<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ACS 4.2 TACACS+ with IOS boxen works fine, but won't allow Nexus to AAA to same server(s)?? in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/acs-4-2-tacacs-with-ios-boxen-works-fine-but-won-t-allow-nexus/m-p/2161054#M123678</link>
    <description>&lt;P&gt;Howdy CSC,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So I am being presented with my second customer in less than 90 days that are running an existing ACS 4.2 AAA system doing AD username/password lookup, and are doing full TACACS+ AAA with IOS boxen, both routers and switches. Everything works fine, everyone is happy.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now both customers want to add multiple Nexus platforms to the mix... N7Ks, N5Ks, etc.&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Dealing with custom attribute values is not something I normally play with (hey, I'm route/switch, not security!), so of course I come over here to figure out how to make all this stuff work, RTFM, etc.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Everything I see points to adding the custom attribute value "shell:roles=network-admin" to the TACACS+ settings under the user group, which I do. And now the users are able to log into the Nexus equipment and receive the proper user role, that works great.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And now all AAA to IOS boxen are broken. Username/password are sent and verified, then we get kicked out of that IOS box with the error "authorization failed".&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I remove the custom attribute from the group, and access to the IOS boxen works again. And of course breaks the Nexus devices.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Just discussing this with some of our security engineers, the general consensus is to do one of the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) Upgrade to ACS 5.x&lt;/P&gt;&lt;P&gt;2) Stand up new ACS 4.2 servers exclusively for the Nexus devices&lt;/P&gt;&lt;P&gt;3) Create/manage separate local usernames/usergroup in the existing ACS 4.2 servers to be used exclusively for the Nexus devices.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Customers are already budget-constrained, so option 1 isn't feasible, same issue for option 2. Option 3 seems most practical at this point, but the customer is not going to like having to remember multiple network management usernames/passwords.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Anyone have any suggestions or alternatives?&lt;/P&gt;</description>
    <pubDate>Mon, 11 Mar 2019 03:10:15 GMT</pubDate>
    <dc:creator>rmarosko</dc:creator>
    <dc:date>2019-03-11T03:10:15Z</dc:date>
    <item>
      <title>ACS 4.2 TACACS+ with IOS boxen works fine, but won't allow Nexus to AAA to same server(s)??</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-4-2-tacacs-with-ios-boxen-works-fine-but-won-t-allow-nexus/m-p/2161054#M123678</link>
      <description>&lt;P&gt;Howdy CSC,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So I am being presented with my second customer in less than 90 days that are running an existing ACS 4.2 AAA system doing AD username/password lookup, and are doing full TACACS+ AAA with IOS boxen, both routers and switches. Everything works fine, everyone is happy.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now both customers want to add multiple Nexus platforms to the mix... N7Ks, N5Ks, etc.&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Dealing with custom attribute values is not something I normally play with (hey, I'm route/switch, not security!), so of course I come over here to figure out how to make all this stuff work, RTFM, etc.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Everything I see points to adding the custom attribute value "shell:roles=network-admin" to the TACACS+ settings under the user group, which I do. And now the users are able to log into the Nexus equipment and receive the proper user role, that works great.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And now all AAA to IOS boxen are broken. Username/password are sent and verified, then we get kicked out of that IOS box with the error "authorization failed".&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I remove the custom attribute from the group, and access to the IOS boxen works again. And of course breaks the Nexus devices.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Just discussing this with some of our security engineers, the general consensus is to do one of the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) Upgrade to ACS 5.x&lt;/P&gt;&lt;P&gt;2) Stand up new ACS 4.2 servers exclusively for the Nexus devices&lt;/P&gt;&lt;P&gt;3) Create/manage separate local usernames/usergroup in the existing ACS 4.2 servers to be used exclusively for the Nexus devices.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Customers are already budget-constrained, so option 1 isn't feasible, same issue for option 2. Option 3 seems most practical at this point, but the customer is not going to like having to remember multiple network management usernames/passwords.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Anyone have any suggestions or alternatives?&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 03:10:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-4-2-tacacs-with-ios-boxen-works-fine-but-won-t-allow-nexus/m-p/2161054#M123678</guid>
      <dc:creator>rmarosko</dc:creator>
      <dc:date>2019-03-11T03:10:15Z</dc:date>
    </item>
    <item>
      <title>ACS 4.2 TACACS+ with IOS boxen works fine, but won't allow Nexus</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-4-2-tacacs-with-ios-boxen-works-fine-but-won-t-allow-nexus/m-p/2161055#M123679</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ron,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Did you see the post linked below?&amp;nbsp; Implies you may need to replace the equal sign("=") with an asterisk("*") to achieve desired result.&amp;nbsp; Might be worth a try.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="https://community.cisco.com/thread/2013536"&gt;https://supportforums.cisco.com/thread/2013536&lt;/A&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 08 Mar 2013 21:11:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-4-2-tacacs-with-ios-boxen-works-fine-but-won-t-allow-nexus/m-p/2161055#M123679</guid>
      <dc:creator>dherrald</dc:creator>
      <dc:date>2013-03-08T21:11:18Z</dc:date>
    </item>
    <item>
      <title>ACS 4.2 TACACS+ with IOS boxen works fine, but won't allow Nexus</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-4-2-tacacs-with-ios-boxen-works-fine-but-won-t-allow-nexus/m-p/2161056#M123680</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;David:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Good answer. +5.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I think that is going to fix the issue.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Amjad&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: blue;"&gt;Rating useful replies is more useful than saying &lt;SPAN style="color: green;"&gt; "&lt;SPAN style="text-decoration: underline;"&gt;Thank you&lt;/SPAN&gt;"&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 09 Mar 2013 09:26:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-4-2-tacacs-with-ios-boxen-works-fine-but-won-t-allow-nexus/m-p/2161056#M123680</guid>
      <dc:creator>Amjad Abdullah</dc:creator>
      <dc:date>2013-03-09T09:26:12Z</dc:date>
    </item>
  </channel>
</rss>

