Solved

Locked out of router after VPN config

Posted on 2004-08-25
4
196 Views
Last Modified: 2013-11-29
I go throught these instructions and afterwards I get locked our of my router.  I can reboot and get it back but why is this?
I did not have a login specified for the vty line 0 4.  Just a Banner and required password and ena password.

http://www.cisco.com/en/US/tech/tk583/tk372/technologies_configuration_example09186a00800946b7.shtml
0
Comment
Question by:rick_me27
  • 2
  • 2
4 Comments
 
LVL 79

Expert Comment

by:lrmoore
ID: 11895181
What part are you tring to do? Setup RADIUS/Tacacs+ authentication, or IPSEC?
How do you mean locked out? Do you lose your telnet session?
What is the last command that you enter before being locked out?
Can you post your complete config, and what it is you are trying to accomplish?
0
 

Author Comment

by:rick_me27
ID: 11895244
I just specify the IP address of the RADIUS server,
along with the RADIUS shared secret key the I decided to log out and then back in
and it brings us a login which I have none.  Never set one?  I can't post the config
I was about to set up the RADIUS server after but I can't get in the router to turn on debug to
see if I am getting in.  Weird?

0
 
LVL 79

Accepted Solution

by:
lrmoore earned 125 total points
ID: 11895360
Not weird if you use "default" as in:
   aaa authentication login default group radius

If that's what you are doing, try:

 aaa authentication login default group radius
 aaa authentication login noradius local
 username <user1> password <password>
line vty 0 4
 login authentication noradius

OR:
   aaa authentication login default group radius none
                                                                   ^^^^




0
 

Author Comment

by:rick_me27
ID: 11895393
let me try this out and see what I can do.
0

Featured Post

What is SQL Server and how does it work?

The purpose of this paper is to provide you background on SQL Server. It’s your self-study guide for learning fundamentals. It includes both the history of SQL and its technical basics. Concepts and definitions will form the solid foundation of your future DBA expertise.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
In this article, I am going to show you how to simulate a multi-site Lab environment on a single Hyper-V host. I use this method successfully in my own lab to simulate three fully routed global AD Sites on a Windows 10 Hyper-V host.
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…
Internet Business Fax to Email Made Easy - With  eFax Corporate (http://www.enterprise.efax.com), you'll receive a dedicated online fax number, which is used the same way as a typical analog fax number. You'll receive secure faxes in your email, f…

776 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question