Local privilege authorization fallback


(Kevin W) #1

I am going through the exam topics that I did not do so well on and I found this topic, but I haven’t found any information about it on this website. I was hoping someone could elaborate on this topic for me. I assume it is a a method of using local usernames and passwords configured on the Cisco device when the radius server or Tacacs+ server is unavailable.


(Lazaros Agapides) #2

Hello Kevin

The local privilege authorization fallback does indeed have to do with a method of using the local usernames and passwords to authorize users into the device in the event that a RADIUS or TACACS+ server is unavailable. This can be done using the following command for example:

aaa authorization exec default group tacacs+ local

By listing the sources of authorization in order, we can state that the local database is the fallback method. Now this allows authorization via the configured tacacs+ and if that is unavailable, it will use the local database.

Now there is an additional parameter that you can use, and this can be seen here:

aaa authorization exec default group tacacs+ local if-authenticated

The if-authenticated keyword is used here for situations where a user has been authenticated using TACACS+ however, during the session, the TACACS+ server goes down, the user can still continue doing configuration. If this option is not added, once the TACACS+ server goes down, authorization fails, and the user is no longer authorized and cannot continue to configure.

Both of these concepts are included in this specific exam topic.

I hope this has been helpful!

Laz


(Kevin W) #3

Laz,

Thank you so much for your reply! I am glad I have some configuration examples to look at now. I understand this topic much better and look forward to labing it up!

Thanks,
Scott Weller