January 11, 201313 yr Here is a config for RADIUS AAA authentication !!! IOS !!!aaa new-modelaaa authentication login default group radius localaaa authorization exec default group radius localaaa accounting network default start-stop group radiusaaa accounting exec default start-stop group radiususername netadm1n privilege 15 secret teleco0mmradius-server host 10.43.208.11radius-server key DPSWy1qpokXT Router# debug radius
January 14, 201313 yr Moderators Our goal is to figure out how to utilize the Cisco ACS 5.3 as our RADIUS server to point our devices to which will use Active Directory Group membership to assign a role (ACS-ReadOnly, ACS-ReadWrite)Devices we will need to configure to point to the Cisco ACS/RADIUS/AD include :• Switch running IOS• Switch running NX-OS• Wireless Lan Controller (WLC)• Wireless Access Point (WAP)• Cisco CPTIf I could configure one of each to use RADIUS in the Cisco ACS 5.3 box with Active Directory then I would be set. I just need that example and I am unable to find anything online to help me solve this.Now Cisco ACS 5.3 – TACACS – Active Directory works great for the Cisco hardware running IOS. That has been tested and verified but I heard that issues with running TACACS on NX-OS and CPT.Any help is most appreciated. My GNS lab on my Mac is limited and I can’t seem to virtualize nothing besides just IOS.
January 15, 201313 yr Author Here are some configurations you can use !! ----- NX-OS RADIUS ConfigFeature TACACStacacs-server key 7 ""tacacs-server host 10.43.208.11tacacs-server host 10.47.208.11aaa group server tacacs+ tacacs server 10.43.208.11 server 10.47.208.11 use-vrf core (change out with the value of the VRF that has IP reachability to ACS Server)aaa accounting default group tacacsAAA authentication login default group Radiusno aaa user default-role (this defines if we have a default role for TACACS users with non-defined roles in ACS)tacacs-server directed-request Below is the RADIUS configuration for IOS
January 20, 201511 yr PRODUCTION logging buffered 20480 debugginglogging console informationallogging monitor informationalenable secret 5 $1$MBrN$ottZrqMPOB3jZEo0QFEQA0!aaa new-modelaaa authentication attempts login 6aaa authentication login default group tacacs+ lineaaa authentication enable default group tacacs+ enableaaa accounting exec default stop-only group tacacs+aaa accounting commands 15 default stop-only group tacacs+aaa accounting network default stop-only group tacacs+!aaa session-id commontacacs-server host 10.59.245.27tacacs-server host 10.59.245.28tacacs-server attempts 6tacacs-server directed-requesttacacs-server key 7 03075A1F120E2840banner motd _********************************************************************Use of this system is restricted to authorized users. User activityis monitored and recorded by system personnel. Anyone using thissystem expressly consents to such monitoring and recording. BEADVISED: if possible criminal activity is detected, system records,along with certain personal information, may be provided to lawenforcement officials. (Rev hosangit2.55) ********************************************************************_privilege exec level 1 tracerouteprivilege exec level 1 pingprivilege exec level 1 show configurationprivilege exec level 1 terminal monitorprivilege exec level 1 terminalprivilege exec level 1 dir! LAB !aaa new-modelaaa authentication attempts login 6aaa authentication login default group tacacs+ lineaaa authentication enable default group tacacs+ enableaaa accounting exec default stop-only group tacacs+aaa accounting commands 15 default stop-only group tacacs+aaa accounting network default stop-only group tacacs+!aaa session-id commontacacs-server host 10.6.56.244tacacs-server key 0 bl@hbl@hwh@t3v3r!privilege exec level 1 tracerouteprivilege exec level 1 pingprivilege exec level 1 show configurationprivilege exec level 1 terminal monitorprivilege exec level 1 terminalprivilege exec level 1 dir!tacacs-server notify enableenable use-tacacs GENERIC aaa new-modelaaa authentication login default group tacacs+ localtacacs-server host 10.6.56.244tacacs-server key 0 bl@hbl@hwh@t3v3renable use-tacacsreload in 20reload cancelshow reload LAB RADIUS aaa new-modelaaa authentication login default group radius localaaa authentication login localauth localaaa authentication ppp default if-needed group radius localaaa authorization exec default group radius localaaa authorization network default group radius localaaa accounting delay-startaaa accounting exec default start-stop group radiusaaa accounting network default start-stop group radiusaaa processes 6radius-server host 10.6.56.244 auth-port 1812 acct-port 1813 key Cis$koconf tradius-server host 10.6.56.244radius-server key Cis$koradius-server auth-port 1812aaa authentication login default group radiusaaa new-modelradius-server host 10.6.56.244 auth-port 1812 acct-port 1813 key Cis$koaaa authentication login default group radius localaaa authorization exec default group radius localaaa accounting exec default start-stop group radiusaaa accounting system default start-stop group radius
Create an account or sign in to comment