02-01-2023 04:10 PM
Hi There,
I have 2 C9500 L3 switches setup successfully authenticating to 2 ISE 2.6.0.156 servers using the following command set:
aaa group server tacacs+ ISE_SERVERS
server-private 10.x.x.1 key 7 blablabla
server-private 10.x.x.2 key 7 blablabla
ip tacacs source-interface Vlanxxx
aaa authentication login default group ISE_SERVERS local
aaa authorization console
aaa authorization config-commands
aaa authorization exec default group ISE_SERVERS local if-authenticated
aaa accounting exec default start-stop group ISE_SERVERS
aaa accounting commands 0 default start-stop group ISE_SERVERS
aaa accounting commands 1 default start-stop group ISE_SERVERS
aaa accounting commands 15 default start-stop group ISE_SERVERS
aaa accounting network default start-stop group ISE_SERVERS
aaa accounting network SSH start-stop group ISE_SERVERS
Now if I apply the same config as above to some other switches (connected to the C9500's. I cannot get ISE to authenticate to logon. I can ping the ISE servers from the offending switches & ISE can ping the switches OK.
If I change the config on the offending switches to the following, everything works fine! Just wondering what could be the difference with using 'server-private' in the ISE_SERVERS tacacs+ group as opposed to using just the tacacs server command?
aaa authentication login default group tacacs+ local
aaa authentication enable default group tacacs+ enable
aaa authorization exec default group tacacs+ local
tacacs server ISE_SERVER
address ipv4 10.x.x.1
key 7 blablabla
Thanks!
02-01-2023 04:20 PM
some other switches - need more information on what model of the switch and what IOS code running.
Cat 9500 latest IOS XE code - so the syntax changed looking into future config directions.
some old models based on IOS we need to use what is suggested.
i do see different config methods in different models of routers and switches.
02-01-2023 04:41 PM
Hi @balaji.bandi - other switches include:
IE-5000-12S12P-10G running 15.2(7)E3
IE-4010-16S12P running 15.2(7)E2
The C9500's that are working are:
C9500-48Y4C running Catalyst L3 Switch Software (CAT9K_IOSXE), Version 16.12.5b, RELEASE SOFTWARE (fc3)
02-01-2023 04:51 PM
Other note: Cat 9500 running an old version (may be ROMMON version you showing) check if you running 16.12.X upgrade to 17.6.4 lot of security and bug fixed. the code 16.12,X no longer advised by TAC.
02-01-2023 04:28 PM
ip tacacs source-interface Vlanxxx <<- are this VLAN interface is UP ??
02-01-2023 04:36 PM
Hi @MHM Cisco World - yes vlan is up
02-01-2023 04:37 PM
ping ISE using VLAN interface as source
02-01-2023 05:36 PM
pings OK using VLAN interface as source
NSxxx#ping 10.x.x.1 source vlan xxx
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 10.x.x.1, timeout is 2 seconds:
Packet sent with a source address of 10.x.x.x
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 1/2/4 ms
02-01-2023 05:30 PM
I recall in the past I had to use "server-private" when connecting to tacacs servers via a management VRF.
But then again as some one mentioned above the tacacs configuration can differ from different cisco router/platforms, software versions.
02-01-2023 05:42 PM
OK after testing with some of these suggestions I have realised that the 'private-server' commands are working on any of the L2 switches, no matter which model it is (IE5K & 4010). On the IE5K's that have routing enabled it doesn't work & I have to use the 'tacacs server' commands which do work. Why would this make any difference?
As stated above I can ping the ISE interface useing the source option.
02-05-2023 03:18 AM
I make deep dive and I think find solution here,
I will share detail later today or max tomorrow.
02-06-2023 02:46 PM
Hi @MHM Cisco World - any luck with this? very interested to hear what you have found!
02-06-2023 02:50 PM
sure I will share tonight,
02-12-2023 03:56 PM
Hi @MHM Cisco World - can you please share when you have a chance? Thanks
02-16-2023 05:14 AM
@benbroadfoot Server-private means you cannot re-use the TACACS server in another server group whereas server name or server host can be re-used in another server group.
Use-case for private-server is in VRF aware TACACS configurations mostly.
aaa group server radius LAB
server-private x.x.x.x key abc
ip vrf forwarding <vrf name>
ip radius source-interface GigabitEthernet x/x/x
>> Using tacacs server command keep the tacacs server as part of default-vrf.
>> When using private-server, configure the "ip vrf forwarding <vrf name> command under the "aaa group server" command and then check.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide