<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Determining whether TACACS+ access is being dropped by serve in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/determining-whether-tacacs-access-is-being-dropped-by-server-or/m-p/1549087#M330908</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This is a little tricky to tell without actually knowing or setting up a capture at the firewall that you mentioned. First thing I would do is to see if the tacacs services on the ACS is started...if you are running acs for windows you will just got to the server that ACS is installed on and see if the CSTacacs services are started. If you are on the solution engine you can verify the services are started when you click on "Service Control" under the System Configuration menu on the left. If the tacacs services are started then you can try to issue a telnet &lt;ACSIP&gt; 49 from the firewall and if the connection is open but closed when you issue the same command from the device that you are trying to authenticate then it is a possibility that the firewall is blocking the traffic from passing through.&lt;/ACSIP&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope that helps,&lt;/P&gt;&lt;P&gt;Tarik Admani&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 02 Dec 2010 04:34:37 GMT</pubDate>
    <dc:creator>Tarik Admani</dc:creator>
    <dc:date>2010-12-02T04:34:37Z</dc:date>
    <item>
      <title>Determining whether TACACS+ access is being dropped by server or firewall?</title>
      <link>https://community.cisco.com/t5/network-access-control/determining-whether-tacacs-access-is-being-dropped-by-server-or/m-p/1549086#M330866</link>
      <description>&lt;P&gt;&lt;SPAN style="background-color: #f8fafd;"&gt;I have a router with the following aaa and tacacs+ config:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa new-model&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;aaa authentication attempts login 5&lt;BR /&gt;aaa authentication fail-message ^CCFailed login. Five consecutive fails will revoke.^C&lt;BR /&gt;aaa authentication login default group tacacs+ local&lt;BR /&gt;aaa authentication enable default group tacacs+ enable&lt;BR /&gt;aaa authorization exec default group tacacs+ if-authenticated&lt;BR /&gt;aaa accounting suppress null-username&lt;BR /&gt;aaa accounting exec default start-stop group tacacs+&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip tacacs source-interface Loopback0&lt;/P&gt;&lt;P&gt;tacacs-server host 167.64.248.52 single-connection&lt;BR /&gt;tacacs-server host 167.64.148.12 single-connection&lt;BR /&gt;tacacs-server timeout 6&lt;BR /&gt;tacacs-server directed-request&lt;BR /&gt;tacacs-server key 7 XXXXXXXXXXXXXXXXXXXXXXXXXX&lt;BR /&gt; &lt;/P&gt;&lt;P&gt;The loopback address is 167.64.82.53/32, and the following routes and ACLs are in place to ensure that connectivity for ssh and tacacs are in place:&lt;/P&gt;&lt;P&gt;ip route 167.64.148.12 255.255.255.255 212.123.3.156 name Tacacs+&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;lt;---- Firewall is the gateway&lt;BR /&gt;ip route 167.64.248.52 255.255.255.255 212.123.3.156 name Tacacs+&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;lt;---- Firewall is the gateway&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 101 remark /**********************************************&lt;BR /&gt;access-list 101 remark Allows SSH access for management&lt;BR /&gt;access-list 101 remark **********************************************/&lt;BR /&gt;access-list 101 permit tcp host 212.123.3.146 any eq telnet&lt;BR /&gt;access-list 101 permit tcp host 212.123.3.158 any eq telnet&lt;BR /&gt;access-list 101 permit tcp host 212.123.3.146 any eq 22&lt;BR /&gt;access-list 101 permit tcp host 212.123.3.156 any eq 22&lt;BR /&gt;access-list 101 permit tcp host 212.123.3.158 any eq 22&lt;BR /&gt;access-list 101 permit tcp 172.30.127.0 0.0.0.31 any eq 22&lt;BR /&gt;access-list 101 permit tcp host 10.1.9.13 any eq 22&lt;BR /&gt;access-list 101 permit tcp host 10.6.35.35 any eq 22&lt;BR /&gt;access-list 101 permit tcp host 10.11.15.35 any eq 22&lt;BR /&gt;access-list 101 deny&amp;nbsp;&amp;nbsp; ip any any log&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The following is configured on the ACS server:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;TABLE border="0" class="content" style="width: 100%;"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD align="left"&gt;AAA Client IP Address&lt;/TD&gt;&lt;TD&gt;&lt;TEXTAREA cols="20" name="ip" rows="3"&gt;167.64.82.53 &lt;/TEXTAREA&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD align="left"&gt;Shared Secret&lt;/TD&gt;&lt;TD&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;INPUT maxlength="2147483647" name="key_value" size="20" type="hidden" value="M;dl(hdThs2Z" /&gt;&lt;INPUT maxlength="2147483647" name="key_state" size="20" type="hidden" value="0" /&gt;&lt;INPUT maxlength="2147483647" name="key_state_enc" size="20" type="hidden" value="0" /&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;Network Device Group&lt;/TD&gt;&lt;TD&gt;&lt;SELECT name="NDG_ID"&gt; &lt;OPTION value="14"&gt;TEST&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/OPTION&gt;&lt;OPTION value="15"&gt;VF Corp - CAS&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/OPTION&gt;&lt;OPTION value="7"&gt;VF Corp - Radius devices&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/OPTION&gt;&lt;OPTION value="10"&gt;VF Corp Firewalls&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/OPTION&gt;&lt;OPTION value="9"&gt;VF PCI Firewalls&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/OPTION&gt;&lt;OPTION value="6"&gt;VF-RTPDC&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/OPTION&gt;&lt;OPTION value="12"&gt;VFC Wireless&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/OPTION&gt;&lt;OPTION value="13"&gt;VFC Wireless TACACS&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/OPTION&gt;&lt;OPTION value="5"&gt;VFCorp ACS servers&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/OPTION&gt;&lt;OPTION value="4"&gt;VFE-LUFTHANSA&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/OPTION&gt;&lt;OPTION value="2"&gt;VFE-NETWORK&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/OPTION&gt;&lt;OPTION value="3"&gt;VFE-QUENTRIS&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/OPTION&gt;&lt;OPTION value="0"&gt;(Not Assigned)&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/OPTION&gt;&lt;/SELECT&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;Authenticate Using&lt;/TD&gt;&lt;TD&gt;&lt;SELECT name="VENDOR_PICK_FIELD"&gt;&lt;OPTION value="02"&gt;TACACS+ (Cisco IOS)&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/OPTION&gt; &lt;OPTION value="13"&gt;RADIUS (Cisco Airespace)&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/OPTION&gt; &lt;OPTION value="08"&gt;RADIUS (Cisco Aironet)&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/OPTION&gt; &lt;OPTION value="11"&gt;RADIUS (Cisco BBSM)&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/OPTION&gt; &lt;OPTION value="14"&gt;RADIUS (3COMUSR)&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/OPTION&gt; &lt;OPTION value="01"&gt;RADIUS (Cisco IOS/PIX 6.0)&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/OPTION&gt; &lt;OPTION value="05"&gt;RADIUS (Cisco VPN 3000/ASA/PIX 7.x+)&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/OPTION&gt; &lt;OPTION value="07"&gt;RADIUS (Cisco VPN 5000)&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/OPTION&gt; &lt;OPTION value="00"&gt;RADIUS (IETF)&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/OPTION&gt; &lt;OPTION value="03"&gt;RADIUS (Ascend)&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/OPTION&gt; &lt;OPTION value="10"&gt;RADIUS (Juniper)&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/OPTION&gt; &lt;OPTION value="09"&gt;RADIUS (Nortel)&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/OPTION&gt; &lt;OPTION value="12"&gt;RADIUS (iPass)&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/OPTION&gt;&lt;/SELECT&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD colspan="2"&gt;&lt;HR width="75%" /&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;!-- RADIUS Key Wrap related information --&gt;&lt;TD colspan="2"&gt;&lt;TABLE border="0" class="content" width="100%"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD align="left"&gt;&lt;STRONG&gt;RADIUS Key Wrap&lt;/STRONG&gt;&lt;/TD&gt;&lt;TD&gt; &lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD align="left"&gt;Key Encryption Key&lt;/TD&gt;&lt;TD&gt;&lt;INPUT maxlength="32" name="KW_kek" size="40" type="text" value="00000000000000000000000000000000" /&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD align="left"&gt;Message Authenticator Code Key&lt;/TD&gt;&lt;TD&gt;&lt;INPUT maxlength="40" name="KW_mack" size="48" type="text" value="0000000000000000000000000000000000000000" /&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD align="left"&gt;Key Input Format&lt;/TD&gt;&lt;TD align="left"&gt;&lt;TABLE border="0" class="content"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD align="left"&gt;&lt;INPUT maxlength="2147483647" name="KW_keyInFmt" onclick="" size="20" type="radio" value="A" /&gt;ASCII&lt;/TD&gt;&lt;TD align="left"&gt;&lt;INPUT maxlength="2147483647" name="KW_keyInFmt" onclick="" size="20" type="radio" value="H" /&gt;Hexadecimal&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;INPUT maxlength="2147483647" name="KW_keyInFmt_state" size="20" type="hidden" value="H" /&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/TD&gt;&lt;!-- RADIUS Key Wrap related information --&gt;&lt;/TR&gt;&lt;TR&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD colspan="2"&gt;&lt;HR width="75%" /&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD colspan="2"&gt;&lt;TABLE class="content"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;&lt;INPUT maxlength="2147483647" name="logUpdatePackets" size="20" type="checkbox" value="1" /&gt;&lt;/TD&gt;&lt;TD&gt;Log Update/Watchdog Packets from this AAA Client&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD align="left"&gt;&lt;STRONG&gt;RADIUS Options&lt;/STRONG&gt;&lt;/TD&gt;&lt;TD&gt; &lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD colspan="2"&gt;&lt;TABLE class="content"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;&lt;INPUT maxlength="2147483647" name="logReplacePortWithUID" size="20" type="checkbox" value="1" /&gt;&lt;/TD&gt;&lt;TD&gt;Replace RADIUS Port info with Username from this AAA Client&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD colspan="2"&gt;&lt;TABLE class="content"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;&lt;INPUT maxlength="2147483647" name="logTunnelPackets" size="20" type="checkbox" value="1" /&gt;&lt;/TD&gt;&lt;TD&gt;Log RADIUS Tunneling Packets from this AAA Client&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD colspan="2"&gt;&lt;TABLE class="content"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;&lt;INPUT maxlength="2147483647" name="matchFramedIPAddr" size="20" type="checkbox" value="1" /&gt;&lt;/TD&gt;&lt;TD&gt;Match Framed-IP-Address with user IP address for accounting packets from this AAA Client&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD align="left"&gt;&lt;STRONG&gt;TACACS+ Options&lt;/STRONG&gt;&lt;/TD&gt;&lt;TD&gt; &lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt; &lt;/TR&gt;&lt;TR&gt;&lt;TD colspan="2"&gt;&lt;TABLE border="0" class="content"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;&lt;INPUT maxlength="2147483647" name="TAC_SINGLE_GROUP" size="20" type="checkbox" value="UNLOAD_SINGLE" /&gt;&lt;/TD&gt;&lt;TD&gt;Generate account stop packet for unexpected Single-Connect termination&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;TABLE align="center" border="1" class="content" width="95%"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TH align="center"&gt;Single Connect Flag support&lt;/TH&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD colspan="2"&gt;&lt;TABLE border="0" class="content"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;&lt;INPUT maxlength="2147483647" name="TacSingleConnFlagOnOff" size="20" type="radio" value="0" /&gt;&lt;/TD&gt;&lt;TD&gt;Legacy TACACS+ Single Connect support for this AAA client&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;INPUT maxlength="2147483647" name="TacSingleConnFlagOnOff" size="20" type="radio" value="1" /&gt;&lt;/TD&gt;&lt;TD&gt;TACACS+ Draft compliant Single Connect support for this AAA client&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The following error is received when users try to connect using TACACS credentials:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Nov 30 17:19:46 EST: TPLUS: Queuing AAA Authentication request 12 for processing&lt;BR /&gt;Nov 30 17:19:46 EST: TPLUS: processing authentication start request id 12&lt;BR /&gt;Nov 30 17:19:46 EST: TPLUS: Authentication start packet created for 12(alansmit)&lt;BR /&gt;Nov 30 17:19:46 EST: TPLUS: Using server 167.64.248.52&lt;BR /&gt;Nov 30 17:19:46 EST: TPLUS(0000000C)/0/IDLE/65AB8424: got immediate connect on new 0&lt;BR /&gt;Nov 30 17:19:46 EST: TPLUS(0000000C)/0/WRITE/65AB8424: Started 6 sec timeout&lt;BR /&gt;Nov 30 17:19:46 EST: TPLUS(0000000C)/0/WRITE: write to 167.64.248.52 failed with errno 257((ENOTCONN))&lt;BR /&gt;Nov 30 17:19:46 EST: TPLUS: Authentication start packet created for 12(alansmit)&lt;BR /&gt;Nov 30 17:19:52 EST: TPLUS(0000000C)/0/WRITE/65AB8424: timed out&lt;BR /&gt;Nov 30 17:19:52 EST: TPLUS(0000000C)/0/WRITE/65AB8424: timed out, clean up&lt;BR /&gt;Nov 30 17:19:52 EST: TPLUS(0000000C)/0/65AB8424: Processing the reply packet&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The ACS server does not register a failed attempt. Is it likely that this traffic is possibly being blocked by the firewall at IP address 212.123.3.156?&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 00:37:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/determining-whether-tacacs-access-is-being-dropped-by-server-or/m-p/1549086#M330866</guid>
      <dc:creator>alan1smith</dc:creator>
      <dc:date>2019-03-11T00:37:37Z</dc:date>
    </item>
    <item>
      <title>Re: Determining whether TACACS+ access is being dropped by serve</title>
      <link>https://community.cisco.com/t5/network-access-control/determining-whether-tacacs-access-is-being-dropped-by-server-or/m-p/1549087#M330908</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This is a little tricky to tell without actually knowing or setting up a capture at the firewall that you mentioned. First thing I would do is to see if the tacacs services on the ACS is started...if you are running acs for windows you will just got to the server that ACS is installed on and see if the CSTacacs services are started. If you are on the solution engine you can verify the services are started when you click on "Service Control" under the System Configuration menu on the left. If the tacacs services are started then you can try to issue a telnet &lt;ACSIP&gt; 49 from the firewall and if the connection is open but closed when you issue the same command from the device that you are trying to authenticate then it is a possibility that the firewall is blocking the traffic from passing through.&lt;/ACSIP&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope that helps,&lt;/P&gt;&lt;P&gt;Tarik Admani&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 02 Dec 2010 04:34:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/determining-whether-tacacs-access-is-being-dropped-by-server-or/m-p/1549087#M330908</guid>
      <dc:creator>Tarik Admani</dc:creator>
      <dc:date>2010-12-02T04:34:37Z</dc:date>
    </item>
    <item>
      <title>Re: Determining whether TACACS+ access is being dropped by serve</title>
      <link>https://community.cisco.com/t5/network-access-control/determining-whether-tacacs-access-is-being-dropped-by-server-or/m-p/1549088#M330958</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Could you try ticking this: Legacy TACACS+ Single Connect support for this AAA client&amp;nbsp;&amp;nbsp; on your ACS.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 02 Dec 2010 10:45:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/determining-whether-tacacs-access-is-being-dropped-by-server-or/m-p/1549088#M330958</guid>
      <dc:creator>cadet alain</dc:creator>
      <dc:date>2010-12-02T10:45:43Z</dc:date>
    </item>
    <item>
      <title>Re: Determining whether TACACS+ access is being dropped by serve</title>
      <link>https://community.cisco.com/t5/network-access-control/determining-whether-tacacs-access-is-being-dropped-by-server-or/m-p/1549089#M331034</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Alan&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am interested in this error message from your original post:&lt;/P&gt;&lt;P&gt;write to 167.64.248.52 failed with errno 257((ENOTCONN))&lt;/P&gt;&lt;P&gt;can you verify that there is IP connectivity between your router loopback interface and the TACACS server (extended ping from the router specifying the source address as loopback 0 and destination as 167.64.248.52&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am also curious. You posted access list 101 but do not tell us how that access list is used. Can you clarify that for us?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Rick&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 04 Dec 2010 23:13:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/determining-whether-tacacs-access-is-being-dropped-by-server-or/m-p/1549089#M331034</guid>
      <dc:creator>Richard Burts</dc:creator>
      <dc:date>2010-12-04T23:13:12Z</dc:date>
    </item>
  </channel>
</rss>

