<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic AAA TACACS+ authentication of IOS HTTP service in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/aaa-tacacs-authentication-of-ios-http-service/m-p/1430999#M297892</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi there,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You may need to add the following command(s) for the authorization pieces:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip http authentication aaa command-authorization &lt;LVL 0-15=""&gt; &lt;METHOD list="" ="" default=""&gt;&lt;/METHOD&gt;&lt;/LVL&gt;&lt;/P&gt;&lt;P&gt;ip http authentication aaa exec-authorization &lt;METHOD list="" ="" default=""&gt;&lt;/METHOD&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I use specific named method lists rather than relying on the default method list so that we can treat a console connection differently than a VTY session (gives you more granular control based on the access method - con, aux, ssh, and still allows for fallback to local credentials if the remote AAA server is unavailable)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa group server tacacs+ TAC_PLUS&lt;/P&gt;&lt;P&gt; server a.b.c.d&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa authentication login default local&lt;/P&gt;&lt;P&gt;aaa authentication login TacLogin group TAC_PLUS local&lt;/P&gt;&lt;P&gt;aaa authorization console&lt;/P&gt;&lt;P&gt;aaa authorization config-commands&lt;/P&gt;&lt;P&gt;aaa authorization exec default local &lt;/P&gt;&lt;P&gt;aaa authorization exec TacAuth group TAC_PLUS local &lt;/P&gt;&lt;P&gt;aaa authorization commands 0 default local &lt;/P&gt;&lt;P&gt;aaa authorization commands 0 TacCommands0 group TAC_PLUS local &lt;/P&gt;&lt;P&gt;aaa authorization commands 1 default local &lt;/P&gt;&lt;P&gt;aaa authorization commands 1 TacCommands1 group TAC_PLUS local &lt;/P&gt;&lt;P&gt;aaa authorization commands 15 default local &lt;/P&gt;&lt;P&gt;aaa authorization commands 15 TacCommands15 group TAC_PLUS local &lt;/P&gt;&lt;P&gt;aaa accounting exec default start-stop group TAC_PLUS&lt;/P&gt;&lt;P&gt;aaa accounting commands 15 default start-stop group TAC_PLUS&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then down in the relevant http server and line input sections, we use this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip http authentication aaa login-authentication TacLogin&lt;/P&gt;&lt;P&gt;ip http authentication aaa command-authorization 0 TacCommands0&lt;/P&gt;&lt;P&gt;ip http authentication aaa command-authorization 1 TacCommands1&lt;/P&gt;&lt;P&gt;ip http authentication aaa command-authorization 15 TacCommands15&lt;/P&gt;&lt;P&gt;ip http authentication aaa exec-authorization TacAuth&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;line con 0&lt;/P&gt;&lt;P&gt; exec-timeout 15 0&lt;/P&gt;&lt;P&gt; logging synchronous&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;line aux 0&lt;/P&gt;&lt;P&gt; exec-timeout 15 0&lt;/P&gt;&lt;P&gt; logging synchronous&lt;/P&gt;&lt;P&gt; modem InOut&lt;/P&gt;&lt;P&gt; modem autoconfigure discovery&lt;/P&gt;&lt;P&gt; transport input all&lt;/P&gt;&lt;P&gt; flowcontrol hardware&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;line vty 0 4&lt;/P&gt;&lt;P&gt; exec-timeout 15 0&lt;/P&gt;&lt;P&gt; authorization commands 0 TacCommands0&lt;/P&gt;&lt;P&gt; authorization commands 1 TacCommands1&lt;/P&gt;&lt;P&gt; authorization commands 15 TacCommands15&lt;/P&gt;&lt;P&gt; authorization exec TacAuth&lt;/P&gt;&lt;P&gt; logging synchronous&lt;/P&gt;&lt;P&gt; login authentication TacLogin&lt;/P&gt;&lt;P&gt; transport input ssh&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So OOB connection types (CON and AUX) use local credentials only, but TTY (SSH) and HTTP sessions use the TACACS server named method lists.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I hope this helps in your case, let me know if there's anything else I can provide.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 01 Feb 2013 14:59:04 GMT</pubDate>
    <dc:creator>Travis Hysuick</dc:creator>
    <dc:date>2013-02-01T14:59:04Z</dc:date>
    <item>
      <title>AAA TACACS+ authentication of IOS HTTP service</title>
      <link>https://community.cisco.com/t5/network-access-control/aaa-tacacs-authentication-of-ios-http-service/m-p/1430997#M297890</link>
      <description>&lt;P&gt;I am having difficulty with TACACS+ authentication to the HTTP service running on IOS-based switches.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The TACACS+ server is Secure ACS Express (the appliance) running Build 5.0.0.18.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The IOS configuration is:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa new-model&lt;BR /&gt;aaa authentication login default group tacacs+ local&lt;BR /&gt;aaa authorization console&lt;BR /&gt;aaa authorization exec default group tacacs+ if-authenticated&lt;BR /&gt;aaa session-id common&lt;BR /&gt;ip http authentication aaa login-authentication default&lt;/P&gt;&lt;P&gt;ip tacacs source-interface Loopback0&lt;BR /&gt;tacacs-server host nnn.nnn.nnn.nnn&lt;BR /&gt;tacacs-server directed-request&lt;BR /&gt;tacacs-server key 7 keyhash&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This works as expected against 38xx routers running IOS 12.4(3g). It fails against 3560 switches running IOS 12.2(40)SE or 4507 switches running IOS 12.2(31)SGA10, even though the TACACS+ server's authentication report indicates that it sent a "Passed", and the switch's debug log shows this as the last TACACS response before throwing me a "401 Unauthorized"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;10741001: Jul 26 09:44:56.474 EDT: TPLUS(00000000)/0/1A8BC9B0: Processing the reply packet&lt;BR /&gt;10741002: Jul 26 09:44:56.474 EDT: TPLUS: Processed AV priv-lvl=15&lt;BR /&gt;10741003: Jul 26 09:44:56.474 EDT: TPLUS: Processed AV timeout=60&lt;BR /&gt;10741004: Jul 26 09:44:56.474 EDT: TPLUS: Processed AV idletime=10&lt;BR /&gt;10741005: Jul 26 09:44:56.474 EDT: TPLUS: received authorization response for 0: PASS&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;SSH access with TACACS+ authentication against the same switches from the same client using the same credentials works as expected.&lt;/P&gt;</description>
      <pubDate>Tue, 26 Mar 2019 00:27:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/aaa-tacacs-authentication-of-ios-http-service/m-p/1430997#M297890</guid>
      <dc:creator>gkuzmowycz</dc:creator>
      <dc:date>2019-03-26T00:27:07Z</dc:date>
    </item>
    <item>
      <title>AAA TACACS+ authentication of IOS HTTP service</title>
      <link>https://community.cisco.com/t5/network-access-control/aaa-tacacs-authentication-of-ios-http-service/m-p/1430998#M297891</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I'm experiencing the same problems as you did. Did you ever get this resolved?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;regards&lt;/P&gt;&lt;P&gt;Michel&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 01 Feb 2013 10:18:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/aaa-tacacs-authentication-of-ios-http-service/m-p/1430998#M297891</guid>
      <dc:creator>Michel Pedersen</dc:creator>
      <dc:date>2013-02-01T10:18:38Z</dc:date>
    </item>
    <item>
      <title>AAA TACACS+ authentication of IOS HTTP service</title>
      <link>https://community.cisco.com/t5/network-access-control/aaa-tacacs-authentication-of-ios-http-service/m-p/1430999#M297892</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi there,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You may need to add the following command(s) for the authorization pieces:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip http authentication aaa command-authorization &lt;LVL 0-15=""&gt; &lt;METHOD list="" ="" default=""&gt;&lt;/METHOD&gt;&lt;/LVL&gt;&lt;/P&gt;&lt;P&gt;ip http authentication aaa exec-authorization &lt;METHOD list="" ="" default=""&gt;&lt;/METHOD&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I use specific named method lists rather than relying on the default method list so that we can treat a console connection differently than a VTY session (gives you more granular control based on the access method - con, aux, ssh, and still allows for fallback to local credentials if the remote AAA server is unavailable)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa group server tacacs+ TAC_PLUS&lt;/P&gt;&lt;P&gt; server a.b.c.d&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa authentication login default local&lt;/P&gt;&lt;P&gt;aaa authentication login TacLogin group TAC_PLUS local&lt;/P&gt;&lt;P&gt;aaa authorization console&lt;/P&gt;&lt;P&gt;aaa authorization config-commands&lt;/P&gt;&lt;P&gt;aaa authorization exec default local &lt;/P&gt;&lt;P&gt;aaa authorization exec TacAuth group TAC_PLUS local &lt;/P&gt;&lt;P&gt;aaa authorization commands 0 default local &lt;/P&gt;&lt;P&gt;aaa authorization commands 0 TacCommands0 group TAC_PLUS local &lt;/P&gt;&lt;P&gt;aaa authorization commands 1 default local &lt;/P&gt;&lt;P&gt;aaa authorization commands 1 TacCommands1 group TAC_PLUS local &lt;/P&gt;&lt;P&gt;aaa authorization commands 15 