Appendix

The following example shows how to configure the switch to authenticate and account using TACACS+.

Output 1: Example: Cisco iOS

**Authentication

aaa authentication login default group <group-name> local

aaa authentication enable default group <group-name> enable

**Authorization

aaa authorization exec default group <group-name> local

aaa authorization commands <privilege no.> default group <group-name> local

aaa authorization config-commands

**Accounting

aaa accounting exec default start-stop group <group-name>

aaa accounting commands <privilege no.> default start-stop group <group-name>

aaa accounting send stop-record authentication failure

**Mapping TACACS+ server IP to group

aaa group server tacacs+ <group-name>

server-private <server-ip> key <shared-secret>

Output 2: Example: HP switch

tacacs-server host <host-ip> key <shared-secret>

aaa authentication telnet login tacacs

aaa authentication telnet enable tacacs

aaa authentication login privilege-mode

aaa accounting exec start-stop tacacs

HP switches should be set with privilege level always. Enable authentication is not supported.

Output 3: Example: Juniper Switch

root@ex-2200# show system login

class class1 {

idle-timeout 20;

}

class network-admin {

idle-timeout 10;

}

user network-admin {

uid 2002;

class network-admin;

}

user remote-read-only {

full-name "User template for remote read-only";

uid 2014;

class read-only;

}

user remote-super-users {

full-name "User template for remote super-users";

uid 2013;

class super-user;

}

#show system tacplus-server

<Ivanti Policy Secure-IP> {secret “fkfljsfjsafjsaf”; }

#show system accounting

events [events];

#show system tacplus-options

service-name shell;

For more information on Juniper, see Juniper documentation.

Output 4: Example: F5 Device

Label

Sample Configuration

TACACS+ Authentication

https://support.f5.com/csp/article/K8811

Configure Service Name as “shell” instead of “ppp” under configuration for TACACS+ authentication.

TACACS+ Accounting

https://support.f5.com/csp/article/K13762

Remote Role configuration using Custom attributes

https://devcentral.f5.com/Portals/0/Cache/Pdfs/2807/tacacs-remote-role-configuration-for-big-ip.pdf

Output 5: Example: Arista Switch

tacacs-server host <IPS-IP Address> key <secret-key>

!

aaa group server tacacs+ <group-name>

server <IPS-IP Address>

!

aaa authentication login default local group tacacs+ group <group-name>

Required for enabling service authentication.

aaa authentication enable default group tacacs+ group <group-name> local

aaa authorization exec default local group tacacs+ group <group-name>

aaa authorization commands all default local group tacacs+ group <group-name>

aaa accounting exec default start-stop group tacacs+ group <group-name>

aaa accounting commands all default start-stop group tacacs+ group <group-name>

For Command based Authorization configure the following command.

aaa authorization commands all default group tacacs+ group <group-name>

 

For Role based Authorization configure the following command.

configure aaa authorization commands all default local

From the Ivanti Policy Secure Admin UI configure the custom attribute for Role based authorization as shown below.