SlideShare a Scribd company logo
C H A PT ER              5




       Configuring TACACS+
       This chapter describes the Terminal Access Controller Access Control System Plus
       (TACACS+), a Cisco proprietary version of TACACS.


       Note STP UplinkFast has also been added for this release, and it is documented in the
       “Enabling STP UplinkFast” section on page 3-18.


       TACACS+ provides the means to manage network security (authentication, authorization,
       and accounting [AAA]) from a server. This section describes how TACACS+ works and
       how you can configure it. For complete syntax and usage information for the commands
       described in this chapter, refer to the Cisco IOS Desktop Switching Command Reference or
       to the “Security” chapter of the Cisco IOS 11.3 Command Summary.
       These sections describe how to configure TACACS+:
       •   “How TACACS+ Works” section on page 5-1
       •   “Configuring TACACS+” section on page 5-2



How TACACS+ Works
       In large enterprise networks, the task of administering passwords on each device can be
       simplified by doing the user authentication centrally on a server. TACACS+ is an
       access-control protocol that allows a switch to authenticate all login attempts through a
       central authentication server. The network administrator configures the switch with the
       address of the TACACS+ server, and the switch and the server exchange messages to
       authenticate each user before allowing access to the management console.




                                                                      Configuring TACACS+ 5-1
Configuring TACACS+




               TACACS+ consists of three services: authentication, authorization, and accounting.
               Authentication is the action of determining who the user is and whether he or she is allowed
               access to the switch. Authorization is the action of determining what the user is allowed to
               do on the system. Accounting is the action of collecting data related to resource usage.



Configuring TACACS+
               The TACACS+ feature is disabled by default. However, you can enable and configure it
               using the command-line interface (CLI). You can access the CLI through the console port
               or via Telnet. In order to prevent a lapse in security, you cannot configure TACACS+
               through a network-management application. When enabled, TACACS+ can authenticate
               users accessing the switch through either the console or Telnet.
               The following sections describe how to configure the primary features of AAA/TACACS+:
               •   Enabling AAA/TACACS+
               •   Enabling Authentication for Login
               •   Specifying TACACS+ Authorization for EXEC Access and Network Services
               •   Starting TACACS+ Accounting
               •   Establishing the TACACS+ Server Host
               •   Configuring a Switch for Local AAA Configuration


               Note Although TACACS+ configuration is done using the CLI, the TACACS+ server will
               authenticate CVSM connections that have been configured with a privilege level of 15.




5-2    Cisco IOS Desktop Switching Enterprise Edition Software Configuration Guide
Configuring TACACS+




Enabling AAA/TACACS+
              Use the aaa new-model command to enable AAA/TACACS+. Enter the following
              commands in global configuration mode:

              Task                                                Command
              Enable AAA/TACACS+.                                 aaa new-model



Enabling Authentication for Login
              Using the aaa authentication login command and the following keywords, you create one
              or more lists of authentication methods that are tried at login. The lists are used with the
              login authentication line configuration command.
              Enter the following command in global configuration mode to enable authentication for
              login:
                 Switch# aaa authentication login {default | list-name} method1
                 [...[method3]]

              The keyword list-name is any character string used to name the list you are creating. The
              method keyword refers to the actual method the authentication algorithm tries, in the
              sequence entered. You can enter up to three methods:

              Keyword         Description

              line            Uses the line password for authentication.

              local           Uses the local username database for authentication.

              tacacs+         Uses TACACS+ authentication.

              To create a default list that is used if no list is specified in the login authentication
              command, use the default argument followed by the methods you want used in default
              situations.
              The additional methods of authentication are used only if the previous method returns an
              error, not if it fails. To specify that the authentication succeed even if all methods return an
              error, specify none as the final method in the command line.




                                                                                 Configuring TACACS+ 5-3
Configuring TACACS+




Specifying TACACS+ Authorization for EXEC Access and Network Services
               You can use the aaa authorization command with the tacacs+ keyword to set parameters
               that restrict a user’s network access to Cisco IOS privilege mode (EXEC access) and to
               network services such as Serial Line Internet Protocol (SLIP), Point to Point Protocol (PPP)
               with Network Control Protocols (NCPs), and AppleTalk Remote Access (ARA).
               The aaa authorization exec tacacs+ local command sets the following authorization
               parameters:
               •   Use TACACS+ for EXEC access authorization if authentication was done using
                   TACACS+.
               •   Use the local database if authentication was not done using TACACS+.


               Note Authorization is bypassed for authenticated users who log in through the CLI, even
               if authorization has been configured.


               To specify TACACS+ authorization for EXEC access and network services, perform the
               following tasks in global configuration mode:

               Task                                                     Command
               User TACACS+ authorization for all network-related       aaa authorization network tacacs+
               service requests, including SLIP, PPP NCPs, and ARA
               protocol.
               User TACACS+ authorization to determine if the user is   aaa authorization exec tacacs+
               allowed EXEC access. This keyword might return user
               profile information (such as autocommand
               information).




5-4    Cisco IOS Desktop Switching Enterprise Edition Software Configuration Guide
Configuring TACACS+




Starting TACACS+ Accounting
             You use the aaa accounting command with the tacacs+ keyword to turn on TACACS+
             accounting for each Cisco IOS privilege level and for network services.
             To use TACACS+ accounting to send a start-record accounting notice at the beginning of
             an EXEC process and a stop-record at the end, enter the following command in global
             configuration mode:
                 Switch#   aaa accounting exec start-stop tacacs+

             To use TACACS+ to account for all network-related service requests, including SLIP, PPP,
             and PPP NCPs, perform the following task in global configuration mode:
                 Switch# aaa accounting network start-stop tacacs+


             Note This command is documented in the “Accounting and Billing Commands” chapter
             of the Security Command Reference.



Establishing the TACACS+ Server Host
             Use the tacacs-server host command to specify the names of the IP host or hosts
             maintaining a AAA/TACACS+ server. On TACACS+ servers, you can configure the
             following additional options:
             •   Period of time (in seconds) the switch attempts to contact the server before it times out.
             •   Encryption key to encrypt and decrypt all traffic between the router and the daemon.
             •   Number of attempts that a user can make when entering a command that is being
                 authenticated by TACACS+.




                                                                              Configuring TACACS+ 5-5
Configuring TACACS+




               You can use the tacacs-server retransmit command to change the number of times the
               system software searches the list of TACACS servers (the default is two) and the interval it
               waits for a reply (the default is 5 seconds).
               Perform the following tasks in global configuration mode:

               Task                                                         Command
               Step 1   Define a TACACS+ host. Entering the timeout and      tacacs-server host name [timeout
                        key parameters with this command overrides the      integer] [key string]
                        global values that you can enter with the
                        tacacs-server timeout (Step 3) and the
                        tacacs-server key commands (Step 5).
               Step 2   Enter the number of times the server searches the   tacacs-server retransmit retries
                        list of TACACS+ servers before stopping.
               Step 3   Set the interval the server waits for a TACACS+     tacacs-server timeout seconds
                        server host to reply.
               Step 4   Set the number of login attempts that can be made   tacacs-server attempts count
                        on the line.
               Step 5   Define a set of encryption keys for all TACACS+      tacacs-server key key
                        and communication between the access server and
                        the TACACS daemon. (Repeat the command for
                        each encryption key.)
               Step 6   Return to privileged EXEC mode.                     exit
               Step 7   Confirm the TACACS+ server information and           show tacacs
                        display statistics in privileged EXEC mode.




5-6    Cisco IOS Desktop Switching Enterprise Edition Software Configuration Guide
Configuring TACACS+




Configuring a Switch for Local AAA Configuration
             You can configure AAA to operate without a server by setting the switch to implement
             AAA in local mode. Authentication and authorization are then handled by the switch. No
             accounting is available in this configuration.
             Perform the following tasks in global configuration mode:

             Task                                                    Command
             Step 1   Enable AAA.                                    aaa new-model
             Step 2   Set login authorization to default to local.   aaa authentication login default local
             Step 3   User AAA authorization for all                 aaa authorization exec local
                      network-related service requests, including
                      SLIP, PPP NCPs, and ARA protocol.
             Step 4   User AAA authorization to determine if the     aaa authorization network local
                      user is allowed to run an EXEC shell.
             Step 5   Enter the local database. (Repeat the          username name password password
                      command for each user.)                        privilege level (0 to 15)




                                                                                 Configuring TACACS+ 5-7
Configuring TACACS+




5-8    Cisco IOS Desktop Switching Enterprise Edition Software Configuration Guide

More Related Content

What's hot

CCNA Security - Chapter 3
CCNA Security - Chapter 3CCNA Security - Chapter 3
CCNA Security - Chapter 3
Irsandi Hasan
 
Tacacs+ with ise 2.4_ CCIE
Tacacs+ with ise 2.4_ CCIE Tacacs+ with ise 2.4_ CCIE
Tacacs+ with ise 2.4_ CCIE
Dhruv Sharma
 
Apple Captive Network Assistant Bypass with ClearPass Guest
Apple Captive Network Assistant Bypass with ClearPass GuestApple Captive Network Assistant Bypass with ClearPass Guest
Apple Captive Network Assistant Bypass with ClearPass Guest
Aruba, a Hewlett Packard Enterprise company
 
Aruba ClearPass Guest 6.3 User Guide
Aruba ClearPass Guest 6.3 User GuideAruba ClearPass Guest 6.3 User Guide
Aruba ClearPass Guest 6.3 User Guide
Aruba, a Hewlett Packard Enterprise company
 
CCNP Security-Secure
CCNP Security-SecureCCNP Security-Secure
CCNP Security-Secure
mohannadalhanahnah
 
EMEA Airheads- LACP and distributed LACP – ArubaOS Switch
EMEA Airheads- LACP and distributed LACP – ArubaOS SwitchEMEA Airheads- LACP and distributed LACP – ArubaOS Switch
EMEA Airheads- LACP and distributed LACP – ArubaOS Switch
Aruba, a Hewlett Packard Enterprise company
 
Implementing 802.1x Authentication
Implementing 802.1x AuthenticationImplementing 802.1x Authentication
Implementing 802.1x Authentication
dkaya
 
Radius Protocol
Radius ProtocolRadius Protocol
Radius Protocol
Netwax Lab
 
Ccnp enterprise workbook v1.0 completed till weigth
Ccnp enterprise workbook v1.0   completed till weigthCcnp enterprise workbook v1.0   completed till weigth
Ccnp enterprise workbook v1.0 completed till weigth
SagarR24
 
ClearPass Policy Manager 6.3 User Guide
ClearPass Policy Manager 6.3 User GuideClearPass Policy Manager 6.3 User Guide
ClearPass Policy Manager 6.3 User Guide
Aruba, a Hewlett Packard Enterprise company
 
Aruba instant iap setup rev3
Aruba instant iap setup rev3Aruba instant iap setup rev3
Aruba instant iap setup rev3
Aruba, a Hewlett Packard Enterprise company
 
Radius1
Radius1Radius1
Aruba clearpass ebook_chpt1_final
Aruba clearpass ebook_chpt1_finalAruba clearpass ebook_chpt1_final
Aruba clearpass ebook_chpt1_final
Aruba, a Hewlett Packard Enterprise company
 
ClearPass 6.3.6 Release Notes
ClearPass 6.3.6 Release NotesClearPass 6.3.6 Release Notes
ClearPass 6.3.6 Release Notes
Aruba, a Hewlett Packard Enterprise company
 
Cisco Router Basic Configuration
Cisco Router Basic ConfigurationCisco Router Basic Configuration
Cisco Router Basic Configuration
Prof. Erwin Globio
 
Aruba OS 6.3 Command Line Interface Reference Guide
Aruba OS 6.3 Command Line Interface Reference GuideAruba OS 6.3 Command Line Interface Reference Guide
Aruba OS 6.3 Command Line Interface Reference Guide
Aruba, a Hewlett Packard Enterprise company
 
BYOD with ClearPass
BYOD with ClearPassBYOD with ClearPass
EMEA Airheads - AP Discovery Logic and AP Deployment
EMEA Airheads - AP Discovery Logic and AP DeploymentEMEA Airheads - AP Discovery Logic and AP Deployment
EMEA Airheads - AP Discovery Logic and AP Deployment
Aruba, a Hewlett Packard Enterprise company
 
Optimizing Aruba WLANs for Roaming Devices
Optimizing Aruba WLANs for Roaming DevicesOptimizing Aruba WLANs for Roaming Devices
Optimizing Aruba WLANs for Roaming Devices
Aruba, a Hewlett Packard Enterprise company
 
ClearPass Overview
ClearPass OverviewClearPass Overview
ClearPass Overview
JoAnna Cheshire
 

What's hot (20)

CCNA Security - Chapter 3
CCNA Security - Chapter 3CCNA Security - Chapter 3
CCNA Security - Chapter 3
 
Tacacs+ with ise 2.4_ CCIE
Tacacs+ with ise 2.4_ CCIE Tacacs+ with ise 2.4_ CCIE
Tacacs+ with ise 2.4_ CCIE
 
Apple Captive Network Assistant Bypass with ClearPass Guest
Apple Captive Network Assistant Bypass with ClearPass GuestApple Captive Network Assistant Bypass with ClearPass Guest
Apple Captive Network Assistant Bypass with ClearPass Guest
 
Aruba ClearPass Guest 6.3 User Guide
Aruba ClearPass Guest 6.3 User GuideAruba ClearPass Guest 6.3 User Guide
Aruba ClearPass Guest 6.3 User Guide
 
CCNP Security-Secure
CCNP Security-SecureCCNP Security-Secure
CCNP Security-Secure
 
EMEA Airheads- LACP and distributed LACP – ArubaOS Switch
EMEA Airheads- LACP and distributed LACP – ArubaOS SwitchEMEA Airheads- LACP and distributed LACP – ArubaOS Switch
EMEA Airheads- LACP and distributed LACP – ArubaOS Switch
 
Implementing 802.1x Authentication
Implementing 802.1x AuthenticationImplementing 802.1x Authentication
Implementing 802.1x Authentication
 
Radius Protocol
Radius ProtocolRadius Protocol
Radius Protocol
 
Ccnp enterprise workbook v1.0 completed till weigth
Ccnp enterprise workbook v1.0   completed till weigthCcnp enterprise workbook v1.0   completed till weigth
Ccnp enterprise workbook v1.0 completed till weigth
 
ClearPass Policy Manager 6.3 User Guide
ClearPass Policy Manager 6.3 User GuideClearPass Policy Manager 6.3 User Guide
ClearPass Policy Manager 6.3 User Guide
 
Aruba instant iap setup rev3
Aruba instant iap setup rev3Aruba instant iap setup rev3
Aruba instant iap setup rev3
 
Radius1
Radius1Radius1
Radius1
 
Aruba clearpass ebook_chpt1_final
Aruba clearpass ebook_chpt1_finalAruba clearpass ebook_chpt1_final
Aruba clearpass ebook_chpt1_final
 
ClearPass 6.3.6 Release Notes
ClearPass 6.3.6 Release NotesClearPass 6.3.6 Release Notes
ClearPass 6.3.6 Release Notes
 
Cisco Router Basic Configuration
Cisco Router Basic ConfigurationCisco Router Basic Configuration
Cisco Router Basic Configuration
 
Aruba OS 6.3 Command Line Interface Reference Guide
Aruba OS 6.3 Command Line Interface Reference GuideAruba OS 6.3 Command Line Interface Reference Guide
Aruba OS 6.3 Command Line Interface Reference Guide
 
BYOD with ClearPass
BYOD with ClearPassBYOD with ClearPass
BYOD with ClearPass
 
EMEA Airheads - AP Discovery Logic and AP Deployment
EMEA Airheads - AP Discovery Logic and AP DeploymentEMEA Airheads - AP Discovery Logic and AP Deployment
EMEA Airheads - AP Discovery Logic and AP Deployment
 
Optimizing Aruba WLANs for Roaming Devices
Optimizing Aruba WLANs for Roaming DevicesOptimizing Aruba WLANs for Roaming Devices
Optimizing Aruba WLANs for Roaming Devices
 
ClearPass Overview
ClearPass OverviewClearPass Overview
ClearPass Overview
 

Similar to Tacacs

5 ip security ipsec gre
5 ip security ipsec gre5 ip security ipsec gre
5 ip security ipsec gre
SagarR24
 
5 ip security dataplace security
5 ip security dataplace security5 ip security dataplace security
5 ip security dataplace security
SagarR24
 
5 ip security copp-mpp
5 ip security copp-mpp5 ip security copp-mpp
5 ip security copp-mpp
SagarR24
 
010 sa302 aaa+ldap
010 sa302 aaa+ldap010 sa302 aaa+ldap
010 sa302 aaa+ldap
Babaa Naya
 
010 sa302 aaa+ldap
010 sa302 aaa+ldap010 sa302 aaa+ldap
010 sa302 aaa+ldap
Babaa Naya
 
5 ip security asa-partb
5 ip security asa-partb5 ip security asa-partb
5 ip security asa-partb
SagarR24
 
Terminal Access Controller
Terminal Access ControllerTerminal Access Controller
Terminal Access Controller
KHNOG
 
AAA Best Practices
AAA Best PracticesAAA Best Practices
AAA Best Practices
Sagar Gor
 
5 ip security aaa and acl
5 ip security aaa and acl5 ip security aaa and acl
5 ip security aaa and acl
SagarR24
 
Cisco ise jun os and ios xr - tacacs+ integration
Cisco ise   jun os and ios xr - tacacs+ integrationCisco ise   jun os and ios xr - tacacs+ integration
Cisco ise jun os and ios xr - tacacs+ integration
ArunKumar Subbiah
 
5 ip security urpf
5 ip security urpf5 ip security urpf
5 ip security urpf
SagarR24
 
Aruba Instant 6.4.0.2-4.1 Command Line Interface Reference Guide
Aruba Instant 6.4.0.2-4.1 Command Line Interface Reference GuideAruba Instant 6.4.0.2-4.1 Command Line Interface Reference Guide
Aruba Instant 6.4.0.2-4.1 Command Line Interface Reference Guide
Aruba, a Hewlett Packard Enterprise company
 
5 ip security aaa
5 ip security aaa5 ip security aaa
5 ip security aaa
SagarR24
 
Iuwne10 S02 L02
Iuwne10 S02 L02Iuwne10 S02 L02
Iuwne10 S02 L02
Ravi Ranjan
 
AAA Implementation
AAA ImplementationAAA Implementation
AAA Implementation
Ahmad El Tawil
 
Cisco Router and Switch Security Hardening Guide
Cisco Router and Switch Security Hardening GuideCisco Router and Switch Security Hardening Guide
Cisco Router and Switch Security Hardening Guide
Harris Andrea
 
SSMS-waitstats
SSMS-waitstatsSSMS-waitstats
SSMS-waitstats
E Blake
 
Securing management, control & data plane
Securing management, control & data planeSecuring management, control & data plane
Securing management, control & data plane
NetProtocol Xpert
 
PHP tips by a MYSQL DBA
PHP tips by a MYSQL DBAPHP tips by a MYSQL DBA
PHP tips by a MYSQL DBA
Amit Kumar Singh
 
How to Bulletproof Your Scylla Deployment
How to Bulletproof Your Scylla DeploymentHow to Bulletproof Your Scylla Deployment
How to Bulletproof Your Scylla Deployment
ScyllaDB
 

Similar to Tacacs (20)

5 ip security ipsec gre
5 ip security ipsec gre5 ip security ipsec gre
5 ip security ipsec gre
 
5 ip security dataplace security
5 ip security dataplace security5 ip security dataplace security
5 ip security dataplace security
 
5 ip security copp-mpp
5 ip security copp-mpp5 ip security copp-mpp
5 ip security copp-mpp
 
010 sa302 aaa+ldap
010 sa302 aaa+ldap010 sa302 aaa+ldap
010 sa302 aaa+ldap
 
010 sa302 aaa+ldap
010 sa302 aaa+ldap010 sa302 aaa+ldap
010 sa302 aaa+ldap
 
5 ip security asa-partb
5 ip security asa-partb5 ip security asa-partb
5 ip security asa-partb
 
Terminal Access Controller
Terminal Access ControllerTerminal Access Controller
Terminal Access Controller
 
AAA Best Practices
AAA Best PracticesAAA Best Practices
AAA Best Practices
 
5 ip security aaa and acl
5 ip security aaa and acl5 ip security aaa and acl
5 ip security aaa and acl
 
Cisco ise jun os and ios xr - tacacs+ integration
Cisco ise   jun os and ios xr - tacacs+ integrationCisco ise   jun os and ios xr - tacacs+ integration
Cisco ise jun os and ios xr - tacacs+ integration
 
5 ip security urpf
5 ip security urpf5 ip security urpf
5 ip security urpf
 
Aruba Instant 6.4.0.2-4.1 Command Line Interface Reference Guide
Aruba Instant 6.4.0.2-4.1 Command Line Interface Reference GuideAruba Instant 6.4.0.2-4.1 Command Line Interface Reference Guide
Aruba Instant 6.4.0.2-4.1 Command Line Interface Reference Guide
 
5 ip security aaa
5 ip security aaa5 ip security aaa
5 ip security aaa
 
Iuwne10 S02 L02
Iuwne10 S02 L02Iuwne10 S02 L02
Iuwne10 S02 L02
 
AAA Implementation
AAA ImplementationAAA Implementation
AAA Implementation
 
Cisco Router and Switch Security Hardening Guide
Cisco Router and Switch Security Hardening GuideCisco Router and Switch Security Hardening Guide
Cisco Router and Switch Security Hardening Guide
 
SSMS-waitstats
SSMS-waitstatsSSMS-waitstats
SSMS-waitstats
 
Securing management, control & data plane
Securing management, control & data planeSecuring management, control & data plane
Securing management, control & data plane
 
PHP tips by a MYSQL DBA
PHP tips by a MYSQL DBAPHP tips by a MYSQL DBA
PHP tips by a MYSQL DBA
 
How to Bulletproof Your Scylla Deployment
How to Bulletproof Your Scylla DeploymentHow to Bulletproof Your Scylla Deployment
How to Bulletproof Your Scylla Deployment
 

More from 1 2d

Notas clase
Notas claseNotas clase
Notas clase
1 2d
 
Notas clase java ii
Notas clase java iiNotas clase java ii
Notas clase java ii
1 2d
 
J2me
J2meJ2me
J2me
1 2d
 
6. control de acceso
6. control de acceso6. control de acceso
6. control de acceso
1 2d
 
5. administracioìn de claves y certificados
5. administracioìn de claves y certificados5. administracioìn de claves y certificados
5. administracioìn de claves y certificados
1 2d
 
4. certificados digitales
4. certificados digitales4. certificados digitales
4. certificados digitales
1 2d
 
3. boletines de mensajes y firmas digitales
3. boletines de mensajes y firmas digitales3. boletines de mensajes y firmas digitales
3. boletines de mensajes y firmas digitales
1 2d
 
2. criptografiìa con java
2. criptografiìa con java2. criptografiìa con java
2. criptografiìa con java
1 2d
 
1. introduccioìn a la seguridad
1. introduccioìn a la seguridad1. introduccioìn a la seguridad
1. introduccioìn a la seguridad
1 2d
 
1046 pdfsam opos informatica
1046 pdfsam opos informatica1046 pdfsam opos informatica
1046 pdfsam opos informatica1 2d
 
1203 pdfsam opos informatica
1203 pdfsam opos informatica1203 pdfsam opos informatica
1203 pdfsam opos informatica1 2d
 
878 pdfsam opos informatica
878 pdfsam opos informatica878 pdfsam opos informatica
878 pdfsam opos informatica1 2d
 
516 pdfsam opos informatica
516 pdfsam opos informatica516 pdfsam opos informatica
516 pdfsam opos informatica1 2d
 
1704 pdfsam opos informatica
1704 pdfsam opos informatica1704 pdfsam opos informatica
1704 pdfsam opos informatica1 2d
 
1893 pdfsam opos informatica
1893 pdfsam opos informatica1893 pdfsam opos informatica
1893 pdfsam opos informatica1 2d
 
516 pdfsam opos informatica
516 pdfsam opos informatica516 pdfsam opos informatica
516 pdfsam opos informatica1 2d
 
706 pdfsam opos informatica
706 pdfsam opos informatica706 pdfsam opos informatica
706 pdfsam opos informatica1 2d
 
330 pdfsam opos informatica
330 pdfsam opos informatica330 pdfsam opos informatica
330 pdfsam opos informatica1 2d
 
1 pdfsam opos informatica
1 pdfsam opos informatica1 pdfsam opos informatica
1 pdfsam opos informatica
1 2d
 
1379 pdfsam opos informatica
1379 pdfsam opos informatica1379 pdfsam opos informatica
1379 pdfsam opos informatica1 2d
 

More from 1 2d (20)

Notas clase
Notas claseNotas clase
Notas clase
 
Notas clase java ii
Notas clase java iiNotas clase java ii
Notas clase java ii
 
J2me
J2meJ2me
J2me
 
6. control de acceso
6. control de acceso6. control de acceso
6. control de acceso
 
5. administracioìn de claves y certificados
5. administracioìn de claves y certificados5. administracioìn de claves y certificados
5. administracioìn de claves y certificados
 
4. certificados digitales
4. certificados digitales4. certificados digitales
4. certificados digitales
 
3. boletines de mensajes y firmas digitales
3. boletines de mensajes y firmas digitales3. boletines de mensajes y firmas digitales
3. boletines de mensajes y firmas digitales
 
2. criptografiìa con java
2. criptografiìa con java2. criptografiìa con java
2. criptografiìa con java
 
1. introduccioìn a la seguridad
1. introduccioìn a la seguridad1. introduccioìn a la seguridad
1. introduccioìn a la seguridad
 
1046 pdfsam opos informatica
1046 pdfsam opos informatica1046 pdfsam opos informatica
1046 pdfsam opos informatica
 
1203 pdfsam opos informatica
1203 pdfsam opos informatica1203 pdfsam opos informatica
1203 pdfsam opos informatica
 
878 pdfsam opos informatica
878 pdfsam opos informatica878 pdfsam opos informatica
878 pdfsam opos informatica
 
516 pdfsam opos informatica
516 pdfsam opos informatica516 pdfsam opos informatica
516 pdfsam opos informatica
 
1704 pdfsam opos informatica
1704 pdfsam opos informatica1704 pdfsam opos informatica
1704 pdfsam opos informatica
 
1893 pdfsam opos informatica
1893 pdfsam opos informatica1893 pdfsam opos informatica
1893 pdfsam opos informatica
 
516 pdfsam opos informatica
516 pdfsam opos informatica516 pdfsam opos informatica
516 pdfsam opos informatica
 
706 pdfsam opos informatica
706 pdfsam opos informatica706 pdfsam opos informatica
706 pdfsam opos informatica
 
330 pdfsam opos informatica
330 pdfsam opos informatica330 pdfsam opos informatica
330 pdfsam opos informatica
 
1 pdfsam opos informatica
1 pdfsam opos informatica1 pdfsam opos informatica
1 pdfsam opos informatica
 
1379 pdfsam opos informatica
1379 pdfsam opos informatica1379 pdfsam opos informatica
1379 pdfsam opos informatica
 

Recently uploaded

How to Create a More Engaging and Human Online Learning Experience
How to Create a More Engaging and Human Online Learning Experience How to Create a More Engaging and Human Online Learning Experience
How to Create a More Engaging and Human Online Learning Experience
Wahiba Chair Training & Consulting
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
mulvey2
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
amberjdewit93
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
Nguyen Thanh Tu Collection
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
Colégio Santa Teresinha
 
Walmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdfWalmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdf
TechSoup
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
Israel Genealogy Research Association
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
Priyankaranawat4
 
Cognitive Development Adolescence Psychology
Cognitive Development Adolescence PsychologyCognitive Development Adolescence Psychology
Cognitive Development Adolescence Psychology
paigestewart1632
 
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
imrankhan141184
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
Priyankaranawat4
 
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptxPrésentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
siemaillard
 
UGC NET Exam Paper 1- Unit 1:Teaching Aptitude
UGC NET Exam Paper 1- Unit 1:Teaching AptitudeUGC NET Exam Paper 1- Unit 1:Teaching Aptitude
UGC NET Exam Paper 1- Unit 1:Teaching Aptitude
S. Raj Kumar
 
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
GeorgeMilliken2
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
AyyanKhan40
 
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptxNEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
iammrhaywood
 
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
สมใจ จันสุกสี
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
Dr. Shivangi Singh Parihar
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Excellence Foundation for South Sudan
 

Recently uploaded (20)

How to Create a More Engaging and Human Online Learning Experience
How to Create a More Engaging and Human Online Learning Experience How to Create a More Engaging and Human Online Learning Experience
How to Create a More Engaging and Human Online Learning Experience
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
 
Walmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdfWalmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdf
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
 
Cognitive Development Adolescence Psychology
Cognitive Development Adolescence PsychologyCognitive Development Adolescence Psychology
Cognitive Development Adolescence Psychology
 
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
 
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptxPrésentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
 
UGC NET Exam Paper 1- Unit 1:Teaching Aptitude
UGC NET Exam Paper 1- Unit 1:Teaching AptitudeUGC NET Exam Paper 1- Unit 1:Teaching Aptitude
UGC NET Exam Paper 1- Unit 1:Teaching Aptitude
 
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
 
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptxNEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
 
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
 

Tacacs

  • 1. C H A PT ER 5 Configuring TACACS+ This chapter describes the Terminal Access Controller Access Control System Plus (TACACS+), a Cisco proprietary version of TACACS. Note STP UplinkFast has also been added for this release, and it is documented in the “Enabling STP UplinkFast” section on page 3-18. TACACS+ provides the means to manage network security (authentication, authorization, and accounting [AAA]) from a server. This section describes how TACACS+ works and how you can configure it. For complete syntax and usage information for the commands described in this chapter, refer to the Cisco IOS Desktop Switching Command Reference or to the “Security” chapter of the Cisco IOS 11.3 Command Summary. These sections describe how to configure TACACS+: • “How TACACS+ Works” section on page 5-1 • “Configuring TACACS+” section on page 5-2 How TACACS+ Works In large enterprise networks, the task of administering passwords on each device can be simplified by doing the user authentication centrally on a server. TACACS+ is an access-control protocol that allows a switch to authenticate all login attempts through a central authentication server. The network administrator configures the switch with the address of the TACACS+ server, and the switch and the server exchange messages to authenticate each user before allowing access to the management console. Configuring TACACS+ 5-1
  • 2. Configuring TACACS+ TACACS+ consists of three services: authentication, authorization, and accounting. Authentication is the action of determining who the user is and whether he or she is allowed access to the switch. Authorization is the action of determining what the user is allowed to do on the system. Accounting is the action of collecting data related to resource usage. Configuring TACACS+ The TACACS+ feature is disabled by default. However, you can enable and configure it using the command-line interface (CLI). You can access the CLI through the console port or via Telnet. In order to prevent a lapse in security, you cannot configure TACACS+ through a network-management application. When enabled, TACACS+ can authenticate users accessing the switch through either the console or Telnet. The following sections describe how to configure the primary features of AAA/TACACS+: • Enabling AAA/TACACS+ • Enabling Authentication for Login • Specifying TACACS+ Authorization for EXEC Access and Network Services • Starting TACACS+ Accounting • Establishing the TACACS+ Server Host • Configuring a Switch for Local AAA Configuration Note Although TACACS+ configuration is done using the CLI, the TACACS+ server will authenticate CVSM connections that have been configured with a privilege level of 15. 5-2 Cisco IOS Desktop Switching Enterprise Edition Software Configuration Guide
  • 3. Configuring TACACS+ Enabling AAA/TACACS+ Use the aaa new-model command to enable AAA/TACACS+. Enter the following commands in global configuration mode: Task Command Enable AAA/TACACS+. aaa new-model Enabling Authentication for Login Using the aaa authentication login command and the following keywords, you create one or more lists of authentication methods that are tried at login. The lists are used with the login authentication line configuration command. Enter the following command in global configuration mode to enable authentication for login: Switch# aaa authentication login {default | list-name} method1 [...[method3]] The keyword list-name is any character string used to name the list you are creating. The method keyword refers to the actual method the authentication algorithm tries, in the sequence entered. You can enter up to three methods: Keyword Description line Uses the line password for authentication. local Uses the local username database for authentication. tacacs+ Uses TACACS+ authentication. To create a default list that is used if no list is specified in the login authentication command, use the default argument followed by the methods you want used in default situations. The additional methods of authentication are used only if the previous method returns an error, not if it fails. To specify that the authentication succeed even if all methods return an error, specify none as the final method in the command line. Configuring TACACS+ 5-3
  • 4. Configuring TACACS+ Specifying TACACS+ Authorization for EXEC Access and Network Services You can use the aaa authorization command with the tacacs+ keyword to set parameters that restrict a user’s network access to Cisco IOS privilege mode (EXEC access) and to network services such as Serial Line Internet Protocol (SLIP), Point to Point Protocol (PPP) with Network Control Protocols (NCPs), and AppleTalk Remote Access (ARA). The aaa authorization exec tacacs+ local command sets the following authorization parameters: • Use TACACS+ for EXEC access authorization if authentication was done using TACACS+. • Use the local database if authentication was not done using TACACS+. Note Authorization is bypassed for authenticated users who log in through the CLI, even if authorization has been configured. To specify TACACS+ authorization for EXEC access and network services, perform the following tasks in global configuration mode: Task Command User TACACS+ authorization for all network-related aaa authorization network tacacs+ service requests, including SLIP, PPP NCPs, and ARA protocol. User TACACS+ authorization to determine if the user is aaa authorization exec tacacs+ allowed EXEC access. This keyword might return user profile information (such as autocommand information). 5-4 Cisco IOS Desktop Switching Enterprise Edition Software Configuration Guide
  • 5. Configuring TACACS+ Starting TACACS+ Accounting You use the aaa accounting command with the tacacs+ keyword to turn on TACACS+ accounting for each Cisco IOS privilege level and for network services. To use TACACS+ accounting to send a start-record accounting notice at the beginning of an EXEC process and a stop-record at the end, enter the following command in global configuration mode: Switch# aaa accounting exec start-stop tacacs+ To use TACACS+ to account for all network-related service requests, including SLIP, PPP, and PPP NCPs, perform the following task in global configuration mode: Switch# aaa accounting network start-stop tacacs+ Note This command is documented in the “Accounting and Billing Commands” chapter of the Security Command Reference. Establishing the TACACS+ Server Host Use the tacacs-server host command to specify the names of the IP host or hosts maintaining a AAA/TACACS+ server. On TACACS+ servers, you can configure the following additional options: • Period of time (in seconds) the switch attempts to contact the server before it times out. • Encryption key to encrypt and decrypt all traffic between the router and the daemon. • Number of attempts that a user can make when entering a command that is being authenticated by TACACS+. Configuring TACACS+ 5-5
  • 6. Configuring TACACS+ You can use the tacacs-server retransmit command to change the number of times the system software searches the list of TACACS servers (the default is two) and the interval it waits for a reply (the default is 5 seconds). Perform the following tasks in global configuration mode: Task Command Step 1 Define a TACACS+ host. Entering the timeout and tacacs-server host name [timeout key parameters with this command overrides the integer] [key string] global values that you can enter with the tacacs-server timeout (Step 3) and the tacacs-server key commands (Step 5). Step 2 Enter the number of times the server searches the tacacs-server retransmit retries list of TACACS+ servers before stopping. Step 3 Set the interval the server waits for a TACACS+ tacacs-server timeout seconds server host to reply. Step 4 Set the number of login attempts that can be made tacacs-server attempts count on the line. Step 5 Define a set of encryption keys for all TACACS+ tacacs-server key key and communication between the access server and the TACACS daemon. (Repeat the command for each encryption key.) Step 6 Return to privileged EXEC mode. exit Step 7 Confirm the TACACS+ server information and show tacacs display statistics in privileged EXEC mode. 5-6 Cisco IOS Desktop Switching Enterprise Edition Software Configuration Guide
  • 7. Configuring TACACS+ Configuring a Switch for Local AAA Configuration You can configure AAA to operate without a server by setting the switch to implement AAA in local mode. Authentication and authorization are then handled by the switch. No accounting is available in this configuration. Perform the following tasks in global configuration mode: Task Command Step 1 Enable AAA. aaa new-model Step 2 Set login authorization to default to local. aaa authentication login default local Step 3 User AAA authorization for all aaa authorization exec local network-related service requests, including SLIP, PPP NCPs, and ARA protocol. Step 4 User AAA authorization to determine if the aaa authorization network local user is allowed to run an EXEC shell. Step 5 Enter the local database. (Repeat the username name password password command for each user.) privilege level (0 to 15) Configuring TACACS+ 5-7
  • 8. Configuring TACACS+ 5-8 Cisco IOS Desktop Switching Enterprise Edition Software Configuration Guide