filmov
tv
TACACS+ Configuration Linux Server Cisco IOS |Part 3/3|Accounting| Privilege level command set exec

ะะพะบะฐะทะฐัั ะพะฟะธัะฐะฝะธะต
๐๐ผ๐ฟ ๐๐ผ๐บ๐ฝ๐น๐ฒ๐๐ฒ ๐ฃ๐๐๐ต๐ผ๐ป ๐๐ผ๐ฟ ๐ก๐ฒ๐๐๐ผ๐ฟ๐ธ ๐๐ป๐ด๐ถ๐ป๐ฒ๐ฒ๐ฟ๐ ๐๐ผ๐๐ฟ๐๐ฒ:
๐๐ป๐ฟ๐ผ๐น๐น ๐ณ๐ผ๐ฟ ๐ฏ๐ฒ๐น๐ผ๐ ๐จ๐ฑ๐ฒ๐บ๐ ๐๐น๐ฎ๐๐: ๐๐๐๐ ๐๐๐ซ๐ฌ๐ข๐จ๐ง
๐ซ๐๐๐๐๐๐๐๐๐ ๐น๐๐๐๐๐๐๐ ๐ณ๐๐๐:
First video convers how to add TACACS clinet in the server, configure shared secret for encrypting the traffic, add users and user groups in tacacs Server
Configure enable password in TACACS+, test enabe passwords in local device config and local password configured in TACACS server
Second video covers authorization of TACACS server
Create users with different privilege levels 0 1 and 15, check the default command permissions of the users. Configure persission for the command set and test the user privilege with commands
Third video covers accounting part. Cerify the TACACS log using "tail -f". Check the real time logs by executing the commands with different privilege levels.Checks the authorization debug output in the console for different user levels.
Below are the configurations in Cisco IOS and TACACS+ Server
sudo apt-get install tacacs+
sudo service tacacs_plus stop
netstat -na | grep -i LISTEN
Step 01
-----------------
key = cisco
host = 10.10.10.10 {
prompt = "Welcome to R1 \n\nUsername:"
}
#####################################################
user = t1 {
member = NETADMIN
enable = cleartext t1
login = cleartext t1
}
group = NETADMIN {
default service = permit
service = exec {
priv-lvl = 15
}
}
######################################################
aaa new-model
tacacs-server host 10.10.10.10
tacacs-server key cisco
------------------------------------------------
Logging console
debug aaa authorization
############################################
Only authentication : no enable , no authorization, no accounting
---------------------------------
aaa authentication login default group tacacs+ local
aaa authentication enable default none
############################################
Authentication + enable (local)
------------------------------------
aaa authentication login default group tacacs+ local
Enable secret password
############################################
Authentication + enable (tacacs)
-------------------------------------
aaa authentication login default group tacacs+ local
aaa authentication enable default group tacacs+
###################################################
Authentication+ authorization with Priv-lvl 0 1 and 15
--------------------------------------------------------
user = t2 {
member = NETADMIN2
enable = cleartext t2
login = cleartext t2
}
group = NETADMIN2 {
default service = permit
service = exec {
priv-lvl = 1
}
}
aaa authentication login default group tacacs+ local
No aaa authentication enable default group tacacs+ enable
aaa authorization exec default group tacacs+ local
aaa authorization commands 0 default group tacacs+ local
aaa authorization commands 1 default group tacacs+ local
aaa authorization commands 15 default group tacacs+ local
###############################################################
Authorization with command list
-----------------------------------------------------
user = t3 {
member = NETADMIN3
enable = cleartext t3
login = cleartext t3
}
group = NADMIN3 {
service = exec {
priv-lvl = 1
}
cmd = enable {
permit .*
}
cmd = show {
permit .*
}
cmd = exit {
permit .*
}
}
OR
cmd = show {
Permit interface
Deny .*
}
################################################################
Authentication+ authorization + accounting
My Config
--------------------------
aaa new-model
aaa authentication login default group tacacs+ local
aaa authorization exec default group tacacs+ local
aaa authorization commands 0 default group tacacs+ local
aaa authorization commands 1 default group tacacs+ local
aaa authorization commands 15 default group tacacs+ local
aaa accounting exec default start-stop group tacacs+
aaa accounting commands 0 default start-stop group tacacs+
aaa accounting commands 1 default start-stop group tacacs+
aaa accounting commands 15 default start-stop group tacacs+
๐๐ป๐ฟ๐ผ๐น๐น ๐ณ๐ผ๐ฟ ๐ฏ๐ฒ๐น๐ผ๐ ๐จ๐ฑ๐ฒ๐บ๐ ๐๐น๐ฎ๐๐: ๐๐๐๐ ๐๐๐ซ๐ฌ๐ข๐จ๐ง
๐ซ๐๐๐๐๐๐๐๐๐ ๐น๐๐๐๐๐๐๐ ๐ณ๐๐๐:
First video convers how to add TACACS clinet in the server, configure shared secret for encrypting the traffic, add users and user groups in tacacs Server
Configure enable password in TACACS+, test enabe passwords in local device config and local password configured in TACACS server
Second video covers authorization of TACACS server
Create users with different privilege levels 0 1 and 15, check the default command permissions of the users. Configure persission for the command set and test the user privilege with commands
Third video covers accounting part. Cerify the TACACS log using "tail -f". Check the real time logs by executing the commands with different privilege levels.Checks the authorization debug output in the console for different user levels.
Below are the configurations in Cisco IOS and TACACS+ Server
sudo apt-get install tacacs+
sudo service tacacs_plus stop
netstat -na | grep -i LISTEN
Step 01
-----------------
key = cisco
host = 10.10.10.10 {
prompt = "Welcome to R1 \n\nUsername:"
}
#####################################################
user = t1 {
member = NETADMIN
enable = cleartext t1
login = cleartext t1
}
group = NETADMIN {
default service = permit
service = exec {
priv-lvl = 15
}
}
######################################################
aaa new-model
tacacs-server host 10.10.10.10
tacacs-server key cisco
------------------------------------------------
Logging console
debug aaa authorization
############################################
Only authentication : no enable , no authorization, no accounting
---------------------------------
aaa authentication login default group tacacs+ local
aaa authentication enable default none
############################################
Authentication + enable (local)
------------------------------------
aaa authentication login default group tacacs+ local
Enable secret password
############################################
Authentication + enable (tacacs)
-------------------------------------
aaa authentication login default group tacacs+ local
aaa authentication enable default group tacacs+
###################################################
Authentication+ authorization with Priv-lvl 0 1 and 15
--------------------------------------------------------
user = t2 {
member = NETADMIN2
enable = cleartext t2
login = cleartext t2
}
group = NETADMIN2 {
default service = permit
service = exec {
priv-lvl = 1
}
}
aaa authentication login default group tacacs+ local
No aaa authentication enable default group tacacs+ enable
aaa authorization exec default group tacacs+ local
aaa authorization commands 0 default group tacacs+ local
aaa authorization commands 1 default group tacacs+ local
aaa authorization commands 15 default group tacacs+ local
###############################################################
Authorization with command list
-----------------------------------------------------
user = t3 {
member = NETADMIN3
enable = cleartext t3
login = cleartext t3
}
group = NADMIN3 {
service = exec {
priv-lvl = 1
}
cmd = enable {
permit .*
}
cmd = show {
permit .*
}
cmd = exit {
permit .*
}
}
OR
cmd = show {
Permit interface
Deny .*
}
################################################################
Authentication+ authorization + accounting
My Config
--------------------------
aaa new-model
aaa authentication login default group tacacs+ local
aaa authorization exec default group tacacs+ local
aaa authorization commands 0 default group tacacs+ local
aaa authorization commands 1 default group tacacs+ local
aaa authorization commands 15 default group tacacs+ local
aaa accounting exec default start-stop group tacacs+
aaa accounting commands 0 default start-stop group tacacs+
aaa accounting commands 1 default start-stop group tacacs+
aaa accounting commands 15 default start-stop group tacacs+