1. Cisco IOS Security Configuration Guide: Securing User Services
Release 15M&T
"Configuring Authorization" chapter
"EXEC Authorization" section.
This guide explains that if a remote AAA server authorizes an EXEC session but does not specify a privilege level
the user is placed at privilege level 1. This confirms the cause of the problem. It also details how to apply a named authorization list to a specific line
as shown in Option C.
2. Cisco IOS Security Command Reference
"aaa authorization" command documentation.
This reference details the none keyword for the aaa authorization command
stating: "No authorization is performed. If the security server fails to respond
the user is automatically granted the privilege level associated with that user
as specified in the local database." This supports the mechanism by which Option C solves the issue for the console line.
3. Cisco IOS Security Configuration Guide: Securing User Services
Release 15M&T
"Configuring Authentication" chapter
"Authentication Method Lists" section.
This document clarifies that method lists are processed in sequential order. If the first method (e.g.
group tacacs+) returns a PASS
subsequent methods are not attempted. This explains why the local fallback in the original configuration was not being used and why options A and B are incorrect.