07-26-2023 02:51 AM
I'm trying to configure aaa,but when i input the command for the same it takes a lot of time.Is there any technical reason why it is taking so much time?.
Please find the config below:-
aaa new-model
aaa authentication fail-message ^CCCCCCCCCLogin attempt failed^C
aaa authentication login default group tacacs+ local
aaa authentication login no_tacacs local
aaa authentication login AAA group ISE_GROUP local
aaa authorization config-commands
aaa authorization exec default group tacacs+ local
aaa authorization exec AAA group ISE_GROUP local
aaa authorization commands 0 AAA group ISE_GROUP local
aaa authorization commands 1 AAA group ISE_GROUP local
aaa authorization commands 15 default group tacacs+ local
aaa authorization commands 15 AAA group ISE_GROUP local
aaa accounting exec default start-stop group tacacs+
aaa accounting commands 0 AAA start-stop group ISE_GROUP
aaa accounting commands 1 default start-stop group tacacs+
aaa accounting commands 1 AAA start-stop group tacacs+
aaa accounting commands 15 default start-stop group tacacs+
aaa accounting commands 15 AAA start-stop group tacacs+
aaa accounting system default start-stop group tacacs+
aaa common-criteria policy POLICY
min-length 8
max-length 25
numeric-count 1
upper-case 1
lower-case 1
special-case 1
char-changes 3
lifetime month 3
aaa session-id common
tacacs-server timeout 60
tacacs-server directed-request
aaa group server tacacs+ ISE_GROUP
server-private xx.xx.xx.xx key -----------
server-private yy.yy.yy.yy key ----------
ip vrf forwarding Mgmt-vrf
aaa session-id common
tacacs-server timeout 60
tacacs-server directed-request
tacacs-server key ------------
07-26-2023 02:56 AM
you have high CPU utilization?
07-26-2023 04:08 AM - edited 07-26-2023 04:08 AM
Router# show tacacs
Router# show aaa servers private
share above after you check the CPU utilize
07-26-2023 02:58 AM
@Ganesh Devarshetty my initial thought is that once you've configured TACACS authorisation, the TACACS server is now going to be authorising each subsequent command, which would be slightly slower. Check the TACACS server logs to determine if that's the case and see if there is latency and or errors.
07-26-2023 03:05 AM
You are using local and tacacs at the same time, thats why you see delay
Keep only this line for authentication and authorization
aaa authentication login AAA group ISE_GROUP local
aaa authorization exec AAA group ISE_GROUP local
Remove
aaa authentication login default group tacacs+ local
aaa authorization exec default group tacacs+ local
07-26-2023 03:48 AM
I tried again after removing the two commands but still it is taking a lot of time.
07-26-2023 04:03 AM
You have too much config over there. Remove all the aaa config and add only this
aaa new-model
aaa group server tacacs+ ISE_GROUP
aaa authentication login default group ISE_GROUP local
aaa authorization exec default group ISE_GROUP if-authenticated
aaa authorization commands 1 default group ISE_GROUP
aaa authorization commands 15 default group ISE_GROUP none
aaa accounting commands 15 default stop-only group ISE_GROUP
aaa session-id common
I took this from a working switch. Only this config is necessary
07-27-2023 05:11 PM
One thing to remember is that IOS will always try the first TACACS server in your group. If that server does not respond, IOS will try a few times with a delay in-between. Then only it will try the second TACACS server. IOS does not remember that Primary TACACS server did not respond (like a hold-down timer) - therefore the experience will be bad until the Primary TACACS server is restored. RADIUS, on the other hand, uses a dead-timer to prevent this from happening.
07-27-2023 05:17 PM
sorry @Arne Bier
@LeoMccoy in other post share if he can use local to access SW/R, and I answer Yes, but to be honest
I dont have TACACS server support command, so my Q which also help @LeoMccoy
if I access SW/R via local user but I use aaa auth enable without local and aaa authz exec without local dose this work ? i.e. he can enter config mode and add command ?
your answer is highly appreciated
07-27-2023 05:28 PM - edited 07-27-2023 05:34 PM
There are two "back doors" available in case the aaa authentication does not succeed (because aaa does not respond)
The best way to test this is to use method lists against a range of VTY lines, and to keep the console port out of any AAA config (as a back door).
When I last tested this, I recall that I was unable to log into the device if the "local" keyword was missing from the aaa authentication commands. It will then rely entirely on the radius/tacacs (whichever is used) to succeed. Unless local or enable is configured on the aaa as mentioned above
GNS3 is your friend
07-27-2023 05:38 PM
@Arne Bier @LeoMccoy
I already mention to him the username and password mandatory
this topic from topic I so careful in suggestion.
and your answer is same as I thinking
config vty (using rotary group) that use local for auth and config command and exec under that VTY.
here if he access to this VTY he completely not depend on tacacs for authc and authz
hope I am right and he read these post.
last thing here we suggest something doing bad than good.
thanks a lot
have a nice summer for you and your family
MHM
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide