<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: TACACS failures on ISE 3.2 in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/tacacs-failures-on-ise-3-2/m-p/5021526#M587490</link>
    <description>&lt;P&gt;Thank you very much.&amp;nbsp; my config pretty much is identical, except I'm testing on a single server.&amp;nbsp; I'm still getting a user rejected when I perform the test aaa testing from the switch.&amp;nbsp; I see the packets sent, sockets opened/closed increasing when I perform the testing, but no other time.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Am I missing something?&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 20 Feb 2024 21:41:00 GMT</pubDate>
    <dc:creator>kyle311</dc:creator>
    <dc:date>2024-02-20T21:41:00Z</dc:date>
    <item>
      <title>TACACS failures on ISE 3.2</title>
      <link>https://community.cisco.com/t5/network-access-control/tacacs-failures-on-ise-3-2/m-p/5021452#M587486</link>
      <description>&lt;P&gt;Alright, after fighting w/ TAC to get my SLR licenses for TACACS, I'm running into a bit of an issue.&amp;nbsp; I'm just trying a basic config to utilize TACACS to authenticate SSH sessions to our switches.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I ran the debug cisco recommends but I'm not seeing what it is that I'm missing.&amp;nbsp; the device is created in ISE, TACACS passwords match on both ends.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I put a copy of the debug below.&amp;nbsp; Any help would be greatly appreciated!&amp;nbsp;&lt;/P&gt;&lt;P&gt;#test aaa group tacacs+ (username) (password) legacy&lt;BR /&gt;Attempting authentication test to server-group tacacs+ using tacacs+&lt;/P&gt;&lt;P&gt;Jul 17 23:27:52.596: AAA: parse name=&amp;lt;no string&amp;gt; idb type=-1 tty=-1&lt;BR /&gt;Jul 17 23:27:52.596: AAA/MEMORY: create_user (0x86738F8) user='kyurick' ruser='NULL' ds0=0 port='' rem_addr='NULL' authen_type=ASCII service=LOGIN priv=1 initial_task_id='0', vrf= (id=0)&lt;BR /&gt;Jul 17 23:27:52.596: TAC+: send AUTHEN/START packet ver=192 id=1120545143&lt;BR /&gt;Jul 17 23:27:52.596: TAC+: Using default tacacs server-group "tacacs+" list.&lt;BR /&gt;Jul 17 23:27:52.596: TAC+: OpUser authentication request was rejected by server.&lt;/P&gt;&lt;P&gt;ISE_TEST#ening TCP/IP to 158.157.232.4/49 timeout=5&lt;BR /&gt;Jul 17 23:27:52.596: TCB076F3060 created&lt;BR /&gt;Jul 17 23:27:52.596: TCB076F3060 setting property TCP_GIVEUP (41) 8890E98&lt;BR /&gt;Jul 17 23:27:52.596: TCB076F3060 setting property TCP_VRFTABLEID (20) 8890EC8&lt;BR /&gt;Jul 17 23:27:52.596: tcp_uniqueport: using ephemeral max 65535&lt;BR /&gt;Jul 17 23:27:52.596: TCP: Random local port generated 46154, network 1&lt;BR /&gt;Jul 17 23:27:52.596: Reserved port 46154 in Transport Port Agent for TCP IP type 1&lt;BR /&gt;Jul 17 23:27:52.596: TCP: sending SYN, seq 559074&lt;BR /&gt;ISE_TEST#741, ack 0&lt;BR /&gt;Jul 17 23:27:52.599: TCP0: Connection to 158.157.232.4:49, advertising MSS 1460&lt;BR /&gt;Jul 17 23:27:52.599: TCP0: state was CLOSED -&amp;gt; SYNSENT [46154 -&amp;gt; 158.157.232.4(49)]&lt;BR /&gt;Jul 17 23:27:52.599: TCP0: state was SYNSENT -&amp;gt; ESTAB [46154 -&amp;gt; 158.157.232.4(49)]&lt;BR /&gt;Jul 17 23:27:52.599: TCP: tcb 76F3060 connection to 158.157.232.4:49, peer MSS 1460, MSS is 1460&lt;BR /&gt;Jul 17 23:27:52.599: TCB076F3060 connected to 158.157.232.4.49&lt;BR /&gt;Jul 17 23:27:52.599: TAC+: Opened TCP/IP handle 0x76F3060 to 158.157.232.4/49 using sou&lt;BR /&gt;ISE_TEST#rce UNKNOWN&lt;BR /&gt;Jul 17 23:27:52.599: TAC+: 158.157.232.4 (1120545143) AUTHEN/START/LOGIN/ASCII queued&lt;BR /&gt;Jul 17 23:27:52.802: TAC+: (1120545143) AUTHEN/START/LOGIN/ASCII processed&lt;BR /&gt;Jul 17 23:27:52.802: TAC+: ver=192 id=1120545143 received AUTHEN status = GETPASS&lt;BR /&gt;Jul 17 23:27:52.802: TAC+: send AUTHEN/CONT packet id=1120545143&lt;BR /&gt;Jul 17 23:27:52.802: TAC+: 158.157.232.4 (1120545143) AUTHEN/CONT queued&lt;BR /&gt;Jul 17 23:27:52.914: TCP0: FIN processed&lt;BR /&gt;Jul 17 23:27:52.914: TCP0: state was ESTAB -&amp;gt; CLOSEWAIT [46154 -&amp;gt; 158.&lt;BR /&gt;ISE_TEST#157.232.4(49)]&lt;BR /&gt;Jul 17 23:27:53.001: TAC+: (1120545143) AUTHEN/CONT processed&lt;BR /&gt;Jul 17 23:27:53.001: TAC+: ver=192 id=1120545143 received AUTHEN status = FAIL&lt;BR /&gt;Jul 17 23:27:53.001: TAC+: Closing TCP/IP 0x76F3060 connection to 158.157.232.4/49&lt;BR /&gt;Jul 17 23:27:53.001: TCP0: state was CLOSEWAIT -&amp;gt; LASTACK [46154 -&amp;gt; 158.157.232.4(49)]&lt;BR /&gt;Jul 17 23:27:53.001: TCP0: sending FIN&lt;BR /&gt;Jul 17 23:27:53.001: AAA/MEMORY: free_user (0x86738F8) user='kyurick' ruser='NULL' port='' rem_addr='NULL' authen_type=ASCII service=LOGIN p&lt;BR /&gt;ISE_TEST#riv=1 vrf= (id=0)&lt;BR /&gt;Jul 17 23:27:53.001: TCP0: Got ACK for our FIN&lt;BR /&gt;Jul 17 23:27:53.001: TCP0: state was LASTACK -&amp;gt; CLOSED [46154 -&amp;gt; 158.157.232.4(49)]&lt;BR /&gt;Jul 17 23:27:53.001: Released port 46154 in Transport Port Agent for TCP IP type 1 delay 240000&lt;BR /&gt;Jul 17 23:27:53.001: TCB 0x76F3060 destroyed&lt;BR /&gt;ISE_TEST#&lt;/P&gt;</description>
      <pubDate>Tue, 20 Feb 2024 20:08:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tacacs-failures-on-ise-3-2/m-p/5021452#M587486</guid>
      <dc:creator>kyle311</dc:creator>
      <dc:date>2024-02-20T20:08:42Z</dc:date>
    </item>
    <item>
      <title>Re: TACACS failures on ISE 3.2</title>
      <link>https://community.cisco.com/t5/network-access-control/tacacs-failures-on-ise-3-2/m-p/5021499#M587488</link>
      <description>&lt;P&gt;what is the basic config - what device mode and IOS code running :&lt;/P&gt;
&lt;P&gt;1. on ISE make sure you have add NAD IP of the switch and&amp;nbsp; created users (Local ISE or fro AD)&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.cisco.com/t5/security-knowledge-base/ise-secure-wired-access-prescriptive-deployment-guide/ta-p/3641515" target="_blank"&gt;https://community.cisco.com/t5/security-knowledge-base/ise-secure-wired-access-prescriptive-deployment-guide/ta-p/3641515&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;below config always works for me :&lt;/P&gt;
&lt;P&gt;username cisco privilege 15 secret 5 cisco&lt;/P&gt;
&lt;P style="margin: 0in; line-height: 18pt; font-family: Calibri; font-size: 12.0pt; color: #1b1c1d;"&gt;&lt;SPAN&gt;aaa new-model&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; line-height: 18pt; font-family: Calibri; font-size: 12.0pt; color: #1b1c1d;"&gt;&lt;SPAN&gt;tacacs server ISE1&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; line-height: 18pt; font-family: Calibri; font-size: 12.0pt; color: #1b1c1d;"&gt;&lt;SPAN&gt;address ipv4 192.100.1.1&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; line-height: 18pt; font-family: Calibri; font-size: 12.0pt; color: #1b1c1d;"&gt;&lt;SPAN&gt;key Mykey&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; line-height: 18pt; font-family: Calibri; font-size: 12.0pt; color: #1b1c1d;"&gt;&lt;SPAN&gt;tacacs server ISE2&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; line-height: 18pt; font-family: Calibri; font-size: 12.0pt; color: #1b1c1d;"&gt;&lt;SPAN&gt;address ipv4 192.200.1.1&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; line-height: 18pt; font-family: Calibri; font-size: 12.0pt; color: #1b1c1d;"&gt;&lt;SPAN&gt;key MyKey&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; line-height: 18pt; font-family: Calibri; font-size: 12.0pt; color: #1b1c1d;"&gt;&lt;SPAN&gt;ip tacacs source-interface Loopback0&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; line-height: 18pt; font-family: Calibri; font-size: 12.0pt; color: #1b1c1d;"&gt;&lt;SPAN&gt;aaa group server tacacs+ ISE_GRP&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; line-height: 18pt; font-family: Calibri; font-size: 12.0pt; color: #1b1c1d;"&gt;&lt;SPAN&gt;server name ISE1&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; line-height: 18pt; font-family: Calibri; font-size: 12.0pt; color: #1b1c1d;"&gt;&lt;SPAN&gt;server name ISE2&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; line-height: 18pt; font-family: Calibri; font-size: 12.0pt; color: #1b1c1d;"&gt;&lt;SPAN&gt;aaa authentication login default group ISE_GRP local&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; line-height: 18pt; font-family: Calibri; font-size: 12.0pt; color: #1b1c1d;"&gt;&lt;SPAN&gt;aaa authorization config-commands&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; line-height: 18pt; font-family: Calibri; font-size: 12.0pt; color: #1b1c1d;"&gt;&lt;SPAN&gt;aaa authorization exec default group ISE_GRP local&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; line-height: 18pt; font-family: Calibri; font-size: 12.0pt; color: #1b1c1d;"&gt;&lt;SPAN&gt;aaa authorization commands 0 default group ISE_GRP local&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; line-height: 18pt; font-family: Calibri; font-size: 12.0pt; color: #1b1c1d;"&gt;&lt;SPAN&gt;aaa authorization commands 1 default group ISE_GRP local&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; line-height: 18pt; font-family: Calibri; font-size: 12.0pt; color: #1b1c1d;"&gt;&lt;SPAN&gt;aaa authorization commands 15 default group ISE_GRP local&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; line-height: 18pt; font-family: Calibri; font-size: 12.0pt; color: #1b1c1d;"&gt;&lt;SPAN&gt;aaa accounting exec default start-stop group ISE_GRP&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; line-height: 18pt; font-family: Calibri; font-size: 12.0pt; color: #1b1c1d;"&gt;&lt;SPAN&gt;aaa accounting commands 0 default start-stop group ISE_GRP&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; line-height: 18pt; font-family: Calibri; font-size: 12.0pt; color: #1b1c1d;"&gt;&lt;SPAN&gt;aaa accounting commands 1 default start-stop group ISE_GRP&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; line-height: 18pt; font-family: Calibri; font-size: 12.0pt; color: #1b1c1d;"&gt;&lt;SPAN&gt;aaa accounting commands 15 default start-stop group ISE_GRP&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 20 Feb 2024 21:06:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tacacs-failures-on-ise-3-2/m-p/5021499#M587488</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2024-02-20T21:06:54Z</dc:date>
    </item>
    <item>
      <title>Re: TACACS failures on ISE 3.2</title>
      <link>https://community.cisco.com/t5/network-access-control/tacacs-failures-on-ise-3-2/m-p/5021526#M587490</link>
      <description>&lt;P&gt;Thank you very much.&amp;nbsp; my config pretty much is identical, except I'm testing on a single server.&amp;nbsp; I'm still getting a user rejected when I perform the test aaa testing from the switch.&amp;nbsp; I see the packets sent, sockets opened/closed increasing when I perform the testing, but no other time.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Am I missing something?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 20 Feb 2024 21:41:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tacacs-failures-on-ise-3-2/m-p/5021526#M587490</guid>
      <dc:creator>kyle311</dc:creator>
      <dc:date>2024-02-20T21:41:00Z</dc:date>
    </item>
    <item>
      <title>Re: TACACS failures on ISE 3.2</title>
      <link>https://community.cisco.com/t5/network-access-control/tacacs-failures-on-ise-3-2/m-p/5021533#M587491</link>
      <description>&lt;PRE&gt;debug aaa authentication &amp;lt;- run this second

debug tacacs &amp;lt;- run this second 

debug ip tcp transaction &amp;lt;- run this first &lt;/PRE&gt;
&lt;P&gt;Access via ssh and run first command then disable it then run two other commands&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Share reuslt here&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks&amp;nbsp;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Tue, 20 Feb 2024 21:51:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tacacs-failures-on-ise-3-2/m-p/5021533#M587491</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-02-20T21:51:42Z</dc:date>
    </item>
    <item>
      <title>Re: TACACS failures on ISE 3.2</title>
      <link>https://community.cisco.com/t5/network-access-control/tacacs-failures-on-ise-3-2/m-p/5021537#M587493</link>
      <description>&lt;LI-CODE lang="markup"&gt;Am I missing something? &lt;/LI-CODE&gt;
&lt;P&gt;i presume yes, that is where we are troubleshooting here ?&lt;/P&gt;
&lt;P&gt;what is the logs show on the ISE side ?&lt;/P&gt;
&lt;PRE&gt;show tacacs &lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 20 Feb 2024 21:53:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tacacs-failures-on-ise-3-2/m-p/5021537#M587493</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2024-02-20T21:53:55Z</dc:date>
    </item>
    <item>
      <title>Re: TACACS failures on ISE 3.2</title>
      <link>https://community.cisco.com/t5/network-access-control/tacacs-failures-on-ise-3-2/m-p/5021558#M587494</link>
      <description>&lt;P&gt;Well, I am getting live log info now..&lt;/P&gt;&lt;TABLE border="0"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;Message Text&lt;/TD&gt;&lt;TD&gt;Failed-Attempt: Authentication failed&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;Failure Reason&lt;/TD&gt;&lt;TD&gt;&lt;P&gt;22056 Subject not found in the applicable identity store(s)&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;TABLE border="0"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;Resolution&lt;/TD&gt;&lt;TD&gt;&lt;P&gt;Check whether the subject is present in any one of the chosen identity stores. Note that some identity stores may have been skipped due to identity resoultion settings or if they do not support the current authentication protocol.&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The user exists - what may be missing now?&lt;/P&gt;</description>
      <pubDate>Tue, 20 Feb 2024 22:11:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tacacs-failures-on-ise-3-2/m-p/5021558#M587494</guid>
      <dc:creator>kyle311</dc:creator>
      <dc:date>2024-02-20T22:11:15Z</dc:date>
    </item>
    <item>
      <title>Re: TACACS failures on ISE 3.2</title>
      <link>https://community.cisco.com/t5/network-access-control/tacacs-failures-on-ise-3-2/m-p/5021575#M587495</link>
      <description>&lt;P&gt;&lt;A href="https://www.wiresandwi.fi/blog/cisco-ise-configuring-tacacs-authentication-for-device-administration" target="_blank"&gt;https://www.wiresandwi.fi/blog/cisco-ise-configuring-tacacs-authentication-for-device-administration&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Check this guide&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Your ISE config maybe wrong&amp;nbsp;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Tue, 20 Feb 2024 23:09:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tacacs-failures-on-ise-3-2/m-p/5021575#M587495</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-02-20T23:09:21Z</dc:date>
    </item>
    <item>
      <title>Re: TACACS failures on ISE 3.2</title>
      <link>https://community.cisco.com/t5/network-access-control/tacacs-failures-on-ise-3-2/m-p/5022069#M587519</link>
      <description>&lt;LI-CODE lang="markup"&gt;what may be missing now?&lt;/LI-CODE&gt;
&lt;P&gt;there is no information provided to miss here anything.&lt;/P&gt;
&lt;P&gt;Looks like rather you addressing our question, the reply going one way, so its hard to addres the issue here.&lt;/P&gt;
&lt;P&gt;there is no relation to our questions and your reply.&lt;/P&gt;
&lt;P&gt;i suggest to please read below how to ask question in the community before you posting any new.&lt;/P&gt;
&lt;P&gt;explain your setup&lt;/P&gt;
&lt;P&gt;explain what is configured&lt;/P&gt;
&lt;P&gt;explain how are you testing&lt;/P&gt;
&lt;P&gt;explain what user soruces (AD) or Local ISE users ?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 21 Feb 2024 16:17:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tacacs-failures-on-ise-3-2/m-p/5022069#M587519</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2024-02-21T16:17:51Z</dc:date>
    </item>
    <item>
      <title>Re: TACACS failures on ISE 3.2</title>
      <link>https://community.cisco.com/t5/network-access-control/tacacs-failures-on-ise-3-2/m-p/5022806#M587573</link>
      <description>&lt;P&gt;Heh, so...I found the issue..It kind of helps if you create a policy...since it was going to the default deny &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you all for you help and input!!!&lt;/P&gt;</description>
      <pubDate>Thu, 22 Feb 2024 15:39:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tacacs-failures-on-ise-3-2/m-p/5022806#M587573</guid>
      <dc:creator>kyle311</dc:creator>
      <dc:date>2024-02-22T15:39:56Z</dc:date>
    </item>
    <item>
      <title>Re: TACACS failures on ISE 3.2</title>
      <link>https://community.cisco.com/t5/network-access-control/tacacs-failures-on-ise-3-2/m-p/5022807#M587574</link>
      <description>&lt;P&gt;You are so so welcome&amp;nbsp;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Thu, 22 Feb 2024 15:43:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tacacs-failures-on-ise-3-2/m-p/5022807#M587574</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-02-22T15:43:29Z</dc:date>
    </item>
  </channel>
</rss>

