<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: tacacs+ not working on VRF Interface in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/tacacs-not-working-on-vrf-interface/m-p/2147873#M138865</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If you copy and paste tailor to your specifics such as IP addresses, it should work perfectly. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa group server tacacs+ management&lt;BR /&gt;server 192.168.5.7&lt;BR /&gt;server 192.168.5.7&lt;BR /&gt;ip vrf forwarding mgmtVrf&lt;BR /&gt;ip tacacs source-interface FastEthernet1&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;aaa authentication login default group management local&lt;BR /&gt;aaa authentication login no_tacacs local&lt;BR /&gt;aaa authentication enable default group management enable&lt;BR /&gt;aaa authorization exec default group management if-authenticated &lt;BR /&gt;aaa authorization network default group management local if-authenticated &lt;BR /&gt;aaa accounting commands 15 default start-stop group management&lt;BR /&gt;tacacs-server host 192.168.5.7&lt;BR /&gt;tacacs-server host 192.168.5.7&lt;BR /&gt;tacacs-server directed-request&lt;BR /&gt;tacacs-server key &lt;SECRET&gt;&lt;/SECRET&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 12 Jun 2013 20:37:17 GMT</pubDate>
    <dc:creator>eudechime</dc:creator>
    <dc:date>2013-06-12T20:37:17Z</dc:date>
    <item>
      <title>tacacs+ not working on VRF Interface</title>
      <link>https://community.cisco.com/t5/network-access-control/tacacs-not-working-on-vrf-interface/m-p/2147860#M138852</link>
      <description>&lt;P&gt;C4948-10G switch running IOS 15.0(2)SG&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ACS 4.2 cannot authenticate on the vrf interface. The issue on vrf aaa authentication. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa new-model&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;aaa authentication login default group tacacs+ local&lt;/P&gt;&lt;P&gt;aaa authentication login no_tacacs local&lt;/P&gt;&lt;P&gt;aaa authentication enable default group tacacs+ enable&lt;/P&gt;&lt;P&gt;aaa authorization exec default group tacacs+ local if-authenticated &lt;/P&gt;&lt;P&gt;aaa authorization network default group tacacs+ local if-authenticated &lt;/P&gt;&lt;P&gt;aaa accounting commands 15 default start-stop group tacacs+&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;aaa session-id common&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip vrf mgmt&lt;/P&gt;&lt;P&gt; rd 100:1&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface fa1&lt;/P&gt;&lt;P&gt;ip vrf forwarding mgmt&lt;/P&gt;&lt;P&gt;IP address 192.168.5.1 255.255.255.0&lt;/P&gt;&lt;P&gt;duplex auto &lt;/P&gt;&lt;P&gt; speed auto &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ip vrf forwarding mgmt&lt;BR /&gt; &lt;BR /&gt;&lt;/P&gt;&lt;P&gt;aaa group server tacacs+ tacacs+ (command did not prompt to sub-command for server-private ....)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-decoration: line-through;"&gt;server-private {ip-address | name} [nat] [single-connection] [port port-number] [timeout seconds] [key [0 | 7] string]&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;tacacs-server host 192.168.5.75 key secret (Then, I decided to use global)&lt;/P&gt;&lt;P&gt;tacacs-server host 192.168.5.76 key secret &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ip route vrf mgmt 192.168.5.75 255.255.255.0 192.168.5.2 (ACS 4.2 Tacacs+ server1)&lt;/P&gt;&lt;P&gt;ip route vrf mgmt 192.168.5.76 255.255.255.0 192.168.5.2 (ACS 4.2 Tacacs+ server2)&lt;/P&gt;&lt;P&gt;ip route vrf mgmt 192.168.5.85 255.255.255.0 192.168.5.2 (my management workstation)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip tacacs source-interface fa1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;sw2#debug tacacs&lt;/P&gt;&lt;P&gt;SW2#debug aaa authentication &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;SW2#&lt;STRONG&gt;test aaa group tacacs+ tester passwordtest new-code&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Feb&amp;nbsp; 4 11:36:09.808: AAA/AUTHEN/LOGIN (00000000): Pick method list 'default' &lt;/P&gt;&lt;P&gt;Feb&amp;nbsp; 4 11:36:09.808: TPLUS: Queuing AAA Authentication request 0 for processing&lt;/P&gt;&lt;P&gt;Feb&amp;nbsp; 4 11:36:09.808: TPLUS: processing authentication start request id 0&lt;/P&gt;&lt;P&gt;Feb&amp;nbsp; 4 11:36:09.808: TPLUS: Authentication start packet created for 0(tester)&lt;/P&gt;&lt;P&gt;Feb&amp;nbsp; 4 11:36:09.808: TPLUS: Using server 192.168.5.75&lt;/P&gt;&lt;P&gt;Feb&amp;nbsp; 4 11:36:09.808: TPLUS(00000000)/0/NB_WAIT/1AEFC558: Started 5 sec timeout&lt;/P&gt;&lt;P&gt;Feb&amp;nbsp; 4 11:36:14.808: TPLUS(00000000)/0/NB_WAIT/1AEFC558: timed out&lt;/P&gt;&lt;P&gt;Feb&amp;nbsp; 4 11:36:14.808: TPLUS: Choosing next server 192.168.5.76&lt;/P&gt;&lt;P&gt;Feb&amp;nbsp; 4 11:36:14.808: TPLUS(00000000)/1/NB_WAIT/1AEFC558: Started 5 sec timeout&lt;/P&gt;&lt;P&gt;Feb&amp;nbsp; 4 11:36:14.808: TPLUS(00000000)/1AEFC558: releasing old socket 0&lt;STRONG&gt;User rejected&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;SW2#&lt;/P&gt;&lt;P&gt;Feb&amp;nbsp; 4 11:36:19.808: TPLUS(00000000)/1/NB_WAIT/1AEFC558: timed out&lt;/P&gt;&lt;P&gt;Feb&amp;nbsp; 4 11:36:19.808: TPLUS(00000000)/1/NB_WAIT/1AEFC558: timed out, clean up&lt;/P&gt;&lt;P&gt;Feb&amp;nbsp; 4 11:36:19.808: TPLUS(00000000)/1/1AEFC558: Processing the reply packet&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;SW2#&lt;STRONG&gt;test aaa group tacacs+ tester passwordtest legacy&lt;/STRONG&gt; &lt;/P&gt;&lt;P&gt;Attempting authentication test to server-group tacacs+ using tacacs+&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Feb&amp;nbsp; 4 11:39:16.372: AAA: parse name=&amp;lt;no string&amp;gt; idb type=-1 tty=-1&lt;/P&gt;&lt;P&gt;Feb&amp;nbsp; 4 11:39:16.372: AAA/MEMORY: create_user (0x1AEFC4A4) user='tester' ruser='NULL' ds0=0 port='' rem_addr='NULL' authen_type=ASCII service=LOGIN priv=1 initial_task_id='0', vrf= (id=0)&lt;/P&gt;&lt;P&gt;Feb&amp;nbsp; 4 11:39:16.372: TAC+: send AUTHEN/START packet ver=192 id=153531412&lt;/P&gt;&lt;P&gt;Feb&amp;nbsp; 4 11:39:16.372: TAC+: Using default tacacs server-group "tacacs+" list.&lt;/P&gt;&lt;P&gt;Feb&amp;nbsp; 4 11:39:16.372: TAC+: Opening TCP/IP to 192.168.5.75/49 timeout=5&lt;/P&gt;&lt;P&gt;Feb&amp;nbsp; 4 11:39:21.372: TAC+: TCP/IP open to 192.168.5.76/49 failed -- Connection timed out; &lt;STRONG&gt;remote host not responding&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Feb&amp;nbsp; 4 11:39:21.372: TAC+: Opening TCP/IP to 192.168.5.76/49 timeout=5&lt;STRONG&gt;No authoritative response from any server.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;SW2#&lt;/P&gt;&lt;P&gt;Feb&amp;nbsp; 4 11:39:26.372: TAC+: TCP/IP open to 192.168.5.75/49 failed -- Connection timed out; remote host not responding&lt;/P&gt;&lt;P&gt;Feb&amp;nbsp; 4 11:39:26.372: AAA/MEMORY: free_user (0x1AEFC4A4) user='tester' ruser='NULL' port='' rem_addr='NULL' authen_type=ASCII service=LOGIN priv=1 vrf= (id=0)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;SW2#ping vrf mgmt 192.168.5.85&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Type escape sequence to abort.&lt;/P&gt;&lt;P&gt;Sending 5, 100-byte ICMP Echos to 192.168.5.85, timeout is 2 seconds:&lt;/P&gt;&lt;P&gt;!!!!!&lt;/P&gt;&lt;P&gt;Success rate is 100 percent (5/5), round-trip min/avg/max = 1/1/1 ms&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;SW2#sh ip route vrf mgmt &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Routing Table: mgmt&lt;/P&gt;&lt;P&gt;Codes: C - connected, S - static, R - RIP, M - mobile, B - BGP&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; E1 - OSPF external type 1, E2 - OSPF external type 2&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ia - IS-IS inter area, * - candidate default, U - per-user static route&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; o - ODR, P - periodic downloaded static route&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Gateway of last resort is not set&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.5.0/24 is variably subnetted, 3 subnets, 2 masks&lt;/P&gt;&lt;P&gt;S&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.5.75/32 [1/0] via 192.168.5.2&lt;/P&gt;&lt;P&gt;S&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.5.76/32 [1/0] via 192.168.5.2&lt;/P&gt;&lt;P&gt;S&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.5.85/32 [1/0] via 192.168.5.2&lt;/P&gt;&lt;P&gt;C&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.5.0/24 is directly connected, FastEthernet1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;SW2#sh ip vrf &lt;/P&gt;&lt;P&gt;&amp;nbsp; Name&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Default RD&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Interfaces&lt;/P&gt;&lt;P&gt;&amp;nbsp; mgmt&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 100:1&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Fa1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/tech/tk59/technologies_tech_note09186a0080bd091c.shtml" target="_blank"&gt;http://www.cisco.com/en/US/tech/tk59/technologies_tech_note09186a0080bd091c.shtml&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 03:03:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tacacs-not-working-on-vrf-interface/m-p/2147860#M138852</guid>
      <dc:creator>eudechime</dc:creator>
      <dc:date>2019-03-11T03:03:11Z</dc:date>
    </item>
    <item>
      <title>Re: tacacs+ not working on VRF Interface</title>
      <link>https://community.cisco.com/t5/network-access-control/tacacs-not-working-on-vrf-interface/m-p/2147861#M138853</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can try to do so (for example):&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;...&lt;/P&gt;&lt;P&gt;aaa group server tacacs+ tacs&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;server 192.168.5.75&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;server 192.168.5.76&lt;/P&gt;&lt;P&gt; ip vrf forwarding mgmtVrf&lt;/P&gt;&lt;P&gt; ip tacacs source-interface FastEthernet1&lt;/P&gt;&lt;P&gt;...&lt;/P&gt;&lt;P&gt;interface FastEthernet1&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;vrf forwarding mgmtVrf&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;ip address xxx.xxx.xxx.xxx&lt;/P&gt;&lt;P&gt;...&lt;/P&gt;&lt;P&gt;ip route vrf mgmtVrf xxx.xxx.xxx.xxx&amp;nbsp; xxx.xxx.xxx.xxx 192.168.5.2&lt;/P&gt;&lt;P&gt;...&lt;/P&gt;&lt;P&gt;ip tacacs source-interface FastEthernet1&lt;/P&gt;&lt;P&gt;...&lt;/P&gt;&lt;P&gt;tacacs-server host 192.168.5.75 key 7 &lt;SECRET&gt;&lt;/SECRET&gt;&lt;/P&gt;&lt;P&gt;tacacs-server host 192.168.5.76 key 7 &lt;SECRET&gt;&lt;/SECRET&gt;&lt;/P&gt;&lt;P&gt;...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;p.s. Replace some of variables needed to...&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 05 Feb 2013 11:59:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tacacs-not-working-on-vrf-interface/m-p/2147861#M138853</guid>
      <dc:creator>Andrey.Gulenko</dc:creator>
      <dc:date>2013-02-05T11:59:29Z</dc:date>
    </item>
    <item>
      <title>Re: tacacs+ not working on VRF Interface</title>
      <link>https://community.cisco.com/t5/network-access-control/tacacs-not-working-on-vrf-interface/m-p/2147862#M138854</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Andrey,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for your reply. I thought this is an option to the global command: tacacs-server host x.x.x.x key 7 xxxxx&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I just tested the command, so it's not taking it because I'm repeating same "tacacs+" as a group name. In this case, do I have to change the aaa authentication group name?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;e.g&lt;/P&gt;&lt;P&gt;aaa authentication login default group &lt;STRONG&gt;tacs&lt;/STRONG&gt; local&lt;/P&gt;&lt;P&gt;aaa authentication login no_tacacs local&lt;/P&gt;&lt;P&gt;aaa authentication enable default group &lt;STRONG&gt;tacs&lt;/STRONG&gt; enable&lt;/P&gt;&lt;P&gt;aaa authorization exec default group &lt;STRONG&gt;tacs&lt;/STRONG&gt; local if-authenticated &lt;/P&gt;&lt;P&gt;aaa authorization network default group &lt;STRONG&gt;tacs&lt;/STRONG&gt; local if-authenticated &lt;/P&gt;&lt;P&gt;aaa accounting commands 15 default start-stop group &lt;STRONG&gt;tacs&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This does not work because I have to define the authentication group tacacs+ or Radius&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 05 Feb 2013 14:37:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tacacs-not-working-on-vrf-interface/m-p/2147862#M138854</guid>
      <dc:creator>eudechime</dc:creator>
      <dc:date>2013-02-05T14:37:02Z</dc:date>
    </item>
    <item>
      <title>Re: tacacs+ not working on VRF Interface</title>
      <link>https://community.cisco.com/t5/network-access-control/tacacs-not-working-on-vrf-interface/m-p/2147863#M138855</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, it's only the name of group, and it will be used for authentication/authorization/accounting.&lt;/P&gt;&lt;P&gt;Group name must conform to:&lt;/P&gt;&lt;P&gt;...&lt;/P&gt;&lt;P&gt;switch#conf t&lt;/P&gt;&lt;P&gt;switch(config)#aaa group server ?&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp; ldap&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Ldap server-group definition&lt;/P&gt;&lt;P&gt;&amp;nbsp; radius&amp;nbsp;&amp;nbsp; Radius server-group definition&lt;/P&gt;&lt;P&gt;&amp;nbsp; &lt;SPAN style="text-decoration: underline;"&gt;tacacs+&amp;nbsp; Tacacs+ server-group definition&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;switch(config)#aaa group server tacacs+ ?&lt;/P&gt;&lt;P&gt;&amp;nbsp; &lt;SPAN style="text-decoration: underline;"&gt;WORD&amp;nbsp; Server-group name&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;switch(config)#aaa group server tacacs+ &lt;SPAN style="text-decoration: underline;"&gt;tacs&lt;/SPAN&gt; &lt;/P&gt;&lt;P&gt;switch(config-sg-tacacs+)#server 192.168.5.75&lt;/P&gt;&lt;P&gt;switch(config-sg-tacacs+)#server 192.168.5.76&lt;/P&gt;&lt;P&gt;switch(config-sg-tacacs+)#&lt;SPAN style="text-decoration: underline;"&gt;ip vrf forwarding mgmtVrf&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I want to draw your attention to the fact that the "ip vrf forwarding mgmtVrf" should apply not in the global config (switch (config) #), but in the configuration aaa group server (switch(config-sg-tacacs+)#).&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 05 Feb 2013 15:44:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tacacs-not-working-on-vrf-interface/m-p/2147863#M138855</guid>
      <dc:creator>Andrey.Gulenko</dc:creator>
      <dc:date>2013-02-05T15:44:51Z</dc:date>
    </item>
    <item>
      <title>Re: tacacs+ not working on VRF Interface</title>
      <link>https://community.cisco.com/t5/network-access-control/tacacs-not-working-on-vrf-interface/m-p/2147864#M138856</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for pointing my attention to "ip vrf forwaring" under sub-command. entering it actually removes the global commad:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is my config and it's still not working. still getting error: User rejected. when I checked the ACS, there is no hit on failed attempt log.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa new-model&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;aaa group server tacacs+ vrfgroup&lt;/P&gt;&lt;P&gt; server-private 192.168.5.75 single-connection key secret&lt;/P&gt;&lt;P&gt; server-private 192.168.5.76 single-connection key secret&lt;/P&gt;&lt;P&gt; ip vrf forwarding mgmt&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;aaa authentication login default group tacacs+ local&lt;/P&gt;&lt;P&gt;aaa authentication login no_tacacs local&lt;/P&gt;&lt;P&gt;aaa authentication enable default group tacacs+ enable&lt;/P&gt;&lt;P&gt;aaa authorization exec default group tacacs+ local if-authenticated &lt;/P&gt;&lt;P&gt;aaa authorization network default group tacacs+ local if-authenticated &lt;/P&gt;&lt;P&gt;aaa accounting commands 15 default start-stop group tacacs+&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;aaa session-id common&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip vrf mgmt&lt;/P&gt;&lt;P&gt; rd 100:1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface FastEthernet1&lt;/P&gt;&lt;P&gt; ip vrf forwarding mgmt&lt;/P&gt;&lt;P&gt; ip address 192.168.5.1 255.255.255.0&lt;/P&gt;&lt;P&gt; speed auto&lt;/P&gt;&lt;P&gt; duplex auto&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip route vrf mgmt 192.168.5.85 255.255.255.255 192.168.5.2&lt;/P&gt;&lt;P&gt;ip route vrf mgmt 192.168.5.75 255.255.255.255 192.168.5.2&lt;/P&gt;&lt;P&gt;ip route vrf mgmt 192.168.5.76 255.255.255.255 192.168.5.2&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 05 Feb 2013 18:24:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tacacs-not-working-on-vrf-interface/m-p/2147864#M138856</guid>
      <dc:creator>eudechime</dc:creator>
      <dc:date>2013-02-05T18:24:35Z</dc:date>
    </item>
    <item>
      <title>Re: tacacs+ not working on VRF Interface</title>
      <link>https://community.cisco.com/t5/network-access-control/tacacs-not-working-on-vrf-interface/m-p/2147865#M138857</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Also tried with this config:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa group server tacacs+ vrfgroup&lt;/P&gt;&lt;P&gt; server 192.168.5.75&lt;/P&gt;&lt;P&gt; server 192.168.5.76&lt;/P&gt;&lt;P&gt; ip vrf forwarding mgmt&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;tacacs-server host 192.168.5.75 key 7 &lt;SECRET&gt;&lt;/SECRET&gt;&lt;/P&gt;&lt;P&gt;tacacs-server host 192.168.5.76 key 7 &lt;SECRET&gt;&lt;/SECRET&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 05 Feb 2013 18:41:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tacacs-not-working-on-vrf-interface/m-p/2147865#M138857</guid>
      <dc:creator>eudechime</dc:creator>
      <dc:date>2013-02-05T18:41:55Z</dc:date>
    </item>
    <item>
      <title>Re: tacacs+ not working on VRF Interface</title>
      <link>https://community.cisco.com/t5/network-access-control/tacacs-not-working-on-vrf-interface/m-p/2147866#M138858</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hey!!!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; Can you try the following command:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE&gt;feature tacacs+&lt;BR /&gt; tacacs-server host &lt;IP address=""&gt; key &lt;KEY&gt;&lt;BR /&gt; tacacs-server key &lt;KEY&gt;&lt;BR /&gt; tacacs-server directed-request&lt;BR /&gt; aaa group server tacacs+ ACS&lt;BR /&gt;&amp;nbsp;&amp;nbsp; server &lt;IP address=""&gt;&lt;BR /&gt;&amp;nbsp;&amp;nbsp; use-vrf management &lt;BR /&gt;&amp;nbsp;&amp;nbsp; source-interface mgmt0&lt;/IP&gt;&lt;/KEY&gt;&lt;/KEY&gt;&lt;/IP&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE&gt;aaa authentication login default group ACS local&lt;BR /&gt; aaa authentication login console group ACS local&lt;BR /&gt; aaa accounting default group ACS&lt;BR /&gt; aaa authentication login error-enable&lt;BR /&gt; aaa authorization commands default local&lt;BR /&gt; aaa authorization config-commands default local&lt;BR /&gt;&lt;BR /&gt;Let me know if it helps:&lt;BR /&gt;&lt;BR /&gt;Regards&lt;BR /&gt;Minakshi ( Rate the posts if it helps)&lt;/PRE&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 05 Feb 2013 18:56:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tacacs-not-working-on-vrf-interface/m-p/2147866#M138858</guid>
      <dc:creator>minkumar</dc:creator>
      <dc:date>2013-02-05T18:56:24Z</dc:date>
    </item>
    <item>
      <title>Re: tacacs+ not working on VRF Interface</title>
      <link>https://community.cisco.com/t5/network-access-control/tacacs-not-working-on-vrf-interface/m-p/2147867#M138859</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Minakshi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Among other things, where should I enter this commands? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE&gt;feature tacacs+&lt;BR /&gt; tacacs-server host &lt;IP address=""&gt; key &lt;KEY&gt;&lt;BR /&gt; tacacs-server key &lt;KEY&gt;&lt;BR /&gt; tacacs-server directed-request&lt;BR /&gt; aaa group server tacacs+ ACS&lt;BR /&gt;&amp;nbsp;&amp;nbsp; server &lt;IP address=""&gt;&lt;BR /&gt;&amp;nbsp;&amp;nbsp; use-vrf management &lt;BR /&gt;&amp;nbsp;&amp;nbsp; source-interface mgmt0&lt;/IP&gt;&lt;/KEY&gt;&lt;/KEY&gt;&lt;/IP&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;feature tacacs+ does not appear to be valid from global. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please note I am using C4948 IOS 15.0(2)SG and Not Nexus VDC&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also note...the authentication commands are working except through vrf interface&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 05 Feb 2013 21:19:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tacacs-not-working-on-vrf-interface/m-p/2147867#M138859</guid>
      <dc:creator>eudechime</dc:creator>
      <dc:date>2013-02-05T21:19:42Z</dc:date>
    </item>
    <item>
      <title>Re: tacacs+ not working on VRF Interface</title>
      <link>https://community.cisco.com/t5/network-access-control/tacacs-not-working-on-vrf-interface/m-p/2147868#M138860</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; I just powered up a 4948E myself and shockingly - tacacs is not working via the VRF/FastEthernet1 interface.&amp;nbsp; I have not seen a working solution in this forum. and suprisingly noone from cisco has posted a response.&amp;nbsp;&amp;nbsp; I have tried both solutions. Solution A with the default tacacs&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;tacacs-server host x.x..x&lt;/P&gt;&lt;P&gt;tacacs-server key blahblahblah&lt;/P&gt;&lt;P&gt;ip tacacs source-interface Fastethernet1 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa new-model&lt;/P&gt;&lt;P&gt;aaa authentication login default group tacacs+ line&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have also tried with creating ther server group&lt;/P&gt;&lt;P&gt;aaa group server tacacs+&amp;nbsp; whahwhahah&lt;/P&gt;&lt;P&gt; server-private x.x.x. key blahblahblah&lt;/P&gt;&lt;P&gt; ip vrf forwarding mgmtVrf&lt;/P&gt;&lt;P&gt; ip tacacs source-interface FastEthernet1&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;aaa authentication login whatwhahwhah line&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I saw one post that stated the server private only works for Radius.&amp;nbsp; If TACACS does not work via the VRF, maybe the documentation should be updated to state so. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 12 Jun 2013 05:16:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tacacs-not-working-on-vrf-interface/m-p/2147868#M138860</guid>
      <dc:creator>paul.pink</dc:creator>
      <dc:date>2013-06-12T05:16:27Z</dc:date>
    </item>
    <item>
      <title>tacacs+ not working on VRF Interface</title>
      <link>https://community.cisco.com/t5/network-access-control/tacacs-not-working-on-vrf-interface/m-p/2147869#M138861</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Mate,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do you have any ACL on VTY interface which restirct the access to your device?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also do you see any logs on ACS?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;Regards&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Najaf&lt;SPAN style="font-size: 10pt;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;STRONG&gt;Please rate when applicable or helpful !!!&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 12 Jun 2013 06:17:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tacacs-not-working-on-vrf-interface/m-p/2147869#M138861</guid>
      <dc:creator>kcnajaf</dc:creator>
      <dc:date>2013-06-12T06:17:33Z</dc:date>
    </item>
    <item>
      <title>tacacs+ not working on VRF Interface</title>
      <link>https://community.cisco.com/t5/network-access-control/tacacs-not-working-on-vrf-interface/m-p/2147870#M138862</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; There are no ACLs in place that would block tacacs traffic nor do I see any hits on my ACS server.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 12 Jun 2013 14:46:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tacacs-not-working-on-vrf-interface/m-p/2147870#M138862</guid>
      <dc:creator>paul.pink</dc:creator>
      <dc:date>2013-06-12T14:46:22Z</dc:date>
    </item>
    <item>
      <title>tacacs+ not working on VRF Interface</title>
      <link>https://community.cisco.com/t5/network-access-control/tacacs-not-working-on-vrf-interface/m-p/2147871#M138863</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Your debug output shows time out to ACS server as below.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;Feb&amp;nbsp; 4 11:39:21.372: TAC+: TCP/IP open to 192.168.5.76/49 failed -- Connection timed out; &lt;STRONG style="border-collapse: collapse; list-style: none;"&gt;remote host not responding&lt;/STRONG&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;Feb&amp;nbsp; 4 11:39:21.372: TAC+: Opening TCP/IP to 192.168.5.76/49 timeout=5&lt;STRONG style="border-collapse: collapse; list-style: none;"&gt;No authoritative response from any server.&lt;/STRONG&gt; &lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;Feb&amp;nbsp; 4 11:39:26.372: TAC+: TCP/IP open to 192.168.5.75/49 failed -- Connection timed out; remote host not responding&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Considering the fact that you are not able to see any logs on ACS, that means traffic may not be reaching the ACS.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Have you tried pinging the ACS server from the switch mgmt vrf? Your previous example was showing ping responce to the managment workstation (&lt;SPAN style="font-size: 10pt;"&gt;192.168.5.85) and not to the ACS.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope that helps&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #f7fafb; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;Najaf&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #f7fafb; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;&lt;EM style="border-collapse: collapse; list-style: none;"&gt;&lt;STRONG style="border-collapse: collapse; list-style: none;"&gt;Please rate when applicable or helpful !!!&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 12 Jun 2013 15:02:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tacacs-not-working-on-vrf-interface/m-p/2147871#M138863</guid>
      <dc:creator>kcnajaf</dc:creator>
      <dc:date>2013-06-12T15:02:52Z</dc:date>
    </item>
    <item>
      <title>tacacs+ not working on VRF Interface</title>
      <link>https://community.cisco.com/t5/network-access-control/tacacs-not-working-on-vrf-interface/m-p/2147872#M138864</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The solution is in the aaa login statement.... &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; aaa authentication login whahwhahah&amp;nbsp; line&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;lt;-- incorrect&lt;/P&gt;&lt;DIV&gt;&lt;DIV id="Normalcontent" style="position: relative; padding-left: 3px; padding-right: 3px; clear: both;"&gt;&lt;P id="imwidget" style="margin-left: 5px;"&gt; aaa authentication login default group whahwhahah&amp;nbsp; line&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;lt;-- correct&lt;/P&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 12 Jun 2013 17:02:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tacacs-not-working-on-vrf-interface/m-p/2147872#M138864</guid>
      <dc:creator>paul.pink</dc:creator>
      <dc:date>2013-06-12T17:02:57Z</dc:date>
    </item>
    <item>
      <title>Re: tacacs+ not working on VRF Interface</title>
      <link>https://community.cisco.com/t5/network-access-control/tacacs-not-working-on-vrf-interface/m-p/2147873#M138865</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If you copy and paste tailor to your specifics such as IP addresses, it should work perfectly. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa group server tacacs+ management&lt;BR /&gt;server 192.168.5.7&lt;BR /&gt;server 192.168.5.7&lt;BR /&gt;ip vrf forwarding mgmtVrf&lt;BR /&gt;ip tacacs source-interface FastEthernet1&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;aaa authentication login default group management local&lt;BR /&gt;aaa authentication login no_tacacs local&lt;BR /&gt;aaa authentication enable default group management enable&lt;BR /&gt;aaa authorization exec default group management if-authenticated &lt;BR /&gt;aaa authorization network default group management local if-authenticated &lt;BR /&gt;aaa accounting commands 15 default start-stop group management&lt;BR /&gt;tacacs-server host 192.168.5.7&lt;BR /&gt;tacacs-server host 192.168.5.7&lt;BR /&gt;tacacs-server directed-request&lt;BR /&gt;tacacs-server key &lt;SECRET&gt;&lt;/SECRET&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 12 Jun 2013 20:37:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tacacs-not-working-on-vrf-interface/m-p/2147873#M138865</guid>
      <dc:creator>eudechime</dc:creator>
      <dc:date>2013-06-12T20:37:17Z</dc:date>
    </item>
  </channel>
</rss>

