Solved

Cisco AAA Authentication issues

Posted on 2012-03-28
2
489 Views
Last Modified: 2012-06-21
The devices in question are stand-alone cisco switches.

I have attached the "debug aaa **" output below for a successful and unsuccessful login attempt. These logs come from the two switches running the same IOS & model.

I am able to authenticate with rsa token, but able to authenticate via local user database when the "aaa authorization exec if-authenticated" command is present.

If the command is not present, I am able to login via the local user database, but not radius.

Any thoughts? What additional information can I provide to help isolate this?
aaa.pass.txt
aaa.fail.txt
0
Comment
Question by:-dev-null-
2 Comments
 
LVL 17

Accepted Solution

by:
TimotiSt earned 500 total points
ID: 37783704
I think you may have an issue with the authorization config on the radius server.
According to this:

The aaa authorization exec default group radius if-authenticated command configures the network access server to contact the RADIUS server to determine if users are permitted to start an EXEC shell when they log in. If an error occurs when the network access server contacts the RADIUS server, the fallback method is to permit the CLI to start, provided the user has been properly authenticated.

the existence of the "if-authenticated" command provides a fallback to CLI if the radius is missing authentication info.

Tamas
0
 

Author Closing Comment

by:-dev-null-
ID: 37805606
fixed
0

Featured Post

Highfive Gives IT Their Time Back

Highfive is so simple that setting up every meeting room takes just minutes and every employee will be able to start or join a call from any room with ease. Never be called into a meeting just to get it started again. This is how video conferencing should work!

Join & Write a Comment

Suggested Solutions

Microservice architecture adoption brings many advantages, but can add intricacy. Selecting the right orchestration tool is most important for business specific needs.
If you're not part of the solution, you're part of the problem.   Tips on how to secure IoT devices, even the dumbest ones, so they can't be used as part of a DDoS botnet.  Use PRTG Network Monitor as one of the building blocks, to detect unusual…
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…

706 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

20 Experts available now in Live!

Get 1:1 Help Now