cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
3372
Views
5
Helpful
3
Replies

TACACS+ for Console ASA

Hello all,

I am trying to use TACACS for authentication / authorization. My setup is shown below.

On the Router, everything works really well.

 

For the ASA, I can ssh, telnet and http with no issues and I am going straight to privilege level 15 (example below is ssh)

 

ciscoasa# show curpriv 
Username : theo 
Current privilege level : 15
Current Mode/ s : P_PRIV 

but when I use the console, after logging I am in user-mode

 

ciscoasa> show curpriv 
Username : theo 
Current privilege level : 1
Current Mode/ s : P_UNPR

I can enter the enable password, but after that I cannot access anything, not even the show commands.

 

ciscoasa> enable 15
Password : *******
ciscoasa# conf t
Command authorization failed

 

TACACS+ Lab.png

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Cisco IOS

 

R1#show running-config | include aaa
aaa new-model
aaa authentication login REMOTE-LOGIN group tacacs+ local
aaa authorization exec REMOTE-AUTHOR group tacacs+ local
aaa authorization commands 15 REMOTE-EXEC-AUTHOR group tacacs+ local

 

R1#show run | include tacacs-server
tacacs-server host 10.11.3.21 key Cisco123
tacacs-server key Cisco123
R1#show run | section vty
line vty 0 4
 authorization commands 15 REMOTE-EXEC-AUTHOR
 authorization exec REMOTE-AUTHOR
 login authentication REMOTE-LOGIN
line vty 5 935
 authorization commands 15 REMOTE-EXEC-AUTHOR
 authorization exec REMOTE-AUTHOR
 login authentication REMOTE-LOGIN

Cisco ASA

 

 

ciscoasa# show running-config aaa 
aaa  authentication telnet console TACACS-Servers LOCAL 
aaa authentication http console TACACS-Servers LOCAL 
aaa authentication serial console TACACS-Servers LOCAL 
aaa authentication ssh console TACACS-Servers LOCAL 
aaa authorization command TACACS-Servers LOCAL 
aaa authorization exec authentication-server auto-enable 
aaa authentication login-history 

 

ciscoasa# show run aaa-server 
aaa-server TACACS-Servers protocol tacacs+ 
aaa-server TACACS-Servers (Inside) host 10.11.3.21 
key *****

Linux  /etc/tac_plus.conf

 

group = network-admin {
         default service = permit
        login = PAM
        service = exec {
        priv-lvl = 15
        }

user = theo {
        login = PAM
        member = network-admin

 

 

1 Accepted Solution

Accepted Solutions

Francesco Molino
VIP Alumni
VIP Alumni

Hi

 

This is because you need to configure a user called enable_15 on your tacacs server.

If you take a look on your logs, you should see an authorization failed coming from that user enable_15

 

Thanks


Thanks
Francesco
PS: Please don't forget to rate and select as validated answer if this answered your question

View solution in original post

3 Replies 3

Francesco Molino
VIP Alumni
VIP Alumni

Hi

 

This is because you need to configure a user called enable_15 on your tacacs server.

If you take a look on your logs, you should see an authorization failed coming from that user enable_15

 

Thanks


Thanks
Francesco
PS: Please don't forget to rate and select as validated answer if this answered your question

Perfect! That worked.

 

user = enable_15 {
        default service = permit
        service = exec {
        priv-lvl = 15
        }
}

TACACS+ Lab-Solution.png

 

Glad that your issue is solved.

Thanks
Francesco
PS: Please don't forget to rate and select as validated answer if this answered your question
Review Cisco Networking for a $25 gift card