06-06-2016 11:46 AM - edited 02-21-2020 05:50 AM
I'm working on an ISE standalone implementation and running into an issue where the enable password for a device isn't pulling properly. I have initial login tied back to AD and I have policy conditions/results/sets all working as they need to be. My test switch is a 2960S. I tried configuring "aaa authentication enable default group <ISE group> enable", but the only way I could do an enabled login with that was if the user was locally configured in ISE Identity Management > Identities > Users. Is there something I have missed that will tie enable passwords to an active directory group like I have working for initial login?
Solved! Go to Solution.
06-07-2016 03:10 PM
I see just an error with your aaa authentication enable default enable. You should specify the Tacacs group.
I don't have access right now to my lab with ISE.
Here is my config for switches used with ACS.
aaa authentication login TACACS-SRV group tacacs+ local
aaa authentication login Console local
aaa authentication dot1x default group radius
aaa authorization exec TACACS-SRV group tacacs+ local
aaa authorization commands 15 TACACS-SRV group tacacs+ local
aaa authorization network default group radius
aaa accounting exec TACACS-SRV start-stop group tacacs+
aaa accounting commands 15 TACACS-SRV start-stop group tacacs+
If you give me all outputs maybe we can figure out why your ISE TACACS not working with AD. I don't see any reason except a misconfiguration or another issue.
Just to go on enable mode, you don't need anymore the command aaa authentication enable default enable. This enable mode is pushed to the user if he gets privilege 15. Your issue should be on profile or policy. With authorization log, we can see if ISE is pushing the policy or not and why?
06-06-2016 03:55 PM
Hi
are you provisionning privilege level on your authorization policy? Could you give an output please?
06-06-2016 05:22 PM
Yes. I was following one of the example documents and giving default and max privilege levels. Let me know exactly what output you would like and I'll grab it for you.
06-06-2016 05:31 PM
The rules for devices authentication, the authorization policy and logs from ise.
eventually, ios config for aaa
06-07-2016 10:19 AM
For the commands and profile:
Current working aaa configs:
The aaa authentication enable configuration is what I have been playing around with. When I set that to get the enable login from ISE, that is when it looks for a local user account within the ISE system.
06-07-2016 12:13 PM
Could you add logs from authenticated users?
06-07-2016 12:25 PM
06-07-2016 01:28 PM
I don't see the authorization profile that ISE is pushing on your word document.
Could you make another screenshot of logging please?
I'm not able to access my lab. As soon as I'm getting access, I will try to send out some screenshots of configuration.
06-07-2016 03:10 PM
I see just an error with your aaa authentication enable default enable. You should specify the Tacacs group.
I don't have access right now to my lab with ISE.
Here is my config for switches used with ACS.
aaa authentication login TACACS-SRV group tacacs+ local
aaa authentication login Console local
aaa authentication dot1x default group radius
aaa authorization exec TACACS-SRV group tacacs+ local
aaa authorization commands 15 TACACS-SRV group tacacs+ local
aaa authorization network default group radius
aaa accounting exec TACACS-SRV start-stop group tacacs+
aaa accounting commands 15 TACACS-SRV start-stop group tacacs+
If you give me all outputs maybe we can figure out why your ISE TACACS not working with AD. I don't see any reason except a misconfiguration or another issue.
Just to go on enable mode, you don't need anymore the command aaa authentication enable default enable. This enable mode is pushed to the user if he gets privilege 15. Your issue should be on profile or policy. With authorization log, we can see if ISE is pushing the policy or not and why?
06-09-2016 07:02 AM
So I've been trying to recreate the issue I had initially, but when I went back and added in "aaa authentication enable default group <ACS_Group> enable" it is working now. I haven't been able to determine what was done differently between this attempt and my previous that was unsuccessful, but I do appreciate all the help!
06-09-2016 07:06 AM
Cool. I'm happy that we solved your issue.
Have a good day
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide