cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
1950
Views
15
Helpful
12
Replies

ACS to ISE 2.7 migration. TACAC+ enable login issue

KelvinT
Level 1
Level 1
2 Accepted Solutions

Accepted Solutions

 

 -  https://community.cisco.com/t5/security-documents/cisco-ise-device-administration-prescriptive-deployment-guide/ta-p/3738365#toc-hId--919282975

         Follow the referenced example, to create  a user or user(s) with enable(d) privilege(s) directly. If problems persist on the logging for the failed authentication click on detail. Check which policy rules were matched and or check correctness of the policy (sets)

 M.



-- ' 'Good body every evening' ' this sentence was once spotted on a logo at the entrance of a Weight Watchers Club !

View solution in original post

I found the issue.

 

An ISE configuration that migrated over from 2 previous upgrades using the 1st old ACS to new ACS IOS then from new ACS to ISE.  The configuration was a shell:roles"network-admin" that was on the profile.  The debug showed it failing with ACS but ACS just ignored it and authc the user.  ISE doesn't ignore it.  It gives an authc failure.

 

After removing the av-pair from the shell profile the user authc successfully.

 

Thanks for your help.

View solution in original post

12 Replies 12

marce1000
VIP
VIP

 

                               - What is the issue ?

 M.



-- ' 'Good body every evening' ' this sentence was once spotted on a logo at the entrance of a Weight Watchers Club !

Wow!  It didn't take my questions.

 

Basically in ISE the user successfully login the 1st part but when the switch ask for enable password it fails.  Authc failure.

 

FYI when pointing the switch to the ACS it works without issue.

 

Thanks

 

  - What's in the ISE logs when this happens ?

 M.



-- ' 'Good body every evening' ' this sentence was once spotted on a logo at the entrance of a Weight Watchers Club !

The initial log on shows authz successful.  the enable login attempt shows authc failure.  bad credential.

 

 

 

 - Verify your ISE policies and setup according to this document :

          https://www.cisco.com/c/en/us/support/docs/security/identity-services-engine/200208-Configure-ISE-2-0-IOS-TACACS-Authentic.html

 M.



-- ' 'Good body every evening' ' this sentence was once spotted on a logo at the entrance of a Weight Watchers Club !

Yes it is with some exceptions.

We check the box for maximum privilege 15.  Is there a reason it isn't selected?

 

 

                                - You mean you can't check the box ?

 

 M.



-- ' 'Good body every evening' ' this sentence was once spotted on a logo at the entrance of a Weight Watchers Club !

No.  Its checked.  We are running ISE 2.7 patch2. I thought that was required for enabled mode.

 

 - The original document I referred to also contains :

              Note: For TACACS you need to have separate license installed

 

                                      Check this thread for further info's on that :

         https://community.cisco.com/t5/network-access-control/tacacs-licenses-in-ise/m-p/3504911

 M.



-- ' 'Good body every evening' ' this sentence was once spotted on a logo at the entrance of a Weight Watchers Club !

Yes.  Licenses are there and consumed.

 

 -  https://community.cisco.com/t5/security-documents/cisco-ise-device-administration-prescriptive-deployment-guide/ta-p/3738365#toc-hId--919282975

         Follow the referenced example, to create  a user or user(s) with enable(d) privilege(s) directly. If problems persist on the logging for the failed authentication click on detail. Check which policy rules were matched and or check correctness of the policy (sets)

 M.



-- ' 'Good body every evening' ' this sentence was once spotted on a logo at the entrance of a Weight Watchers Club !

I found the issue.

 

An ISE configuration that migrated over from 2 previous upgrades using the 1st old ACS to new ACS IOS then from new ACS to ISE.  The configuration was a shell:roles"network-admin" that was on the profile.  The debug showed it failing with ACS but ACS just ignored it and authc the user.  ISE doesn't ignore it.  It gives an authc failure.

 

After removing the av-pair from the shell profile the user authc successfully.

 

Thanks for your help.