09-18-2023 08:58 AM
Hi, there
I've a couple of WS-C4507R+E switches (Version 03.08.07.E.152-4.E7) with installed standby supervisor engine.
After attaching to the standby supervisor engine ("attach module 4", "session module 4") I'm getting cli authorization fails if I try to execute a privileged command.
I found the Bug CSCtr65315 (https://quickview.cloudapps.cisco.com/quickview/bug/CSCtr65315 / https://bst.cisco.com/bugsearch/bug/CSCtr65315) which describes my problem pretty well, but targets Nexus 7K (N7K).
Is anyone aware of this bug hitting C4K Switches also?
Any recommandation how to solve this issue?
HOSTNAME#attach module 4
Connecting to standby virtual console
Type "exit" or "quit" to end this session
HOSTNAME-standby-console#verify bootflash:/cat4500es8-universalk9.SPA.03.08.07.E.152-4.E7.bin
% Authorization failed.
HOSTNAME-standby-console#show run
% Authorization failed.
HOSTNAME-standby-console#show version
-> works
09-18-2023 09:04 AM
- Also try HOSTNAME-standby-console#show logging ; in order to check if additional info's are logged when the authorization fails ,
M.
09-18-2023 09:08 AM
This command also leads to a % Authorization failed.
Show logging on the primary sub does not show an entry.
debug aaa authorization also shows nothing.
09-18-2023 10:18 AM
- As it could be a bug for the WS-C4507R+E switches too ; you may try the latest advisory software release and check if that can help ,
M.
09-18-2023 12:51 PM
Hello
If it isn't a bug and depending on you AAA configuration, its possible you are authenticating to tacacs but no being authorised, which could be negated by appending "if-authenticated" to the authorization commands
Any chance you can isolate the switch's and then gain access via local creds and remove or amend tacacs, also check your authentication server (ISE/ACS) for missing/changed ACLs
09-19-2023 12:57 AM
> also check your authentication server (ISE/ACS) for missing/changed ACLs
TACACS+ (ISE 2.6) live logs only shows the passed Authorization for the attach module command.
I do not see any logs regarding the commands throwing a "% Authorization failed"
Request Type | Authorization |
Status | Pass |
Message Text | Device-Administration: Command Authorization succeeded |
Username | XXXXX |
Authorization Policy | Tacacs >> XXXXX |
Shell Profile | |
Matched Command Set | PERMIT_ALL |
Command From Device | attach module 4 |
Authentication Method | None |
Authentication Privilege Level | 15 |
Authentication Type | ASCII |
Authentication Service | None |
Regarding your other hints i will reply later.
09-28-2023 11:15 AM
> Any chance you can isolate the switch's and then gain access via local creds and remove or amend tacacs
unfortunately not before mid of october. I will respond as soon as i manage to get one switch isolated
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide