<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic What is the issue you are in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/3850-aaa-using-mgmt-vrf/m-p/3028098#M24371</link>
    <description>&lt;P&gt;What is the issue you are seeing? Is the TACACS packet not reaching the server? Try setting it up using the "aaa group server tacacs+ [Group_Name]" instead of tacacs-server. You should be able to specify the vrf for the aaa servers using the "ip vrf forwarding command". Use the following doc as reference:&lt;/P&gt;
&lt;P&gt;http://www.cisco.com/c/en/us/support/docs/security-vpn/terminal-access-controller-access-control-system-tacacs-/113667-ios-vrf-tshoot.html&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
    <pubDate>Fri, 20 Jan 2017 03:54:31 GMT</pubDate>
    <dc:creator>Rahul Govindan</dc:creator>
    <dc:date>2017-01-20T03:54:31Z</dc:date>
    <item>
      <title>3850 aaa using Mgmt-vrf</title>
      <link>https://community.cisco.com/t5/network-access-control/3850-aaa-using-mgmt-vrf/m-p/3028097#M24367</link>
      <description>&lt;P&gt;I have a 3550 running the latest IOS, cat3k_caa-universalk9. I am having an issue getting aaa authentication working. Below is a copy of my config.&lt;/P&gt;
&lt;DIV&gt;&lt;SPAN class="ansi0 bgAnsi15"&gt;aaa new-model&lt;/SPAN&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN class="ansi0 bgAnsi15"&gt;!&lt;/SPAN&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN class="ansi0 bgAnsi15"&gt;!&lt;/SPAN&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN class="ansi0 bgAnsi15"&gt;aaa authentication login default group tacacs+ local&lt;/SPAN&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN class="ansi0 bgAnsi15"&gt;aaa authentication login http local&lt;/SPAN&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN class="ansi0 bgAnsi15"&gt;aaa authentication enable default group tacacs+ enable&lt;/SPAN&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN class="ansi0 bgAnsi15"&gt;aaa authorization exec default group tacacs+ local &lt;/SPAN&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN class="ansi0 bgAnsi15"&gt;aaa authorization commands 15 default group tacacs+ if-authenticated &lt;/SPAN&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN class="ansi0 bgAnsi15"&gt;aaa authorization network default group tacacs+ local &lt;/SPAN&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN class="ansi0 bgAnsi15"&gt;aaa accounting exec default start-stop group tacacs+&lt;/SPAN&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN class="ansi0 bgAnsi15"&gt;aaa accounting commands 1 default stop-only group tacacs+&lt;/SPAN&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN class="ansi0 bgAnsi15"&gt;aaa accounting commands 15 default start-stop group tacacs+&lt;/SPAN&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN class="ansi0 bgAnsi15"&gt;aaa accounting network default start-stop group tacacs+&lt;/SPAN&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN class="ansi0 bgAnsi15"&gt;aaa accounting connection default start-stop group tacacs+&lt;/SPAN&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN class="ansi0 bgAnsi15"&gt;aaa accounting system default start-stop group tacacs+&lt;/SPAN&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN class="ansi0 bgAnsi15"&gt;aaa local authentication default authorization default&lt;/SPAN&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN class="ansi0 bgAnsi15"&gt;! &lt;/SPAN&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN class="ansi0 bgAnsi15"&gt;! &lt;/SPAN&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN class="ansi0 bgAnsi15"&gt;! &lt;/SPAN&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN class="ansi0 bgAnsi15"&gt;! &lt;/SPAN&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN class="ansi0 bgAnsi15"&gt;! &lt;/SPAN&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN class="ansi0 bgAnsi15"&gt;! &lt;/SPAN&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN class="ansi0 bgAnsi15"&gt;aaa session-id common&lt;/SPAN&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;!&lt;/DIV&gt;
&lt;DIV&gt;!&lt;/DIV&gt;
&lt;DIV&gt;-----&lt;/DIV&gt;
&lt;DIV&gt;
&lt;DIV&gt;&lt;SPAN class="ansi0 bgAnsi15"&gt;interface GigabitEthernet0/0&lt;/SPAN&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN class="ansi0 bgAnsi15"&gt; vrf forwarding Mgmt-vrf&lt;/SPAN&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN class="ansi0 bgAnsi15"&gt; ip address 10.226.96.190 255.255.255.0&lt;/SPAN&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN class="ansi0 bgAnsi15"&gt; negotiation auto&lt;/SPAN&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN&gt;------------&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;
&lt;DIV&gt;&lt;SPAN class="ansi0 bgAnsi15"&gt;ip route vrf Mgmt-vrf 10.0.0.0 255.0.0.0 10.226.96.1&lt;/SPAN&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN class="ansi0 bgAnsi15"&gt;ip tacacs source-interface GigabitEthernet0/0&lt;/SPAN&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN class="ansi0 bgAnsi15"&gt;&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN class="ansi0 bgAnsi15"&gt;------------&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;
&lt;DIV&gt;&lt;SPAN class="ansi0 bgAnsi15"&gt;tacacs-server directed-request&lt;/SPAN&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN class="ansi0 bgAnsi15"&gt;tacacs server 10.226.96.253&lt;/SPAN&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN class="ansi0 bgAnsi15"&gt;&amp;nbsp;address ipv4 10.226.96.253&lt;/SPAN&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN class="ansi0 bgAnsi15"&gt;&amp;nbsp;key&amp;nbsp;****************&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN class="ansi0 bgAnsi15"&gt;&amp;nbsp;timeout 5&lt;/SPAN&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN class="ansi0 bgAnsi15"&gt;&amp;nbsp;single-connection&lt;/SPAN&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN class="ansi0 bgAnsi15"&gt;tacacs server 10.226.96.254&lt;/SPAN&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN class="ansi0 bgAnsi15"&gt;&amp;nbsp;address ipv4 10.226.96.254&lt;/SPAN&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN class="ansi0 bgAnsi15"&gt;&amp;nbsp;key **************&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN class="ansi0 bgAnsi15"&gt;&amp;nbsp;timeout 5&lt;/SPAN&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN class="ansi0 bgAnsi15"&gt;&amp;nbsp;single-connection&lt;/SPAN&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;</description>
      <pubDate>Mon, 11 Mar 2019 07:22:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/3850-aaa-using-mgmt-vrf/m-p/3028097#M24367</guid>
      <dc:creator>scottsassin</dc:creator>
      <dc:date>2019-03-11T07:22:53Z</dc:date>
    </item>
    <item>
      <title>What is the issue you are</title>
      <link>https://community.cisco.com/t5/network-access-control/3850-aaa-using-mgmt-vrf/m-p/3028098#M24371</link>
      <description>&lt;P&gt;What is the issue you are seeing? Is the TACACS packet not reaching the server? Try setting it up using the "aaa group server tacacs+ [Group_Name]" instead of tacacs-server. You should be able to specify the vrf for the aaa servers using the "ip vrf forwarding command". Use the following doc as reference:&lt;/P&gt;
&lt;P&gt;http://www.cisco.com/c/en/us/support/docs/security-vpn/terminal-access-controller-access-control-system-tacacs-/113667-ios-vrf-tshoot.html&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 20 Jan 2017 03:54:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/3850-aaa-using-mgmt-vrf/m-p/3028098#M24371</guid>
      <dc:creator>Rahul Govindan</dc:creator>
      <dc:date>2017-01-20T03:54:31Z</dc:date>
    </item>
  </channel>
</rss>

