[c-nsp] another tac_plus question regarding PIX firewalls
Ziv Leyes
zivl at gilat.net
Tue Apr 6 02:25:37 EDT 2010
In order to make those PIX work flawlessly with TACACS+ I've found that upgrading both pdm to 3.0(4) and image to 6.3(5) helped solving a few problems.
-----Original Message-----
From: cisco-nsp-bounces at puck.nether.net [mailto:cisco-nsp-bounces at puck.nether.net] On Behalf Of Erik Witkop
Sent: Tuesday, April 06, 2010 4:38 AM
To: cisco-nsp at puck.nether.net
Subject: [c-nsp] another tac_plus question regarding PIX firewalls
So I am trying to setup AAA on some PIX firewalls and some ASA firewalls.
On my ASA firewalls running 8.x, the AAA with tacacs+ works great. Here
is my ASA config:
aaa-server TACACS+ protocol tacacs+
aaa-server TACACS+ (outside) host 216.x.x.x
aaa authentication ssh console TACACS+ LOCAL
aaa authentication enable console TACACS+ LOCAL
aaa authorization command TACACS+ LOCAL
aaa accounting command TACACS+
aaa accounting enable console TACACS+
aaa accounting ssh console TACACS+
aaa authorization exec authentication-server
The above all works great.
But here is my config on my 515 PIX running 6.3(3):
test-AAA-pix(config)# sho run | inc aaa
aaa-server TACACS+ protocol tacacs+
aaa-server TACACS+ (outside) host 216.x.x.x timeout 10
aaa-server LOCAL protocol local
aaa authentication ssh console TACACS+
aaa authentication enable console TACACS+ <-- this line is the
problem. But why?
(I can't turn on authorization until I get the line above working)
SSH authentication works fine. But when I type 'enable' and then the
enable password, the tac_plus server is sending back a FAIL message. Yet
the same firewall commands and tac_plus configs work fine on the ASA. Why?
Here is the debug:
202: Tacacs packet sent
203: Sending TACACS Start message. Session id: 1590929404l, seq no:1
204: Recevied TACACS packet. Session id:4238857054l seq no:2
205: tacp_procpkt_authen: GETPASS
206: Authen Message: Password:
207: mk_pkt - type: 0x1, session_id: 208: mkpkt_continue -
response:(this is the enable password on the firewall. I removed it from
the debug)
209: Tacacs packet sent
210: Sending TACACS Start message. Session id: 1590929404l, seq no:2
211: Recevied TACACS packet. Session id:4238857054l seq no:4
212: tacp_procpkt_authen: FAIL
213: TACACS Session finished. Session id: 1590929404l, seq no: 4
tac_plus logs show nothing.
_______________________________________________
cisco-nsp mailing list cisco-nsp at puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/
************************************************************************************
This footnote confirms that this email message has been scanned by
PineApp Mail-SeCure for the presence of malicious code, vandals & computer viruses.
************************************************************************************
************************************************************************************
This footnote confirms that this email message has been scanned by
PineApp Mail-SeCure for the presence of malicious code, vandals & computer viruses.
************************************************************************************
More information about the cisco-nsp
mailing list