68-IOS+Switch+TACACS
68-IOS+Switch+TACACS
Choose Administration > Identity Management > External Identity Sources > Active Directory.
Click the Groups Tab. Click on Add and then Select Groups from Directory.
Configure TACACS authentication Settings put Shared Secret Key in this case Test123
For example, we have created IOS_Admin which allows all commands. Check the box under
Commands ‘Permit any command that is not listed below’ and don’t add any command.
Create Authentication Policy and use internal or external users in our case both.
SW2(config)#aaa new-model
SW2(config)#tacacs server ISE
SW2(config-server-tacacs)#address ipv4 192.168.100.210
SW2(config-server-tacacs)#key Test123
SW2(config)#aaa authentication login default group tacacs+ local
SW2(config)#aaa authentication enable default group tacacs+ enable
SW2(config)#aaa authorization exec default group tacacs+ local
SW2(config)#aaa authorization commands 0 default group tacacs+ local
SW2(config)#aaa authorization commands 1 default group tacacs+ local
SW2(config)#aaa authorization commands 15 default group tacacs+ local
SW2(config)#aaa authorization config-commands
SW2(config)#aaa accounting exec default start-stop group tacacs+
SW2(config)#aaa accounting commands 0 default start-stop group tacacs+
SW2(config)#aaa accounting commands 1 default start-stop group tacacs+
SW2(config)#aaa accounting commands 15 default start-stop group tacacs+
SW2(config)#aaa accounting connection default start-stop group tacacs+
SW2(config)#line vty 0 4
SW2(config-line)#authorization commands 0 default
SW2(config-line)#authorization commands 1 default
SW2(config-line)#authorization commands 15 default
SW2(config-line)#authorization exec default
SW2(config-line)#login authentication default
SW2(config-line)#accounting exec default
SW2(config-line)#accounting commands 0 default
SW2(config-line)#accounting commands 1 default
SW2(config-line)#accounting commands 15 default
SW2(config-line)#accounting connection default
We can monitor the authentication/authorization logs on ISE Operations > TACACS > Live Logs.
The ad1 user was successfully authenticated and authorized to run privileged commands.
We can monitor the authentication/authorization logs on ISE Operations > TACACS > Live Logs.