The original poster asks what appears to be a simple question (which may not be as simple as it appears) and Seb has provided exactly the correct answer to that question. So +5 for that. Using that configuration you would authenticate using tacacs with fallback to local if you access vty 0 through 4 and would authenticate using only local if you access vty 5 through 15. But how to get to vty 5 15 when you access the device?
A potential solution would be to specify on one group of vty access using only SSH and specify on the other group access using only telnet. If you do that then you choose your authentication method when you choose to access using SSH or using telnet. I hesitate to suggest something like this on a live network since you are forcing one group of users to use a less secure method of access.
In the last year, we’ve seen substantial changes in how enterprises conduct business. When the pandemic hit, it exposed gaps in business continuity plans, and it showcased the need to quickly deploy and remotely manage secure connections.
On 18th December 2020, Cisco announced the latest IOS XE release - Cisco IOS XE Bengaluru 17.4.1a
The first one in the Cisco IOS XE Bengaluru release series, IOS XE 17.4.1a unlocks various routing features and enhancements comprehensively c...
Exploring business options for a SD-WAN managed serviceLogicalis UK offers a rapid, cost effective deployment with ngenaAdvantages that make a differenceSummary of benefits:Looking forwardResources
This event had place on Tuesday 19th, January 2021 at 10...
(view in My Videos)
Community Live- May the SD-WAN Force Be With You
This event took place on Tuesday 19th, January 2021 at 10:00hrs PDT
In this session attendees received an introduction to Software Defined-WAN (SD-WAN) and the importance of ...
Cisco Champion Radio · S8|E3 The Cisco DNA Center Machine Reasoning Engine
Machine Reasoning is a new category of AI/ML that you will soon hear a lot about. It saves your IT team time by automating complex and tedious networking tasks. It can also...