Two aaa-server TACACS+ in PIX 525

I have a PIX 525 with two aaa-server for TACACS+; My aaa comands are configured by default.
I understand that my aaa-server TACACS+max-failed-attempts "number" have a "3" times to declare my aaa-server unresponsive and move on to try the next server in the list.
Once it happens, how long does the aaa requests are send to the secundary aaa-server?
Can somebody of you can help me? I want to keep my first aaa-server as primary and just in case of failure use the second aaa-server.
Thanks a lot.

The timeout interval also has to be configured for the request. This is the time after which the PIX Firewall gives up on the request to the primary AAA server. If there is a standby AAA server, the PIX Firewall will send the request to the backup server. The retransmit timeout is currently set to 10 seconds and is not user configurable.

Similar Messages

  • PIX 525 aaa authentication with both tacacs and local

    Hi,
    I have configured the aaa authentication for the PIX with tacacs protocol (ACS Server).
    It works fine, now i would like to add the back up authentication, as follows:
    - If the ACS goes down i can to be authenticated with the local database.
    Is it possible with PIX, if yes how?

    Hi,
    I am trying to configure aaa using TACACS+ , i am not able to close.Problems are
    1.It dosent ask for username /password in first level.
    2.on second level it asks for user name it dosent authenticate the user .
    Cud u pls let me know if the following config is correct.If not cud u help me .
    aaa-server TACACS+ protocol tacacs+
    aaa-server TACACS+ (outside) host ip.ip.ip.ip key timeout 15
    aaa-server RADIUS protocol radius
    aaa-server LOCAL protocol local
    aaa authentication include tcp/0 inside 0.0.0.0 0.0.0.0 0.0.0.0 0.0.0.0 TACACS+
    aaa authentication include tcp/0 outside 0.0.0.0 0.0.0.0 0.0.0.0 0.0.0.0 TACACS+
    aaa authen enable console TACACS+

  • PIX AAA To tacacs server not reliable

    I've got a couple of different platforms of PIX, 535s and FWSMs mainly all running the latest code. I have them all configured similarly with regards to AAA via tacacs:
    aaa-server TACACS protocol tacacs+
    aaa-server TACACS host <Removed> key <removed>
    username <removed> password <removed> encrypted privilege 15
    aaa authentication enable console TACACS LOCAL
    aaa authentication ssh console TACACS LOCAL
    aaa authentication telnet console TACACS LOCAL
    aaa accounting command TACACS
    Now, sometimes I can get in with my tacacs account but other times I have to use the local backup account. There seems to be no reason behind it. My routers all pointing to the same TACACS server have no issues like this. The PIX's however are totally unreliable in this regard.
    Anyone experiencing this?

    Hello mlipsey,
    This shouldn't be. Do the ACS logs reveal anything? What about
    debug tacacs
    debug aaa authentication
    Can you send 1000 pings to the tacacs server from your FWs without issue? Any packet loss?
    Hope this helps! If so, please rate.
    Thanks!

  • Aaa authorization commands for pix 535

    Hi ,
    Can you provide aaa authorization commands for pix 535
    Sanjay Nalawade.

    Hi,
    Please find the AAA config for PIX.
    aaa-server TACACS+ protocol tacacs+
    max-failed-attempts 5
    aaa-server TACACS+ (ExranetFW-In) host
    timeout 5
    key ********
    aaa authentication enable console TACACS+ LOCAL
    aaa authentication serial console TACACS+ LOCAL
    aaa authentication http console TACACS+ LOCAL
    aaa authentication ssh console TACACS+ LOCAL
    aaa authorization command LOCAL
    aaa accounting command privilege 15 TACACS+
    aaa authorization exec authentication-server
    Karuppuchamy

  • Prime 1.4 - no aaa authentication tacacs+ server

    Anybody know the equivalent command "no aaa authentication tacacs+ server" on PI 1.4. I saw this command on PI 2.2 but I can´t find something similar on 1.4.
    Thanks in advanced.

    Check the following Command line manual for PI 1.4
    http://www.cisco.com/c/en/us/td/docs/wireless/prime_infrastructure/1-4/command/reference/cli14.html
    Apart from that I found this ,let me know if it helps.
    Select a command
        Add TACACS+ Server—See the “Add TACACS+ Server” section.
        Delete TACACS+ Server—Select a server or servers to be deleted, select this command, and click Go to delete the server(s) from the database.
    Add TACACS+ Server
    Choose Administration > AAA > TACACS+ from the left sidebar menu to access this page. From the Select a command drop-down list choose Add TACACS+ Server , and click Go to access this page.
    This page allows you to add a new TACACS+ server to Prime Infrastructure.
        Server Address—IP address of the TACACS+ server being added.
        Port—Controller port.
        Shared Secret Format—ASCII or Hex.
        Shared Secret—The shared secret that acts as a password to log in to the TACACS+ server.
        Confirm Shared Secret—Reenter TACACS+ server shared secret.
        Retransmit Timeout—Specify retransmission timeout value for a TACACS+ authentication request.
        Retries—Number of retries allowed for authentication request. You can specify a value between 1 and 9.
        Authentication Type—Two authentication protocols are provided. Password Authentication Protocol (PAP) and Challenge Handshake Authentication Protocol (CHAP).
    Command Buttons
        Submit
        Cancel
    Note • Enable the TACACS+ server with the AAA Mode Settings. See the “Configuring AAA Mode” section.
        You can add only three servers at a time in Prime Infrastructure.

  • How to use 2 AAA server for different login purpose

    Hello, could you help me?
    This is a part of my configuration; I would like to add another TACACS server, witch should take care of the telnet at vty 0 4.
    The Tacacs server 10.20.30.40 takes care of the virtual access, and I have another Tacacs server who takes care of login on our network equipment.
    ! Cisco 7204 with system flash c7200-io3s56i-mz.121-4.bin
    aaa new-model
    aaa authentication login default group tacacs+
    aaa authentication login no_tacacs enable
    aaa authentication ppp default group tacacs+
    aaa authorization exec default group tacacs+
    aaa authorization network default group tacacs+
    aaa accounting exec default start-stop group tacacs+
    aaa accounting network default start-stop group tacacs+
    aaa accounting connection default start-stop group tacacs+
    virtual-profile virtual-template 1
    virtual-profile aaa
    interface Serial2/0:15
    description ISDN30
    no ip address
    encapsulation ppp
    no ip route-cache
    no keepalive
    dialer pool-member 10
    isdn switch-type primary-net5
    isdn tei-negotiation first-call
    isdn caller xxxxxxx
    no fair-queue
    compress stac
    no cdp enable
    ppp authentication chap
    ppp multilink
    interface Virtual-Template1
    ip unnumbered FastEthernet1/0
    ip nat outside
    ppp authentication chap
    tacacs-server host 10.20.30.40 key ********
    line con 0
    exec-timeout 20 0
    password ************
    login authentication no_tacacs
    transport input none
    flowcontrol hardware
    line aux 0
    line vty 0 4
    access-class 1 in
    exec-timeout 60 0
    password *************
    login authentication no_tacacs
    transport input telnet
    transport output telnet
    If I just add
    aaa authentication login vtymethod group tacacs+ enable
    tacacs-server host 10.50.60.70 key ********
    line vty 0 4
    login authentication vtymethod
    My telnet request ask 10.20.30.40 and I have a deny! Could you help to make a secure solution?
    Thanks

    Jens
    I believe that your solution would be to configure a different tacacs server group with the new server in the new group and to use the new group to authenticate for your vty. The config might look something like this:
    aaa group server tacacs+ vty_TAC
    server 10.50.60.70
    aaa authentication login vtymethod group vty_TAC enable
    tacacs-server host 10.50.60.70 key ********
    I have configured this type of thing and it worked well. When I configured it I explicitly configured (and named) two different TACACS server groups and referenced specific server groups for each authentication method. I am not clear whether it works to keep the default group tacacs+ and use it for your normal authentication or whether you may need to configure a non-default group for it.
    Give it a try and let us know what happens.
    HTH
    Rick

  • AAA server logs replication

    •1.       We have two locations and require Cisco ACS 5.x for each location.
    •2.       Both locations are connected via MPLS link.
    •3.       Need to deploy both ACS in Active-Active OR Active-Standby.
    •4.       The idea is that users in network A will have their primary ACS as ACS A and secondary ACS as ACS B.
    •5.       Similarly users in network B will have its primary ACS as ACS B local to their LAN.
    If ACS in network A goes down, then users in network A should be able to authenticate using ACS B in remote network and vice versa.
    •6.       Now what we got to understand by reading ACS documents is that incase one of ACS goes down, the accounting logs do not get replicated to secondary ACS and vice versa.
    •7.       I would like to have a kind of setup where in  Accounting logs are also replicated between ACS servers. The idea is that, I should have complete logs of both the servers up to the time till one of the ACS breaks down.
    Kindly let me know if the accounting logs can be replicated in the manner as mentioned above.
    Also let me know the typical bandwidth utilized during replication of ACS A to ACS B.
    We have around 500 users combining both sides.
    Our proposal is dependent upon working of the above solution…kindly see if ACS5.x will work in the above scenario as we need to propose the same.

    I hope I get your question correctly. The AAA group tag is local to the AAA Client and has nothing to do with the AAA Server (e.g. ACS). It is meant to group more than one TACACS/RADIUS server.
    Proxy Distribution Table is used when you have Multiple ACS servers and you want to route incoming AAA requests to particular server(s) based on pre-defined criteria. Like user1@NY should be redirected to the NewYork ACS.
    Regards
    Farrukh

  • Two ACS Server failover

    hi all,
    we have a asa firewall,and we want to authentication login user by ACS server ,
    in order to eliminate single failure,we build two ACS server and make one as backup,we also use two protocol tacacs+ and RADIUS.
    I just want to know how long will take,if the active ACS server failed and the login is authenticated by standby ACS.
    I have no idea about any "keyword" to search,so please kindly help me,or could you provide a Doc , I will learn it by myself.
    think you very much.

    Generally in failover scenarios we create AAA server group on ASA. The security appliance contacts the first server in the group. If that server is unavailable, the security appliance contacts the next server in the group, if configured. If all servers in the group are unavailable, the security appliance tries the local database if you configured it as a fallback method (management authentication and authorization only). If you do not have a fallback method, the security appliance continues to try the AAA servers.
    To create a server group and add AAA servers to it, follow these steps:
    Step 1 For each AAA server group you need to create, follow these steps:
    a.] Identify the server group name and the protocol. To do so, enter the following command:
    hostname(config)# aaa-server server_group protocol radius
    For example, to use RADIUS to authenticate network access and TACACS+ to authenticate CLI access, you need to create at least two server groups, one for RADIUS servers and one for TACACS+ servers.
    You can have up to 15 single-mode server groups or 4 multi-mode server groups. Each server group can have up to 16 servers in single mode or up to 4 servers in multi-mode.
    When you enter a aaa-server protocol command, you enter group mode.
    b.] If you want to specify the maximum number of requests sent to a AAA server in the group before trying the next server, enter the following command:
    hostname(config-aaa-server-group)# max-failed-attempts number
    The number can be between 1 and 5. The default is 3.
    Also, the default timed out for a server is 5 seconds so if the first server in the group is not responding the ASA will take 5 seconds * 3 attempts = 15 seconds before it tries second server in the group.
    If all the servers in the group fail to respond, then the group is considered to be unresponsive, and the fallback method is tried that could be LOCAL database as well. The server group remains marked as unresponsive for a period of 10 minutes (by default) so that additional AAA requests within that period do not attempt to contact the server group, and the fallback method is used immediately. To change the unresponsive period from the default, see the reactivation-mode command in the following step.
    If you do not have a fallback method, the security appliance continues to retry the servers in the group.
    c.]  If you want to specify the method (reactivation policy) by which failed servers in a group are reactivated, enter the following command:
    hostname(config-aaa-server-group)# # reactivation-mode {depletion [deadtime minutes] | timed}
    Where the depletion keyword reactivates failed servers only after all of the servers in the group are inactive.
    The deadtime minutes argument specifies the amount of time in minutes, between 0 and 1440, that elapses between the disabling of the last server in the group and the subsequent re-enabling of all servers. The default is 10 minutes.
    The timed keyword reactivates failed servers after 30 seconds of down time.
    Hope this helps.
    Regards,
    Jatin
    Do rate helpful posts-

  • Acs 4.2 :- router# test aaa group tacacs+ uid pwd .... works but not when authenticating

    I have setup ACS 4.2 and when I run
    router# test aaa group tacacs+ myuser mypasswd [ legacy | new-code]
                   Both options work fine
    But when I try and login, over telnet, the request reaches the aaa server, but returns fail !
    My commands are :-
    tacacs-server host xx.xx.xx.xx single-connection port 49
    tacacs-server key xxxxxxxxxxx
    aaa authentication banner ^CUnauthorized access forbidden^C
    aaa authentication username-prompt "Enter Username: "
    aaa authentication login default group tacacs+ local
    aaa authorization exec default group tacacs+ local
    I dont see the banner NOR the "Enter Username:" prompt.
    Also a debug aaa authentication and debug aaa subsys show that the request reaches AAA, but it simply returns fail
    I had the same issue in 5.1, but that was due to the tacacs+ single-connection not being set or something similar, and the error
    there was "shared secret does not match", on the AAA server logs
    I am still new to 4.2, so am still trying to determine where the log files are etc, but since it works with the test command, I cant
    seem to understand why it fails with telnet
    Any idea why this may be happning ?
    Thanks

    I tried both the sugestion.. no luck
    Below are th eoutput of debug, with some lines in BOLD to help you
    find interesting lines in the log output.
    Thanks
    fixeddemo#sh run | inc tacacs
    aaa authentication login default group tacacs+ local
    aaa authorization exec default group tacacs+ local
    ip tacacs source-interface FastEthernet0/1
    tacacs-server host 10.1.7.15
    tacacs-server key xxxxxxxxxx
    fixeddemo#sh debugging
    General OS:
      TACACS+ events debugging is on
      TACACS+ authentication debugging is on
      TACACS+ packets debugging is on
      AAA Authentication debugging is on
      AAA Subsystem debugs debugging is on
    fixeddemo#
    Jun 17 14:15:54.666: AAA/BIND(00000072): Bind i/f
    Jun 17 14:15:54.666: AAA/AUTHEN/LOGIN (00000072): Pick method list 'default'
    Jun 17 14:15:54.666: AAA SRV(00000072): process authen req
    Jun 17 14:15:54.670: AAA SRV(00000072): Authen method=SERVER_GROUP tacacs+
    Jun 17 14:15:54.670: TPLUS: Queuing AAA Authentication request 114 for processin
    g
    Jun 17 14:15:54.670: TPLUS: processing authentication start request id 114
    Jun 17 14:15:54.670: TPLUS: Authentication start packet created for 114()
    Jun 17 14:15:54.670: TPLUS: Using server 10.1.7.15
    Jun 17 14:15:54.670: TPLUS(00000072)/0/NB_WAIT/45585278: Started 5 sec timeout
    Jun 17 14:15:54.674: TPLUS(00000072)/0/NB_WAIT: socket event 2
    Jun 17 14:15:54.674: T+: Version 192 (0xC0), type 1, seq 1, encryption 1
    Jun 17 14:15:54.674: T+: session_id 3123693045 (0xBA2FC5F5), dlen 24 (0x18)
    Jun 17 14:15:54.674: T+: type:AUTHEN/START, priv_lvl:1 action:LOGIN ascii
    Jun 17 14:15:54.674: T+: svc:LOGIN user_len:0 port_len:6 (0x6) raddr_len:10 (0xA
    ) data_len:0
    Jun 17 14:15:54.674: T+: user:
    Jun 17 14:15:54.674: T+: port:  tty515
    Jun 17 14:15:54.674: T+: rem_addr:  10.1.1.216
    Jun 17 14:15:54.674: T+: data:
    Jun 17 14:15:54.674: T+: End Packet
    Jun 17 14:15:54.674: TPLUS(00000072)/0/NB_WAIT: wrote entire 36 bytes request
    Jun 17 14:15:54.674: TPLUS(00000072)/0/READ: socket event 1
    Jun 17 14:15:54.674: TPLUS(00000072)/0/READ: Would block while reading
    Jun 17 14:15:54.674: TPLUS(00000072)/0/READ: socket event 1
    Jun 17 14:15:54.674: TPLUS(00000072)/0/READ: read entire 12 header bytes (expect
    16 bytes data)
    Jun 17 14:15:54.674: TPLUS(00000072)/0/READ: socket event 1
    Jun 17 14:15:54.674: TPLUS(00000072)/0/READ: read entire 28 bytes response
    Jun 17 14:15:54.674: T+: Version 192 (0xC0), type 1, seq 2, encryption 1
    Jun 17 14:15:54.674: T+: session_id 3123693045 (0xBA2FC5F5), dlen 16 (0x10)
    Jun 17 14:15:54.674: T+: AUTHEN/REPLY status:4 flags:0x0 msg_len:10, data_len:0
    fixeddemo#
    Jun 17 14:15:54.674: T+: msg:  Username:
    Jun 17 14:15:54.674: T+: data:
    Jun 17 14:15:54.678: T+: End Packet
    Jun 17 14:15:54.678: TPLUS(00000072)/0/45585278: Processing the reply packet
    Jun 17 14:15:54.678: TPLUS: Received authen response status GET_USER (7)
    Jun 17 14:15:54.678: AAA SRV(00000072): protocol reply GET_USER for Authenticati
    on
    Jun 17 14:15:54.678: AAA SRV(00000072): Return Authentication status=GET_USER
    fixeddemo#
    Jun 17 14:15:58.794: AAA SRV(00000072): process authen req
    Jun 17 14:15:58.794: AAA SRV(00000072): Authen method=SERVER_GROUP tacacs+
    Jun 17 14:15:58.794: TPLUS: Queuing AAA Authentication request 114 for processin
    g
    Jun 17 14:15:58.794: TPLUS: processing authentication continue request id 114
    Jun 17 14:15:58.794: TPLUS: Authentication continue packet generated for 114
    Jun 17 14:15:58.794: TPLUS(00000072)/0/WRITE/47194394: Started 5 sec timeout
    Jun 17 14:15:58.794: T+: Version 192 (0xC0), type 1, seq 3, encryption 1
    Jun 17 14:15:58.794: T+: session_id 3123693045 (0xBA2FC5F5), dlen 10 (0xA)
    Jun 17 14:15:58.794: T+: AUTHEN/CONT msg_len:5 (0x5), data_len:0 (0x0) flags:0x0
    Jun 17 14:15:58.794: T+: User msg:
    Jun 17 14:15:58.794: T+: User data:
    Jun 17 14:15:58.794: T+: End Packet
    Jun 17 14:15:58.794: TPLUS(00000072)/0/WRITE: wrote entire 22 bytes request
    Jun 17 14:15:58.798: TPLUS(00000072)/0/READ: socket event 1
    Jun 17 14:15:58.798: TPLUS(00000072)/0/READ: read entire 12 header bytes (expect
    16 bytes data)
    Jun 17 14:15:58.798: TPLUS(00000072)/0/READ: socket event 1
    Jun 17 14:15:58.798: TPLUS(00000072)/0/READ: read entire 28 bytes response
    Jun 17 14:15:58.798: T+: Version 192 (0xC0), type 1, seq 4, encryption 1
    Jun 17 14:15:58.798: T+: session_id 3123693045 (0xBA2FC5F5), dlen 16 (0x10)
    fixeddemo#
    Jun 17 14:15:58.798: T+: AUTHEN/REPLY status:5 flags:0x1 msg_len:10, data_len:0
    Jun 17 14:15:58.798: T+: msg:  Password:
    Jun 17 14:15:58.798: T+: data:
    Jun 17 14:15:58.798: T+: End Packet
    Jun 17 14:15:58.798: TPLUS(00000072)/0/47194394: Processing the reply packet
    Jun 17 14:15:58.798: TPLUS: Received authen response status GET_PASSWORD (8)
    Jun 17 14:15:58.798: AAA SRV(00000072): protocol reply GET_PASSWORD for Authenti
    cation
    Jun 17 14:15:58.798: AAA SRV(00000072): Return Authentication status=GET_PASSWOR
    D
    fixeddemo#
    Jun 17 14:16:02.502: AAA SRV(00000072): process authen req
    Jun 17 14:16:02.502: AAA SRV(00000072): Authen method=SERVER_GROUP tacacs+
    Jun 17 14:16:02.502: TPLUS: Queuing AAA Authentication request 114 for processin
    g
    Jun 17 14:16:02.502: TPLUS: processing authentication continue request id 114
    Jun 17 14:16:02.502: TPLUS: Authentication continue packet generated for 114
    Jun 17 14:16:02.502: TPLUS(00000072)/0/WRITE/47194394: Started 5 sec timeout
    Jun 17 14:16:02.502: T+: Version 192 (0xC0), type 1, seq 5, encryption 1
    Jun 17 14:16:02.502: T+: session_id 3123693045 (0xBA2FC5F5), dlen 14 (0xE)
    Jun 17 14:16:02.502: T+: AUTHEN/CONT msg_len:9 (0x9), data_len:0 (0x0) flags:0x0
    Jun 17 14:16:02.502: T+: User msg:
    Jun 17 14:16:02.502: T+: User data:
    Jun 17 14:16:02.502: T+: End Packet
    Jun 17 14:16:02.506: TPLUS(00000072)/0/WRITE: wrote entire 26 bytes request
    Jun 17 14:16:02.550: TPLUS(00000072)/0/READ: socket event 1
    Jun 17 14:16:02.550: TPLUS(00000072)/0/READ: read entire 12 header bytes (expect
    6 bytes data)
    Jun 17 14:16:02.550: TPLUS(00000072)/0/READ: socket event 1
    Jun 17 14:16:02.550: TPLUS(00000072)/0/READ: read entire 18 bytes response
    Jun 17 14:16:02.550: T+: Version 192 (0xC0), type 1, seq 6, encryption 1
    Jun 17 14:16:02.554: T+: session_id 3123693045 (0xBA2FC5F5), dlen 6 (0x6)
    fixeddemo#
    Jun 17 14:16:02.554: T+: AUTHEN/REPLY status:2 flags:0x0 msg_len:0, data_len:0
    Jun 17 14:16:02.554: T+: msg:
    Jun 17 14:16:02.554: T+: data:
    Jun 17 14:16:02.554: T+: End Packet
    Jun 17 14:16:02.554: TPLUS(00000072)/0/47194394: Processing the reply packet
    Jun 17 14:16:02.554: TPLUS: Received authen response status FAIL (3)
    Jun 17 14:16:02.554: AAA SRV(00000072): protocol reply FAIL for Authentication
    Jun 17 14:16:02.554: AAA SRV(00000072): Return Authentication status=FAIL
    fixeddemo#
    [ The output below is for the next Username: prompt I believe]Jun 17 14:16:04.554: AAA/AUTHEN/LOGIN (00000072): Pick method list 'default'
    Jun 17 14:16:04.554: AAA SRV(00000072): process authen req
    Jun 17 14:16:04.554: AAA SRV(00000072): Authen method=SERVER_GROUP tacacs+
    Jun 17 14:16:04.554: TPLUS: Queuing AAA Authentication request 114 for processin
    g
    Jun 17 14:16:04.554: TPLUS: processing authentication start request id 114
    Jun 17 14:16:04.554: TPLUS: Authentication start packet created for 114()
    Jun 17 14:16:04.554: TPLUS: Using server 10.1.7.15
    Jun 17 14:16:04.554: TPLUS(00000072)/0/NB_WAIT/47194394: Started 5 sec timeout
    Jun 17 14:16:04.558: TPLUS(00000072)/0/NB_WAIT: socket event 2
    Jun 17 14:16:04.558: T+: Version 192 (0xC0), type 1, seq 1, encryption 1
    Jun 17 14:16:04.558: T+: session_id 2365877689 (0x8D046DB9), dlen 24 (0x18)
    Jun 17 14:16:04.558: T+: type:AUTHEN/START, priv_lvl:1 action:LOGIN ascii
    Jun 17 14:16:04.558: T+: svc:LOGIN user_len:0 port_len:6 (0x6) raddr_len:10 (0xA
    ) data_len:0
    Jun 17 14:16:04.558: T+: user:
    Jun 17 14:16:04.558: T+: port:  tty515
    Jun 17 14:16:04.558: T+: rem_addr:  10.1.1.216
    Jun 17 14:16:04.558: T+: data:
    Jun 17 14:16:04.558: T+: End Packet
    Jun 17 14:16:04.558: TPLUS(00000072)/0/NB_WAIT: wrote entire 36 bytes request
    Jun 17 14:16:04.558: TPLUS(00000072)/0/READ: socket event 1
    Jun 17 14:16:04.558: TPLUS(00000072)/0/READ: Would block while reading
    Jun 17 14:16:04.562: TPLUS(00000072)/0/READ: socket event 1
    Jun 17 14:16:04.562: TPLUS(00000072)/0/READ: read entire 12 header bytes (expect
    43 bytes data)
    Jun 17 14:16:04.562: TPLUS(00000072)/0/READ: socket event 1
    Jun 17 14:16:04.562: TPLUS(00000072)/0/READ: read entire 55 bytes response
    Jun 17 14:16:04.562: T+: Version 192 (0xC0), type 1, seq 2, encryption 1
    Jun 17 14:16:04.562: T+: session_id 2365877689 (0x8D046DB9), dlen 43 (0x2B)
    Jun 17 14:16:04.562: T+: AUTHEN/REPLY status:4 flags:0x0 msg_len:37, data_len:0
    Jun 17 14:16:04.562: T+: msg:   0x0A User Access Verification 0x0A  0x0A Usernam
    e:
    fixeddemo#
    Jun 17 14:16:04.562: T+: data:
    Jun 17 14:16:04.562: T+: End Packet
    Jun 17 14:16:04.562: TPLUS(00000072)/0/47194394: Processing the reply packet
    Jun 17 14:16:04.562: TPLUS: Received authen response status GET_USER (7)
    Jun 17 14:16:04.562: AAA SRV(00000072): protocol reply GET_USER for Authenticati
    on
    Jun 17 14:16:04.562: AAA SRV(00000072): Return Authentication status=GET_USER
    fixeddemo#

  • Errors on aaa server

    Hello,
    pls which service is actually suspended when the AAA server gives this report.
    "Service CSAuth has been stopped or paused by the system. Monitoring will suspend until the service is restarted."
    And how can I resolve it.
    Also, my backup AAA server is still not replying. If I shutdown the service on the primary acs, the errors i get when i try to login are "auth server down".
    What can I do to correct these?

    To my knowledge, it's the authentication service like Radius or Tacacs+ that is suspended.

  • AAA and TACACS servers

    Hello All,
    I want to download a free, yet reliable AAA and TACACS servers, can you guide me? Also, I need help with configuring them for study purpose.

    You may download the eval version ACS 4.2.0.124, if you've access to cisco.com
    ACS v4.2.0.124 90-Days Evaluation Software
    eval-ACS-4.2.0.124-SW.zip
    http://tools.cisco.com/squish/9B37e
    Path:
    Cisco.com > Downloads Home > Products > Cloud and Systems Management > Security and Identity Management
    > Cisco Secure Access Control Server Products > Cisco Secure Access Control Server for Windows > Cisco Secure ACS 4.2 for Windows > Secure Access Control Server (ACS) for Windows-4.2.0.124
    ~BR
    Jatin Katyal
    **Do rate helpful posts**

  • Cisco pix 525 land attack

    Goodmorning,
    I have a message on my pix 525 someone is spoofing on a server from my dmz. How can i prevent spoofing attacks? It goes something like that : Deny IP due to Land Attack from 10.10.8.1 to 10.10.8.1

    The thing is that i have exhaustion of resources. How can i stop that?

  • AAA server & Ciscoworks

    Hi
    How can use the users profiles that can access the AAA server with the ciscoworks2000 , e.g. suppose that I have a user name and password that allows me to access the AAA server and I want the AAA server authenticate me to access CW200 with the same username & password . in otherword can I make the AAA server authenticate CW2000 access or can I have the same authentication database ??
    Thanks

    CW2K supports using external authentication for logins like TACACS+ etc. After you select and configure a login module, all authentication transactions are performed by that source. The CW2K Server still determines user roles; therefore, all users must be in the local database of user IDs and passwords. Users who are authenticated by an alternative service and who are not in the local database are assigned to the same role as the guest user (by default, the Help Desk role). To assign a user to a different role, such as the System Admin role, you must configure the user locally. Such users must have the same user ID locally as they have in the alternative authentication source. Users log in with the user ID and password associated with the current login module. See the User Guide for more details:
    http://www.cisco.com/univercd/cc/td/doc/product/rtrmgmt/cw2000/cw2000_d/5steditn/gs_guide/setup.htm

  • AAA server precedence

    Hi,
    I have two AAA servers configured in Global config, in the WLAN and in FlexConnect groups. If I understand correctly the AAA server in the WLAN has precedence over the others. Is this true? Does that mean that I can remove the AAA server config from the other two?
    The AAA servers are used for 802.1x user authentication.
    Regards,
    Philip

    AAA in the WLAN is used first... if you have network user also checked on the AAA server and for example you have a total of 4 AAA servers, 2 defined on your WLAN and two defined globally also maybe for another WLC, then when the two in the WLAN is marked as down, then the WLC will use your global AAA servers.  I don't check the box for network user or management in the AAA server, but define it in the WLAN.

  • AAA server group tag

    is the "AAA server group tag" the same as the proxy distribution entry.
    trying to setup my asa for tacacs+
    cisco# aaa-server ?
    WORD < 17 char Enter a AAA server group tag

    I hope I get your question correctly. The AAA group tag is local to the AAA Client and has nothing to do with the AAA Server (e.g. ACS). It is meant to group more than one TACACS/RADIUS server.
    Proxy Distribution Table is used when you have Multiple ACS servers and you want to route incoming AAA requests to particular server(s) based on pre-defined criteria. Like user1@NY should be redirected to the NewYork ACS.
    Regards
    Farrukh

Maybe you are looking for

  • Question on Multimaster and consumer setup

    Is it better to have the consumer get its updates from one of the multimasters or can the consumer be setup to get its updates from both? Any problems to watch out for in setting up the consumer to receive updates from both multimasters? Any special

  • Implementing two 1:M relationships

    Hello, I have a Oppty Fact. As an Extension to it I have resource fact and case fact. Oppty Fact : Resource fact = 1: M opty fact : case fact = 1:M. We need a report with oppty name (from oppty fact), Amount (from oppty fact) , REsource name (from re

  • Terminal App Up Arrow History Broken

    I've noticed that since installing Leopard, that Terminal's up arrow history function seems to be broken. You press the UP arrow key, and it does cycle through your previous commands, but they are shifted way over to the left hand side of the screen

  • Installing Flasher Player On A MAC

    When installing the Flash Player, a screen ask for my Mac Username and Password.  I have never set up a Username and Password. How do I get around this and complete the installation?

  • Networking: problems servering multiple clients

    hi all i'm writing a simple client server system, with a multithread server, in order to serve multiple clients. the client's requests to connect to the server arrive to a port (ie 1025), and then the server, through a method returns to the client an