<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: After TACACS configured, Authenticate successfully but not a in Application Networking</title>
    <link>https://community.cisco.com/t5/application-networking/after-tacacs-configured-authenticate-successfully-but-not-able/m-p/1565560#M32063</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;thank you gills for reply. I am using ACS 5.1 Appliance, can you please help for ACS 5.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I also check AV in this which is not editable.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank You&lt;/P&gt;&lt;P&gt;Milind Rane&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 20 Sep 2010 08:15:20 GMT</pubDate>
    <dc:creator>ranemilind</dc:creator>
    <dc:date>2010-09-20T08:15:20Z</dc:date>
    <item>
      <title>After TACACS configured, Authenticate successfully but not able to go in config mode.</title>
      <link>https://community.cisco.com/t5/application-networking/after-tacacs-configured-authenticate-successfully-but-not-able/m-p/1565558#M32061</link>
      <description>&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I Have Cisco 4710 ACE, and configured TACACS on ACE for authentication and accounting. Configuration paste below.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am able to authenticate with ACS server 5.1 but not able to go in config mode of ACE 4710.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Debug output attached.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Need help on this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;tacacs-server key 7 "wwxfeootjv"&lt;/P&gt;&lt;P&gt;tacacs-server timeout 60&lt;/P&gt;&lt;P&gt;tacacs-server host 128.9.31.70 key 7 "wwxfeootjv"&lt;/P&gt;&lt;P&gt;aaa group server tacacs+ TACACS_Group_Server&lt;/P&gt;&lt;P&gt;&amp;nbsp; server 128.9.31.70&lt;/P&gt;&lt;P&gt;ntp server 128.9.24.58&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa authentication login default group TACACS_Group_Server&lt;/P&gt;&lt;P&gt;aaa accounting default group TACACS_Group_Server&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Below Logs are coming on Device.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: helvetica;"&gt;Sep 19 2010 16:35:55 : %ACE-6-302022: Built TCP connection 0x3853a for vlan1000:172.24.24.70/16477 (172.24.24.70/16477) to vlan1000:128.9.31.70/49 (128.9.31.70/49)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: helvetica;"&gt;Sep 19 2010 16:35:55 : %ACE-6-302023: Teardown TCP connection 0x3853a for vlan1000:172.24.24.70/16477 (172.24.24.70/16477) to vlan1000:128.9.31.70/49 (128.9.31.70/49) duration 0&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: helvetica;"&gt;:00:00 bytes 743 TCP FINs&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: helvetica;"&gt;Sep 19 2010 16:35:58 : %ACE-6-302022: Built TCP connection 0x38570 for vlan1000:172.24.24.70/16480 (172.24.24.70/16480) to vlan1000:128.9.31.70/49 (128.9.31.70/49)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: helvetica;"&gt;Sep 19 2010 16:35:58 : %ACE-6-302023: Teardown TCP connection 0x38570 for vlan1000:172.24.24.70/16480 (172.24.24.70/16480) to vlan1000:128.9.31.70/49 (128.9.31.70/49) duration 0&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: helvetica;"&gt;:00:00 bytes 742 TCP FINs&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: helvetica;"&gt;Sep 19 2010 16:37:51 : %ACE-6-302022: Built TCP connection 0x38aff for vlan1000:172.24.24.70/16545 (172.24.24.70/16545) to vlan1000:128.9.31.70/49 (128.9.31.70/49)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: helvetica;"&gt;Sep 19 2010 16:37:51 : %ACE-6-302023: Teardown TCP connection 0x38aff for vlan1000:172.24.24.70/16545 (172.24.24.70/16545) to vlan1000:128.9.31.70/49 (128.9.31.70/49) duration 0&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: helvetica;"&gt;:00:00 bytes 736 TCP FINs&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: helvetica;"&gt;Sep 19 2010 16:38:21 : %ACE-6-302022: Built TCP connection 0x38c9d for vlan1000:172.24.24.70/16559 (172.24.24.70/16559) to vlan1000:128.9.31.70/49 (128.9.31.70/49)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: helvetica;"&gt;Sep 19 2010 16:38:21 : %ACE-6-302022: Built TCP connection 0x38c9f for vlan1000:172.24.24.70/16560 (172.24.24.70/16560) to vlan1000:128.9.31.70/49 (128.9.31.70/49)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: helvetica;"&gt;Sep 19 2010 16:38:21 : %ACE-6-302023: Teardown TCP connection 0x38c9d for vlan1000:172.24.24.70/16559 (172.24.24.70/16559) to vlan1000:128.9.31.70/49 (128.9.31.70/49) duration 0&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: helvetica;"&gt;:00:00 bytes 722 TCP FINs&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: helvetica;"&gt;Sep 19 2010 16:38:21 : %ACE-6-302023: Teardown TCP connection 0x38c9f for vlan1000:172.24.24.70/16560 (172.24.24.70/16560) to vlan1000:128.9.31.70/49 (128.9.31.70/49) duration 0&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: helvetica;"&gt;:00:00 bytes 788 TCP FINs&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: helvetica;"&gt;Sep 19 2010 16:38:29 : %ACE-6-302022: Built TCP connection 0x38ce1 for vlan1000:172.24.24.70/16565 (172.24.24.70/16565) to vlan1000:128.9.31.70/49 (128.9.31.70/49)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: helvetica;"&gt;Sep 19 2010 16:38:29 : %ACE-6-302022: Built TCP connection 0x38cff for vlan1000:172.24.24.70/16566 (172.24.24.70/16566) to vlan1000:128.9.31.70/49 (128.9.31.70/49)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: helvetica;"&gt;Sep 19 2010 16:38:29 : %ACE-6-302023: Teardown TCP connection 0x38ce1 for vlan1000:172.24.24.70/16565 (172.24.24.70/16565) to vlan1000:128.9.31.70/49 (128.9.31.70/49) duration 0&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: helvetica;"&gt;:00:00 bytes 661 TCP FINs&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: helvetica;"&gt;Sep 19 2010 16:38:29 : %ACE-6-302023: Teardown TCP connection 0x38cff for vlan1000:172.24.24.70/16566 (172.24.24.70/16566) to vlan1000:128.9.31.70/49 (128.9.31.70/49) duration 0&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: helvetica;"&gt;:00:00 bytes 712 TCP FINs&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: helvetica;"&gt;Sep 19 2010 16:38:29 : %ACE-6-302022: Built TCP connection 0x38cf5 for vlan1000:172.24.24.70/16567 (172.24.24.70/16567) to vlan1000:128.9.31.70/49 (128.9.31.70/49)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: helvetica;"&gt;Sep 19 2010 16:38:29 : %ACE-6-302023: Teardown TCP connection 0x38cf5 for vlan1000:172.24.24.70/16567 (172.24.24.70/16567) to vlan1000:128.9.31.70/49 (128.9.31.70/49) duration 0&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: helvetica;"&gt;:00:00 bytes 724 TCP FINs&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: helvetica;"&gt;Sep 19 2010 16:39:41 : %ACE-6-302022: Built TCP connection 0x390a1 for vlan1000:172.24.24.70/3883 (172.24.24.70/3883) to vlan1000:128.9.31.70/49 (128.9.31.70/49)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: helvetica;"&gt;Sep 19 2010 16:39:41 : %ACE-6-302023: Teardown TCP connection 0x390a1 for vlan1000:172.24.24.70/3883 (172.24.24.70/3883) to vlan1000:128.9.31.70/49 (128.9.31.70/49) duration 0:0&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: helvetica;"&gt;0:00 bytes 737 TCP FINs&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: helvetica;"&gt;Sep 19 2010 16:40:20 : %ACE-6-302022: Built TCP connection 0x3929b for vlan1000:172.24.24.70/3902 (172.24.24.70/3902) to vlan1000:128.9.31.70/49 (128.9.31.70/49)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: helvetica;"&gt;Sep 19 2010 16:40:20 : %ACE-6-302022: Built TCP connection 0x392ab for vlan1000:172.24.24.70/3903 (172.24.24.70/3903) to vlan1000:128.9.31.70/49 (128.9.31.70/49)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: helvetica;"&gt;Sep 19 2010 16:40:20 : %ACE-6-302023: Teardown TCP connection 0x3929b for vlan1000:172.24.24.70/3902 (172.24.24.70/3902) to vlan1000:128.9.31.70/49 (128.9.31.70/49) duration 0:0&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: helvetica;"&gt;0:00 bytes 722 TCP FINs&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: helvetica;"&gt;Sep 19 2010 16:40:20 : %ACE-6-302023: Teardown TCP connection 0x392ab for vlan1000:172.24.24.70/3903 (172.24.24.70/3903) to vlan1000:128.9.31.70/49 (128.9.31.70/49) duration 0:0&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: helvetica;"&gt;0:00 bytes 791 TCP FINs&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: helvetica;"&gt;Sep 19 2010 16:45:17 : %ACE-6-302022: Built TCP connection 0x3a127 for vlan1000:172.24.24.70/53389 (172.24.24.70/53389) to vlan1000:128.9.31.70/49 (128.9.31.70/49)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: helvetica;"&gt;Sep 19 2010 16:45:17 : %ACE-6-302023: Teardown TCP connection 0x3a127 for vlan1000:172.24.24.70/53389 (172.24.24.70/53389) to vlan1000:128.9.31.70/49 (128.9.31.70/49) duration 0&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: helvetica;"&gt;:00:00 bytes 723 TCP FINs&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: helvetica;"&gt;Sep 19 2010 16:46:11 : %ACE-6-302022: Built TCP connection 0x3a3b3 for vlan1000:172.24.24.70/53414 (172.24.24.70/53414) to vlan1000:128.9.31.70/49 (128.9.31.70/49)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: helvetica;"&gt;Sep 19 2010 16:46:11 : %ACE-6-302022: Built TCP connection 0x3a3c3 for vlan1000:172.24.24.70/53415 (172.24.24.70/53415) to vlan1000:128.9.31.70/49 (128.9.31.70/49)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: helvetica;"&gt;Sep 19 2010 16:46:11 : %ACE-6-302023: Teardown TCP connection 0x3a3b3 for vlan1000:172.24.24.70/53414 (172.24.24.70/53414) to vlan1000:128.9.31.70/49 (128.9.31.70/49) duration 0&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: helvetica;"&gt;:00:00 bytes 722 TCP FINs&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: helvetica;"&gt;Sep 19 2010 16:46:11 : %ACE-6-302023: Teardown TCP connection 0x3a3c3 for vlan1000:172.24.24.70/53415 (172.24.24.70/53415) to vlan1000:128.9.31.70/49 (128.9.31.70/49) duration 0&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: helvetica;"&gt;:00:00 bytes 788 TCP FINs&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: helvetica;"&gt;Sep 19 2010 16:46:23 : %ACE-6-302022: Built TCP connection 0x3a467 for vlan1000:172.24.24.70/53422 (172.24.24.70/53422) to vlan1000:128.9.31.70/49 (128.9.31.70/49)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: helvetica;"&gt;Sep 19 2010 16:46:23 : %ACE-6-302022: Built TCP connection 0x3a469 for vlan1000:172.24.24.70/53423 (172.24.24.70/53423) to vlan1000:128.9.31.70/49 (128.9.31.70/49)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: helvetica;"&gt;Sep 19 2010 16:46:23 : %ACE-6-302023: Teardown TCP connection 0x3a467 for vlan1000:172.24.24.70/53422 (172.24.24.70/53422) to vlan1000:128.9.31.70/49 (128.9.31.70/49) duration 0&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: helvetica;"&gt;:00:00 bytes 661 TCP FINs&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: helvetica;"&gt;Sep 19 2010 16:46:23 : %ACE-6-302023: Teardown TCP connection 0x3a469 for vlan1000:172.24.24.70/53423 (172.24.24.70/53423) to vlan1000:128.9.31.70/49 (128.9.31.70/49) duration 0&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: helvetica;"&gt;:00:00 bytes 712 TCP FINs&lt;/SPAN&gt;&lt;/P&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;MS.&lt;/P&gt;</description>
      <pubDate>Sun, 19 Sep 2010 11:15:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/after-tacacs-configured-authenticate-successfully-but-not-able/m-p/1565558#M32061</guid>
      <dc:creator>ranemilind</dc:creator>
      <dc:date>2010-09-19T11:15:13Z</dc:date>
    </item>
    <item>
      <title>Re: After TACACS configured, Authenticate successfully but not a</title>
      <link>https://community.cisco.com/t5/application-networking/after-tacacs-configured-authenticate-successfully-but-not-able/m-p/1565559#M32062</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Do a 'show user' after you login and check the "role" thatr you have.&lt;/P&gt;&lt;P&gt;If you're not admin user you can't get in config mode.&lt;/P&gt;&lt;P&gt;Don't forget you need to set the ACS to return the role of the user.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm usiing tac_plus and here is the config I need to use :&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;user=gdufour {&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; default service = deny&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; pap = cleartext "xxxxx"&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; service = exec {&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; optional &lt;SPAN style="color: #ff0000;"&gt;shell:Admin="Admin default-domain"&lt;/SPAN&gt;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; }&lt;BR /&gt;}&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Gilles.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 20 Sep 2010 07:24:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/after-tacacs-configured-authenticate-successfully-but-not-able/m-p/1565559#M32062</guid>
      <dc:creator>Gilles Dufour</dc:creator>
      <dc:date>2010-09-20T07:24:41Z</dc:date>
    </item>
    <item>
      <title>Re: After TACACS configured, Authenticate successfully but not a</title>
      <link>https://community.cisco.com/t5/application-networking/after-tacacs-configured-authenticate-successfully-but-not-able/m-p/1565560#M32063</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;thank you gills for reply. I am using ACS 5.1 Appliance, can you please help for ACS 5.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I also check AV in this which is not editable.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank You&lt;/P&gt;&lt;P&gt;Milind Rane&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 20 Sep 2010 08:15:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/after-tacacs-configured-authenticate-successfully-but-not-able/m-p/1565560#M32063</guid>
      <dc:creator>ranemilind</dc:creator>
      <dc:date>2010-09-20T08:15:20Z</dc:date>
    </item>
    <item>
      <title>Re: After TACACS configured, Authenticate successfully but not a</title>
      <link>https://community.cisco.com/t5/application-networking/after-tacacs-configured-authenticate-successfully-but-not-able/m-p/1565561#M32064</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/app_ntwk_services/data_center_app_services/ace_appliances/vA3_1_0/configuration/security/guide/aaa.html#wp1411787"&gt;http://www.cisco.com/en/US/docs/app_ntwk_services/data_center_app_services/ace_appliances/vA3_1_0/configuration/security/guide/aaa.html#wp1411787&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="content"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="pB1_Body1"&gt;To configure the TACACS+ role and domain settings on Cisco Secure ACS,&amp;nbsp; perform the following steps:&lt;/P&gt;&lt;HR noshade="noshade" /&gt;&lt;A name="wp1532483"&gt;&lt;/A&gt;&lt;P class="pSF_StepFirst"&gt;&lt;STRONG&gt;Step 1 &lt;/STRONG&gt;&lt;IMG border="0" height="2" src="http://www.cisco.com/en/US/i/templates/blank.gif" width="5" /&gt;Go to the Interface Configuration section of the&amp;nbsp; Cisco Secure ACS HTML interface and access the TACACS+ (Cisco IOS) page.&amp;nbsp; Perform the following actions:&lt;/P&gt;&lt;A name="wp1532484"&gt;&lt;/A&gt;&lt;P class="pNsF_NumsubFirst"&gt;&lt;STRONG&gt; a. &lt;/STRONG&gt;&lt;IMG border="0" height="2" src="http://www.cisco.com/en/US/i/templates/blank.gif" width="10" /&gt;Under the TACACS+ Services&amp;nbsp; section of the page, the User column or the Group column depending on&amp;nbsp; your configuration, check the &lt;STRONG class="cBold"&gt;Shell (exec) &lt;/STRONG&gt;check&amp;nbsp; box.&lt;/P&gt;&lt;A name="wp1532485"&gt;&lt;/A&gt;&lt;P class="pNsN_NumsubNext"&gt;&lt;STRONG&gt; b. &lt;/STRONG&gt;&lt;IMG border="0" height="2" src="http://www.cisco.com/en/US/i/templates/blank.gif" width="10" /&gt;Under the Advanced Configuration&amp;nbsp; Options section of the page, check the &lt;STRONG class="cBold"&gt;Display a&amp;nbsp; window for each service selected in which you can enter customized&amp;nbsp; TACACS+ attributes&lt;/STRONG&gt; check box.&lt;/P&gt;&lt;A name="wp1532486"&gt;&lt;/A&gt;&lt;P class="pNsN_NumsubNext"&gt;&lt;STRONG&gt; c. &lt;/STRONG&gt;&lt;IMG border="0" height="2" src="http://www.cisco.com/en/US/i/templates/blank.gif" width="10" /&gt;Click &lt;STRONG class="cBold"&gt;Submit&lt;/STRONG&gt;.&lt;/P&gt;&lt;A name="wp1532487"&gt;&lt;/A&gt;&lt;P class="pSN_StepNext"&gt;&lt;STRONG&gt;Step 2 &lt;/STRONG&gt;&lt;IMG border="0" height="2" src="http://www.cisco.com/en/US/i/templates/blank.gif" width="5" /&gt;Go to the Advanced Options page of the Interface&amp;nbsp; Configuration section of the Cisco Secure ACS HTML interface. Perform&amp;nbsp; the following actions:&lt;/P&gt;&lt;A name="wp1532488"&gt;&lt;/A&gt;&lt;P class="pNsF_NumsubFirst"&gt;&lt;STRONG&gt; a. &lt;/STRONG&gt;&lt;IMG border="0" height="2" src="http://www.cisco.com/en/US/i/templates/blank.gif" width="10" /&gt;Check the &lt;STRONG class="cBold"&gt;Per-user&amp;nbsp; TACACS+/RADIUS Attributes&lt;/STRONG&gt; check box.&lt;/P&gt;&lt;A name="wp1532489"&gt;&lt;/A&gt;&lt;P class="pNsN_NumsubNext"&gt;&lt;STRONG&gt; b. &lt;/STRONG&gt;&lt;IMG border="0" height="2" src="http://www.cisco.com/en/US/i/templates/blank.gif" width="10" /&gt;Click &lt;STRONG class="cBold"&gt;Submit&lt;/STRONG&gt;.&lt;/P&gt;&lt;A name="wp1532490"&gt;&lt;/A&gt;&lt;P class="pSN_StepNext"&gt;&lt;STRONG&gt;Step 3 &lt;/STRONG&gt;&lt;IMG border="0" height="2" src="http://www.cisco.com/en/US/i/templates/blank.gif" width="5" /&gt;Go to the User Setup section of the Cisco Secure&amp;nbsp; ACS HTML interface and double-click the name of an existing user that&amp;nbsp; you want to define a user profile attribute for virtualization. The User&amp;nbsp; Setup page appears.&lt;/P&gt;&lt;A name="wp1521303"&gt;&lt;/A&gt;&lt;P class="pSN_StepNext"&gt;&lt;STRONG&gt;Step 4 &lt;/STRONG&gt;&lt;IMG border="0" height="2" src="http://www.cisco.com/en/US/i/templates/blank.gif" width="5" /&gt;Under the TACACS+ Settings section of the page,&amp;nbsp; configure the following settings:&lt;/P&gt;&lt;A name="wp1521304"&gt;&lt;/A&gt;&lt;P class="pSBu1_StepBullet1"&gt;•&lt;IMG border="0" height="2" src="http://www.cisco.com/en/US/i/templates/blank.gif" width="19" /&gt;Check the &lt;STRONG class="cBold"&gt;Shell (exec) &lt;/STRONG&gt;check box.