<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ACS 5.4 and Juniper J-Web in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/acs-5-4-and-juniper-j-web/m-p/2219622#M250308</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I spanned the Juniper connected port and then attempted to connect to the GUI&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I could see my https sessions within wireshark but there was no inidication of any Tacacs authentication occuring. I'd at least expect some TCP traffic on port 49?&lt;/P&gt;&lt;P&gt;I repeated the logon via the root account and saw exactly the same thing, except that the root acount successfully logged into the device&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am sure that this is a mapping issue in that my user (jweb) is not mapping correctly within the command set.&lt;/P&gt;&lt;P&gt;I have vsys set as mandatory root and privilege as mandatory but this is isn't working (in my opinion)&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 31 May 2013 13:21:24 GMT</pubDate>
    <dc:creator>Simon Young</dc:creator>
    <dc:date>2013-05-31T13:21:24Z</dc:date>
    <item>
      <title>ACS 5.4 and Juniper J-Web</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-4-and-juniper-j-web/m-p/2219611#M249420</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have set up an ACS 5.4 box and have some test devices connected to it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cisco and Juniper, both working fine using TACACS&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I can connect to both using SSH or Telnet but my problem is the J-Web Juniper GUI&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I can access the J-web no problem with the root account. &lt;/P&gt;&lt;P&gt;I can not seem to get it to work, no matter what I try. Here is my shell from the ACS box&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG src="https://community.cisco.com/legacyfs/online/legacy/9/1/7/140719-Untitled.jpg" alt="Untitled.jpg" class="jive-image-thumbnail jive-image" width="450" /&gt;&lt;/P&gt;&lt;P&gt;And the following Juniper configuration.&amp;nbsp; I have tried binding the local-user-name attribute to both the remote and remoteadmin with no luck. Anyone have any ideas how I can resolve this??? Or if its even possible?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;version 9.6R1.13;&lt;/P&gt;&lt;P&gt;system {&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; host-name Juniper-Firewall;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; authentication-order [ tacplus password ];&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; root-authentication {&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; encrypted-password "$1$1tRuy9o2$LwSPxNwe4XGNMOMIMo1pd1"; ## SECRET-DATA&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; }&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; tacplus-server {&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 10.251.200.25 {&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; secret "$9$zaUL6/AtuOIRS5QF/CuEhws2"; ## SECRET-DATA&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; timeout 10;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; single-connection;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; }&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; }&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; accounting {&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; events [ login change-log interactive-commands ];&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; destination {&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; tacplus;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; }&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; }&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; login {&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; user admin {&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; uid 2001;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; class super-user;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; authentication {&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; encrypted-password "$1$MNUZBLFW$X2sJL/UTgRYcgBNV4RLe.0"; ## SECRET-DATA&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; }&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; }&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; user remote {&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; full-name "Remote User";&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; uid 2025;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; class operator;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; }&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; user remoteadmin {&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; full-name "Remote Admin";&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; uid 2026;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; class super-user;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; }&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; }&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; services {&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ssh;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; telnet;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; web-management {&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; https {&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; system-generated-certificate;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; interface fe-0/0/0.0;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 03:29:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-4-and-juniper-j-web/m-p/2219611#M249420</guid>
      <dc:creator>Simon Young</dc:creator>
      <dc:date>2019-03-11T03:29:11Z</dc:date>
    </item>
    <item>
      <title>ACS 5.4 and Juniper J-Web</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-4-and-juniper-j-web/m-p/2219612#M249484</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;What do you see in acs/tacacs logs while authenticating for J-web?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is that possible we can run the packet capture on the ACS 4.2 ( in case it is windows)?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jatin Katyal &lt;BR /&gt;- Do rate helpful posts -&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 30 May 2013 13:03:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-4-and-juniper-j-web/m-p/2219612#M249484</guid>
      <dc:creator>Jatin Katyal</dc:creator>
      <dc:date>2013-05-30T13:03:51Z</dc:date>
    </item>
    <item>
      <title>ACS 5.4 and Juniper J-Web</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-4-and-juniper-j-web/m-p/2219613#M249581</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jatin&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am running ACS 5.4, so I am not sure what you mean when you say packet capture on 4.2 (I don't have this)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Which logs should I access? And is there an issue with windows?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 30 May 2013 14:25:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-4-and-juniper-j-web/m-p/2219613#M249581</guid>
      <dc:creator>Simon Young</dc:creator>
      <dc:date>2013-05-30T14:25:31Z</dc:date>
    </item>
    <item>
      <title>ACS 5.4 and Juniper J-Web</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-4-and-juniper-j-web/m-p/2219614#M249664</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;sorry, my bad. I was helping someone on ACS 4.2 as well.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Look at tacacs authorization under logging and monitoring. I mentioned windows because in case of appliance either we have to take tcpdump or span the switch port to take packet capture.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jatin Katyal &lt;BR /&gt;- Do rate helpful posts -&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 30 May 2013 14:40:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-4-and-juniper-j-web/m-p/2219614#M249664</guid>
      <dc:creator>Jatin Katyal</dc:creator>
      <dc:date>2013-05-30T14:40:12Z</dc:date>
    </item>
    <item>
      <title>ACS 5.4 and Juniper J-Web</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-4-and-juniper-j-web/m-p/2219615#M249776</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I am not seeing any recent entries in the tacacs authorization. I can see the SSH highlighted below. I am not seeing any http logging, not sure if I have to turn something on in ACS?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My Juniper is stating, failure with the Tacacs user and success with the root user?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="mailto:root@Juniper-Firewall"&gt;root@Juniper-Firewall&lt;/A&gt;&amp;gt; show log messages&lt;BR /&gt;May 30 15:41:32 Juniper-Firewall clear-log[11338]: logfile cleared&lt;BR /&gt;May 30 15:37:00&amp;nbsp; Juniper-Firewall last message repeated 2 times&lt;BR /&gt;May 30 15:41:45&amp;nbsp; Juniper-Firewall checklogin[11346]: WEB_AUTH_FAIL: Unable to authenticate httpd client (username Jweb)&lt;BR /&gt;May 30 15:47:01&amp;nbsp; Juniper-Firewall checklogin[11358]: WEB_AUTH_SUCCESS: Authenticated httpd client (username root)&lt;BR /&gt;May 30 15:48:26&amp;nbsp; Juniper-Firewall checklogin[11399]: WEB_AUTH_FAIL: Unable to authenticate httpd client (username Jweb)&lt;BR /&gt;&lt;STRONG&gt;May 30 15:48:55&amp;nbsp; Juniper-Firewall sshd[11402]: Accepted password for jweb from x.x.x.x port 54501 ssh2&lt;/STRONG&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 30 May 2013 14:51:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-4-and-juniper-j-web/m-p/2219615#M249776</guid>
      <dc:creator>Simon Young</dc:creator>
      <dc:date>2013-05-30T14:51:56Z</dc:date>
    </item>
    <item>
      <title>ACS 5.4 and Juniper J-Web</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-4-and-juniper-j-web/m-p/2219616#M249881</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;have you gone through this&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://kb.juniper.net/InfoCenter/index?page=content&amp;amp;id=KB24437"&gt;http://kb.juniper.net/InfoCenter/index?page=content&amp;amp;id=KB24437&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jatin Katyal &lt;/P&gt;&lt;P&gt;- Do rate helpful posts -&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 30 May 2013 16:04:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-4-and-juniper-j-web/m-p/2219616#M249881</guid>
      <dc:creator>Jatin Katyal</dc:creator>
      <dc:date>2013-05-30T16:04:58Z</dc:date>
    </item>
    <item>
      <title>ACS 5.4 and Juniper J-Web</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-4-and-juniper-j-web/m-p/2219617#M249958</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;OR&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You may try this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;OL type="1"&gt;&lt;LI id="jd0e3350"&gt;In the J-Web user interface, select &lt;STRONG&gt;Configure&amp;gt;System Properties&amp;gt;User Management&lt;/STRONG&gt;.&lt;/LI&gt;&lt;LI id="jd0e3356"&gt;Click &lt;STRONG&gt;Edit&lt;/STRONG&gt;. The Edit User Management dialog box appears. &lt;/LI&gt;&lt;LI&gt;Select the &lt;STRONG&gt;Authentication Method and Order &lt;/STRONG&gt; tab. &lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Just make sure the first authentication method is tacacs and fallback is local.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jatin Katyal &lt;BR /&gt; - Do rate helpful posts -&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 30 May 2013 16:08:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-4-and-juniper-j-web/m-p/2219617#M249958</guid>
      <dc:creator>Jatin Katyal</dc:creator>
      <dc:date>2013-05-30T16:08:57Z</dc:date>
    </item>
    <item>
      <title>Re: ACS 5.4 and Juniper J-Web</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-4-and-juniper-j-web/m-p/2219618#M250042</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I had seen that post and it is exactly the same as what I am seeing but my settings were already configured correctly.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have doubled checked the settings via Jweb and they are as expected.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have no idea why this doesn't work&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 30 May 2013 17:59:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-4-and-juniper-j-web/m-p/2219618#M250042</guid>
      <dc:creator>Simon Young</dc:creator>
      <dc:date>2013-05-30T17:59:21Z</dc:date>
    </item>
    <item>
      <title>Re: ACS 5.4 and Juniper J-Web</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-4-and-juniper-j-web/m-p/2219619#M250123</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I could only see the below listed error.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;May 30 15:48:26&amp;nbsp; Juniper-Firewall checklogin[11399]: WEB_AUTH_FAIL: Unable to authenticate httpd client (username Jweb)&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is there any detailed debbuging or logging related to tacacs or aaa that we can run and further isolate this issue.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We can also run the packet capture on the ACS side and take a look.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jatin Katyal &lt;BR /&gt; - Do rate helpful posts -&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 30 May 2013 18:03:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-4-and-juniper-j-web/m-p/2219619#M250123</guid>
      <dc:creator>Jatin Katyal</dc:creator>
      <dc:date>2013-05-30T18:03:07Z</dc:date>
    </item>
    <item>
      <title>Re: ACS 5.4 and Juniper J-Web</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-4-and-juniper-j-web/m-p/2219620#M250179</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;how do i run the packet capture on the acs?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 30 May 2013 18:16:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-4-and-juniper-j-web/m-p/2219620#M250179</guid>
      <dc:creator>Simon Young</dc:creator>
      <dc:date>2013-05-30T18:16:55Z</dc:date>
    </item>
    <item>
      <title>Re: ACS 5.4 and Juniper J-Web</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-4-and-juniper-j-web/m-p/2219621#M250241</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Well you can take tcpdump and that can only be done via bash shell/root access. I may not be able to help you here as there is a special patch that need to be applied on the ACS before we run tcpdump. For now, would it be possible for you to span the switch port where acs is connected.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;do share the tacacs key so that we can decode it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jatin Katyal &lt;/P&gt;&lt;P&gt;- Do rate helpful posts -&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 30 May 2013 18:22:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-4-and-juniper-j-web/m-p/2219621#M250241</guid>
      <dc:creator>Jatin Katyal</dc:creator>
      <dc:date>2013-05-30T18:22:30Z</dc:date>
    </item>
    <item>
      <title>Re: ACS 5.4 and Juniper J-Web</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-4-and-juniper-j-web/m-p/2219622#M250308</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I spanned the Juniper connected port and then attempted to connect to the GUI&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I could see my https sessions within wireshark but there was no inidication of any Tacacs authentication occuring. I'd at least expect some TCP traffic on port 49?&lt;/P&gt;&lt;P&gt;I repeated the logon via the root account and saw exactly the same thing, except that the root acount successfully logged into the device&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am sure that this is a mapping issue in that my user (jweb) is not mapping correctly within the command set.&lt;/P&gt;&lt;P&gt;I have vsys set as mandatory root and privilege as mandatory but this is isn't working (in my opinion)&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 31 May 2013 13:21:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-4-and-juniper-j-web/m-p/2219622#M250308</guid>
      <dc:creator>Simon Young</dc:creator>
      <dc:date>2013-05-31T13:21:24Z</dc:date>
    </item>
    <item>
      <title>Re: ACS 5.4 and Juniper J-Web</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-4-and-juniper-j-web/m-p/2219623#M250368</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;since ssh is working with tacacs there should not be a port tco 49 issue. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The below listed config confirms that https is enabled using self-signed certificate.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;services {&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ssh;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; telnet;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; web-management {&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; https {&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; system-generated-certificate;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; interface fe-0/0/0.0;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;STRONG&gt;If I am not wrong, you don't even see &lt;SPAN style="text-decoration: underline;"&gt;passed or failed authentication&lt;/SPAN&gt; on ACS under tacacs authentication.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jatin Katyal &lt;BR /&gt; Do rate helpful posts -&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 31 May 2013 13:49:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-4-and-juniper-j-web/m-p/2219623#M250368</guid>
      <dc:creator>Jatin Katyal</dc:creator>
      <dc:date>2013-05-31T13:49:54Z</dc:date>
    </item>
    <item>
      <title>Re: ACS 5.4 and Juniper J-Web</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-4-and-juniper-j-web/m-p/2219624#M250416</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi Jatin&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Good point about the SSH, I have been looking at this too long&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You are correct, I see nothing in the ACS tacas authentication report for my HTTPS connections&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is a SSH test followed by a Telnet test, which always work&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;TABLE id="__TOC_0" style="border-bottom: #808080 1px solid; border-left: #808080 1px solid; margin: 5pt 0pt 0pt; width: 97%; border-collapse: collapse; font-family: sans-serif; empty-cells: show; font-size: small; border-top: #e3e3e3 1px; border-right: #808080 1px solid;"&gt;&lt;TBODY&gt;&lt;TR align="left" style="border-bottom: #8499a2 thin; border-left: #8499a2 thin solid; padding-bottom: 1pt; background-color: #f5f9fd; padding-left: 2pt; padding-right: 2pt; white-space: nowrap; color: #008000; border-top: #8499a2 thin; font-weight: normal; border-right: #8499a2 thin solid; padding-top: 1pt;" valign="middle"&gt;&lt;TD style="padding-bottom: 2pt; padding-left: 4pt; padding-right: 4pt; padding-top: 2pt;" valign="middle"&gt;&lt;P&gt;May 31,13 1:55:49.256 PM&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding-bottom: 2pt; padding-left: 4pt; padding-right: 4pt; padding-top: 2pt;" valign="middle"&gt;&lt;P&gt;May 31,13 1:55:49.230 PM&lt;/P&gt;&lt;/TD&gt;&lt;TD align="center" style="padding-bottom: 2pt; padding-left: 4pt; padding-right: 4pt; padding-top: 2pt;" valign="middle"&gt;&lt;P&gt;&lt;IMG id="AUTOGENBOOKMARK_19" src="https://10.251.200.25/avreports/iv?__ivcmd=getimage&amp;amp;iportalID=TKNENRBYE&amp;amp;__ivSessionId=1370008565379_9331EC863BA3A7E2EAAFA1EB3BB0CDBB&amp;amp;__report=%2F%24%24%24Transient%2Facfile605.rptdocument&amp;amp;__imageID=%2F%2F%2F%24%24%24transient%2Facfile605.rptdocument%3B0%2Fen_us%24%24%24%24file%3A%2Fopt%2FCSCOacs%2Fmgmt%2Fapache-tomcat-6.0.18%2Fwebapps%2Favreports%2Fresources%2Fpass.gif" style="border: black;" title="Passed Authentication" /&gt; &lt;/P&gt;&lt;/TD&gt;&lt;TD align="center" style="padding-bottom: 2pt; padding-left: 4pt; padding-right: 4pt; padding-top: 2pt;" valign="middle"&gt;&lt;P&gt;&lt;A href="https://10.251.200.25/avreports/servlet/GenericRedirector?command=submit&amp;amp;__requesttype=immediate&amp;amp;invokeSubmit=true&amp;amp;__executableName=%2Fhome%2Facsadmin%2FAAA_Protocol%2FTACACS_Authentication_Details.rptdesign&amp;amp;rptDay=05%2F31%2F2013+01%3A55%3A49.256+PM&amp;amp;rptAcsSessionID=nhc0-dev-acs001%2F158588029%2F3679&amp;amp;ID=13&amp;amp;rptDiagnosticTimeRange=custom&amp;amp;__locale=en_US&amp;amp;iportalID=TKNENRBYE&amp;amp;__masterpage=false&amp;amp;__newWindow=false" target="_self"&gt;&lt;IMG id="AUTOGENBOOKMARK_20" src="https://10.251.200.25/avreports/iv?__ivcmd=getimage&amp;amp;iportalID=TKNENRBYE&amp;amp;__ivSessionId=1370008565379_9331EC863BA3A7E2EAAFA1EB3BB0CDBB&amp;amp;__report=%2F%24%24%24Transient%2Facfile605.rptdocument&amp;amp;__imageID=%2F%2F%2F%24%24%24transient%2Facfile605.rptdocument%3B0%2Fen_us%24%24%24%24file%3A%2Fopt%2FCSCOacs%2Fmgmt%2Fapache-tomcat-6.0.18%2Fwebapps%2Favreports%2Fresources%2Fdetails.gif" style="border: black;" /&gt; &lt;/A&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding-bottom: 2pt; padding-left: 4pt; padding-right: 4pt; padding-top: 2pt;" valign="middle"&gt;&lt;/TD&gt;&lt;TD style="padding-bottom: 2pt; padding-left: 4pt; padding-right: 4pt; padding-top: 2pt;" valign="middle"&gt;&lt;A href="https://10.251.200.25/avreports/servlet/GenericRedirector?command=submit&amp;amp;__requesttype=immediate&amp;amp;invokeSubmit=true&amp;amp;__executableName=%2Fhome%2Facsadmin%2FUser%2FUser_Authentication_Summary.rptdesign&amp;amp;rptMacAddress=All&amp;amp;rptAccessService=J-Web&amp;amp;rptProtocol=TACACS&amp;amp;rptStartDate=05%2F31%2F2013+01%3A55%3A49.256+PM&amp;amp;rptIdentityGroup=All+Groups%3AJweb&amp;amp;rptAcsInstance=nhc0-dev-acs001&amp;amp;rptTimeRange=custom&amp;amp;rptIdentityStore=Internal+Users&amp;amp;rptEndDate=05%2F31%2F2013+01%3A55%3A49.256+PM&amp;amp;rptUser=jweb&amp;amp;rptNetworkDeviceGroup=Vendor%3AVendor%3AJuniper%2C+Device+Type%3AAll+Device+Types%3AFirewall%2C+Location%3AAll+Locations%3AMarlow&amp;amp;rptNetworkDevice=Juniper+Firewall&amp;amp;__locale=en_US&amp;amp;iportalID=TKNENRBYE&amp;amp;__masterpage=false&amp;amp;__newWindow=false" style="display: block; color: #008000;" target="_self"&gt;jweb&lt;/A&gt; &lt;/TD&gt;&lt;TD style="padding-bottom: 2pt; padding-left: 4pt; padding-right: 4pt; padding-top: 2pt;" valign="middle"&gt;&lt;A href="https://10.251.200.25/avreports/servlet/GenericRedirector?command=submit&amp;amp;__requesttype=immediate&amp;amp;invokeSubmit=true&amp;amp;__executableName=%2Fhome%2Facsadmin%2FNetwork_Device%2FNetwork_Device_Authentication_Summary.rptdesign&amp;amp;rptMacAddress=All&amp;amp;rptAccessService=J-Web&amp;amp;rptProtocol=TACACS&amp;amp;rptStartDate=05%2F31%2F2013+01%3A55%3A49.256+PM&amp;amp;rptIdentityGroup=All+Groups%3AJweb&amp;amp;rptAcsInstance=nhc0-dev-acs001&amp;amp;rptTimeRange=custom&amp;amp;rptIdentityStore=Internal+Users&amp;amp;rptEndDate=05%2F31%2F2013+01%3A55%3A49.256+PM&amp;amp;rptUser=jweb&amp;amp;rptNetworkDeviceGroup=Vendor%3AVendor%3AJuniper%2C+Device+Type%3AAll+Device+Types%3AFirewall%2C+Location%3AAll+Locations%3AMarlow&amp;amp;rptNetworkDevice=Juniper+Firewall&amp;amp;__locale=en_US&amp;amp;iportalID=TKNENRBYE&amp;amp;__masterpage=false&amp;amp;__newWindow=false" style="display: block; color: #008000;" target="_self"&gt;Juniper Firewall&lt;/A&gt; &lt;/TD&gt;&lt;TD style="padding-bottom: 2pt; padding-left: 4pt; padding-right: 4pt; padding-top: 2pt;" valign="middle"&gt;&lt;P&gt;Vendor:Vendor:Juniper, Device Type:All Device Types:Firewall, Location:All Locations:Marlow&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding-bottom: 2pt; padding-left: 4pt; padding-right: 4pt; padding-top: 2pt;" valign="middle"&gt;&lt;A href="https://10.251.200.25/avreports/servlet/GenericRedirector?command=submit&amp;amp;__requesttype=immediate&amp;amp;invokeSubmit=true&amp;amp;__executableName=%2Fhome%2Facsadmin%2FAccess_Service%2FAccess_Service_Authentication_Summary.rptdesign&amp;amp;rptMacAddress=All&amp;amp;rptAccessService=J-Web&amp;amp;rptProtocol=TACACS&amp;amp;rptStartDate=05%2F31%2F2013+01%3A55%3A49.256+PM&amp;amp;rptIdentityGroup=All+Groups%3AJweb&amp;amp;rptAcsInstance=nhc0-dev-acs001&amp;amp;rptTimeRange=custom&amp;amp;rptIdentityStore=Internal+Users&amp;amp;rptEndDate=05%2F31%2F2013+01%3A55%3A49.256+PM&amp;amp;rptUser=jweb&amp;amp;rptNetworkDeviceGroup=Vendor%3AVendor%3AJuniper%2C+Device+Type%3AAll+Device+Types%3AFirewall%2C+Location%3AAll+Locations%3AMarlow&amp;amp;rptNetworkDevice=Juniper+Firewall&amp;amp;__locale=en_US&amp;amp;iportalID=TKNENRBYE&amp;amp;__masterpage=false&amp;amp;__newWindow=false" style="display: block; color: #008000;" target="_self"&gt;J-Web&lt;/A&gt; &lt;/TD&gt;&lt;TD style="padding-bottom: 2pt; padding-left: 4pt; padding-right: 4pt; padding-top: 2pt;" valign="middle"&gt;&lt;P&gt;Internal Users&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding-bottom: 2pt; padding-left: 4pt; padding-right: 4pt; padding-top: 2pt;" valign="middle"&gt;&lt;P&gt;All Groups:Jweb&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding-bottom: 2pt; padding-left: 4pt; padding-right: 4pt; padding-top: 2pt;" valign="middle"&gt;&lt;A href="https://10.251.200.25/avreports/servlet/GenericRedirector?command=submit&amp;amp;__requesttype=immediate&amp;amp;invokeSubmit=true&amp;amp;__executableName=%2Fhome%2Facsadmin%2FACS_Instance%2FACS_Instance_Authentication_Summary.rptdesign&amp;amp;rptMacAddress=All&amp;amp;rptAccessService=J-Web&amp;amp;rptProtocol=TACACS&amp;amp;rptStartDate=05%2F31%2F2013+01%3A55%3A49.256+PM&amp;amp;rptIdentityGroup=All+Groups%3AJweb&amp;amp;rptAcsInstance=nhc0-dev-acs001&amp;amp;rptTimeRange=custom&amp;amp;rptIdentityStore=Internal+Users&amp;amp;rptEndDate=05%2F31%2F2013+01%3A55%3A49.256+PM&amp;amp;rptUser=jweb&amp;amp;rptNetworkDeviceGroup=Vendor%3AVendor%3AJuniper%2C+Device+Type%3AAll+Device+Types%3AFirewall%2C+Location%3AAll+Locations%3AMarlow&amp;amp;rptNetworkDevice=Juniper+Firewall&amp;amp;__locale=en_US&amp;amp;iportalID=TKNENRBYE&amp;amp;__masterpage=false&amp;amp;__newWindow=false" style="margin-top: 0pt; display: block; color: #008000;" target="_self"&gt;nhc0-dev-acs001&lt;/A&gt; &lt;/TD&gt;&lt;/TR&gt;&lt;TR align="left" style="border-bottom: #8499a2 thin; border-left: #8499a2 thin solid; padding-bottom: 1pt; background-color: #ebeff3; padding-left: 2pt; padding-right: 2pt; white-space: nowrap; color: #008000; border-top: #8499a2 thin; font-weight: normal; border-right: #8499a2 thin solid; padding-top: 1pt;" valign="middle"&gt;&lt;TD style="padding-bottom: 2pt; padding-left: 4pt; padding-right: 4pt; padding-top: 2pt;" valign="middle"&gt;&lt;P&gt;May 31,13 1:55:32.216 PM&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding-bottom: 2pt; padding-left: 4pt; padding-right: 4pt; padding-top: 2pt;" valign="middle"&gt;&lt;P&gt;May 31,13 1:55:32.186 PM&lt;/P&gt;&lt;/TD&gt;&lt;TD align="center" style="padding-bottom: 2pt; padding-left: 4pt; padding-right: 4pt; padding-top: 2pt;" valign="middle"&gt;&lt;P&gt;&lt;IMG id="AUTOGENBOOKMARK_21" src="https://10.251.200.25/avreports/iv?__ivcmd=getimage&amp;amp;iportalID=TKNENRBYE&amp;amp;__ivSessionId=1370008565379_9331EC863BA3A7E2EAAFA1EB3BB0CDBB&amp;amp;__report=%2F%24%24%24Transient%2Facfile605.rptdocument&amp;amp;__imageID=%2F%2F%2F%24%24%24transient%2Facfile605.rptdocument%3B0%2Fen_us%24%24%24%24file%3A%2Fopt%2FCSCOacs%2Fmgmt%2Fapache-tomcat-6.0.18%2Fwebapps%2Favreports%2Fresources%2Fpass.gif" style="border: black;" title="Passed Authentication" /&gt; &lt;/P&gt;&lt;/TD&gt;&lt;TD align="center" style="padding-bottom: 2pt; padding-left: 4pt; padding-right: 4pt; padding-top: 2pt;" valign="middle"&gt;&lt;P&gt;&lt;A href="https://10.251.200.25/avreports/servlet/GenericRedirector?command=submit&amp;amp;__requesttype=immediate&amp;amp;invokeSubmit=true&amp;amp;__executableName=%2Fhome%2Facsadmin%2FAAA_Protocol%2FTACACS_Authentication_Details.rptdesign&amp;amp;rptDay=05%2F31%2F2013+01%3A55%3A32.216+PM&amp;amp;rptAcsSessionID=nhc0-dev-acs001%2F158588029%2F3676&amp;amp;ID=12&amp;amp;rptDiagnosticTimeRange=custom&amp;amp;__locale=en_US&amp;amp;iportalID=TKNENRBYE&amp;amp;__masterpage=false&amp;amp;__newWindow=false" target="_self"&gt;&lt;IMG id="AUTOGENBOOKMARK_22" src="https://10.251.200.25/avreports/iv?__ivcmd=getimage&amp;amp;iportalID=TKNENRBYE&amp;amp;__ivSessionId=1370008565379_9331EC863BA3A7E2EAAFA1EB3BB0CDBB&amp;amp;__report=%2F%24%24%24Transient%2Facfile605.rptdocument&amp;amp;__imageID=%2F%2F%2F%24%24%24transient%2Facfile605.rptdocument%3B0%2Fen_us%24%24%24%24file%3A%2Fopt%2FCSCOacs%2Fmgmt%2Fapache-tomcat-6.0.18%2Fwebapps%2Favreports%2Fresources%2Fdetails.gif" style="border: black;" /&gt; &lt;/A&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding-bottom: 2pt; padding-left: 4pt; padding-right: 4pt; padding-top: 2pt;" valign="middle"&gt;&lt;/TD&gt;&lt;TD style="padding-bottom: 2pt; padding-left: 4pt; padding-right: 4pt; padding-top: 2pt;" valign="middle"&gt;&lt;A href="https://10.251.200.25/avreports/servlet/GenericRedirector?command=submit&amp;amp;__requesttype=immediate&amp;amp;invokeSubmit=true&amp;amp;__executableName=%2Fhome%2Facsadmin%2FUser%2FUser_Authentication_Summary.rptdesign&amp;amp;rptMacAddress=All&amp;amp;rptAccessService=J-Web&amp;amp;rptProtocol=TACACS&amp;amp;rptStartDate=05%2F31%2F2013+01%3A55%3A32.216+PM&amp;amp;rptIdentityGroup=All+Groups%3AJweb&amp;amp;rptAcsInstance=nhc0-dev-acs001&amp;amp;rptTimeRange=custom&amp;amp;rptIdentityStore=Internal+Users&amp;amp;rptEndDate=05%2F31%2F2013+01%3A55%3A32.216+PM&amp;amp;rptUser=jweb&amp;amp;rptNetworkDeviceGroup=Vendor%3AVendor%3AJuniper%2C+Device+Type%3AAll+Device+Types%3AFirewall%2C+Location%3AAll+Locations%3AMarlow&amp;amp;rptNetworkDevice=Juniper+Firewall&amp;amp;__locale=en_US&amp;amp;iportalID=TKNENRBYE&amp;amp;__masterpage=false&amp;amp;__newWindow=false" style="display: block; color: #008000;" target="_self"&gt;jweb&lt;/A&gt; &lt;/TD&gt;&lt;TD style="padding-bottom: 2pt; padding-left: 4pt; padding-right: 4pt; padding-top: 2pt;" valign="middle"&gt;&lt;A href="https://10.251.200.25/avreports/servlet/GenericRedirector?command=submit&amp;amp;__requesttype=immediate&amp;amp;invokeSubmit=true&amp;amp;__executableName=%2Fhome%2Facsadmin%2FNetwork_Device%2FNetwork_Device_Authentication_Summary.rptdesign&amp;amp;rptMacAddress=All&amp;amp;rptAccessService=J-Web&amp;amp;rptProtocol=TACACS&amp;amp;rptStartDate=05%2F31%2F2013+01%3A55%3A32.216+PM&amp;amp;rptIdentityGroup=All+Groups%3AJweb&amp;amp;rptAcsInstance=nhc0-dev-acs001&amp;amp;rptTimeRange=custom&amp;amp;rptIdentityStore=Internal+Users&amp;amp;rptEndDate=05%2F31%2F2013+01%3A55%3A32.216+PM&amp;amp;rptUser=jweb&amp;amp;rptNetworkDeviceGroup=Vendor%3AVendor%3AJuniper%2C+Device+Type%3AAll+Device+Types%3AFirewall%2C+Location%3AAll+Locations%3AMarlow&amp;amp;rptNetworkDevice=Juniper+Firewall&amp;amp;__locale=en_US&amp;amp;iportalID=TKNENRBYE&amp;amp;__masterpage=false&amp;amp;__newWindow=false" style="display: block; color: #008000;" target="_self"&gt;Juniper Firewall&lt;/A&gt; &lt;/TD&gt;&lt;TD style="padding-bottom: 2pt; padding-left: 4pt; padding-right: 4pt; padding-top: 2pt;" valign="middle"&gt;&lt;P&gt;Vendor:Vendor:Juniper&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 31 May 2013 13:57:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-4-and-juniper-j-web/m-p/2219624#M250416</guid>
      <dc:creator>Simon Young</dc:creator>
      <dc:date>2013-05-31T13:57:16Z</dc:date>
    </item>
    <item>
      <title>Re: ACS 5.4 and Juniper J-Web</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-4-and-juniper-j-web/m-p/2219625#M250457</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Is there any specific section on juniper where you need to point the J-WEB authentication towards tacacs first and then local. I feel that section is still checking the tacacs user against the local database and getting failed. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jatin Katyal &lt;BR /&gt; - Do rate helpful posts -&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 31 May 2013 14:08:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-4-and-juniper-j-web/m-p/2219625#M250457</guid>
      <dc:creator>Jatin Katyal</dc:creator>
      <dc:date>2013-05-31T14:08:15Z</dc:date>
    </item>
    <item>
      <title>Re: ACS 5.4 and Juniper J-Web</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-4-and-juniper-j-web/m-p/2219626#M250495</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN&gt;I was working on a almost similar issues today and he confirmed that he is able to access J-WEB with the tacacs credentials.You may check his config here: &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="https://community.cisco.com/message/3953224#3953224"&gt;https://supportforums.cisco.com/message/3953224#3953224&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Going through your config it seems you have not defined/created classes like he did:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;for example:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;login {&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; class RO-CLASS {&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; permissions [ view view-configuration ];&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; }&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; class RW-CLASS {&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; permissions all;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; }&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; user JUNOS-RO {&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; uid 2000;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jatin Katyal &lt;BR /&gt; - Do rate helpful posts -&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 01 Jun 2013 00:11:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-4-and-juniper-j-web/m-p/2219626#M250495</guid>
      <dc:creator>Jatin Katyal</dc:creator>
      <dc:date>2013-06-01T00:11:33Z</dc:date>
    </item>
    <item>
      <title>Re: ACS 5.4 and Juniper J-Web</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-4-and-juniper-j-web/m-p/2219627#M250522</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; A Junos upgrade and everything works&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jatin thanks very much for your help with this issue&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 03 Jun 2013 12:23:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-4-and-juniper-j-web/m-p/2219627#M250522</guid>
      <dc:creator>Simon Young</dc:creator>
      <dc:date>2013-06-03T12:23:15Z</dc:date>
    </item>
    <item>
      <title>Re: ACS 5.4 and Juniper J-Web</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-4-and-juniper-j-web/m-p/2219628#M250543</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Awesome &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt; I think while helping you on this I've seen almost all Juniper configuration guides so now I am little familiar with Junos as well.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jatin Katyal &lt;BR /&gt; - Do rate helpful posts -&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 03 Jun 2013 12:45:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-4-and-juniper-j-web/m-p/2219628#M250543</guid>
      <dc:creator>Jatin Katyal</dc:creator>
      <dc:date>2013-06-03T12:45:47Z</dc:date>
    </item>
  </channel>
</rss>

