cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
2528
Views
0
Helpful
20
Replies

ACE 4700 and Cisco ACS aaa authentication

cisco24x7
Level 6
Level 6

ACE version Software

loader: Version 0.95

system: Version A1(7b) [build 3.0(0)A1(7b)

Cisco ACS version 4.0.1

I am trying to authenticate admin users with AAA authentication for ACE management.

This is what I've done:

ACE-lab/Admin(config)# tacacs-server host 192.168.3.10 key 123456 port 49

warning: numeric key will not be encrypted

ACE-lab/Admin(config)# aaa group server tacacs+ cciesec

ACE-lab/Admin(config-tacacs+)# server ?

<A.B.C.D> TACACS+ server name

ACE-lab/Admin(config-tacacs+)# server 192.168.3.10

can not find the TACACS+ server

specified TACACS+ server not found, please configure it using tacacs-server host ... and then retry

ACE-lab/Admin(config-tacacs+)#

Why am I getting this error? I have full

connectivity between the ACE and the ACS

server. Furthermore, the ACS server

works fine with other Cisco IOS devices.

Please help. Thanks.

20 Replies 20

you do not have any other access to the device ?

What about console ? Do you also run tacacs on console ?

G.

This is what I did:

1- configure AAA configuration on the ACE box,

2- go to my Cisco ACS and stop the ACS service.

That enables me to log into the ACE box with

"admin/admin",

3- enable Cisco ACS service on the ACS server,

4- Now I can log into the ACE box with ngx1

account. However, I can not go into the

"conf t" mode.

Can anyone help? Thanks in advance.

next thing is to get a sniffer trace of the TACACS exchange.

We'll need the key to decode.

You can also try to upgrade to A1(8a) or A3(1.0).

Finally, a service request with the TAC seems appropriate.

Gilles.

I found the following in the ACE 4700 release notes:

CSCsl48103-When the ACE is configured for TACACS+ authentication with a user context and the Cisco ACS sends the cisco-av-pair* attribute before the ACE custom shell attribute, you cannot log in to the ACE via TACACS+ and use the Admin role. Workaround: Do not use the ACE TACACS+ authentication for an Admin role. If you must use TACACS+ authentication for an Admin role, do not configure the Cisco ACS to send the cisco-av-pair* attribute.

www.cisco.com/en/US/partner/docs/app_ntwk_services/data_center_app_services/ace_appliances/A1_x/release/note/RACEA1X.html

HTH

Ross

Are you saying that I do NOT need in Cisco ACS:

shell:Admin*Admin default-domain

Getting Started

Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community: