[c-nsp] Tacacs and console oob access % Authorization failed.

George Hong georgehong21 at gmail.com
Tue Jun 4 17:38:52 EDT 2013


Hi Cisco Gurus,

Quick question my Cisco foo is a bit dusty.  I'm configuring a new switch
and I'm setting it up with Tacacs.
I'm configuring it using the console and the switch is not yet connected to
the network. After applying the tacacs config it says
% Authorization failed when I type "show run" or "conf t"

My tacacs config should fall back to local authorization but that doesn't
seem to work.
Below the relevant config. Any ideas what might be going on (what am I
doing wrong)?

Remember that no network cables have been plugged in (all interfaces are
down) and I'm configuring using console. I'm expecting to be able to
configure the switch when it has no network connectivity (via out of band /
console).


This is the tacacs config I'm applying:

aaa new-model
!
aaa authentication login default group tacacs+ local
aaa authentication login CONSOLE group tacacs+ local
aaa authentication enable default group tacacs+ enable
aaa authorization exec default group tacacs+ local
aaa authorization commands 0 default group tacacs+ local
aaa authorization commands 4 default group tacacs+ local
aaa authorization commands 15 default group tacacs+ local
!

aaa session-id common


tacacs-server key key 7 <removed this >
tacacs-server host x.x.x.x timeout 2

tacacs-server directed-request

line con 0
 session-timeout 60
 exec-timeout 60 0
 login authentication CONSOLE
line vty 0 4
 session-timeout 60
 access-class 22 in
 exec-timeout 60 9
 history size 256
 transport input ssh
line vty 5 15
 session-timeout 60
 access-class 22 in
 exec-timeout 60 9
 history size 256
 transport input ssh

After applying:

sw1.chi#sh run
% Authorization failed.

sw1.chi#conf t
% Authorization failed.

sw1.chi#


Below the complete relevant  config

!
hostname sw1.xxx
!
username xxxx secret 5xxxx
aaa new-model
!
aaa authentication login default group tacacs+ local
aaa authentication login CONSOLE group tacacs+ local
aaa authentication enable default group tacacs+ enable
aaa authorization exec default group tacacs+ local
aaa authorization commands 0 default group tacacs+ local
aaa authorization commands 4 default group tacacs+ local
aaa authorization commands 15 default group tacacs+ local
!
aaa session-id common
system mtu routing 1500
ip subnet-zero
!
ip domain-name xxxx
!
!
crypto key generate rsa
ip ssh version 2
!
interface FastEthernet1/0/1

!
interface FastEthernet1/0/2
!
interface FastEthernet1/0/3
 description span.xxx:ipmi
 switchport access vlan 10
 switchport mode access
 spanning-tree portfast
!
!
interface Gi1/0/3
 description Trunk to rtr1.
 switchport trunk allowed vlan 10
 switchport mode trunk
 switchport nonegotiate
!
!
interface Vlan1
 no ip address
 no ip route-cache
!
interface Vlan10
 ip address x.x.x.x 255.255.255.0
 no ip route-cache
!
ip default-gateway y.y.y.y
no ip http server
no ip http secure-server
logging trap notifications
logging source-interface Vlan10
logging x.x.x.x
access-list 22 remark SSH access list
access-list 22 permit x.x.x.x 0.0.0.255
access-list 22 deny   any log

snmp-server community xxxx RO
snmp-server location xx
snmp-server contact noxc at xxx.com

tacacs-server host x.x.x.x
tacacs-server timeout 2
tacacs-server directed-request
tacacs-server key key 7 <removed this >
!
control-plane
!
!
line con 0
 session-timeout 60
 exec-timeout 60 0
 login authentication CONSOLE
line vty 0 4
 session-timeout 60
 access-class 22 in
 exec-timeout 60 9
 history size 256
 transport input ssh
line vty 5 15
 session-timeout 60
 access-class 22 in
 exec-timeout 60 9
 history size 256
 transport input ssh
!
ntp server x.x.x.x
end


Any ideas?

Thanks George!


More information about the cisco-nsp mailing list