<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Configure a Router AAA TACCAS in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/configure-a-router-aaa-taccas/m-p/712438#M422382</link>
    <description>&lt;P&gt;i install de Server ACS 4.0 but i cant get it works with a route ror swich can someone post a confiuracion for me to the server and router to works good.&lt;/P&gt;</description>
    <pubDate>Sun, 10 Mar 2019 21:51:20 GMT</pubDate>
    <dc:creator>ricardo-morales</dc:creator>
    <dc:date>2019-03-10T21:51:20Z</dc:date>
    <item>
      <title>Configure a Router AAA TACCAS</title>
      <link>https://community.cisco.com/t5/network-access-control/configure-a-router-aaa-taccas/m-p/712438#M422382</link>
      <description>&lt;P&gt;i install de Server ACS 4.0 but i cant get it works with a route ror swich can someone post a confiuracion for me to the server and router to works good.&lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 21:51:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/configure-a-router-aaa-taccas/m-p/712438#M422382</guid>
      <dc:creator>ricardo-morales</dc:creator>
      <dc:date>2019-03-10T21:51:20Z</dc:date>
    </item>
    <item>
      <title>Re: Configure a Router AAA TACCAS</title>
      <link>https://community.cisco.com/t5/network-access-control/configure-a-router-aaa-taccas/m-p/712439#M422383</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Router/Switch Config&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa new-model&lt;/P&gt;&lt;P&gt;aaa authentication enable default group tacacs+ local&lt;/P&gt;&lt;P&gt;aaa authorization exec default group tacacs+ local&lt;/P&gt;&lt;P&gt;aaa authorization network default group tacacs+ if-authenticated local&lt;/P&gt;&lt;P&gt;aaa accounting exec default start-stop group tacacs+&lt;/P&gt;&lt;P&gt;aaa accounting commands 15 default start-stop group tacacs+&lt;/P&gt;&lt;P&gt;aaa accounting network default start-stop group tacacs+&lt;/P&gt;&lt;P&gt;aaa accounting connection default start-stop group tacacs+&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;tacacs-server host 10.1.2.3 key cisco123&lt;/P&gt;&lt;P&gt;&lt;OR&gt;&lt;/OR&gt;&lt;/P&gt;&lt;P&gt;tacacs-server host 10.1.2.3&lt;/P&gt;&lt;P&gt;tacacs-server timeout 20&lt;/P&gt;&lt;P&gt;tacacs-server directed-request&lt;/P&gt;&lt;P&gt;tacacs-server key cisco123&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Optional:&lt;/P&gt;&lt;P&gt;Use Loopback0 as tacacs source interface as Loopback intf never goes down&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface loopback0&lt;/P&gt;&lt;P&gt; ip address 10.1.1.254 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Note:&lt;/P&gt;&lt;P&gt;The above 'default' keyword under aaa will auto-apply aaa authentication for all access sessions into the router/switch.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ACS Server Config:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Go to ACS Menu (via web browser)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. Create Network Device Group&lt;/P&gt;&lt;P&gt;- You can use Network Device Group (NDG) for easy device/group identification, or just use default group. Click on default or create a group.&lt;/P&gt;&lt;P&gt;- The 'Add AAA Client' page will appear after creating the group or click on default group.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2. Add router/switch as AAA Client&lt;/P&gt;&lt;P&gt;a. Click 'Network Configuration - add AAA Client&lt;/P&gt;&lt;P&gt;b. Enter :&lt;/P&gt;&lt;P&gt;AAA Client Hostname: &lt;YOUR router=""&gt;&lt;/YOUR&gt;&lt;/P&gt;&lt;P&gt;IP Address: 10.1.1.254&lt;/P&gt;&lt;P&gt;Key: cisco123  ---&amp;gt; use any preferred key&lt;/P&gt;&lt;P&gt;Network Device Group: &lt;CREATE your="" group=""&gt;&lt;/CREATE&gt;&lt;/P&gt;&lt;P&gt;Authenticate Using: TACACS+ (Cisco IOS)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3. Identify/assign ACS Server as tacacs+ authentication server&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;a. Click on the NDG if you have any, or under 'AAA Server', click Add Entry.&lt;/P&gt;&lt;P&gt;b. Key in server hostname, IP Address, secret key identical with key used in router/switch (cisco123)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To save ACS config, click 'submit+restart' button.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Refer to the attached doc and url below for more details.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/products/sw/iosswrel/ps1835/products_configuration_guide_chapter09186a00800ca7a7.html" target="_blank"&gt;http://www.cisco.com/en/US/products/sw/iosswrel/ps1835/products_configuration_guide_chapter09186a00800ca7a7.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;AK&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 27 Nov 2006 00:44:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/configure-a-router-aaa-taccas/m-p/712439#M422383</guid>
      <dc:creator>a.kiprawih</dc:creator>
      <dc:date>2006-11-27T00:44:44Z</dc:date>
    </item>
    <item>
      <title>Re: Configure a Router AAA TACCAS</title>
      <link>https://community.cisco.com/t5/network-access-control/configure-a-router-aaa-taccas/m-p/712440#M422385</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Config to specify Loopback0 as source intf for tacacs+ authentication:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip tacacs source-interface Loopback0&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 27 Nov 2006 00:47:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/configure-a-router-aaa-taccas/m-p/712440#M422385</guid>
      <dc:creator>a.kiprawih</dc:creator>
      <dc:date>2006-11-27T00:47:15Z</dc:date>
    </item>
    <item>
      <title>Re: Configure a Router AAA TACCAS</title>
      <link>https://community.cisco.com/t5/network-access-control/configure-a-router-aaa-taccas/m-p/712441#M422387</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;AK&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I believe that you have provided mostly good advice. I would question this line:&lt;/P&gt;&lt;P&gt;aaa authentication enable default group tacacs+ local &lt;/P&gt;&lt;P&gt;I question using local as the fall back method for authenticating the enable password. I believe it is better to configure it this way:&lt;/P&gt;&lt;P&gt;aaa authentication enable default group tacacs+ enable&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also I believe that the configuration needs a line configuring login authentication. It might look like this:&lt;/P&gt;&lt;P&gt;aaa authentication login default group tacacs+ line&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would emphasize your advice about using the loopback interface as the source address for tatacs. This is especially important when the router (or switch) has more than one interface that is a potential path to the tacacs server. The tacacs server can recognize only a single address from the router (or switch). If you do not specify the source address then the router (or switch) will default to using the address of the outbound interface. If the primary interface happens to be down and the router is sending out the other interface then tacacs will not be able to authenticate or authorize. Specifing the source address as the loopback fixes this and tacacs will be able to process no matter which interface is sending the traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Rick &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 27 Nov 2006 03:23:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/configure-a-router-aaa-taccas/m-p/712441#M422387</guid>
      <dc:creator>Richard Burts</dc:creator>
      <dc:date>2006-11-27T03:23:15Z</dc:date>
    </item>
    <item>
      <title>Re: Configure a Router AAA TACCAS</title>
      <link>https://community.cisco.com/t5/network-access-control/configure-a-router-aaa-taccas/m-p/712442#M422390</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for the feedback.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The config options depends on the final decision by the owner, as he/she can referred details on the config/implementation in the URL link and attached doc. Here, we normally share/suggest config that some might be applied, and some might use it as guidelines or references.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Anyway, the reason why local, instead of enable was to have another layer of control when ACS not available to authenticate, i,e. Operator might not need to go far compared to other admin with higher privilege, plus keeping enable pwd to certain (authorized) folks only.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But having said that, it is not a compulsory to use strictly use local or enable as last resort.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Without ACS, some might used local database in router/switch to keep individual accounts with different privileges when logging in. With ACS, some will probably get rid all, or maintain some of it. It's all depends on their requirements.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;BTW, the tacacs source intf command was in the next post. I missed the line.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My 2cent opinion.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers!&lt;/P&gt;&lt;P&gt;AK&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 27 Nov 2006 03:53:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/configure-a-router-aaa-taccas/m-p/712442#M422390</guid>
      <dc:creator>a.kiprawih</dc:creator>
      <dc:date>2006-11-27T03:53:42Z</dc:date>
    </item>
    <item>
      <title>Re: Configure a Router AAA TACCAS</title>
      <link>https://community.cisco.com/t5/network-access-control/configure-a-router-aaa-taccas/m-p/712443#M422393</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The missing part was "aaa authentication login default group tacacs+ local", enable instead of login (mixed-up...)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For certain devices (aaa authentication login TELNET group tacacs+ local), while others default (aaa authentication login default group tacacs+ local).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 27 Nov 2006 06:04:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/configure-a-router-aaa-taccas/m-p/712443#M422393</guid>
      <dc:creator>a.kiprawih</dc:creator>
      <dc:date>2006-11-27T06:04:54Z</dc:date>
    </item>
  </channel>
</rss>