&lt;/P&gt;&lt;A name="wp1521305"&gt;&lt;/A&gt;&lt;P class="pSBu1_StepBullet1"&gt;•&lt;IMG border="0" height="2" src="http://www.cisco.com/en/US/i/templates/blank.gif" width="19" /&gt;Check the &lt;STRONG class="cBold"&gt;Custom&amp;nbsp; attributes &lt;/STRONG&gt;check box.&lt;/P&gt;&lt;A name="wp1523101"&gt;&lt;/A&gt;&lt;P class="pSBu1_StepBullet1"&gt;•&lt;IMG border="0" height="2" src="http://www.cisco.com/en/US/i/templates/blank.gif" width="19" /&gt;In the text box under the Custom&amp;nbsp; attributes, enter the user role and associated domain for a specific&amp;nbsp; context in the following format:&lt;/P&gt;&lt;A name="wp1523102"&gt;&lt;/A&gt;&lt;DIV class="pEx2_Example2"&gt;&lt;PRE&gt;shell:&lt;CONTEXTNAME&gt;=&lt;ROLE&gt; &lt;DOMAIN1&gt; &lt;DOMAIN2&gt;...&lt;DOMAINN&gt;&lt;BR /&gt;&lt;/DOMAINN&gt;&lt;/DOMAIN2&gt;&lt;/DOMAIN1&gt;&lt;/ROLE&gt;&lt;/CONTEXTNAME&gt;&lt;/PRE&gt;&lt;/DIV&gt;&lt;DIV class="pPreformatted"&gt;&lt;PRE class="pPreformatted"&gt;&lt;A name="wp1529531"&gt;&lt;/A&gt;&lt;BR /&gt;&lt;/PRE&gt;&lt;/DIV&gt;&lt;A name="wp1523104"&gt;&lt;/A&gt;&lt;P class="pSBu1B_StepBullet1Body"&gt;For example, to assign the selected user to the C1 context with the role&amp;nbsp; ROLE1 and the domain DOMAIN1, enter &lt;STRONG class="cBold"&gt;shell:C1=ROLE1&amp;nbsp; DOMAIN1&lt;/STRONG&gt;.&lt;/P&gt;&lt;A name="wp1532751"&gt;&lt;/A&gt;&lt;P class="pSBu1B_StepBullet1Body"&gt;You can also substitute an asterisk (*) for the equals sign (=) as&amp;nbsp; follows:&lt;/P&gt;&lt;A name="wp1532752"&gt;&lt;/A&gt;&lt;DIV class="pEx2_Example2"&gt;&lt;PRE&gt;shell:&lt;CONTEXTNAME&gt;*&lt;ROLE&gt; &lt;DOMAIN1&gt; &lt;DOMAIN2&gt;...&lt;DOMAINN&gt;&lt;BR /&gt;&lt;/DOMAINN&gt;&lt;/DOMAIN2&gt;&lt;/DOMAIN1&gt;&lt;/ROLE&gt;&lt;/CONTEXTNAME&gt;&lt;/PRE&gt;&lt;/DIV&gt;&lt;DIV class="pPreformatted"&gt;&lt;PRE class="pPreformatted"&gt;&lt;A name="wp1532753"&gt;&lt;/A&gt;&lt;BR /&gt;&lt;/PRE&gt;&lt;/DIV&gt;&lt;A name="wp1532754"&gt;&lt;/A&gt;&lt;P class="pSBu1B_StepBullet1Body"&gt;Use the above shell string if you are also using Cisco IOS command&amp;nbsp; authorization.&lt;/P&gt;&lt;A name="wp1521680"&gt;&lt;/A&gt;&lt;P class="pSN_StepNext"&gt;&lt;STRONG&gt;Step 5 &lt;/STRONG&gt;&lt;IMG border="0" height="2" src="http://www.cisco.com/en/US/i/templates/blank.gif" width="5" /&gt;Under the Checking This option Will PERMIT all&amp;nbsp; UNKNOWN Services section of the page, check the &lt;STRONG class="cBold"&gt;Default&amp;nbsp; (Undefined) Services&lt;/STRONG&gt; check box to permit unknown services.&lt;/P&gt;&lt;A name="wp1522704"&gt;&lt;/A&gt;&lt;P class="pSN_StepNext"&gt;&lt;STRONG&gt;Step 6 &lt;/STRONG&gt;&lt;IMG border="0" height="2" src="http://www.cisco.com/en/US/i/templates/blank.gif" width="5" /&gt;Click &lt;STRONG class="cBold"&gt;Submit&lt;/STRONG&gt; when you finish&amp;nbsp; configuring the TACACS+ role and domain settings.&lt;/P&gt;&lt;A name="wp1519874"&gt;&lt;/A&gt;&lt;P class="pB1_Body1"&gt;For example, if USER1 is assigned the role ADMIN and the domain&amp;nbsp; MYDOMAIN1 (where shell:Admin=ADMIN MYDOMAIN1), then one of the following&amp;nbsp; can occur:&lt;/P&gt;&lt;A name="wp1522861"&gt;&lt;/A&gt;&lt;P class="pBu1_Bullet1"&gt;•&lt;IMG border="0" height="2" src="http://www.cisco.com/en/US/i/templates/blank.gif" width="19" /&gt;If USER1 logs in through the Admin&amp;nbsp; context, that user is automatically assigned the Admin role and the&amp;nbsp; MyDomain1 domain.&lt;/P&gt;&lt;A name="wp1523068"&gt;&lt;/A&gt;&lt;P class="pBu1_Bullet1"&gt;•&lt;IMG border="0" height="2" src="http://www.cisco.com/en/US/i/templates/blank.gif" width="19" /&gt;If USER1 logs in through a different&amp;nbsp; context, that user is automatically assigned the default role&amp;nbsp; (Network-Monitor) and the default domain (default-domain). In this case,&amp;nbsp; the user profile attribute is not obtained from the TACACS+ server&amp;nbsp; during authentication.&lt;/P&gt;&lt;P class="pBu1_Bullet1"&gt;&lt;/P&gt;&lt;P class="pBu1_Bullet1"&gt;Gilles.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 20 Sep 2010 09:44:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/after-tacacs-configured-authenticate-successfully-but-not-able/m-p/1565561#M32064</guid>
      <dc:creator>Gilles Dufour</dc:creator>
      <dc:date>2010-09-20T09:44:41Z</dc:date>
    </item>
    <item>
      <title>Re: After TACACS configured, Authenticate successfully but not a</title>
      <link>https://community.cisco.com/t5/application-networking/after-tacacs-configured-authenticate-successfully-but-not-able/m-p/1565562#M32065</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Gills,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Your below instructions seems to be for ACS 3.1 version not for ACS 5.1 appliance.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But i did changes in required fields.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I Created one more rule in Default Device Admin: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In&amp;nbsp; which i customized and added: &lt;/P&gt;&lt;P&gt;protocol: tacacs&lt;/P&gt;&lt;P&gt;identity group: Global Admins&lt;/P&gt;&lt;P&gt;NDG:Location: &lt;/P&gt;&lt;P&gt;Compound Conditions: with shell:Admin*Admin default-domain and without shell:Admin*Admin default-domain&lt;/P&gt;&lt;P&gt;Shell Profile: &lt;/P&gt;&lt;P&gt;Command Set&lt;/P&gt;&lt;P&gt;Hit Counts&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;when i select compound condition with shell:Admin*Admin default-domain then i am not able to authenticate as not seeing hitcount in loggs.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;but when select compund condition any then i am able to authenticate but not able to go in config mode as it is showing network monitor user on ACE.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Attached files for your ref.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you know about ACS 5.1 for this issue please help.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 21 Sep 2010 05:20:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/after-tacacs-configured-authenticate-successfully-but-not-able/m-p/1565562#M32065</guid>
      <dc:creator>ranemilind</dc:creator>
      <dc:date>2010-09-21T05:20:16Z</dc:date>
    </item>
    <item>
      <title>Re: After TACACS configured, Authenticate successfully but not a</title>
      <link>https://community.cisco.com/t5/application-networking/after-tacacs-configured-authenticate-successfully-but-not-able/m-p/1565563#M32066</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;There is a bug in ACS 5.1&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: large;"&gt;&lt;STRONG&gt;&lt;A href="http://cdetsweb-prd.cisco.com/apps/goto?identifier=CSCtd24949"&gt;&lt;BR /&gt;&lt;/A&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt;"&gt;CSCtd24949&amp;nbsp;&amp;nbsp;&amp;nbsp; Tacacs authorization failure when authen_type=0&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;Gilles.&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 21 Sep 2010 10:05:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/after-tacacs-configured-authenticate-successfully-but-not-able/m-p/1565563#M32066</guid>
      <dc:creator>Gilles Dufour</dc:creator>
      <dc:date>2010-09-21T10:05:22Z</dc:date>
    </item>
  </channel>
</rss>

