08-10-2011 03:30 AM - edited 03-10-2019 06:17 PM
Hi,
I am trying add custom attributes for Juniper Netscreen TACACS+ authentication to a v5.2 ACS. The advice is to add it to the group as follows:
ervice = netscreen { vsys = root privilege = read-write }
I know how to add this to a version v4.x ACS
However, I do not know how to apply this to the custom attribiutes to a v5.x ACS
Do I add the vsys and privilege attribute seperately or together? What should be the attribute name? netscreen? Should it be mandatory?
Any advice please
Solved! Go to Solution.
08-11-2011 01:10 PM
Making different device groups and shell profiles mapped to different authorization profiles fixed my problem BTW.
Here is the setup I did for Juniper. I will try the netscreen one (last picture) later today/tomorrow
08-10-2011 05:27 PM
Good question, I'd like to know this as well for the netscreens. For junos, this is how I tried to do it (you would drop the "netscreen" from yours, but not sure if you would add both as mandatory)
Acs4.x setup
junos-exec
local-user-name=readonly
acs5.2 setup
attribute - local-user-name
value - readonly
mandatory
# junos config
}
login {
class admin {
idle-timeout 30;
permissions all;
}
class read-only {
idle-timeout 30;
permissions [ view view-configuration ];
}
user admin {
class admin;
}
user readonly {
class read-only;
The problem I have though, is this fixes my login to work to my JunOS devices, but it breaks the authentication to my Cisco IOS devices. The AAA logs show that the authentication succeeded, but the router says "authorization failed". Once I remove either the attribute from my shell profile, or make it optional then the Cisco router works for auth, but the JunOS device stops working (The username it tries to use is "remote" instead of the user I am trying to authenticate with).
08-11-2011 01:10 PM
Making different device groups and shell profiles mapped to different authorization profiles fixed my problem BTW.
Here is the setup I did for Juniper. I will try the netscreen one (last picture) later today/tomorrow
08-15-2011 10:23 PM
Bingo! Thank you very much Justin - I still had the privilege levels set to 15 but when I removed them but kept in the new attributes it logged in fine.
12-07-2017 12:43 AM
02-09-2012 05:15 AM
Hi, I was looking for some help on configuring a Juniper FW on my Cisco ACS v4.0 and I found you guys. Can you tell me which would be the best way to do that or where can I find good documentaction about it?
Thanks.
09-04-2013 07:27 PM
Has anyone managed to find out why the cisco devices fail authorization when the mandatory custom attribute is enabled?
Justin said
"The problem I have though, is this fixes my login to work to my JunOS devices, but it breaks the authentication to my Cisco IOS devices. The AAA logs show that the authentication succeeded, but the router says "authorization failed". Once I remove either the attribute from my shell profile, or make it optional then the Cisco router works for auth, but the JunOS device stops working (The username it tries to use is "remote" instead of the user I am trying to authenticate with)."
I am currently having the same issue with ACS5.4.
Thanks,
Craig
09-05-2013 05:06 PM
I was able to make it work using different device groups and shell profiles instead of trying to combine mulitiple together.
Is your issue with IOS devices or NXOS devices (role-based auth)
Justin
09-05-2013 09:07 PM
Thanks Justin,
I was hoping to use just one shell profile for both device groups. We have it working with seperate profiles, but would be less overhead with one!
I havn't tried NXOS yet, but I imagine it will be a similar story.
Craig
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide