08-05-2020 02:02 AM
Hi everyone,
I have setup my switches to authenticate via RADIUS as below:
aaa new-model aaa group server radius ADAAA server-private 192.168.xx.xx key xxxxx aaa authentication login default group ADAAA local line vty 0 4 transport input ssh login authentication default
My question is, is there a way to configure a fallback account and password that is different from the AD account used when logging in? For example, if I was to try and login with user 'john', if RADIUS auth failed I would want to fall back on a local user 'admin' with a different password altogether. Will appreciate some pointers
Regards
Solved! Go to Solution.
08-05-2020 03:48 AM
Hi there,
The only way to fallback to a second user store in an AAA statement is if the primary store (RADIUS in your case) is unreachable. In your case the solution is a little more involved as you would need to create an ACL on your management network to prevent the switch in question from communicating with the RADIUS server, this would case the AAA to use the local user database.
cheers,
Seb.
08-05-2020 03:48 AM
Hi there,
The only way to fallback to a second user store in an AAA statement is if the primary store (RADIUS in your case) is unreachable. In your case the solution is a little more involved as you would need to create an ACL on your management network to prevent the switch in question from communicating with the RADIUS server, this would case the AAA to use the local user database.
cheers,
Seb.
08-05-2020 05:21 AM
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide