09-19-2017 10:36 AM - edited 03-08-2019 12:05 PM
Community,
Im trying to get an IOS-XE router to use TACACS+ for login authentication but im having trouble doing so. I have a strong feeling that it has to do with the vrf instance "Mgmt-intf" but cant figure out how to make it work. I want the interface Gig0 which is in the vrf instance Mgmt-intf to be the source interface for the TACACS requests. I have double checked the keys and I know the config is correct in Cisco ACS. I can ping the ACS from the interface as shown:
QTS-BORDER-1A#ping vrf Mgmt-intf 10.134.193.178
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 10.134.193.178, timeout is 2 seconds:
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 69/78/86 ms
My configs are as follows:
aaa new-model
aaa authentication login default group tacacs+ local
vrf definition Mgmt-intf
!
interface GigabitEthernet0
vrf forwarding Mgmt-intf
ip address 10.110.255.14 255.255.255.0
negotiation auto
no mop enabled
!
ip route vrf Mgmt-intf 0.0.0.0 0.0.0.0 10.110.255.18
ip tacacs source-interface GigabitEthernet0
!
tacacs server TACACS+
address ipv4 10.134.193.178
key 7 104B0A0A0D1E022218222F3D0B3130212D1925130D37574D575A5A2C0A1F05510E
When I try to connect using my TACACS account it just says "access denied."
QTS-BORDER-1A#show tacacs
Tacacs+ Server - public :
Server name: TACACS+
Server address: 10.134.193.178
Server port: 49
Socket opens: 2
Socket closes: 2
Socket aborts: 0
Socket errors: 0
Socket Timeouts: 0
Failed Connect Attempts: 0
Total Packets Sent: 0
Total Packets Recv: 0
Any suggestions? Thanks Everyone!
Chris.
Solved! Go to Solution.
09-19-2017 11:03 AM - edited 09-19-2017 11:06 AM
Have you tried configuring like this:
aaa group server tacacs+ tacacs1 server-private 10.1.1.1 port 19 key cisco ip vrf forwarding MGMTxxxx ip tacacs source-interface Loopback0
I hope it helps,
Paul
09-19-2017 11:01 AM
09-19-2017 11:03 AM - edited 09-19-2017 11:06 AM
Have you tried configuring like this:
aaa group server tacacs+ tacacs1 server-private 10.1.1.1 port 19 key cisco ip vrf forwarding MGMTxxxx ip tacacs source-interface Loopback0
I hope it helps,
Paul
09-19-2017 11:16 AM
09-19-2017 01:00 PM - edited 09-19-2017 01:02 PM
Excellent. I am glad this has worked for you.
09-18-2019 06:32 AM
I had the same problem with ASR1001x, IOS asr1001x-universalk9.16.09.02.SPA.bin
Here is the correct config that worked.
aaa group server tacacs+ xxxxxxx
server-private xxxxxxxxx key 7 xxxxx
server-private xxxxxxxxx key 7 xxxxx
ip vrf forwarding Mgmt-intf
ip tacacs source-interface GigabitEthernet0
aaa authentication login default group xxxxxxx none
aaa authorization exec default group xxxxxxxxx none
aaa authorization commands 1 default group xxxxxxxxx none
aaa authorization commands 15 default group xxxxxxxxxx none
aaa accounting exec default start-stop group xxxxxxxxxxx none
aaa accounting commands 1 default start-stop group xxxxxxxxxxxxxx
aaa accounting commands 15 default start-stop group xxxxxxxxxxxxxxxx
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide