<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic TACACS auth working via SSH, but not HTTP (ACS 5.1 / 3560) in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/tacacs-auth-working-via-ssh-but-not-http-acs-5-1-3560/m-p/1493930#M316333</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I never figured out the issue and ended up moving on to other projects, but I'm definitely interested in picking this back up.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Javier, yes the shell profile being hit is configured to grant priv level 15.&amp;nbsp; This works fine via SSH and telnet.&amp;nbsp; What's strange is my ACS logs show successful authentication.&amp;nbsp; If I look at the actual log, I can see myself match the appropriate ID Store, shell profile, ID group, ID policy, Group Mapping, and Authorization policy, with success.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm curious if something is misconfigured on the switch side, can you take a look at the posted config, particularly the http configuration?&amp;nbsp; I know over SSH and telnet my shell profiles work fine, just not HTTP.&amp;nbsp; I'll do some more digging since I haven't looked at this in over a year and let you know if I resolve the issue.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 14 Nov 2011 19:30:12 GMT</pubDate>
    <dc:creator>David Varnum</dc:creator>
    <dc:date>2011-11-14T19:30:12Z</dc:date>
    <item>
      <title>TACACS auth working via SSH, but not HTTP (ACS 5.1 / 3560)</title>
      <link>https://community.cisco.com/t5/network-access-control/tacacs-auth-working-via-ssh-but-not-http-acs-5-1-3560/m-p/1493925#M316091</link>
      <description>&lt;P&gt;Experts,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My switches are able to successfully authenticate user access against ACS 5.1 via SSH with TACACS+, but I am not able to authenticate via HTTPS with TACACS+.&amp;nbsp; I don't even get a log in ACS when attempting to authenticate via HTTPS.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is my AAA config, followed by a debug:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa new-model&lt;BR /&gt;aaa authentication login ACCESS group tacacs+ local&lt;BR /&gt;aaa authorization console&lt;BR /&gt;aaa authorization config-commands&lt;BR /&gt;aaa authorization exec ACCESS group tacacs+ &lt;BR /&gt;aaa authorization commands 1 Priv1 group tacacs+ none &lt;BR /&gt;aaa authorization commands 15 Priv15 group tacacs+ none &lt;BR /&gt;aaa authorization network ACCESS group tacacs+ &lt;BR /&gt;aaa accounting exec ACCESS start-stop group tacacs+&lt;BR /&gt;aaa accounting commands 0 ACCESS start-stop group tacacs+&lt;BR /&gt;aaa accounting commands 1 ACCESS start-stop group tacacs+&lt;BR /&gt;aaa accounting commands 15 ACCESS start-stop group tacacs+&lt;BR /&gt;aaa session-id common&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;ip http authentication aaa login-authentication ACCESS&lt;BR /&gt;ip http authentication aaa exec-authorization ACCESS&lt;BR /&gt;ip http authentication aaa command-authorization 1 Priv1&lt;BR /&gt;ip http authentication aaa command-authorization 15 Priv15&lt;/P&gt;&lt;P&gt;ip http secure-server&lt;/P&gt;&lt;P&gt;no ip http server&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;tacacs-server host X.X.X.X key 7&lt;BR /&gt;tacacs-server timeout 3&lt;BR /&gt;tacacs-server directed-request&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Debug:&lt;/P&gt;&lt;P&gt;47w4d: HTTP AAA Login-Authentication List name: ACCESS&lt;BR /&gt;47w4d: HTTP AAA Exec-Authorization List name: ACCESS&lt;BR /&gt;47w4d: HTTP: Authentication failed for level 15&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Shell authorization profiles are working in ACS when SSHing to devices (Priv1 and Priv15), and I can't figure out why its not working for HTTPS.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any ideas?&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 00:22:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tacacs-auth-working-via-ssh-but-not-http-acs-5-1-3560/m-p/1493925#M316091</guid>
      <dc:creator>David Varnum</dc:creator>
      <dc:date>2019-03-11T00:22:05Z</dc:date>
    </item>
    <item>
      <title>Re: TACACS auth working via SSH, but not HTTP (ACS 5.1 / 3560)</title>
      <link>https://community.cisco.com/t5/network-access-control/tacacs-auth-working-via-ssh-but-not-http-acs-5-1-3560/m-p/1493926#M316126</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Can you turn on "debug tacacs" on the router, collect the output, and post it here please?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 30 Aug 2010 15:50:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tacacs-auth-working-via-ssh-but-not-http-acs-5-1-3560/m-p/1493926#M316126</guid>
      <dc:creator>Javier Henderson</dc:creator>
      <dc:date>2010-08-30T15:50:31Z</dc:date>
    </item>
    <item>
      <title>Re: TACACS auth working via SSH, but not HTTP (ACS 5.1 / 3560)</title>
      <link>https://community.cisco.com/t5/network-access-control/tacacs-auth-working-via-ssh-but-not-http-acs-5-1-3560/m-p/1493927#M316178</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you for your response, here is the debug from the 3560:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;BC-3560-48-6-1-1#&lt;BR /&gt;48w0d: HTTP AAA Login-Authentication List name: ACCESS&lt;BR /&gt;48w0d: HTTP AAA Exec-Authorization List name: ACCESS&lt;BR /&gt;48w0d: TPLUS: Queuing AAA Authentication request 0 for processing&lt;BR /&gt;48w0d: TPLUS: processing authentication start request id 0&lt;BR /&gt;48w0d: TPLUS: Authentication start packet created for 0(varnumd)&lt;BR /&gt;48w0d: TPLUS: Using server 10.10.0.16&lt;BR /&gt;48w0d: TPLUS(00000000)/0/NB_WAIT/458EDA8: Started 3 sec timeout&lt;BR /&gt;48w0d: TPLUS(00000000)/0/NB_WAIT: socket event 2&lt;BR /&gt;48w0d: TPLUS(00000000)/0/NB_WAIT: wrote entire 27 bytes request&lt;BR /&gt;48w0d: TPLUS(00000000)/0/READ: socket event 1&lt;BR /&gt;48w0d: TPLUS(00000000)/0/READ: Would block while reading&lt;BR /&gt;48w0d: TPLUS(00000000)/0/READ: socket event 1&lt;BR /&gt;48w0d: TPLUS(00000000)/0/READ: read entire 12 header bytes (expect 16 bytes data)&lt;BR /&gt;48w0d: TPLUS(00000000)/0/READ: socket event 1&lt;BR /&gt;48w0d: TPLUS(00000000)/0/READ: read entire 28 bytes response&lt;BR /&gt;48w0d: TPLUS(00000000)/0/458EDA8: Processing the reply packet&lt;BR /&gt;48w0d: TPLUS: Received authen response status GET_PASSWORD (8)&lt;BR /&gt;48w0d: TPLUS: Queuing AAA Authentication request 0 for processing&lt;BR /&gt;48w0d: TPLUS: processing authentication continue request id 0&lt;BR /&gt;48w0d: TPLUS: Authentication continue packet generated for 0&lt;BR /&gt;48w0d: TPLUS(00000000)/0/WRITE/4332F88: Started 3 sec timeout&lt;BR /&gt;48w0d: TPLUS(00000000)/0/WRITE: wrote entire 30 bytes request&lt;BR /&gt;48w0d: TPLUS(00000000)/0/READ: socket event 1&lt;BR /&gt;48w0d: TPLUS(00000000)/0/READ: read entire 12 header bytes (expect 6 bytes data)&lt;BR /&gt;48w0d: TPLUS(00000000)/0/READ: socket event 1&lt;BR /&gt;48w0d: TPLUS(00000000)/0/READ: read entire 18 bytes response&lt;BR /&gt;48w0d: TPLUS(00000000)/0/4332F88: Processing the reply packet&lt;BR /&gt;48w0d: TPLUS: Received authen response status PASS (2)&lt;BR /&gt;48w0d: TPLUS: Queuing AAA Authorization request 0 for processing&lt;BR /&gt;48w0d: TPLUS: processing authorization request id 0&lt;BR /&gt;48w0d: TPLUS: Inappropriate protocol: 25&lt;BR /&gt;48w0d: TPLUS: Sending AV service=shell&lt;BR /&gt;48w0d: TPLUS: Sending AV cmd*&lt;BR /&gt;48w0d: TPLUS: Authorization request created for 0(varnumd)&lt;BR /&gt;48w0d: TPLUS: Using server 10.10.0.16&lt;BR /&gt;48w0d: TPLUS(00000000)/0/NB_WAIT/4332E18: Started 3 sec timeout&lt;BR /&gt;48w0d: TPLUS(00000000)/0/NB_WAIT: socket event 2&lt;BR /&gt;48w0d: TPLUS(00000000)/0/NB_WAIT: wrote entire 46 bytes request&lt;BR /&gt;48w0d: TPLUS(00000000)/0/READ: socket event 1&lt;BR /&gt;48w0d: TPLUS(00000000)/0/READ: Would block while reading&lt;BR /&gt;48w0d: TPLUS(00000000)/0/READ: socket event 1&lt;BR /&gt;48w0d: TPLUS(00000000)/0/READ: read 0 bytes&lt;BR /&gt;48w0d: TPLUS(00000000)/0/READ/4332E18: timed out&lt;BR /&gt;48w0d: TPLUS: Inappropriate protocol: 25&lt;BR /&gt;48w0d: TPLUS: Sending AV service=shell&lt;BR /&gt;48w0d: TPLUS: Sending AV cmd*&lt;BR /&gt;48w0d: TPLUS: Authorization request created for 0(varnumd)&lt;BR /&gt;48w0d: TPLUS(00000000)/0/READ/4332E18: timed out, clean up&lt;BR /&gt;48w0d: TPLUS(00000000)/0/4332E18: Processing the reply packet&lt;BR /&gt;48w0d: HTTP: Authentication failed for level 15&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 30 Aug 2010 15:54:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tacacs-auth-working-via-ssh-but-not-http-acs-5-1-3560/m-p/1493927#M316178</guid>
      <dc:creator>David Varnum</dc:creator>
      <dc:date>2010-08-30T15:54:56Z</dc:date>
    </item>
    <item>
      <title>TACACS auth working via SSH, but not HTTP (ACS 5.1 / 3560)</title>
      <link>https://community.cisco.com/t5/network-access-control/tacacs-auth-working-via-ssh-but-not-http-acs-5-1-3560/m-p/1493928#M316231</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I am having the same issue with the same debug. Did you ever get any resolution to this? If you look at the "Passed" authentications in ACS, it logs the attempt as Passed, but still fails to login. Thanks. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 11 Nov 2011 18:13:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tacacs-auth-working-via-ssh-but-not-http-acs-5-1-3560/m-p/1493928#M316231</guid>
      <dc:creator>bking1982</dc:creator>
      <dc:date>2011-11-11T18:13:54Z</dc:date>
    </item>
    <item>
      <title>TACACS auth working via SSH, but not HTTP (ACS 5.1 / 3560)</title>
      <link>https://community.cisco.com/t5/network-access-control/tacacs-auth-working-via-ssh-but-not-http-acs-5-1-3560/m-p/1493929#M316296</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;48w0d: TPLUS(00000000)/0/4332E18: Processing the reply packet&lt;/P&gt;&lt;P&gt;48w0d: HTTP: Authentication failed for level 15&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Note that it says that authentication failed for level 15. Is the shell profile being hit configured to grant privilege level 15?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 14 Nov 2011 16:21:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tacacs-auth-working-via-ssh-but-not-http-acs-5-1-3560/m-p/1493929#M316296</guid>
      <dc:creator>Javier Henderson</dc:creator>
      <dc:date>2011-11-14T16:21:30Z</dc:date>
    </item>
    <item>
      <title>TACACS auth working via SSH, but not HTTP (ACS 5.1 / 3560)</title>
      <link>https://community.cisco.com/t5/network-access-control/tacacs-auth-working-via-ssh-but-not-http-acs-5-1-3560/m-p/1493930#M316333</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I never figured out the issue and ended up moving on to other projects, but I'm definitely interested in picking this back up.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Javier, yes the shell profile being hit is configured to grant priv level 15.&amp;nbsp; This works fine via SSH and telnet.&amp;nbsp; What's strange is my ACS logs show successful authentication.&amp;nbsp; If I look at the actual log, I can see myself match the appropriate ID Store, shell profile, ID group, ID policy, Group Mapping, and Authorization policy, with success.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm curious if something is misconfigured on the switch side, can you take a look at the posted config, particularly the http configuration?&amp;nbsp; I know over SSH and telnet my shell profiles work fine, just not HTTP.&amp;nbsp; I'll do some more digging since I haven't looked at this in over a year and let you know if I resolve the issue.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 14 Nov 2011 19:30:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tacacs-auth-working-via-ssh-but-not-http-acs-5-1-3560/m-p/1493930#M316333</guid>
      <dc:creator>David Varnum</dc:creator>
      <dc:date>2011-11-14T19:30:12Z</dc:date>
    </item>
    <item>
      <title>TACACS auth working via SSH, but not HTTP (ACS 5.1 / 3560)</title>
      <link>https://community.cisco.com/t5/network-access-control/tacacs-auth-working-via-ssh-but-not-http-acs-5-1-3560/m-p/1493931#M316366</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Dave,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The switch configuration looks fine. Can you look at the traffic between the switch and ACS using a tool like wireshark, to see the contents of the reply packet from ACS, to see if priv-lvl=15 is included?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also, when you look at the details of the authentication and authorization on ACS, does it show that it's sending priv-level=15?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 14 Nov 2011 19:34:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tacacs-auth-working-via-ssh-but-not-http-acs-5-1-3560/m-p/1493931#M316366</guid>
