I am trying to allow my users to reverse telnet to a US Robotics Sportster 56K modem which is connected to the auxilary port of a Cisco 1710. First I want them to authenticate either the local or radius user databases. I have been able to reverse telnet into the modem using the configuration listed below if I disable the aaa new-model and telnet in without authentication. I have preformed debugging on AAA Authentication and AAA Authorization and only receive this output while attempting to authenticate:
02:55:33: AAA/AUTHEN/LOGIN (00000025): Pick method list 'default'
02:55:39: AAA/AUTHOR/CONN(00000025): Authorization FAILED for tty5
At which point I will get a message stating that my connection has been closed by foreign host.
The same local user account works fine when attempting to telnet to a vty port in EXEC mode.
I have also attempted to set all the aaa defaults none so that no authentication takes place and it still terminates my connections in the same way.
Additionally in posibly a related issue when I do a "show user" the user field is blank. On other routers I have done this with it shows the name of the user that is logged onto the port.
Any help would be greatly appreciated.
FYI - This configuration is a work in progress there are some things such as radius client configurations that I have not yet configured.
no parser cache
no service single-slot-reload-enable
service timestamps debug uptime
service timestamps log uptime
logging rate-limit console 10 except errors
aaa authentication login default local group radius
aaa authentication ppp default local group radius
aaa authorization exec default local group radius
aaa authorization network default local group radius
aaa authorization reverse-access default local group radius
DocumentationCode download linksGoalRequirementLimitationsSupported ISR
and UCS-E ModelSupported ISRG2 and UCS-E Blades:Supported ISR4K and
UCS-E Blades:Step by Step ConfigurationConfigure one of the connectivity
options to access the Cisco IMC from the n...
Firepower Threat Defense (NGFWv) on UCS E-series - Transparent Mode in
HA DocumentationCode download linksGoalRequirementLimitationsSupported
ISR and UCS-E ModelSupported ISRG2 and UCS-E Blades:Supported ISR4K and
UCS-E Blades:Step by Step ConfigurationCo...
Question I am currently unable to specify "crypto keyring" command when
configuring VPN connection on my cisco 2901 router. The following
licenses have been activated on my router :