default local &lt;/P&gt;&lt;P&gt;aaa authorization commands 15 TacCommands15 group TAC_PLUS local &lt;/P&gt;&lt;P&gt;aaa accounting exec default start-stop group TAC_PLUS&lt;/P&gt;&lt;P&gt;aaa accounting commands 15 default start-stop group TAC_PLUS&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then down in the relevant http server and line input sections, we use this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip http authentication aaa login-authentication TacLogin&lt;/P&gt;&lt;P&gt;ip http authentication aaa command-authorization 0 TacCommands0&lt;/P&gt;&lt;P&gt;ip http authentication aaa command-authorization 1 TacCommands1&lt;/P&gt;&lt;P&gt;ip http authentication aaa command-authorization 15 TacCommands15&lt;/P&gt;&lt;P&gt;ip http authentication aaa exec-authorization TacAuth&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;line con 0&lt;/P&gt;&lt;P&gt; exec-timeout 15 0&lt;/P&gt;&lt;P&gt; logging synchronous&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;line aux 0&lt;/P&gt;&lt;P&gt; exec-timeout 15 0&lt;/P&gt;&lt;P&gt; logging synchronous&lt;/P&gt;&lt;P&gt; modem InOut&lt;/P&gt;&lt;P&gt; modem autoconfigure discovery&lt;/P&gt;&lt;P&gt; transport input all&lt;/P&gt;&lt;P&gt; flowcontrol hardware&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;line vty 0 4&lt;/P&gt;&lt;P&gt; exec-timeout 15 0&lt;/P&gt;&lt;P&gt; authorization commands 0 TacCommands0&lt;/P&gt;&lt;P&gt; authorization commands 1 TacCommands1&lt;/P&gt;&lt;P&gt; authorization commands 15 TacCommands15&lt;/P&gt;&lt;P&gt; authorization exec TacAuth&lt;/P&gt;&lt;P&gt; logging synchronous&lt;/P&gt;&lt;P&gt; login authentication TacLogin&lt;/P&gt;&lt;P&gt; transport input ssh&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So OOB connection types (CON and AUX) use local credentials only, but TTY (SSH) and HTTP sessions use the TACACS server named method lists.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I hope this helps in your case, let me know if there's anything else I can provide.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 01 Feb 2013 14:59:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/aaa-tacacs-authentication-of-ios-http-service/m-p/1430999#M297892</guid>
      <dc:creator>Travis Hysuick</dc:creator>
      <dc:date>2013-02-01T14:59:04Z</dc:date>
    </item>
    <item>
      <title>AAA TACACS+ authentication of IOS HTTP service</title>
      <link>https://community.cisco.com/t5/network-access-control/aaa-tacacs-authentication-of-ios-http-service/m-p/1431000#M297893</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for taking the time to reply, although it's a bit odd to see a thread re-animated after 2.5 years.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;After this post languished here for a while I opened a TAC case, which we worked in very great detail, until Cisco finally determined that we were dealing with a known bug, &lt;A href="https://www.cisco.com/cisco/psn/bssprt/bss?searchType=bstbugidsearch&amp;amp;page=bstBugDetail&amp;amp;BugID=CSCeh06200" target="_blank"&gt;CSCeh06200&lt;/A&gt;. The solution was to upgrade the IOS on the switches. This last is more for the benefit of Michel Pedersen, who posted above.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 04 Feb 2013 16:39:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/aaa-tacacs-authentication-of-ios-http-service/m-p/1431000#M297893</guid>
      <dc:creator>gkuzmowycz</dc:creator>
      <dc:date>2013-02-04T16:39:57Z</dc:date>
    </item>
    <item>
      <title>AAA TACACS+ authentication of IOS HTTP service</title>
      <link>https://community.cisco.com/t5/network-access-control/aaa-tacacs-authentication-of-ios-http-service/m-p/1431001#M297894</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Thank you for your replies and the example configuration. I have adapted it to my current setup (using my existing AAA configuration). It's still not working on my 3750 switches with 12.2(58)SE2 but I'll try some variations of the configuration and do more debugging. If it doesn't work I'll contact our partner/TAC to see if it's the same bug that you mentioned (CSCeh06200) even though my software isn't listed there.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;regards&lt;/P&gt;&lt;P&gt;Michel&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 06 Feb 2013 06:58:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/aaa-tacacs-authentication-of-ios-http-service/m-p/1431001#M297894</guid>
      <dc:creator>Michel Pedersen</dc:creator>
      <dc:date>2013-02-06T06:58:52Z</dc:date>
    </item>
  </channel>
</rss>

