<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic tacacs per VRF in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/tacacs-per-vrf/m-p/1871272#M198996</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Dear Carlos,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've tried to configure your first suggestion to different (2nd)router and its working, the only difference is the IOS, then i decided to configure again to my 3rd router with the same IOS as my 1st router and it was failed again with the same error&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;c3845-ipbase-mz.124-17b.bin - working&lt;/P&gt;&lt;P&gt;c3845-ipbase-mz.124-17a.bin - not working&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;my working config below&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;aaa group server tacacs+ tacacs1&lt;/P&gt;&lt;P&gt; server-private 183.111.21.100 key 7 08701E430E1F100D08025C5D&lt;/P&gt;&lt;P&gt; ip vrf forwarding NMS&lt;/P&gt;&lt;P&gt; ip tacacs source-interface Vlan89&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;aaa authentication login default group tacacs1 enable&lt;/P&gt;&lt;P&gt;aaa authentication enable default group tacacs1 enable&lt;/P&gt;&lt;P&gt;aaa authorization commands 0 default group tacacs+ none &lt;/P&gt;&lt;P&gt;aaa authorization commands 1 default group tacacs+ none &lt;/P&gt;&lt;P&gt;aaa authorization commands 15 default group tacacs+ none &lt;/P&gt;&lt;P&gt;!&lt;SPAN id="mce_marker"&gt; &lt;/SPAN&gt;!&lt;BR /&gt;aaa group server tacacs+ tacacs1&lt;BR /&gt; server-private 183.X.X.X key 7 XXXXXX&lt;/P&gt;&lt;P&gt; ip vrf forwarding NMS&lt;BR /&gt; ip tacacs source-interface Vlan89&lt;BR /&gt;!&lt;BR /&gt;aaa authentication login default group tacacs1 enable&lt;BR /&gt;aaa authentication enable default group tacacs1 enable&lt;BR /&gt;aaa authorization commands 0 default group tacacs+ none &lt;BR /&gt;aaa authorization commands 1 default group tacacs+ none &lt;BR /&gt;aaa authorization commands 15 default group tacacs+ none &lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;im just thinking this is due to IOS? any advice?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 18 Jan 2012 23:42:24 GMT</pubDate>
    <dc:creator>lester-mendoza</dc:creator>
    <dc:date>2012-01-18T23:42:24Z</dc:date>
    <item>
      <title>tacacs per VRF</title>
      <link>https://community.cisco.com/t5/network-access-control/tacacs-per-vrf/m-p/1871265#M198989</link>
      <description>&lt;P&gt;Gooday&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A&gt;&lt;/A&gt;&lt;A&gt;&lt;/A&gt;&lt;A&gt;&lt;/A&gt;&lt;A&gt;&lt;/A&gt;&lt;A&gt;&lt;/A&gt;&lt;A&gt;&lt;/A&gt;&lt;A&gt;&lt;/A&gt;Im trying to configure tacacs per Vrf but no luck, i been using docs from cisco, can somebody help me if my config is correct?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;here is my current config&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;aaa group server tacacs+ tacacs1&lt;/P&gt;&lt;P&gt;server-private 183.x.x.x key 7 XXXXXX&lt;/P&gt;&lt;P&gt;ip vrf forwarding NMS&lt;/P&gt;&lt;P&gt;ip tacacs source-interface Vlan89&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;aaa authentication login default group tacacs+ enable&lt;/P&gt;&lt;P&gt;aaa authentication enable default group tacacs+ enable&lt;/P&gt;&lt;P&gt;aaa authorization commands 0 default group tacacs+ none &lt;/P&gt;&lt;P&gt;aaa authorization commands 1 default group tacacs+ none &lt;/P&gt;&lt;P&gt;aaa authorization commands 15 default group tacacs+ none &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip vrf NMS&lt;/P&gt;&lt;P&gt;description OOB NMS VRF&lt;/P&gt;&lt;P&gt;rd 110:100&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan89&lt;/P&gt;&lt;P&gt;description to DIA monitoring &lt;/P&gt;&lt;P&gt;ip vrf forwarding NMS&lt;/P&gt;&lt;P&gt;ip address 183.109.191.11 255.255.255.0&lt;/P&gt;&lt;P&gt;end&lt;SPAN id="mce_marker"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;ip vrf NMS&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 01:43:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tacacs-per-vrf/m-p/1871265#M198989</guid>
      <dc:creator>lester-mendoza</dc:creator>
      <dc:date>2019-03-11T01:43:52Z</dc:date>
    </item>
    <item>
      <title>tacacs per VRF</title>
      <link>https://community.cisco.com/t5/network-access-control/tacacs-per-vrf/m-p/1871266#M198990</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Lester,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please refer to the following configuration:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa group server tacacs+ vrftacacs &lt;/P&gt;&lt;P&gt;server-private x.x.x.y key XXXX&lt;/P&gt;&lt;P&gt;ip vrf forwarding mgmtVrf &lt;/P&gt;&lt;P&gt;ip tacacs source-interface FastEthernet1 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa authentication login default group vrftacacs local &lt;/P&gt;&lt;P&gt;aaa authentication enable default group vrftacacs enable &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip vrf mgmtVrf &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface FastEthernet1 &lt;/P&gt;&lt;P&gt;ip vrf forwarding mgmtVrf &lt;/P&gt;&lt;P&gt;ip address x.x.x.x y.y.y.y &lt;/P&gt;&lt;P&gt;speed auto &lt;/P&gt;&lt;P&gt;duplex auto &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip route vrf mgmtVrf 0.0.0.0 0.0.0.0 z.z.z.z&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It seems that you are missing the appropriate "TACACS+ Group" on the AAA statements. You are using "group tacacs+" instead of the appropriate one that should be "group tacacs1".&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please let us know the results.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 17 Jan 2012 15:24:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tacacs-per-vrf/m-p/1871266#M198990</guid>
      <dc:creator>camejia</dc:creator>
      <dc:date>2012-01-17T15:24:23Z</dc:date>
    </item>
    <item>
      <title>tacacs per VRF</title>
      <link>https://community.cisco.com/t5/network-access-control/tacacs-per-vrf/m-p/1871267#M198991</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Dear Carlos,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Appreciated your reply, unfortunately it still not working, but its half way to resolve now. here is the screencap&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;if i&amp;nbsp; telnet into the router, firstly it will ask for the local account and after i enable for the priviledge mode, it will ask for the acs account, below is the current config&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; UNAUTHORISED ACCESS TO THIS SYSTEM IS STRICTLY&amp;nbsp; PROHIBITED&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;All data and information held on or in, or generated by this system is&lt;/P&gt;&lt;P&gt;proprietary and confidential. Any unauthorised use or unauthorised&lt;/P&gt;&lt;P&gt;disclosure of such information is strictly prohibited. Violators will be&lt;/P&gt;&lt;P&gt;prosecuted to the fullest extent of local, state and federal laws.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;User Access Verification&lt;/P&gt;&lt;P&gt;Password:&lt;/P&gt;&lt;P&gt;Session activated. Enter commands at the prompt.&lt;BR /&gt;You have entered crt-tw1-602. on line 450 ()&lt;BR /&gt;crt-tw1-602&amp;gt;ena&lt;BR /&gt;Username ACS:lesterm.admin&lt;BR /&gt;Password:&lt;BR /&gt;crt-tw1-602#&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;current config&lt;/P&gt;&lt;P&gt;aaa group server tacacs+ &lt;STRONG&gt;tacacs1&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt; server-private 183.x.x.x key 7 xxxxxxxx&lt;/P&gt;&lt;P&gt; ip vrf forwarding NMS&lt;/P&gt;&lt;P&gt; ip tacacs source-interface Vlan89&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;aaa authentication login default group&lt;STRONG&gt; tacacs1 enable &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;aaa authentication enable default group &lt;STRONG&gt;tacacs1&lt;/STRONG&gt; enable&lt;/P&gt;&lt;P&gt;aaa authorization commands 0 default group tacacs+ none &lt;/P&gt;&lt;P&gt;aaa authorization commands 1 default group tacacs+ none &lt;/P&gt;&lt;P&gt;aaa authorization commands 15 default group tacacs+ none &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 17 Jan 2012 16:19:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tacacs-per-vrf/m-p/1871267#M198991</guid>
      <dc:creator>lester-mendoza</dc:creator>
      <dc:date>2012-01-17T16:19:40Z</dc:date>
    </item>
    <item>
      <title>tacacs per VRF</title>
      <link>https://community.cisco.com/t5/network-access-control/tacacs-per-vrf/m-p/1871268#M198992</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Lester,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The first "password" prompt you get is for the local enable password? We might need to enable "Debug aaa authentication" and "debug tacacs" and recreate the issue.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please, share the outputs with us.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 17 Jan 2012 16:23:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tacacs-per-vrf/m-p/1871268#M198992</guid>
      <dc:creator>camejia</dc:creator>
      <dc:date>2012-01-17T16:23:52Z</dc:date>
    </item>
    <item>
      <title>tacacs per VRF</title>
      <link>https://community.cisco.com/t5/network-access-control/tacacs-per-vrf/m-p/1871269#M198993</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; thanks Carlos,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I followed your suggestion, i think there will be only change in the aaa authentication statement,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm very careful on changing the aaa statement, and don't want to change it without your expert advice, the router is located in different country and no one will reboot if i lost the connection&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The first "password" prompt you get is for the local enable password? We might need to enable "Debug aaa authentication" and "debug tacacs" and recreate the issue.&lt;/P&gt;&lt;P&gt;ans: yes, first it will ask for the local password&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;below is the debug&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;AAA Authentication debugging is on&lt;/P&gt;&lt;P&gt;crt-tw1-602#&lt;/P&gt;&lt;P&gt;*Jan 18 00:39:40: AAA/BIND(00000084): Bind i/f&amp;nbsp; &lt;/P&gt;&lt;P&gt;*Jan 18 00:39:40: AAA/AUTHEN/LOGIN (00000084): Pick method list 'default' &lt;/P&gt;&lt;P&gt;*Jan 18 00:39:45: AAA/AUTHEN/ENABLE(00000084): Processing request action LOGIN&lt;/P&gt;&lt;P&gt;*Jan 18 00:39:45: AAA/AUTHEN/ENABLE(00000084): Done status GET_PASSWORD &lt;/P&gt;&lt;P&gt;*Jan 18 00:39:52: AAA/AUTHEN/ENABLE(00000084): Processing request action LOGIN&lt;/P&gt;&lt;P&gt;*Jan 18 00:39:52: AAA/AUTHEN/ENABLE(00000084): Done status PASS &lt;/P&gt;&lt;P&gt;*Jan 18 00:39:54: AAA: parse name=tty450 idb type=-1 tty=-1&lt;/P&gt;&lt;P&gt;*Jan 18 00:39:54: AAA: name=tty450 flags=0x11 type=5 shelf=0 slot=0 adapter=0 port=450 channel=0&lt;/P&gt;&lt;P&gt;*Jan 18 00:39:54: AAA/MEMORY: create_user (0x62673AC0) user='NULL' ruser='crt-tw1-602' ds0=0 port='tty450' rem_addr='183.100.2.99' authen_type=ASCII service=NONE priv=0 initial_task_id='0', vrf= (id=0)&lt;/P&gt;&lt;P&gt;*Jan 18 00:39:54: AAA/MEMORY: free_user (0x62673AC0) user='NULL' ruser='crt-tw1-602' port='tty450' rem_addr='183.100.2.99' authen_type=ASCII service=NONE priv=0 vrf= (id=0)&lt;/P&gt;&lt;P&gt;*Jan 18 00:39:54: AAA: parse name=tty450 idb type=-1 tty=-1&lt;/P&gt;&lt;P&gt;*Jan 18 00:39:54: AAA: name=tty450 flags=0x11 type=5 shelf=0 slot=0 adapter=0 port=450 channel=0&lt;/P&gt;&lt;P&gt;*Jan 18 00:39:54: AAA/MEMORY: create_user (0x7067DF54) user='NULL' ruser='NULL' ds0=0 port='tty450' rem_addr='183.100.2.99' authen_type=ASCII service=ENABLE priv=15 initial_task_id='0', vrf= (id=0)&lt;/P&gt;&lt;P&gt;*Jan 18 00:39:54: AAA/AUTHEN/START (4129965333): port='tty450' list='' action=LOGIN service=ENABLE&lt;/P&gt;&lt;P&gt;*Jan 18 00:39:54: AAA/AUTHEN/START (4129965333): using "default" list&lt;/P&gt;&lt;P&gt;*Jan 18 00:39:54: AAA/AUTHEN/START (4129965333): Method=tacacs1 (tacacs+)&lt;/P&gt;&lt;P&gt;*Jan 18 00:39:54: TAC+: send AUTHEN/START packet ver=192 id=-165001963&lt;/P&gt;&lt;P&gt;*Jan 18 00:39:54: TAC+: ver=192 id=-165001963 received AUTHEN status = GETUSER&lt;/P&gt;&lt;P&gt;*Jan 18 00:39:54: AAA/AUTHEN(4129965333): Status=GETUSER&lt;/P&gt;&lt;P&gt;*Jan 18 00:40:06: AAA/AUTHEN/CONT (4129965333): continue_login (user='(undef)')&lt;/P&gt;&lt;P&gt;*Jan 18 00:40:06: AAA/AUTHEN(4129965333): Status=GETUSER&lt;/P&gt;&lt;P&gt;*Jan 18 00:40:06: AAA/AUTHEN(4129965333): Method=tacacs1 (tacacs+)&lt;/P&gt;&lt;P&gt;*Jan 18 00:40:06: TAC+: send AUTHEN/CONT packet id=-165001963&lt;/P&gt;&lt;P&gt;*Jan 18 00:40:06: TAC+: ver=192 id=-165001963 received AUTHEN status = GETPASS&lt;/P&gt;&lt;P&gt;*Jan 18 00:40:06: AAA/AUTHEN(4129965333): Status=GETPASS&lt;/P&gt;&lt;P&gt;*Jan 18 00:40:09: AAA/AUTHEN/CONT (4129965333): continue_login (user='lesterm.admin')&lt;/P&gt;&lt;P&gt;*Jan 18 00:40:09: AAA/AUTHEN(4129965333): Status=GETPASS&lt;/P&gt;&lt;P&gt;*Jan 18 00:40:09: AAA/AUTHEN(4129965333): Method=tacacs1 (tacacs+)&lt;/P&gt;&lt;P&gt;*Jan 18 00:40:09: TAC+: send AUTHEN/CONT packet id=-165001963&lt;/P&gt;&lt;P&gt;*Jan 18 00:40:10: TAC+: ver=192 id=-165001963 received AUTHEN status = PASS&lt;/P&gt;&lt;P&gt;*Jan 18 00:40:10: AAA/AUTHEN(4129965333): Status=PASS&lt;/P&gt;&lt;P&gt;*Jan 18 00:40:10: AAA/MEMORY: free_user (0x7067DF54) user='lesterm.admin' ruser='NULL' port='tty450' rem_addr='183.100.2.99' authen_type=ASCII service=ENABLE priv=15 vrf= (id=0)&lt;/P&gt;&lt;P&gt;crt-tw1-602#&lt;/P&gt;&lt;P&gt;crt-tw1-602#debug tacacs &lt;/P&gt;&lt;P&gt;TACACS access control debugging is on&lt;/P&gt;&lt;P&gt;crt-tw1-602#&lt;/P&gt;&lt;P&gt;*Jan 18 00:41:44: TPLUS: Queuing AAA Authentication request 133 for processing&lt;/P&gt;&lt;P&gt;*Jan 18 00:41:44: TPLUS: processing authentication start request id 133&lt;/P&gt;&lt;P&gt;*Jan 18 00:41:44: TPLUS: Authentication start packet created for 133()&lt;/P&gt;&lt;P&gt;*Jan 18 00:41:44: TPLUS: Using server 183.111.21.100&lt;/P&gt;&lt;P&gt;*Jan 18 00:41:44: TPLUS(00000085)/0/NB_WAIT/7050EE30: Started 5 sec timeout&lt;/P&gt;&lt;P&gt;*Jan 18 00:41:49: TPLUS(00000085)/0/NB_WAIT/7050EE30: timed out&lt;/P&gt;&lt;P&gt;*Jan 18 00:41:49: TPLUS(00000085)/0/NB_WAIT/7050EE30: timed out, clean up&lt;/P&gt;&lt;P&gt;*Jan 18 00:41:49: TPLUS(00000085)/0/7050EE30: Processing the reply packet&lt;/P&gt;&lt;P&gt;*Jan 18 00:41:58: TAC+: no tacacs servers defined in group "tacacs+"&lt;/P&gt;&lt;P&gt;*Jan 18 00:41:58: TAC+: send AUTHEN/START packet ver=192 id=1096121892&lt;/P&gt;&lt;P&gt;*Jan 18 00:41:58: TAC+: Using default tacacs server-group "tacacs1" list.&lt;/P&gt;&lt;P&gt;*Jan 18 00:41:58: TAC+: Opening TCP/IP to 183.111.21.100/49 timeout=5&lt;/P&gt;&lt;P&gt;*Jan 18 00:41:58: TAC+: Opened TCP/IP handle 0x7065A0B8 to 183.111.21.100/49 using source 183.109.191.11&lt;/P&gt;&lt;P&gt;*Jan 18 00:41:58: TAC+: 183.111.21.100 (1096121892) AUTHEN/START/LOGIN/ASCII queued&lt;/P&gt;&lt;P&gt;*Jan 18 00:41:58: TAC+: (1096121892) AUTHEN/START/LOGIN/ASCII processed&lt;/P&gt;&lt;P&gt;*Jan 18 00:41:58: TAC+: ver=192 id=1096121892 received AUTHEN status = GETUSER&lt;/P&gt;&lt;P&gt;*Jan 18 00:42:02: TAC+: send AUTHEN/CONT packet id=1096121892&lt;/P&gt;&lt;P&gt;*Jan 18 00:42:02: TAC+: 183.111.21.100 (1096121892) AUTHEN/CONT queued&lt;/P&gt;&lt;P&gt;*Jan 18 00:42:02: TAC+: (1096121892) AUTHEN/CONT processed&lt;/P&gt;&lt;P&gt;*Jan 18 00:42:02: TAC+: ver=192 id=1096121892 received AUTHEN status = GETPASS&lt;/P&gt;&lt;P&gt;*Jan 18 00:42:09: TAC+: send AUTHEN/CONT packet id=1096121892&lt;/P&gt;&lt;P&gt;*Jan 18 00:42:09: TAC+: 183.111.21.100 (1096121892) AUTHEN/CONT queued&lt;/P&gt;&lt;P&gt;*Jan 18 00:42:10: TAC+: (1096121892) AUTHEN/CONT processed&lt;/P&gt;&lt;P&gt;*Jan 18 00:42:10: TAC+: ver=192 id=1096121892 received AUTHEN status = FAIL&lt;/P&gt;&lt;P&gt;*Jan 18 00:42:10: TAC+: Closing TCP/IP 0x7065A0B8 connection to 183.111.21.100/49&lt;/P&gt;&lt;P&gt;*Jan 18 00:42:12: TAC+: no tacacs servers defined in group "tacacs+"&lt;/P&gt;&lt;P&gt;*Jan 18 00:42:12: TAC+: send AUTHEN/START packet ver=192 id=-1420048987&lt;/P&gt;&lt;P&gt;*Jan 18 00:42:12: TAC+: Using default tacacs server-group "tacacs1" list.&lt;/P&gt;&lt;P&gt;*Jan 18 00:42:12: TAC+: Opening TCP/IP to 183.111.21.100/49 timeout=5&lt;/P&gt;&lt;P&gt;*Jan 18 00:42:12: TAC+: Opened TCP/IP handle 0x62741B98 to 183.111.21.100/49 using source 183.109.191.11&lt;/P&gt;&lt;P&gt;*Jan 18 00:42:12: TAC+: 183.111.21.100 (2874918309) AUTHEN/START/LOGIN/ASCII queued&lt;/P&gt;&lt;P&gt;*Jan 18 00:42:12: TAC+: (2874918309) AUTHEN/START/LOGIN/ASCII processed&lt;/P&gt;&lt;P&gt;*Jan 18 00:42:12: TAC+: ver=192 id=-1420048987 received AUTHEN status = GETUSER&lt;/P&gt;&lt;P&gt;*Jan 18 00:42:16: TAC+: send AUTHEN/CONT packet id=-1420048987&lt;/P&gt;&lt;P&gt;*Jan 18 00:42:16: TAC+: 183.111.21.100 (2874918309) AUTHEN/CONT queued&lt;/P&gt;&lt;P&gt;*Jan 18 00:42:16: TAC+: (2874918309) AUTHEN/CONT processed&lt;/P&gt;&lt;P&gt;*Jan 18 00:42:16: TAC+: ver=192 id=-1420048987 received AUTHEN status = GETPASS&lt;/P&gt;&lt;P&gt;*Jan 18 00:42:19: TAC+: send AUTHEN/CONT packet id=-1420048987&lt;/P&gt;&lt;P&gt;*Jan 18 00:42:19: TAC+: 183.111.21.100 (2874918309) AUTHEN/CONT queued&lt;/P&gt;&lt;P&gt;*Jan 18 00:42:20: TAC+: (2874918309) AUTHEN/CONT processed&lt;/P&gt;&lt;P&gt;*Jan 18 00:42:20: TAC+: ver=192 id=-1420048987 received AUTHEN status = PASS&lt;/P&gt;&lt;P&gt;*Jan 18 00:42:20: TAC+: Closing TCP/IP 0x62741B98 connection to 183.111.21.100/49&lt;/P&gt;&lt;P&gt;crt-tw1-602#&lt;/P&gt;&lt;P&gt;crt-tw1-602#&lt;SPAN id="mce_marker"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;AAA Authentication debugging is on&lt;BR /&gt;crt-tw1-602#&lt;BR /&gt;*Jan 18 00:39:40: AAA/BIND(00000084): Bind i/f&amp;nbsp; &lt;BR /&gt;*Jan 18 00:39:40: AAA/AUTHEN/LOGIN (00000084): Pick method list 'default' &lt;BR /&gt;*Jan 18 00:39:45: AAA/AUTHEN/ENABLE(00000084): Processing request action LOGIN&lt;BR /&gt;*Jan 18 00:39:45: AAA/AUTHEN/ENABLE(00000084): Done status GET_PASSWORD &lt;BR /&gt;*Jan 18 00:39:52: AAA/AUTHEN/ENABLE(00000084): Processing request action LOGIN&lt;BR /&gt;*Jan 18 00:39:52: AAA/AUTHEN/ENABLE(00000084): Done status PASS &lt;BR /&gt;*Jan 18 00:39:54: AAA: parse name=tty450 idb type=-1 tty=-1&lt;BR /&gt;*Jan 18 00:39:54: AAA: name=tty450 flags=0x11 type=5 shelf=0 slot=0 adapter=0 port=450 channel=0&lt;BR /&gt;*Jan 18 00:39:54: AAA/MEMORY: create_user (0x62673AC0) user='NULL' ruser='crt-tw1-602' ds0=0 port='tty450' rem_addr='183.100.2.99' authen_type=ASCII service=NONE priv=0 initial_task_id='0', vrf= (id=0)&lt;BR /&gt;*Jan 18 00:39:54: AAA/MEMORY: free_user (0x62673AC0) user='NULL' ruser='crt-tw1-602' port='tty450' rem_addr='183.100.2.99' authen_type=ASCII service=NONE priv=0 vrf= (id=0)&lt;BR /&gt;*Jan 18 00:39:54: AAA: parse name=tty450 idb type=-1 tty=-1&lt;BR /&gt;*Jan 18 00:39:54: AAA: name=tty450 flags=0x11 type=5 shelf=0 slot=0 adapter=0 port=450 channel=0&lt;BR /&gt;*Jan 18 00:39:54: AAA/MEMORY: create_user (0x7067DF54) user='NULL' ruser='NULL' ds0=0 port='tty450' rem_addr='183.100.2.99' authen_type=ASCII service=ENABLE priv=15 initial_task_id='0', vrf= (id=0)&lt;BR /&gt;*Jan 18 00:39:54: AAA/AUTHEN/START (4129965333): port='tty450' list='' action=LOGIN service=ENABLE&lt;BR /&gt;*Jan 18 00:39:54: AAA/AUTHEN/START (4129965333): using "default" list&lt;BR /&gt;*Jan 18 00:39:54: AAA/AUTHEN/START (4129965333): Method=tacacs1 (tacacs+)&lt;BR /&gt;*Jan 18 00:39:54: TAC+: send AUTHEN/START packet ver=192 id=-165001963&lt;BR /&gt;*Jan 18 00:39:54: TAC+: ver=192 id=-165001963 received AUTHEN status = GETUSER&lt;BR /&gt;*Jan 18 00:39:54: AAA/AUTHEN(4129965333): Status=GETUSER&lt;BR /&gt;*Jan 18 00:40:06: AAA/AUTHEN/CONT (4129965333): continue_login (user='(undef)')&lt;BR /&gt;*Jan 18 00:40:06: AAA/AUTHEN(4129965333): Status=GETUSER&lt;BR /&gt;*Jan 18 00:40:06: AAA/AUTHEN(4129965333): Method=tacacs1 (tacacs+)&lt;BR /&gt;*Jan 18 00:40:06: TAC+: send AUTHEN/CONT packet id=-165001963&lt;BR /&gt;*Jan 18 00:40:06: TAC+: ver=192 id=-165001963 received AUTHEN status = GETPASS&lt;BR /&gt;*Jan 18 00:40:06: AAA/AUTHEN(4129965333): Status=GETPASS&lt;BR /&gt;*Jan 18 00:40:09: AAA/AUTHEN/CONT (4129965333): continue_login (user='lesterm.admin')&lt;BR /&gt;*Jan 18 00:40:09: AAA/AUTHEN(4129965333): Status=GETPASS&lt;BR /&gt;*Jan 18 00:40:09: AAA/AUTHEN(4129965333): Method=tacacs1 (tacacs+)&lt;BR /&gt;*Jan 18 00:40:09: TAC+: send AUTHEN/CONT packet id=-165001963&lt;BR /&gt;*Jan 18 00:40:10: TAC+: ver=192 id=-165001963 received AUTHEN status = PASS&lt;BR /&gt;*Jan 18 00:40:10: AAA/AUTHEN(4129965333): Status=PASS&lt;BR /&gt;*Jan 18 00:40:10: AAA/MEMORY: free_user (0x7067DF54) user='lesterm.admin' ruser='NULL' port='tty450' rem_addr='183.100.2.99' authen_type=ASCII service=ENABLE priv=15 vrf= (id=0)&lt;BR /&gt;crt-tw1-602#&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;crt-tw1-602#debug tacacs &lt;BR /&gt;TACACS access control debugging is on&lt;BR /&gt;crt-tw1-602#&lt;BR /&gt;*Jan 18 00:41:44: TPLUS: Queuing AAA Authentication request 133 for processing&lt;BR /&gt;*Jan 18 00:41:44: TPLUS: processing authentication start request id 133&lt;BR /&gt;*Jan 18 00:41:44: TPLUS: Authentication start packet created for 133()&lt;BR /&gt;*Jan 18 00:41:44: TPLUS: Using server 183.111.21.100&lt;BR /&gt;*Jan 18 00:41:44: TPLUS(00000085)/0/NB_WAIT/7050EE30: Started 5 sec timeout&lt;BR /&gt;*Jan 18 00:41:49: TPLUS(00000085)/0/NB_WAIT/7050EE30: timed out&lt;BR /&gt;*Jan 18 00:41:49: TPLUS(00000085)/0/NB_WAIT/7050EE30: timed out, clean up&lt;BR /&gt;*Jan 18 00:41:49: TPLUS(00000085)/0/7050EE30: Processing the reply packet&lt;BR /&gt;*Jan 18 00:41:58: TAC+: no tacacs servers defined in group "tacacs+"&lt;BR /&gt;*Jan 18 00:41:58: TAC+: send AUTHEN/START packet ver=192 id=1096121892&lt;BR /&gt;*Jan 18 00:41:58: TAC+: Using default tacacs server-group "tacacs1" list.&lt;BR /&gt;*Jan 18 00:41:58: TAC+: Opening TCP/IP to 183.111.21.100/49 timeout=5&lt;BR /&gt;*Jan 18 00:41:58: TAC+: Opened TCP/IP handle 0x7065A0B8 to 183.111.21.100/49 using source 183.109.191.11&lt;BR /&gt;*Jan 18 00:41:58: TAC+: 183.111.21.100 (1096121892) AUTHEN/START/LOGIN/ASCII queued&lt;BR /&gt;*Jan 18 00:41:58: TAC+: (1096121892) AUTHEN/START/LOGIN/ASCII processed&lt;BR /&gt;*Jan 18 00:41:58: TAC+: ver=192 id=1096121892 received AUTHEN status = GETUSER&lt;BR /&gt;*Jan 18 00:42:02: TAC+: send AUTHEN/CONT packet id=1096121892&lt;BR /&gt;*Jan 18 00:42:02: TAC+: 183.111.21.100 (1096121892) AUTHEN/CONT queued&lt;BR /&gt;*Jan 18 00:42:02: TAC+: (1096121892) AUTHEN/CONT processed&lt;BR /&gt;*Jan 18 00:42:02: TAC+: ver=192 id=1096121892 received AUTHEN status = GETPASS&lt;BR /&gt;*Jan 18 00:42:09: TAC+: send AUTHEN/CONT packet id=1096121892&lt;BR /&gt;*Jan 18 00:42:09: TAC+: 183.111.21.100 (1096121892) AUTHEN/CONT queued&lt;BR /&gt;*Jan 18 00:42:10: TAC+: (1096121892) AUTHEN/CONT processed&lt;BR /&gt;*Jan 18 00:42:10: TAC+: ver=192 id=1096121892 received AUTHEN status = FAIL&lt;BR /&gt;*Jan 18 00:42:10: TAC+: Closing TCP/IP 0x7065A0B8 connection to 183.111.21.100/49&lt;BR /&gt;*Jan 18 00:42:12: TAC+: no tacacs servers defined in group "tacacs+"&lt;BR /&gt;*Jan 18 00:42:12: TAC+: send AUTHEN/START packet ver=192 id=-1420048987&lt;BR /&gt;*Jan 18 00:42:12: TAC+: Using default tacacs server-group "tacacs1" list.