      <dc:creator>Javier Henderson</dc:creator>
      <dc:date>2011-11-14T19:34:45Z</dc:date>
    </item>
    <item>
      <title>TACACS auth working via SSH, but not HTTP (ACS 5.1 / 3560)</title>
      <link>https://community.cisco.com/t5/network-access-control/tacacs-auth-working-via-ssh-but-not-http-acs-5-1-3560/m-p/1493932#M316399</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I found this bug and it looks like it has not been fixed yet. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The Bug ID is CSCtq94595.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;TABLE border="0" cellpadding="5" cellspacing="2" style="width: 100%;"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD colspan="2" style="font-size: 88%; padding: 8px;"&gt;&lt;STRONG&gt;HTTP AAA Authentication does not work any more after upgrade to 12.2.58S. &lt;/STRONG&gt; &lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="font-size: 88%; padding: 0px 8px 8px;" valign="top"&gt;&lt;STRONG&gt;Symptom:&lt;/STRONG&gt; HTTP AAA Authentication does not work with IOS version 12.2.58SE1&lt;P&gt;&lt;/P&gt;&lt;STRONG&gt;&lt;STRONG&gt;Conditions&lt;/STRONG&gt;:&lt;/STRONG&gt; HTTP AAA authentication with local DB&lt;P&gt;&lt;/P&gt;&lt;STRONG&gt;Workaround:&lt;/STRONG&gt; None&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;1st Found-In &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;A href="http://tools.cisco.com/Support/BugToolKit/images/Field%20Definitions.html" target="_blank"&gt; &lt;IMG alt="1st Found-in" border="0" height="14" id="Found_Image" name="Found_Image" src="http://tools.cisco.com/Support/BugToolKit/images/icon_info.gif" style="text-decoration: none;" width="13" /&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; 15.2(1)TPI17&lt;/P&gt;&lt;P&gt; 12.2(58)SE2&lt;/P&gt;&lt;P&gt; 15.0(1)SE&lt;/P&gt;&lt;P&gt; 12.2(58)SE1 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;STRONG&gt; Fixed-In &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;A href="http://tools.cisco.com/Support/BugToolKit/images/Field%20Definitions.html" target="_blank"&gt; &lt;IMG alt="Fixed-in" border="0" height="14" id="Fixed_Image" name="Fixed_Image" src="http://tools.cisco.com/Support/BugToolKit/images/icon_info.gif" style="text-decoration: none;" width="13" /&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; Release-Pending &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 14 Nov 2011 19:42:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tacacs-auth-working-via-ssh-but-not-http-acs-5-1-3560/m-p/1493932#M316399</guid>
      <dc:creator>bking1982</dc:creator>
      <dc:date>2011-11-14T19:42:20Z</dc:date>
    </item>
    <item>
      <title>TACACS auth working via SSH, but not HTTP (ACS 5.1 / 3560)</title>
      <link>https://community.cisco.com/t5/network-access-control/tacacs-auth-working-via-ssh-but-not-http-acs-5-1-3560/m-p/1493933#M316419</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I'm running 12.2(50)SE on my 3560, where I am experiencing the issue.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;One thing I noticed on the 3560 was I could successfully login via &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://x.x.x.x/level/1"&gt;http://x.x.x.x/level/1&lt;/A&gt;&lt;SPAN&gt;, but not &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://x.x.x.x/level/15"&gt;http://x.x.x.x/level/15&lt;/A&gt;&lt;SPAN&gt;, even though both logs show success authentication and authorization.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I decided to try a 2960 running 12.2(53r)SE, and HTTP auth worked!&amp;nbsp; Same exact configuration, just a different switch, slightly different IOS revision.&amp;nbsp; I'm going to try and upgrade my 3560 to this version of code during our maintenance window this week and see if it works.&amp;nbsp; I hope this really is just a bug in particular versions of code, good find.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 14 Nov 2011 20:57:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tacacs-auth-working-via-ssh-but-not-http-acs-5-1-3560/m-p/1493933#M316419</guid>
      <dc:creator>David Varnum</dc:creator>
      <dc:date>2011-11-14T20:57:54Z</dc:date>
    </item>
  </channel>
</rss>

