<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Configuring TACACS+ on ASA5525 with CIsco ISE for AAA in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/configuring-tacacs-on-asa5525-with-cisco-ise-for-aaa/m-p/3408352#M548129</link>
    <description>&lt;P&gt;Thanks Francesco - relieved you don't see anything amiss with the config!&lt;/P&gt;</description>
    <pubDate>Sat, 30 Jun 2018 09:31:59 GMT</pubDate>
    <dc:creator>antonypaul</dc:creator>
    <dc:date>2018-06-30T09:31:59Z</dc:date>
    <item>
      <title>Configuring TACACS+ on ASA5525 with CIsco ISE for AAA</title>
      <link>https://community.cisco.com/t5/network-access-control/configuring-tacacs-on-asa5525-with-cisco-ise-for-aaa/m-p/3407652#M548127</link>
      <description>&lt;P&gt;Hello all,&lt;/P&gt;
&lt;P&gt;Hoping to&amp;nbsp;get some assistance with&amp;nbsp;configuring TACACS+ on an ASA 5525 with ISE for aaa&lt;/P&gt;
&lt;P&gt;Environment:&lt;/P&gt;
&lt;P&gt;ASA5525 - 9.8(2)20 active/standby cluster&lt;BR /&gt;ISE - 2.1.0.474&lt;/P&gt;
&lt;P&gt;We currently use RADIUS for aaa and are looking to switch over to TACACS+&lt;/P&gt;
&lt;P&gt;Following the Cisco documentation I have cobbled together the below config&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;------------------------------------------------------------&lt;/P&gt;
&lt;P&gt;aaa-server ise-tacacs protocol tacacs+ &lt;BR /&gt;aaa-server ise-tacacs max-failed-attempts 3&lt;/P&gt;
&lt;P&gt;aaa-server ise-tacacs (inside) host xx.xx.xx.xx &lt;BR /&gt;key ################&lt;/P&gt;
&lt;P&gt;aaa-server ise-tacacs (inside) host xx.xx.xx.xx&lt;BR /&gt;key ################&lt;/P&gt;
&lt;P&gt;clear configure aaa&lt;BR /&gt;aaa authentication ssh console ise-tacacs LOCAL&lt;BR /&gt;aaa authentication enable console ise-tacacs LOCAL&lt;BR /&gt;aaa authentication http console ise-tacacs LOCAL&lt;BR /&gt;aaa authentication secure-http-client&lt;/P&gt;
&lt;P&gt;aaa authorization exec authentication-server auto-enable&lt;/P&gt;
&lt;P&gt;aaa authorization http console ise-tacacs&lt;/P&gt;
&lt;P&gt;aaa authorization command ise-tacacs LOCAL&lt;/P&gt;
&lt;P&gt;aaa accounting ssh console ise-tacacs&lt;BR /&gt;aaa accounting serial console ise-tacacs&lt;BR /&gt;aaa accounting enable console ise-tacacs&lt;/P&gt;
&lt;P&gt;-----------------------------------------------------------&lt;/P&gt;
&lt;P&gt;Now my main concern is locking everyone out either from authentication or from command authorization. That would be, for want of a better phrase, a resume generating event. Whilst I vaguely understand the aaa authentication commands above I am not so sure of things to feel safe enough to enter this config just yet.&lt;/P&gt;
&lt;P&gt;I can't schedule a reload as a backup because of the primary/secondary failover.&lt;/P&gt;
&lt;P&gt;We have an out of band lantronix terminal server providing serial access. What I am unclear about is whether serial access would be possible in the event I get locked out.&lt;/P&gt;
&lt;P&gt;I haven't included an aaa authentication serial command above - would that mean that serial connections could be made using the LOCAL priv 15 user to assist with rollback? This is the part I am unsure about. I would like to play this as safe as possible, even though I am about 90% sure the above would work as intended as I have tested this on a standalone 5512. I was also successfully able to test LOCAL fall back by changing the ISE Object for the test firewall to an incorrect IP.&lt;/P&gt;
&lt;P&gt;--------------------------------------&lt;/P&gt;
&lt;P&gt;existing radius config (if it would be helpful to share any other parts of the config please let me know)&lt;/P&gt;
&lt;P&gt;aaa-server RADIUS-GROUP protocol radius&lt;BR /&gt;aaa-server RADIUS-GROUP (inside) host YY.YY.YY.YY&lt;BR /&gt;aaa-server RADIUS-GROUP (inside) host YY.YY.YY.YY&lt;BR /&gt;user-identity domain DOMAIN-NAME aaa-server DOMAIN-NAME.LOCAL&lt;BR /&gt;user-identity ad-agent aaa-server CCDA&lt;BR /&gt;aaa authentication http console RADIUS-GROUP LOCAL&lt;BR /&gt;aaa authentication ssh console RADIUS-GROUP LOCAL&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;Any advice gratefully received.&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 18:59:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/configuring-tacacs-on-asa5525-with-cisco-ise-for-aaa/m-p/3407652#M548127</guid>
      <dc:creator>Antony Paul</dc:creator>
      <dc:date>2020-02-21T18:59:47Z</dc:date>
    </item>
    <item>
      <title>Re: Configuring TACACS+ on ASA5525 with CIsco ISE for AAA</title>
      <link>https://community.cisco.com/t5/network-access-control/configuring-tacacs-on-asa5525-with-cisco-ise-for-aaa/m-p/3407735#M548128</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You're configuration looks good.&lt;/P&gt;
&lt;P&gt;If you don't issue anything regarding serial console, it'll use local database.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Don't forget to configure the password and enable password field for your user on ISE.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You should be good with this config.&lt;/P&gt;</description>
      <pubDate>Fri, 29 Jun 2018 04:25:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/configuring-tacacs-on-asa5525-with-cisco-ise-for-aaa/m-p/3407735#M548128</guid>
      <dc:creator>Francesco Molino</dc:creator>
      <dc:date>2018-06-29T04:25:50Z</dc:date>
    </item>
    <item>
      <title>Re: Configuring TACACS+ on ASA5525 with CIsco ISE for AAA</title>
      <link>https://community.cisco.com/t5/network-access-control/configuring-tacacs-on-asa5525-with-cisco-ise-for-aaa/m-p/3408352#M548129</link>
      <description>&lt;P&gt;Thanks Francesco - relieved you don't see anything amiss with the config!&lt;/P&gt;</description>
      <pubDate>Sat, 30 Jun 2018 09:31:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/configuring-tacacs-on-asa5525-with-cisco-ise-for-aaa/m-p/3408352#M548129</guid>
      <dc:creator>antonypaul</dc:creator>
      <dc:date>2018-06-30T09:31:59Z</dc:date>
    </item>
    <item>
      <title>Re: Configuring TACACS+ on ASA5525 with CIsco ISE for AAA</title>
      <link>https://community.cisco.com/t5/network-access-control/configuring-tacacs-on-asa5525-with-cisco-ise-for-aaa/m-p/3408425#M548130</link>
      <description>Yeah that's correct. your config looks ok</description>
      <pubDate>Sat, 30 Jun 2018 16:58:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/configuring-tacacs-on-asa5525-with-cisco-ise-for-aaa/m-p/3408425#M548130</guid>
      <dc:creator>Francesco Molino</dc:creator>
      <dc:date>2018-06-30T16:58:48Z</dc:date>
    </item>
  </channel>
</rss>