&lt;BR /&gt;*Jan 18 00:42:12: TAC+: Opening TCP/IP to 183.111.21.100/49 timeout=5&lt;BR /&gt;*Jan 18 00:42:12: TAC+: Opened TCP/IP handle 0x62741B98 to 183.111.21.100/49 using source 183.109.191.11&lt;BR /&gt;*Jan 18 00:42:12: TAC+: 183.111.21.100 (2874918309) AUTHEN/START/LOGIN/ASCII queued&lt;BR /&gt;*Jan 18 00:42:12: TAC+: (2874918309) AUTHEN/START/LOGIN/ASCII processed&lt;BR /&gt;*Jan 18 00:42:12: TAC+: ver=192 id=-1420048987 received AUTHEN status = GETUSER&lt;BR /&gt;*Jan 18 00:42:16: TAC+: send AUTHEN/CONT packet id=-1420048987&lt;BR /&gt;*Jan 18 00:42:16: TAC+: 183.111.21.100 (2874918309) AUTHEN/CONT queued&lt;BR /&gt;*Jan 18 00:42:16: TAC+: (2874918309) AUTHEN/CONT processed&lt;BR /&gt;*Jan 18 00:42:16: TAC+: ver=192 id=-1420048987 received AUTHEN status = GETPASS&lt;BR /&gt;*Jan 18 00:42:19: TAC+: send AUTHEN/CONT packet id=-1420048987&lt;BR /&gt;*Jan 18 00:42:19: TAC+: 183.111.21.100 (2874918309) AUTHEN/CONT queued&lt;BR /&gt;*Jan 18 00:42:20: TAC+: (2874918309) AUTHEN/CONT processed&lt;BR /&gt;*Jan 18 00:42:20: TAC+: ver=192 id=-1420048987 received AUTHEN status = PASS&lt;BR /&gt;*Jan 18 00:42:20: TAC+: Closing TCP/IP 0x62741B98 connection to 183.111.21.100/49&lt;BR /&gt;crt-tw1-602#&lt;BR /&gt;crt-tw1-602#&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 17 Jan 2012 16:31:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tacacs-per-vrf/m-p/1871269#M198993</guid>
      <dc:creator>lester-mendoza</dc:creator>
      <dc:date>2012-01-17T16:31:46Z</dc:date>
    </item>
    <item>
      <title>tacacs per VRF</title>
      <link>https://community.cisco.com/t5/network-access-control/tacacs-per-vrf/m-p/1871270#M198994</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Lester,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do you have "tacacs-server" commands on your running configuration? For example:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; tacacs-server host 1.1.1.1 key cisco123 &lt;/P&gt;&lt;P&gt;tacacs-server host 2.2.2.2 key cisco123 &lt;/P&gt;&lt;P&gt;tacacs-server timeout 10&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If not, can you define your TACACS+ server IP address and key as described above? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 17 Jan 2012 16:54:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tacacs-per-vrf/m-p/1871270#M198994</guid>
      <dc:creator>camejia</dc:creator>
      <dc:date>2012-01-17T16:54:27Z</dc:date>
    </item>
    <item>
      <title>tacacs per VRF</title>
      <link>https://community.cisco.com/t5/network-access-control/tacacs-per-vrf/m-p/1871271#M198995</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Lester,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Were you able to test my last suggestion and test again?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 18 Jan 2012 19:30:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tacacs-per-vrf/m-p/1871271#M198995</guid>
      <dc:creator>camejia</dc:creator>
      <dc:date>2012-01-18T19:30:31Z</dc:date>
    </item>
    <item>
      <title>tacacs per VRF</title>
      <link>https://community.cisco.com/t5/network-access-control/tacacs-per-vrf/m-p/1871272#M198996</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Dear Carlos,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've tried to configure your first suggestion to different (2nd)router and its working, the only difference is the IOS, then i decided to configure again to my 3rd router with the same IOS as my 1st router and it was failed again with the same error&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;c3845-ipbase-mz.124-17b.bin - working&lt;/P&gt;&lt;P&gt;c3845-ipbase-mz.124-17a.bin - not working&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;my working config below&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;aaa group server tacacs+ tacacs1&lt;/P&gt;&lt;P&gt; server-private 183.111.21.100 key 7 08701E430E1F100D08025C5D&lt;/P&gt;&lt;P&gt; ip vrf forwarding NMS&lt;/P&gt;&lt;P&gt; ip tacacs source-interface Vlan89&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;aaa authentication login default group tacacs1 enable&lt;/P&gt;&lt;P&gt;aaa authentication enable default group tacacs1 enable&lt;/P&gt;&lt;P&gt;aaa authorization commands 0 default group tacacs+ none &lt;/P&gt;&lt;P&gt;aaa authorization commands 1 default group tacacs+ none &lt;/P&gt;&lt;P&gt;aaa authorization commands 15 default group tacacs+ none &lt;/P&gt;&lt;P&gt;!&lt;SPAN id="mce_marker"&gt; &lt;/SPAN&gt;!&lt;BR /&gt;aaa group server tacacs+ tacacs1&lt;BR /&gt; server-private 183.X.X.X key 7 XXXXXX&lt;/P&gt;&lt;P&gt; ip vrf forwarding NMS&lt;BR /&gt; ip tacacs source-interface Vlan89&lt;BR /&gt;!&lt;BR /&gt;aaa authentication login default group tacacs1 enable&lt;BR /&gt;aaa authentication enable default group tacacs1 enable&lt;BR /&gt;aaa authorization commands 0 default group tacacs+ none &lt;BR /&gt;aaa authorization commands 1 default group tacacs+ none &lt;BR /&gt;aaa authorization commands 15 default group tacacs+ none &lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;im just thinking this is due to IOS? any advice?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 18 Jan 2012 23:42:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tacacs-per-vrf/m-p/1871272#M198996</guid>
      <dc:creator>lester-mendoza</dc:creator>
      <dc:date>2012-01-18T23:42:24Z</dc:date>
    </item>
    <item>
      <title>tacacs per VRF</title>
      <link>https://community.cisco.com/t5/network-access-control/tacacs-per-vrf/m-p/1871273#M198997</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Lester,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now that you shared the working and not working IOS version I was able to find the root cause of the issue: BUG &lt;SPAN __jive_emoticon_name="silly" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/silly.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://tools.cisco.com/Support/BugToolKit/search/getBugDetails.do?method=fetchBugDetails&amp;amp;bugId=CSCsl39449"&gt;http://tools.cisco.com/Support/BugToolKit/search/getBugDetails.do?method=fetchBugDetails&amp;amp;bugId=CSCsl39449&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;TABLE border="0" cellpadding="5" cellspacing="2" width="100%"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD colspan="2" style="font-size: 88%; padding: 8px;"&gt;&lt;STRONG&gt;VRF aware tacacs config does not work &lt;/STRONG&gt; &lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="font-size: 88%; padding: 0px 8px 8px;" valign="top"&gt;&lt;BR /&gt; &lt;BR /&gt; &lt;STRONG&gt;Symptom&lt;/STRONG&gt;:&lt;BR /&gt; &lt;BR /&gt; TACACS+ authentication fails for all users.&lt;BR /&gt; &lt;BR /&gt; &lt;STRONG&gt;Conditions&lt;/STRONG&gt;:&lt;P&gt;&lt;/P&gt;Occurs only in VRF TACACS+ setup, when&amp;nbsp; &lt;STRONG&gt;ip vrf&lt;BR /&gt;forwarding&lt;/STRONG&gt;&lt;EM&gt; &amp;lt; vrf name&amp;gt;&lt;/EM&gt; command is configured for&lt;BR /&gt;AAA TACACS+ server group&lt;BR /&gt; under &lt;STRONG&gt;aaa group server tacacs+&lt;/STRONG&gt;.&lt;BR /&gt; &lt;BR /&gt; Workaround:&lt;P&gt;&lt;/P&gt;There is no workaround.&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;IOS version 12.4(17a) is listed as a known affected version while 12.4(17b) is listed as a fixed version. Great approach testing the configuration on another IOS Version.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Best Regards.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 18 Jan 2012 23:55:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tacacs-per-vrf/m-p/1871273#M198997</guid>
      <dc:creator>camejia</dc:creator>
      <dc:date>2012-01-18T23:55:24Z</dc:date>
    </item>
    <item>
      <title>tacacs per VRF</title>
      <link>https://community.cisco.com/t5/network-access-control/tacacs-per-vrf/m-p/1871274#M198998</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Dear Carlo&lt;/P&gt;&lt;P&gt;I really appreciated your kind help and expertise&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;have a nice day&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;rgds&lt;/P&gt;&lt;P&gt;lester&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 19 Jan 2012 00:25:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tacacs-per-vrf/m-p/1871274#M198998</guid>
      <dc:creator>lester-mendoza</dc:creator>
      <dc:date>2012-01-19T00:25:03Z</dc:date>
    </item>
  </channel>
</rss>

