<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Using two tacacs+ servers in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/using-two-tacacs-servers/m-p/4437212#M568621</link>
    <description>&lt;P&gt;Hi Arne, thank you and all others for reply's,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What about if the ssh session used another port number, then that would go to the specified vty, thereby bypassing vty 0 4 ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Best Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 22 Jul 2021 08:41:16 GMT</pubDate>
    <dc:creator>COLIN</dc:creator>
    <dc:date>2021-07-22T08:41:16Z</dc:date>
    <item>
      <title>Using two tacacs+ servers</title>
      <link>https://community.cisco.com/t5/network-access-control/using-two-tacacs-servers/m-p/4436198#M568565</link>
      <description>&lt;P&gt;On the same switch is it possible to configure that one user from a source authenticates to a tacacs+ server and then another user from another source authenticates to a different tacacs+ server, that is for each user an authentication/authorization request to different TACACS+ servers all together. the ACL on vty 0 4 would deny the first and then the ssh request would go to vty 5 9.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;!&lt;BR /&gt;aaa new-model&lt;BR /&gt;!&lt;BR /&gt;aaa group server tacacs+ TACACS-AUTH-1&lt;BR /&gt;server-private 1.1.1.1 key 7 &amp;lt;removed&amp;gt;&lt;BR /&gt;server-private 1.1.1.2 key 7 &amp;lt;removed&amp;gt;&lt;BR /&gt;tacacs-server directed-request&lt;BR /&gt;tacacs-server attribute allow unknown&lt;BR /&gt;default tacacs-server timeout&lt;BR /&gt;!&lt;BR /&gt;aaa authentication login default group TACACS-AUTH-1 local&lt;BR /&gt;aaa authorization exec default group TACACS-AUTH-1 local&lt;BR /&gt;!&lt;BR /&gt;aaa authentication enable default group TACACS-AUTH-1 enable&lt;BR /&gt;aaa authorization console&lt;BR /&gt;aaa authorization config-commands&lt;BR /&gt;aaa authorization commands 1 default group TACACS-AUTH-1 local&lt;BR /&gt;aaa authorization commands 15 default group TACACS-AUTH-1 local&lt;BR /&gt;aaa accounting exec default start-stop group TACACS-AUTH-1&lt;BR /&gt;aaa accounting commands 1 default start-stop group TACACS-AUTH-1&lt;BR /&gt;aaa accounting commands 15 default start-stop group TACACS-AUTH-1&lt;BR /&gt;aaa accounting connection default start-stop group TACACS-AUTH-1&lt;BR /&gt;aaa accounting system default start-stop group TACACS-AUTH-1&lt;BR /&gt;!&lt;BR /&gt;access-list 111 remark VTY0-4 TACACS-AUTH-1&lt;BR /&gt;access-list 111 permit tcp host 1.1.1.1 any eq 22&lt;BR /&gt;access-list 111 permit tcp host 1.1.1.2 any eq 22&lt;BR /&gt;access-list 111 remark deny any other&lt;BR /&gt;access-list 111 deny ip any any log&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;aaa group server tacacs+ TACACS-AUTH-2&lt;BR /&gt;server-private 2.2.2.1 key 7 &amp;lt;removed&amp;gt;&lt;BR /&gt;server-private 2.2.2.2 key 7 &amp;lt;removed&amp;gt;&lt;BR /&gt;tacacs-server directed-request&lt;BR /&gt;tacacs-server attribute allow unknown&lt;BR /&gt;default tacacs-server timeout&lt;BR /&gt;!&lt;BR /&gt;aaa authentication login ANother group TACACS-AUTH-2 local&lt;BR /&gt;aaa authorization exec ANother group TACACS-AUTH-2 local&lt;BR /&gt;!&lt;BR /&gt;aaa authentication enable ANother group TACACS-AUTH-2 enable&lt;BR /&gt;aaa authorization console&lt;BR /&gt;aaa authorization config-commands&lt;BR /&gt;aaa authorization commands 1 ANother group TACACS-AUTH-2 local&lt;BR /&gt;aaa authorization commands 15 ANother group TACACS-AUTH-2 local&lt;BR /&gt;aaa accounting exec ANother start-stop group TACACS-AUTH-2&lt;BR /&gt;aaa accounting commands 1 ANother start-stop group TACACS-AUTH-2&lt;BR /&gt;aaa accounting commands 15 ANother start-stop group TACACS-AUTH-2&lt;BR /&gt;aaa accounting connection ANother start-stop group TACACS-AUTH-2&lt;BR /&gt;aaa accounting system ANother start-stop group TACACS-AUTH-2&lt;BR /&gt;!&lt;BR /&gt;access-list 222 remark VTY5-9 TACACS-AUTH-2&lt;BR /&gt;access-list 222 permit tcp host 2.2.2.1 any eq 22&lt;BR /&gt;access-list 222 permit tcp host 2.2.2.2 any eq 22&lt;BR /&gt;access-list 222 remark deny any other&lt;BR /&gt;access-list 222 deny ip any any log&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;line vty 0 4&lt;BR /&gt;login authentication default&lt;BR /&gt;access-class 111 in&lt;BR /&gt;!&lt;BR /&gt;line vty 5 9&lt;BR /&gt;login authentication ANother&lt;BR /&gt;access-class 222 in&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you in advance for any comments on this configuration&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 20 Jul 2021 17:39:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/using-two-tacacs-servers/m-p/4436198#M568565</guid>
      <dc:creator>COLIN</dc:creator>
      <dc:date>2021-07-20T17:39:57Z</dc:date>
    </item>
    <item>
      <title>Re: Using two tacacs+ servers</title>
      <link>https://community.cisco.com/t5/network-access-control/using-two-tacacs-servers/m-p/4437113#M568616</link>
      <description>&lt;P&gt;Interesting question. I don't know if that would work - did you test your config?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I expect that the VTY would process the TCP connections as they come in - i.e. VTY0 is used if there are no other sessions in use. And that means that user is going to get processed by VTY0 config.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I thought that perhaps there was something with named authentication/authorization lists - but the same logic applies - there doesn't seem to be any conditional logic in IOS to direct the VTY logins to a named list.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;aaa authentication login VTY_authen group dnac-network-radius-group local
aaa authorization exec VTY_author group dnac-network-radius-group local if-authe&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;line vty 0 4
 authorization exec VTY_author
 login authentication VTY_authen
 transport preferred none
 transport input all
&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 22 Jul 2021 05:47:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/using-two-tacacs-servers/m-p/4437113#M568616</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2021-07-22T05:47:07Z</dc:date>
    </item>
    <item>
      <title>Re: Using two tacacs+ servers</title>
      <link>https://community.cisco.com/t5/network-access-control/using-two-tacacs-servers/m-p/4437212#M568621</link>
      <description>&lt;P&gt;Hi Arne, thank you and all others for reply's,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What about if the ssh session used another port number, then that would go to the specified vty, thereby bypassing vty 0 4 ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Best Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 22 Jul 2021 08:41:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/using-two-tacacs-servers/m-p/4437212#M568621</guid>
      <dc:creator>COLIN</dc:creator>
      <dc:date>2021-07-22T08:41:16Z</dc:date>
    </item>
    <item>
      <title>Re: Using two tacacs+ servers</title>
      <link>https://community.cisco.com/t5/network-access-control/using-two-tacacs-servers/m-p/4437557#M568630</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/157179"&gt;@COLIN&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;May I ask, what is the problem you're trying to solve? I could imagine that perhaps you have two completely independent TACACS+ servers that don't contain the same user information and hence, you need to send the request to a specific server based on where the request is coming from.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I don't believe it's possible to make the IOS intelligent enough based on source IP address. You don't have any control over the the vty session number selection - it's first come, first served.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I had a look through the IOS EEM (Embedded Event Manager) and there doesn't seem to be a section for vty events - the "identity" events assume that authentication has been performed - which is a bit too late. EEM might have been the perfect solution.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 22 Jul 2021 22:08:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/using-two-tacacs-servers/m-p/4437557#M568630</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2021-07-22T22:08:31Z</dc:date>
    </item>
    <item>
      <title>Re: Using two tacacs+ servers</title>
      <link>https://community.cisco.com/t5/network-access-control/using-two-tacacs-servers/m-p/4437654#M568639</link>
      <description>&lt;P&gt;Hi Arne,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Your understanding is spot on, and I think I have to accept that this action of authentication is not achievable in the way I have to do it.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Many thanks for your response been very useful.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 23 Jul 2021 06:42:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/using-two-tacacs-servers/m-p/4437654#M568639</guid>
      <dc:creator>COLIN</dc:creator>
      <dc:date>2021-07-23T06:42:44Z</dc:date>
    </item>
    <item>
      <title>Re: Using two tacacs+ servers</title>
      <link>https://community.cisco.com/t5/network-access-control/using-two-tacacs-servers/m-p/4441318#M568769</link>
      <description>&lt;P&gt;Hello,&lt;BR /&gt;&lt;BR /&gt;Lets say we have&amp;nbsp;10.99.0.0/24 and 10.86.0.0/24, does the users of 10.99.x.x will always access equipements through TACACS1, and the 10.86.x.x always through TACACS2 ? Are you using ISE for both servers ?&lt;BR /&gt;&lt;BR /&gt;Regards!&lt;/P&gt;</description>
      <pubDate>Thu, 29 Jul 2021 19:11:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/using-two-tacacs-servers/m-p/4441318#M568769</guid>
      <dc:creator>Amine ZAKARIA</dc:creator>
      <dc:date>2021-07-29T19:11:41Z</dc:date>
    </item>
  </channel>
</rss>

