11-13-2020 04:24 AM
I have read a number of posts and tested a number of them. Due to Cisco deprecating the legacy tacacs-server host command
I have come up with a new config. However, when I add the line in red access via the console is cut-off.
This is on a 9200L switch running 16.12.4
aaa authorization commands 1 default group TACACS_GROUP local if-authenticated
aaa authorization commands 15 default group TACACS_GROUP local if authenticated
Solved! Go to Solution.
11-14-2020 09:29 AM
I think that is expected in your case as you seem to have applied the wrong authorization method list to the console line. Based on the configs you shared, you used the default method list for authorization exec, so you should use that method list on the console line. Also, I would add the if-authenticated keyword to the authorization exec line to allow the already authenticated users to interact with the device in case the TACACS server is not reachable.
line con 0
no authorization exec CON
authorization exec default
11-13-2020 05:32 AM
When you say " console is cut-off. " is that mean you conjfiguring this config using Console ?
after you add that config, what username and password you using to Loging, first ACACS_GROUP if that fail Local
aaa authentication login CON group tacacs+ local
here is soem diag tips :
11-13-2020 05:42 AM
Yes I mean I am testing from the console port on the switch and when I add the authorization config in red any further commands fail authorization as the switch doesn't have connectivity to the TACACs server.
Historically we haven't used a username and password for console access just a password under the line con 0 configuration.
I have added a username and password and will try adding the local word to the CON profile
11-13-2020 06:14 AM
Good you processing, let us know what was the outcome after changing.
11-14-2020 09:29 AM
I think that is expected in your case as you seem to have applied the wrong authorization method list to the console line. Based on the configs you shared, you used the default method list for authorization exec, so you should use that method list on the console line. Also, I would add the if-authenticated keyword to the authorization exec line to allow the already authenticated users to interact with the device in case the TACACS server is not reachable.
line con 0
no authorization exec CON
authorization exec default
11-15-2020 11:48 PM
11-24-2020 10:04 AM
Do you mean you could not issue any commands post applying those commands? if so, you would need to log out and log back into the device. Try that please and let us know if it works.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide