05-18-2010 06:11 AM - edited 03-11-2019 10:47 AM
My customer has an asa and want to do aaa authentication tacacs+. The ACS server however is accessible through an ipsec vpn tunnel terminating on the outside interface of the ASA.
Whenever a user logs into the ASA the request will be send out via the outside interface with the source ip address of the outside interface of the ASA thus not meeting my encryption list. How can I do this? I can not add the outside interface ip address to the encryption list. What I need is a command like: tacacs source ip adress a.b.c.d.
05-18-2010 06:20 AM
You can add the inside interface in the aaa-server configuration.
Example as follows:
aaa-server myaaa (inside) host
Here is the command for your reference:
http://www.cisco.com/en/US/docs/security/asa/asa80/command/reference/a1.html#wp1538618
Hope that helps.
05-18-2010 06:35 AM
Dear halijenn,
Thank you very much for your reaction but this did not help. Any other suggestions.
The problem is that the source ip address send from my ASA does not match the encryption list.
05-18-2010 03:26 PM
When you specify the "(inside)" on the aaa-server, the tacacs packet will be sourced from the inside interface.
Please also configure "management-access inside" command.
If you tried to generate a ping from the ASA: ping inside
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide