<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: TACACS configuration question in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/tacacs-configuration-question/m-p/4418441#M1081557</link>
    <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/282485"&gt;@david&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Yes, it looks ok, check out &lt;A href="https://community.cisco.com/t5/security-documents/cisco-ise-device-administration-prescriptive-deployment-guide/ta-p/3738365#toc-hId-1371716353" target="_self"&gt;this guide&lt;/A&gt; and compare to cisco's recommended switch configuration for TACACS+.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you are connect to a vty session, apply the commands and the rules are not setup on the TACACS+ server you could lock yourself out. I normally apply the config to all but the vty line you are connected to, then connect another session which should prompt for tacacs+ credentials. If that fails you still have access on the original session.&lt;/P&gt;</description>
    <pubDate>Tue, 15 Jun 2021 13:14:04 GMT</pubDate>
    <dc:creator>Rob Ingram</dc:creator>
    <dc:date>2021-06-15T13:14:04Z</dc:date>
    <item>
      <title>TACACS configuration question</title>
      <link>https://community.cisco.com/t5/network-security/tacacs-configuration-question/m-p/4418437#M1081555</link>
      <description>&lt;DIV class="_2FCtq-QzlfuN-SwVMUZMM3 _2v9pwVh0VUYrmhoMv1tHPm t3_o0cmoy"&gt;&lt;DIV class="y8HYJ-y_lTUHkQIc1mdCq _2INHSNB8V5eaWp4P0rY_mE"&gt;&lt;DIV class="_2SdHzo12ISmrC8H86TgSCp _29WrubtjAcKqzJSPdQqQ4h "&gt;&lt;H1&gt;&lt;FONT face="arial,helvetica,sans-serif" size="4"&gt;&lt;SPAN&gt;Is there anything wrong (or missing) with the sample TACACS config below? And does it matter what order the commands are entered? In config docs, I've seen so many variations of tacacs config that it's making my head spin so I'm trying to make sense of it and standardize. Thanks!&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/H1&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class="_3xX726aBn29LDbsDtzr_6E _1Ap4F5maDtT1E1YuCiaO0r D3IL3FD0RFy_mkKLPwL4"&gt;&lt;DIV class="_292iotee39Lmt0MkQZ2hPV RichTextJSON-root"&gt;&lt;P class="_1qeIAgB0cPwnLhDF9XSiJM"&gt;aaa new-model&lt;/P&gt;&lt;P class="_1qeIAgB0cPwnLhDF9XSiJM"&gt;aaa session-id common&lt;/P&gt;&lt;P class="_1qeIAgB0cPwnLhDF9XSiJM"&gt;aaa group server tacacs+ tacacs_123&lt;/P&gt;&lt;P class="_1qeIAgB0cPwnLhDF9XSiJM"&gt;server name ise-tacacs_01&lt;/P&gt;&lt;P class="_1qeIAgB0cPwnLhDF9XSiJM"&gt;server name ise-tacacs_02&lt;/P&gt;&lt;P class="_1qeIAgB0cPwnLhDF9XSiJM"&gt;!&lt;/P&gt;&lt;P class="_1qeIAgB0cPwnLhDF9XSiJM"&gt;tacacs server ise-tacacs_01&lt;/P&gt;&lt;P class="_1qeIAgB0cPwnLhDF9XSiJM"&gt;address ipv4&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://10.1.1.101/" target="_blank" rel="noopener nofollow ugc"&gt;10.1.1.101&lt;/A&gt;&lt;/P&gt;&lt;P class="_1qeIAgB0cPwnLhDF9XSiJM"&gt;key &amp;lt;tacacs key&amp;gt;&lt;/P&gt;&lt;P class="_1qeIAgB0cPwnLhDF9XSiJM"&gt;timeout 5&lt;/P&gt;&lt;P class="_1qeIAgB0cPwnLhDF9XSiJM"&gt;!&lt;/P&gt;&lt;P class="_1qeIAgB0cPwnLhDF9XSiJM"&gt;tacacs server ise-tacacs_02&lt;/P&gt;&lt;P class="_1qeIAgB0cPwnLhDF9XSiJM"&gt;address ipv4&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://10.1.1.102/" target="_blank" rel="noopener nofollow ugc"&gt;10.1.1.102&lt;/A&gt;&lt;/P&gt;&lt;P class="_1qeIAgB0cPwnLhDF9XSiJM"&gt;key &amp;lt;tacacs key&amp;gt;&lt;/P&gt;&lt;P class="_1qeIAgB0cPwnLhDF9XSiJM"&gt;timeout 5&lt;/P&gt;&lt;P class="_1qeIAgB0cPwnLhDF9XSiJM"&gt;!&lt;/P&gt;&lt;P class="_1qeIAgB0cPwnLhDF9XSiJM"&gt;tacacs-server timeout 5&lt;/P&gt;&lt;P class="_1qeIAgB0cPwnLhDF9XSiJM"&gt;tacacs-server directed-request&lt;/P&gt;&lt;P class="_1qeIAgB0cPwnLhDF9XSiJM"&gt;ip tacacs source-interface Loopback0&lt;/P&gt;&lt;P class="_1qeIAgB0cPwnLhDF9XSiJM"&gt;!&lt;/P&gt;&lt;P class="_1qeIAgB0cPwnLhDF9XSiJM"&gt;aaa authentication login vty group tacacs_123 local&lt;/P&gt;&lt;P class="_1qeIAgB0cPwnLhDF9XSiJM"&gt;aaa authentication login conaux local&lt;/P&gt;&lt;P class="_1qeIAgB0cPwnLhDF9XSiJM"&gt;aaa authentication enable default group tacacs_123 enable&lt;/P&gt;&lt;P class="_1qeIAgB0cPwnLhDF9XSiJM"&gt;aaa authorization config-commands&lt;/P&gt;&lt;P class="_1qeIAgB0cPwnLhDF9XSiJM"&gt;aaa authorization commands 1 default group tacacs_123 local&lt;/P&gt;&lt;P class="_1qeIAgB0cPwnLhDF9XSiJM"&gt;aaa authorization commands 1 conaux local&lt;/P&gt;&lt;P class="_1qeIAgB0cPwnLhDF9XSiJM"&gt;aaa authorization commands 15 default group tacacs_123 local&lt;/P&gt;&lt;P class="_1qeIAgB0cPwnLhDF9XSiJM"&gt;aaa authorization commands 15 conaux local&lt;/P&gt;&lt;P class="_1qeIAgB0cPwnLhDF9XSiJM"&gt;aaa accounting commands 15 default start-stop group tacacs_123&lt;/P&gt;&lt;P class="_1qeIAgB0cPwnLhDF9XSiJM"&gt;aaa accounting connection default start-stop group tacacs_123&lt;/P&gt;&lt;/DIV&gt;&lt;/DIV&gt;</description>
      <pubDate>Tue, 15 Jun 2021 12:50:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/tacacs-configuration-question/m-p/4418437#M1081555</guid>
      <dc:creator>david</dc:creator>
      <dc:date>2021-06-15T12:50:13Z</dc:date>
    </item>
    <item>
      <title>Re: TACACS configuration question</title>
      <link>https://community.cisco.com/t5/network-security/tacacs-configuration-question/m-p/4418441#M1081557</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/282485"&gt;@david&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Yes, it looks ok, check out &lt;A href="https://community.cisco.com/t5/security-documents/cisco-ise-device-administration-prescriptive-deployment-guide/ta-p/3738365#toc-hId-1371716353" target="_self"&gt;this guide&lt;/A&gt; and compare to cisco's recommended switch configuration for TACACS+.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you are connect to a vty session, apply the commands and the rules are not setup on the TACACS+ server you could lock yourself out. I normally apply the config to all but the vty line you are connected to, then connect another session which should prompt for tacacs+ credentials. If that fails you still have access on the original session.&lt;/P&gt;</description>
      <pubDate>Tue, 15 Jun 2021 13:14:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/tacacs-configuration-question/m-p/4418441#M1081557</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2021-06-15T13:14:04Z</dc:date>
    </item>
    <item>
      <title>Re: TACACS configuration question</title>
      <link>https://community.cisco.com/t5/network-security/tacacs-configuration-question/m-p/4419085#M1081579</link>
      <description>&lt;P&gt;hi,&lt;/P&gt;&lt;P&gt;that's the traditional/legacy way of configuring TACACS.&lt;/P&gt;&lt;P&gt;are you asking AAA for a router, switch or ASA?&lt;/P&gt;&lt;P&gt;the new AAA config structure changed in a router/switch starting IOS-XE 16.12.2 wherein TACACS server, key, source interface and VRF are all configured under AAA group server.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 16 Jun 2021 14:24:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/tacacs-configuration-question/m-p/4419085#M1081579</guid>
      <dc:creator>johnlloyd_13</dc:creator>
      <dc:date>2021-06-16T14:24:53Z</dc:date>
    </item>
  </channel>
</rss>

