item>
    <item>
      <title>Re: GUI - https -  WLC 9800 local Autentication when ISE Fail</title>
      <link>https://community.cisco.com/t5/wireless/gui-https-wlc-9800-local-autentication-when-ise-fail/m-p/5132304#M272745</link>
      <description>&lt;P&gt;Correct by Mr&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/244975"&gt;@Rich R&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Mon, 17 Jun 2024 10:09:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/gui-https-wlc-9800-local-autentication-when-ise-fail/m-p/5132304#M272745</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-06-17T10:09:25Z</dc:date>
    </item>
    <item>
      <title>Re: GUI - https -  WLC 9800 local Autentication when ISE Fail</title>
      <link>https://community.cisco.com/t5/wireless/gui-https-wlc-9800-local-autentication-when-ise-fail/m-p/5132313#M272750</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1065752"&gt;@MHM Cisco World&lt;/a&gt;&amp;nbsp;if the ISE is &lt;STRONG&gt;down (failed)&lt;/STRONG&gt;&amp;nbsp; - which is why the WLC must fall back to local auth - how could the ISE config possibly cause that problem?&lt;/P&gt;</description>
      <pubDate>Mon, 17 Jun 2024 00:59:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/gui-https-wlc-9800-local-autentication-when-ise-fail/m-p/5132313#M272750</guid>
      <dc:creator>Rich R</dc:creator>
      <dc:date>2024-06-17T00:59:25Z</dc:date>
    </item>
    <item>
      <title>Re: GUI - https -  WLC 9800 local Autentication when ISE Fail</title>
      <link>https://community.cisco.com/t5/wireless/gui-https-wlc-9800-local-autentication-when-ise-fail/m-p/5132479#M272768</link>
      <description>&lt;P&gt;Thanks Rich !!!&lt;BR /&gt;This is my config, the config is good to VTY and CONSOLE, That's why I think that changing the order of writing first local and then group, will not serve any purpose,&amp;nbsp;But I haven't tried it yet.&lt;BR /&gt;If it works fine for VTY and CONSOLE, it should also work fine for HTTP GUI.&lt;BR /&gt;I understand that the configuration I have is fine.&lt;BR /&gt;I will try to do a new test as is and debug triple A in the WLC&lt;/P&gt;</description>
      <pubDate>Mon, 17 Jun 2024 10:03:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/gui-https-wlc-9800-local-autentication-when-ise-fail/m-p/5132479#M272768</guid>
      <dc:creator>lacemi</dc:creator>
      <dc:date>2024-06-17T10:03:34Z</dc:date>
    </item>
    <item>
      <title>Re: GUI - https -  WLC 9800 local Autentication when ISE Fail</title>
      <link>https://community.cisco.com/t5/wireless/gui-https-wlc-9800-local-autentication-when-ise-fail/m-p/5132480#M272769</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Thanks Rich !!!&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;This is my config, the config is good to VTY and CONSOLE, That's why I think that changing the order of writing first local and then group, will not serve any purpose,&amp;nbsp;But I haven't tried it yet.&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;If it works fine for VTY and CONSOLE, it should also work fine for HTTP GUI.&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;I understand that the configuration I have is fine.&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;I will try to do a new test as is and debug triple A in the WLC&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 17 Jun 2024 10:04:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/gui-https-wlc-9800-local-autentication-when-ise-fail/m-p/5132480#M272769</guid>
      <dc:creator>lacemi</dc:creator>
      <dc:date>2024-06-17T10:04:27Z</dc:date>
    </item>
    <item>
      <title>Re: GUI - https -  WLC 9800 local Autentication when ISE Fail</title>
      <link>https://community.cisco.com/t5/wireless/gui-https-wlc-9800-local-autentication-when-ise-fail/m-p/5132486#M272770</link>
      <description>&lt;P&gt;show aaa server &amp;lt;&amp;lt;- share this&amp;nbsp;&lt;BR /&gt;debug aaa auth&lt;STRONG&gt;C&lt;/STRONG&gt; &amp;lt;&amp;lt;- share this&amp;nbsp;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Mon, 17 Jun 2024 10:31:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/gui-https-wlc-9800-local-autentication-when-ise-fail/m-p/5132486#M272770</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-06-17T10:31:19Z</dc:date>
    </item>
    <item>
      <title>Re: GUI - https -  WLC 9800 local Autentication when ISE Fail</title>
      <link>https://community.cisco.com/t5/wireless/gui-https-wlc-9800-local-autentication-when-ise-fail/m-p/5132493#M272771</link>
      <description>&lt;P&gt;note that "debug aaa auth" is ambiguous.&amp;nbsp; I believe you'll need both:&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;debug aaa&amp;nbsp;authentication&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;debug aaa&amp;nbsp;authorization&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 17 Jun 2024 10:30:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/gui-https-wlc-9800-local-autentication-when-ise-fail/m-p/5132493#M272771</guid>
      <dc:creator>Rich R</dc:creator>
      <dc:date>2024-06-17T10:30:15Z</dc:date>
    </item>
    <item>
      <title>Re: GUI - https -  WLC 9800 local Autentication when ISE Fail</title>
      <link>https://community.cisco.com/t5/wireless/gui-https-wlc-9800-local-autentication-when-ise-fail/m-p/5161003#M274544</link>
      <description>&lt;P&gt;I didn't want to leave this thread hanging without an answer, since you've taken the trouble to try to help, but I think I've found the solution, after doing some debugging.&lt;BR /&gt;&lt;BR /&gt;Hi MHM CISCO WORLD:&lt;BR /&gt;show aaa server &amp;lt;&amp;lt;- share this --&amp;gt; only show radius server, my problems is tacacs and local.&amp;nbsp;&lt;BR /&gt;debug aaa auth&lt;STRONG&gt;C&lt;/STRONG&gt;&amp;nbsp;&amp;lt;&amp;lt;- share this&amp;nbsp; --&amp;gt; yes interesting and it is important debug aaa authoR,&amp;nbsp;Sometimes the authentication works and the authorization fails and other times they both work, but normally they both fail &lt;span class="lia-unicode-emoji" title=":smiling_face_with_smiling_eyes:"&gt;😊&lt;/span&gt;.&lt;BR /&gt;&lt;BR /&gt;For all people,&lt;BR /&gt;I have reviewed the configuration again and another technician must have entered dot1x configuration and I think the old configuration has interfered. Above the normal aaa lines but below aaa-new model,:&lt;BR /&gt;"aaa local authentication default authorization default"&lt;BR /&gt;which I understand in turn calls:&lt;BR /&gt;"aaa authentication dot1x default group Radius1 local"&lt;BR /&gt;This makes me try with Radius and it fails. It tries to logon by entering the user as a radius user and not as a local user when tacacs fail.&lt;BR /&gt;&lt;BR /&gt;&amp;nbsp;I have seen in the debug that it seems that sometimes it authenticates but does not authorize and other times it authorizes and authenticates but these are the least frequent, normally the authorization fails.&lt;BR /&gt;When sometimes it succesfully I can see in the log two different behaviors for the same user,&amp;nbsp; a messagge of radius dead and not responding, maybe it is casual when radius is dead, then I imagine it already uses local authentication and works.&lt;/P&gt;
&lt;P&gt;Other time when authenticates it is follow radius user and process, I dont understand how to go to loggon but it is successfully, I don't understand how it manages to authenticate with the same user that fails other times by radius.&amp;nbsp;I would need to capture more logs and analyze the Radius configuration that I do not know right now, but the important thing is why it doesn't work as I said, normal behavior is that it fails, because it tries to logon by entering the user as a radius user and not as a local user.&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;g 13 11:05:36.906: %SEC_LOGIN-5-WEBLOGIN_SUCCESS: Login Success [user: ciscotest] [Source: 192.168.1.1] at 13:05:36 UTC Mon Aug 10 2024&lt;/P&gt;
&lt;P&gt;WLCISCO#&lt;/P&gt;
&lt;P&gt;Aug 13 11:06:08.063: AAA/BIND(000010C5): Bind i/f&lt;/P&gt;
&lt;P&gt;Aug 13 11:06:08.063: AAA/AUTHEN/LOGIN (000010C5): Pick method list 'LOGINTEST'&lt;/P&gt;
&lt;P&gt;Aug 13 11:06:28.209: AAA/BIND(000010C6): Bind i/f&lt;/P&gt;
&lt;P&gt;Aug 13 11:06:28.209: AAA/BIND(000010C7): Bind i/f&lt;/P&gt;
&lt;P&gt;Aug 13 11:06:28.209: AAA/AUTHOR: auth_need : user= 'copyrightbanneruser' ruser= WLCISCO 'rem_addr= 'async' priv= 15 list= '' AUTHOR-TYPE= 'commands'&lt;/P&gt;
&lt;P&gt;Aug 13 11:06:28.261: AAA/BIND(000010C8): Bind i/f&lt;/P&gt;
&lt;P&gt;Aug 13 11:06:28.261: AAA/AUTHEN/LOGIN (000010C8): Pick method list ' LOGINTEST '&lt;/P&gt;
&lt;P&gt;Aug 13 11:06:28.083: %WEBSERVER-5-LOGIN_FAILED: Chassis 2 Login Un-Successful from host 192.168.1.1&lt;/P&gt;
&lt;P&gt;Aug 13 11:06:48.406: AAA/BIND(000010C9): Bind i/f&lt;/P&gt;
&lt;P&gt;Aug 13 11:06:48.406: AAA/BIND(000010CA): Bind i/f&lt;/P&gt;
&lt;P&gt;Aug 13 11:06:48.407: AAA/AUTHOR: auth_need : user= 'copyrightbanneruser' ruser= WLCISCO 'rem_addr= 'async' priv= 15 list= '' AUTHOR-TYPE= 'commands'&lt;/P&gt;
&lt;P&gt;Aug 13 11:06:48.459: AAA/BIND(000010CB): Bind i/f&lt;/P&gt;
&lt;P&gt;Aug 13 11:06:48.459: AAA/AUTHEN/LOGIN (000010CB): Pick method list ' LOGINTEST '&lt;/P&gt;
&lt;P&gt;Aug 13 11:06:48.281: %WEBSERVER-5-LOGIN_FAILED: Chassis 2 Login Un-Successful from host 192.168.1.1&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;But there is a log that I don't understand and it is this user, maybe it doesn't have much to do with it but I don't know. and&amp;nbsp; I don't know if it's something internal: "copyrightbanneruser":&lt;BR /&gt;13 10:34:35.169: AAA/AUTHOR: auth_need : user= 'copyrightbanneruser' ruser=...........&lt;BR /&gt;&lt;BR /&gt;I didn't have time for more tests but the other quiestion for me, &amp;nbsp;why via SSH it uses the local ones and does not do the same as in the attempts via https if both call the same method.&amp;nbsp;Maybe another time I can do more debugging and test the ssh and look for differences.&lt;/P&gt;</description>
      <pubDate>Wed, 14 Aug 2024 15:28:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/gui-https-wlc-9800-local-autentication-when-ise-fail/m-p/5161003#M274544</guid>
      <dc:creator>lacemi</dc:creator>
      <dc:date>2024-08-14T15:28:12Z</dc:date>
    </item>
    <item>
      <title>Re: GUI - https -  WLC 9800 local Autentication when ISE Fail</title>
      <link>https://community.cisco.com/t5/wireless/gui-https-wlc-9800-local-autentication-when-ise-fail/m-p/5162342#M274622</link>
      <description>&lt;P&gt;copyrightbanneruser is a known bug ...&amp;nbsp; There are actually 3 opened for it:&lt;BR /&gt;&lt;A href="https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvw28460" target="_blank" rel="noopener"&gt;https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvw28460&lt;/A&gt;&amp;nbsp;- says fixed but doesn't list any fixed versions - very irritating when they do this!&lt;BR /&gt;&lt;A href="https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwe57808" target="_blank" rel="noopener"&gt;https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwe57808&lt;/A&gt;&amp;nbsp;- showing as a duplicate of&amp;nbsp;CSCvs94910&lt;BR /&gt;&lt;A href="https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvs94910" target="_blank" rel="noopener"&gt;https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvs94910&lt;/A&gt;&amp;nbsp;- classified as "Enhancement" They are treating it as a new feature request and it will only get fixed if a big, important customer makes a big enough fuss and business case for getting it fixed.&amp;nbsp; You'll notice there's already 38 cases attached to it!&amp;nbsp; Suggest you open a TAC case to get yours attached to it too, and ask TAC for the status of getting it fixed.&amp;nbsp; The bug notes have more detail on the workaround.&amp;nbsp; Basically command authorization is not supported at all on 9800 GUI.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/wireless/catalyst-9800-series-wireless-controllers/214490-configure-radius-and-tacacs-for-gui-and.html#toc-hId-2036691447" target="_blank" rel="noopener"&gt;https://www.cisco.com/c/en/us/support/docs/wireless/catalyst-9800-series-wireless-controllers/214490-configure-radius-and-tacacs-for-gui-and.html#toc-hId-2036691447&lt;/A&gt;&lt;BR /&gt;"When TACACS+ or RADIUS is used for 9800 WebUI authentication, these restrictions exist:&lt;/P&gt;
&lt;UL class="ul"&gt;
&lt;LI&gt;Users with privilege level 0 exist but have no access to the GUI&lt;/LI&gt;
&lt;LI class="li"&gt;
&lt;P class="p"&gt;Users with privilege levels 1-14 can only view the &lt;SPAN class="ph uicontrol"&gt;Monitor&lt;/SPAN&gt; tab (this is equivalent to the privilege level of a read-only locally authenticated user)&lt;/P&gt;
&lt;/LI&gt;
&lt;LI class="li"&gt;
&lt;P class="p"&gt;Users with privilege level 15 have full access&lt;/P&gt;
&lt;/LI&gt;
&lt;LI class="li"&gt;
&lt;P class="p"&gt;Users with privilege level 15 and a &lt;STRONG&gt;command set that allows specific commands only are not supported&lt;/STRONG&gt;. The user can still be able to execute configuration changes through the WebUI&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;These considerations cannot be changed or modified."&lt;/P&gt;</description>
      <pubDate>Sun, 18 Aug 2024 15:38:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/gui-https-wlc-9800-local-autentication-when-ise-fail/m-p/5162342#M274622</guid>
      <dc:creator>Rich R</dc:creator>
      <dc:date>2024-08-18T15:38:04Z</dc:date>
    </item>
  </channel>
</rss>

