Fading Coder

One Final Commit for the Last Sprint

Home > Tech > Content

Configuring TACACS+ Authentication on Cisco Devices

Tech 1
# Configure TACACS+ server
aaa new-model
tacacs-server host 192.168.1.100
tacacs-server key mysecretkey

# Define authentication method for login
aaa authentication login default group tacacs+ local
# First attempt TACACS+; fall back to local if TACACS+ is unreachable

# Define authentication method for privilege mode
aaa authentication enable default group tacacs+ enable
# Use TACACS+ first; fall back to enable password if needed

# Define authorization for exec sessions
aaa authorization exec default group tacacs+ local
# Only users present in TACACS+ can log in

# Define authorization for command execution (privilege level 15)
aaa authorization commands 15 default group tacacs+ local

# Enable accounting for session start/stop
aaa accounting exec default start-stop group tacacs+

# Enable accounting for executed commands
aaa accounting commands 15 default start-stop group tacacs+

Otpional: Allow Local Access During Maintenance

During device upgrades or maintenance, it's advisable to retain local console access as a fallback in case the TACACS+ server becomes unavailable.

# Create custom authentication method
aaa authentication login local_only local

# Define authorization policy for console access
aaa authorization exec console local
aaa authorization commands console none

# Apply to console line
line console 0
 login authentication local_only
 authorization exec console
 authorization commands console
! 

After completing maintneance, remove the local authentication configuration to maintain security.

Tags: Cisco

Related Articles

Understanding Strong and Weak References in Java

Strong References Strong reference are the most prevalent type of object referencing in Java. When an object has a strong reference pointing to it, the garbage collector will not reclaim its memory. F...

Comprehensive Guide to SSTI Explained with Payload Bypass Techniques

Introduction Server-Side Template Injection (SSTI) is a vulnerability in web applications where user input is improper handled within the template engine and executed on the server. This exploit can r...

Implement Image Upload Functionality for Django Integrated TinyMCE Editor

Django’s Admin panel is highly user-friendly, and pairing it with TinyMCE, an effective rich text editor, simplifies content management significantly. Combining the two is particular useful for bloggi...

Leave a Comment

Anonymous

◎Feel free to join the discussion and share your thoughts.