cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
3069
Views
5
Helpful
3
Replies

TACACS+ for Console ASA

Hello all,

I am trying to use TACACS for authentication / authorization. My setup is shown below.

On the Router, everything works really well.

 

For the ASA, I can ssh, telnet and http with no issues and I am going straight to privilege level 15 (example below is ssh)

 

ciscoasa# show curpriv 
Username : theo 
Current privilege level : 15
Current Mode/ s : P_PRIV 

but when I use the console, after logging I am in user-mode

 

ciscoasa> show curpriv 
Username : theo 
Current privilege level : 1
Current Mode/ s : P_UNPR

I can enter the enable password, but after that I cannot access anything, not even the show commands.

 

ciscoasa> enable 15
Password : *******
ciscoasa# conf t
Command authorization failed

 

TACACS+ Lab.png

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Cisco IOS

 

R1#show running-config | include aaa
aaa new-model
aaa authentication login REMOTE-LOGIN group tacacs+ local
aaa authorization exec REMOTE-AUTHOR group tacacs+ local
aaa authorization commands 15 REMOTE-EXEC-AUTHOR group tacacs+ local

 

R1#show run | include tacacs-server
tacacs-server host 10.11.3.21 key Cisco123
tacacs-server key Cisco123
R1#show run | section vty
line vty 0 4
 authorization commands 15 REMOTE-EXEC-AUTHOR
 authorization exec REMOTE-AUTHOR
 login authentication REMOTE-LOGIN
line vty 5 935
 authorization commands 15 REMOTE-EXEC-AUTHOR
 authorization exec REMOTE-AUTHOR
 login authentication REMOTE-LOGIN

Cisco ASA

 

 

ciscoasa# show running-config aaa 
aaa  authentication telnet console TACACS-Servers LOCAL 
aaa authentication http console TACACS-Servers LOCAL 
aaa authentication serial console TACACS-Servers LOCAL 
aaa authentication ssh console TACACS-Servers LOCAL 
aaa authorization command TACACS-Servers LOCAL 
aaa authorization exec authentication-server auto-enable 
aaa authentication login-history 

 

ciscoasa# show run aaa-server 
aaa-server TACACS-Servers protocol tacacs+ 
aaa-server TACACS-Servers (Inside) host 10.11.3.21 
key *****

Linux  /etc/tac_plus.conf

 

group = network-admin {
         default service = permit
        login = PAM
        service = exec {
        priv-lvl = 15
        }

user = theo {
        login = PAM
        member = network-admin

 

 

1 Accepted Solution

Accepted Solutions

Francesco Molino
VIP Alumni
VIP Alumni

Hi

 

This is because you need to configure a user called enable_15 on your tacacs server.

If you take a look on your logs, you should see an authorization failed coming from that user enable_15

 

Thanks


Thanks
Francesco
PS: Please don't forget to rate and select as validated answer if this answered your question

View solution in original post

3 Replies 3

Francesco Molino
VIP Alumni
VIP Alumni

Hi

 

This is because you need to configure a user called enable_15 on your tacacs server.

If you take a look on your logs, you should see an authorization failed coming from that user enable_15

 

Thanks


Thanks
Francesco
PS: Please don't forget to rate and select as validated answer if this answered your question

Perfect! That worked.

 

user = enable_15 {
        default service = permit
        service = exec {
        priv-lvl = 15
        }
}

TACACS+ Lab-Solution.png

 

Glad that your issue is solved.

Thanks
Francesco
PS: Please don't forget to rate and select as validated answer if this answered your question
Getting Started

Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community:

Review Cisco Networking products for a $25 gift card