{"id":1,"date":"2018-12-13T02:32:06","date_gmt":"2018-12-12T19:32:06","guid":{"rendered":"http:\/\/geeksops.com\/?p=1"},"modified":"2019-08-06T02:21:27","modified_gmt":"2019-08-05T19:21:27","slug":"hello-world","status":"publish","type":"post","link":"https:\/\/rotreein.com\/?p=1","title":{"rendered":"Tacacs+ configuration on Linux Debian"},"content":{"rendered":"\n<p>The first step in setting up this new TACACS+ server will be to acquire the software from the repositories :<\/p>\n\n\n\n<p class=\"has-text-color has-background has-small-font-size has-very-dark-gray-color has-very-light-gray-background-color\"><strong> root@debian-tacacs:~# apt-get install tacacs+ -y<\/strong><\/p>\n\n\n\n<p style=\"text-align:left\">This file is where all the TACACS specifications should reside (user permissions, access control lists, host keys, etc). The first thing that needs to be created is a key for the network devices. edit file  \/etc\/tacacs+\/tac_plus.conf. The following configuration created for multipe Vendor ( Cisco IOS, Cisco NXOS, Junos, F5, HP Comware, Brocade ICX, Brocade VDX )<\/p>\n\n\n\n<p class=\"has-text-color has-background has-small-font-size has-very-dark-gray-color has-very-light-gray-background-color\"><strong>group = admin {<br> default service = permit<br> service = exec {<br> priv-lvl = 15<br> optional brcd-role = admin<br> }<br> pap = PAM<br> service = ppp protocol = ip {<br> F5-LTM-User-Info-1 = resource<br> F5-LTM-User-Console = 1<br> F5-LTM-User-Role = 20<br> }<br> cmd = system-view {<br> permit .*<br> }<br> cmd = display {<br> permit .*<br> }<br> }<br> group = netoperator {<br> default service = deny<br> service = exec {<br> priv-lvl = 15<br> }<br> pap = PAM<br> service = ppp protocol = ip {<br> F5-LTM-User-Info-1 = operator<br> F5-LTM-User-Console = 1<br> F5-LTM-User-Role = 400<br> }<br> cmd = show {<br> permit .*<br> }<br> cmd = write {<br> permit .*<br> }<br> cmd = copy {<br> permit .*<br> }<br> cmd = exit {<br> permit .*<br> }<br> cmd = display {<br> permit current-configuration<br> }<br> cmd = display {<br> permit interface<br> }<br> cmd = display= {<br> permit version<br> }<br> cmd = save {<br> permit .*<br> }<br> }<\/strong><br><br><strong>group = netguest {<br> default service = deny<br> service = exec {<br> priv-lvl = 15<br> }<br> pap = PAM<br> service = ppp protocol = ip {<br> F5-LTM-User-Info-1 = guest<br> F5-LTM-User-Console = 1<br> F5-LTM-User-Role = 700<br> F5-LTM-User-Partition = all<br> }<\/strong><br><strong>cmd = show {<br> permit runn.*<br> }<br> cmd = exit {<br> permit .*<br> }<br> cmd = display {<br> permit current-configuration<br> }<br> }<br> user = groupuser { login = des TbLklpSxuUBdQ pap = des TbLklpSxuUBdQ member = netguest }<br> user = groupoperator { login = des TbLklpSxuUBdQ pap = des TbLklpSxuUBdQ member = netoperator }<br> user = groupadmin{ login = des TbLklpSxuUBdQ pap = des TbLklpSxuUBdQ member = netadmin }<br> <\/strong><\/p>\n\n\n\n<p><br>Example manually generated DES encryption password using tac_pwd<\/p>\n\n\n\n<p class=\"has-text-color has-background has-small-font-size has-very-dark-gray-color has-very-light-gray-background-color\"><strong>root@debian-tacacs:~# tac_pwd<br> Password to be encrypted: awasadakabel <br> TDp8zyr\/csMO<br> root@debian-tacacs:~#<\/strong><\/p>\n\n\n\n<p><br>AAA Configuration on BIGIP F5<\/p>\n\n\n\n<p class=\"has-text-color has-background has-small-font-size has-very-dark-gray-color has-very-light-gray-background-color\"><strong>auth tacacs system-auth {<br>     protocol ip<br>     secret $M$4g$wSz5Qw7SXT2guZVejcY1Eg==<br>     servers { 192.168.100.100 } # IP Tacacs+ Server<br>     service ppp<br> }<br> auth remote-role {<br>     role-info {<br>         netadmin {<\/strong><br>   <strong>          attribute F5-LTM-User-Info-1=resource<br>             line-order 1<br>             role resourceadmin<br>             user-partition All<br>         }<br>         netguest {<br>             attribute F5-LTM-User-Info-1=guest<br>             line-order 5<br>             role guest<br>             user-partition All<br>         }<br>         netoperator {<br>             attribute F5-LTM-User-Info-1=operator<br>             line-order 2<br>             role operator<br>             user-partition All<br>         }<br>     }<\/strong><\/p>\n\n\n\n<p><br>AAA Configuration on HP Comware v7<\/p>\n\n\n\n<p class=\"has-text-color has-background has-small-font-size has-very-dark-gray-color has-very-light-gray-background-color\"><code><strong>#hwtacacs scheme tac<\/strong><\/code><strong><br> <\/strong><code><strong>primary authentication <\/strong><\/code><strong>192.168.100.100<br> <\/strong><code><strong>primary authorization&nbsp;192.168.100.100<\/strong><\/code><strong> <br> <\/strong><code><strong>primary authorization <\/strong><\/code><strong>192.168.100.100<br> <\/strong><code><strong>key authentication simple @password@<\/strong><\/code><strong><br> <\/strong><code><strong>key authorization simple @password@<\/strong><\/code><strong><br> <\/strong><code><strong>key accounting simple @<\/strong><\/code><strong>password@<br> <\/strong><code><strong>user-name-format without-domain&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<\/strong><\/code><strong><br><\/strong><code><strong>#domain system&nbsp;<\/strong><\/code><strong><br> <\/strong><code><strong>authentication login hwtacacs-scheme tac local<\/strong><\/code><strong><br> <\/strong><code><strong>authorization login hwtacacs-scheme tac local<\/strong><\/code><strong><br> <\/strong><code><strong>accounting login hwtacacs-scheme tac local<\/strong><\/code><strong><br> <\/strong><code><strong>authorization command hwtacacs-scheme tac local<\/strong><\/code><strong><br> <\/strong><code><strong>accounting command hwtacacs-scheme tac<\/strong><\/code><strong><br><\/strong><code><strong>#domain&nbsp;defaultenable system<\/strong><\/code><strong><br> <\/strong><code><strong>role&nbsp;default-role enable<\/strong><\/code><strong><br> <\/strong><code><strong>authentication-mode scheme<\/strong><\/code><strong><br> <\/strong><code><strong>superauthentication-mode scheme local<\/strong><\/code><strong><br><\/strong><code><strong>line vty&nbsp;063<\/strong><\/code><strong><br><\/strong><code><strong>authentication-mode scheme<\/strong><\/code><strong><br>command authorization<\/strong><\/p>\n\n\n\n<p><br>AAA Configuration on Brocade VDX (NOS)<\/p>\n\n\n\n<p class=\"has-text-color has-background has-small-font-size has-very-dark-gray-color has-very-light-gray-background-color\"><strong>aaa authentication login tacacs+ local-auth-fallback<br> aaa accounting exec default start-stop tacacs+<br> aaa accounting commands default start-stop tacacs+<br>tacacs-server host 172.16.69.29 use-vrf default-vrf<br> protocol pap<br> key BukaLapak<br> encryption-level 7<br> retries 100<br> !<\/strong><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>AAA Configuration on Brocade ICX<\/p>\n\n\n\n<p class=\"has-background has-small-font-size has-very-light-gray-background-color\"><strong>aaa authentication login default tacacs+ enable<br> aaa authentication login privilege-mode<br> aaa authorization commands 0 default  tacacs+<br> aaa authorization exec default  tacacs+<br> aaa accounting commands 0 default start-stop  tacacs+<br> aaa accounting exec default start-stop  tacacs+<br> aaa accounting system default start-stop  tacacs+<br> enable aaa console<br> tacacs-server host 192.168.100.100<br> tacacs-server key @password@<\/strong><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>AAA Configuration on Cisco IOS XE<\/p>\n\n\n\n<p class=\"has-background has-small-font-size has-very-light-gray-background-color\"><strong>aaa new-model<br> aaa authentication login default group tacacs+ local-case<br> aaa authorization config-commands<br> aaa authorization exec default group tacacs+ local if-authenticated<br> aaa authorization commands 15 default group tacacs+ local if-authenticated<br> aaa accounting exec default start-stop group tacacs+<br> aaa accounting commands 15 default start-stop group tacacs+<br> tacacs-server host 192.168.100.100<br> tacacs-server key @password@<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The first step in setting up this new TACACS+ server will be to acquire the software from the repositories : root@debian-tacacs:~# apt-get install tacacs+ -y This file is where all the TACACS specifications should reside (user permissions, access control lists, host keys, etc). The first thing that needs to be created is a key for&hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/rotreein.com\/index.php?rest_route=\/wp\/v2\/posts\/1"}],"collection":[{"href":"https:\/\/rotreein.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rotreein.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rotreein.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rotreein.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1"}],"version-history":[{"count":23,"href":"https:\/\/rotreein.com\/index.php?rest_route=\/wp\/v2\/posts\/1\/revisions"}],"predecessor-version":[{"id":72,"href":"https:\/\/rotreein.com\/index.php?rest_route=\/wp\/v2\/posts\/1\/revisions\/72"}],"wp:attachment":[{"href":"https:\/\/rotreein.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rotreein.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rotreein.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}