<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Juniper devices and allot no logs for tacacs command accounting in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/juniper-devices-and-allot-no-logs-for-tacacs-command-accounting/m-p/5230398#M593450</link>
    <description>&lt;P&gt;ISE Network Device Profiles are there to normalise the RADIUS requirements in multi-vendor products - e.g. you tell ISE in which format a Juniper switch would make a MAB request, or how to send a CoA to a Juniper device.&amp;nbsp; It does not apply to TACACS+.&amp;nbsp; TACACS+ is mostly very well supported and documented for Cisco devices (since it's a Cisco protocol) - but other vendors do implement TACACS+, but not sure whether they always support the same features - e.g. per command accounting.&amp;nbsp; If they send the correctly formatted TACACS+ requests to ISE, then ISE should interpret and log those requests.&lt;/P&gt;
&lt;P&gt;You have to explore the Juniper TACACS+ commands to see what's possible.&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you have Juniper devices in your ISE, then you could also use a Cisco Network Device Profile. But usually, it's nicer for readability/documentation if you made a Juniper profile (tick TACACS+ box) and then apply that to your Juniper Network Devices in ISE.&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;RADIUS is a lot more complex, and you can adapt the 3rd party vendor products to work in harmony with ISE Normalised configs. And with RADIUS you must/should always tag your RADIUS Authorization Profiles with that same Device Profile (e.g. Juniper).&amp;nbsp; With TACACS+, there is no requirement/possibility to do this.&lt;/P&gt;</description>
    <pubDate>Fri, 29 Nov 2024 07:04:35 GMT</pubDate>
    <dc:creator>Arne Bier</dc:creator>
    <dc:date>2024-11-29T07:04:35Z</dc:date>
    <item>
      <title>Juniper devices and allot no logs for tacacs command accounting</title>
      <link>https://community.cisco.com/t5/network-access-control/juniper-devices-and-allot-no-logs-for-tacacs-command-accounting/m-p/5230360#M593445</link>
      <description>&lt;P&gt;I enrolled juniper devices and allot in Cisco ISE, but i notice there is no logs for tacacs command accounting. but all of our cisco devices showing logs history of commands inputted. please help&lt;/P&gt;</description>
      <pubDate>Fri, 29 Nov 2024 05:23:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/juniper-devices-and-allot-no-logs-for-tacacs-command-accounting/m-p/5230360#M593445</guid>
      <dc:creator>drbadar1126</dc:creator>
      <dc:date>2024-11-29T05:23:53Z</dc:date>
    </item>
    <item>
      <title>Re: Juniper devices and allot no logs for tacacs command accounting</title>
      <link>https://community.cisco.com/t5/network-access-control/juniper-devices-and-allot-no-logs-for-tacacs-command-accounting/m-p/5230374#M593447</link>
      <description>&lt;P&gt;There is nothing required on the ISE side to record/log TACACS+ command accounting. The NAD devices are responsible for sending those accounting requests to the TACACS+ server.&lt;/P&gt;
&lt;P&gt;I don't know anything about Juniper commands, but in the IOS world there are generally at least two commands required. Accounting for the exec level&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;aaa accounting exec default start-stop group dnac-network-access-group&lt;/LI-CODE&gt;
&lt;P&gt;TACACS+ Accounting must be enabled for every Priv Level for which command accounting is required - e.g. for priv 15&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;aaa accounting commands 15 default start-stop group dnac-network-access-group&lt;/LI-CODE&gt;
&lt;P&gt;But if I recall, simple commands like "show version" are not run level 15. I think you have to include priv 1 as well. Therefore I tend to do this:&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;aaa accounting commands 0 default start-stop group dnac-network-tacacs-group
aaa accounting commands 1 default start-stop group dnac-network-tacacs-group
aaa accounting commands 15 default start-stop group dnac-network-tacacs-group&lt;/LI-CODE&gt;
&lt;P&gt;Your question is possibly more aimed at a Juniper forum - but see what you can configure on the box and perhaps it's vaguely similar&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 29 Nov 2024 06:38:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/juniper-devices-and-allot-no-logs-for-tacacs-command-accounting/m-p/5230374#M593447</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2024-11-29T06:38:38Z</dc:date>
    </item>
    <item>
      <title>Re: Juniper devices and allot no logs for tacacs command accounting</title>
      <link>https://community.cisco.com/t5/network-access-control/juniper-devices-and-allot-no-logs-for-tacacs-command-accounting/m-p/5230385#M593448</link>
      <description>&lt;P&gt;thank you for your kind reply. is device profile configuration in ISE will provide also the solution? please see &lt;A href="https://community.cisco.com/t5/security-knowledge-base/ise-third-party-nad-profiles-and-configs/ta-p/3648719" target="_blank"&gt;https://community.cisco.com/t5/security-knowledge-base/ise-third-party-nad-profiles-and-configs/ta-p/3648719&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 29 Nov 2024 06:45:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/juniper-devices-and-allot-no-logs-for-tacacs-command-accounting/m-p/5230385#M593448</guid>
      <dc:creator>drbadar1126</dc:creator>
      <dc:date>2024-11-29T06:45:53Z</dc:date>
    </item>
    <item>
      <title>Re: Juniper devices and allot no logs for tacacs command accounting</title>
      <link>https://community.cisco.com/t5/network-access-control/juniper-devices-and-allot-no-logs-for-tacacs-command-accounting/m-p/5230398#M593450</link>
      <description>&lt;P&gt;ISE Network Device Profiles are there to normalise the RADIUS requirements in multi-vendor products - e.g. you tell ISE in which format a Juniper switch would make a MAB request, or how to send a CoA to a Juniper device.&amp;nbsp; It does not apply to TACACS+.&amp;nbsp; TACACS+ is mostly very well supported and documented for Cisco devices (since it's a Cisco protocol) - but other vendors do implement TACACS+, but not sure whether they always support the same features - e.g. per command accounting.&amp;nbsp; If they send the correctly formatted TACACS+ requests to ISE, then ISE should interpret and log those requests.&lt;/P&gt;
&lt;P&gt;You have to explore the Juniper TACACS+ commands to see what's possible.&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you have Juniper devices in your ISE, then you could also use a Cisco Network Device Profile. But usually, it's nicer for readability/documentation if you made a Juniper profile (tick TACACS+ box) and then apply that to your Juniper Network Devices in ISE.&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;RADIUS is a lot more complex, and you can adapt the 3rd party vendor products to work in harmony with ISE Normalised configs. And with RADIUS you must/should always tag your RADIUS Authorization Profiles with that same Device Profile (e.g. Juniper).&amp;nbsp; With TACACS+, there is no requirement/possibility to do this.&lt;/P&gt;</description>
      <pubDate>Fri, 29 Nov 2024 07:04:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/juniper-devices-and-allot-no-logs-for-tacacs-command-accounting/m-p/5230398#M593450</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2024-11-29T07:04:35Z</dc:date>
    </item>
    <item>
      <title>Re: Juniper devices and allot no logs for tacacs command accounting</title>
      <link>https://community.cisco.com/t5/network-access-control/juniper-devices-and-allot-no-logs-for-tacacs-command-accounting/m-p/5230399#M593451</link>
      <description>&lt;P&gt;there are two&amp;nbsp;&lt;BR /&gt;TACACS have two parts for device admin&amp;nbsp;&lt;BR /&gt;1- TACACS commend sets &amp;lt;&amp;lt;- here is issue from what you see in cisco and juniper&amp;nbsp;&lt;BR /&gt;2- TACACS profile &amp;lt;&amp;lt;- this will allow user to auth and give it privilege&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot (200).png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/234786i4E42651A5C230F0D/image-size/large?v=v2&amp;amp;px=999" role="button" title="Screenshot (200).png" alt="Screenshot (200).png" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot (203).png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/234785i066606E0256D6F94/image-size/large?v=v2&amp;amp;px=999" role="button" title="Screenshot (203).png" alt="Screenshot (203).png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 29 Nov 2024 07:04:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/juniper-devices-and-allot-no-logs-for-tacacs-command-accounting/m-p/5230399#M593451</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-11-29T07:04:42Z</dc:date>
    </item>
    <item>
      <title>Re: Juniper devices and allot no logs for tacacs command accounting</title>
      <link>https://community.cisco.com/t5/network-access-control/juniper-devices-and-allot-no-logs-for-tacacs-command-accounting/m-p/5230400#M593452</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1065752"&gt;@MHM Cisco World&lt;/a&gt;&amp;nbsp;- the guy is asking about TACACS+ command accounting. You don't configure that in ISE or in any TACACS+ server. Clients make Accounting requests to the server ... it's the same for any vendor (Cisco, Juniper, etc.) - Accounting is configured on the NAD. And as long as the vendor has implement TACACS protocol correctly, ISE will log and allow reporting etc.&lt;/P&gt;</description>
      <pubDate>Fri, 29 Nov 2024 07:10:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/juniper-devices-and-allot-no-logs-for-tacacs-command-accounting/m-p/5230400#M593452</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2024-11-29T07:10:09Z</dc:date>
    </item>
    <item>
      <title>Re: Juniper devices and allot no logs for tacacs command accounting</title>
      <link>https://community.cisco.com/t5/network-access-control/juniper-devices-and-allot-no-logs-for-tacacs-command-accounting/m-p/5230401#M593453</link>
      <description>&lt;P&gt;thank you, i checked my configuration and found out there is no accounting command in juniper device. i will try to add and i will give an update&lt;/P&gt;</description>
      <pubDate>Fri, 29 Nov 2024 07:12:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/juniper-devices-and-allot-no-logs-for-tacacs-command-accounting/m-p/5230401#M593453</guid>
      <dc:creator>drbadar1126</dc:creator>
      <dc:date>2024-11-29T07:12:25Z</dc:date>
    </item>
    <item>
      <title>Re: Juniper devices and allot no logs for tacacs command accounting</title>
      <link>https://community.cisco.com/t5/network-access-control/juniper-devices-and-allot-no-logs-for-tacacs-command-accounting/m-p/5230402#M593454</link>
      <description>&lt;P&gt;thank you, i will check the video for my reference,&lt;/P&gt;</description>
      <pubDate>Fri, 29 Nov 2024 07:13:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/juniper-devices-and-allot-no-logs-for-tacacs-command-accounting/m-p/5230402#M593454</guid>
      <dc:creator>drbadar1126</dc:creator>
      <dc:date>2024-11-29T07:13:37Z</dc:date>
    </item>
    <item>
      <title>Re: Juniper devices and allot no logs for tacacs command accounting</title>
      <link>https://community.cisco.com/t5/network-access-control/juniper-devices-and-allot-no-logs-for-tacacs-command-accounting/m-p/5230730#M593470</link>
      <description>&lt;P&gt;FYI and update, after adding&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-teams="true"&gt;set system accounting events login &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-teams="true"&gt;set system accounting events change-log &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-teams="true"&gt;set system accounting events interactive-commands &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-teams="true"&gt;set system accounting events configuration&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-teams="true"&gt;set system accounting destination tacplus&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-teams="true"&gt;Juniper commands is now logging in commands accounting &lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 30 Nov 2024 04:15:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/juniper-devices-and-allot-no-logs-for-tacacs-command-accounting/m-p/5230730#M593470</guid>
      <dc:creator>drbadar1126</dc:creator>
      <dc:date>2024-11-30T04:15:33Z</dc:date>
    </item>
  </channel>
</rss>

