Cisco Wireless :: 5508 - Tacacs Not Working

Oct 24, 2011

Tacacs not working for 3 new 5508 WLC's...working fine for 6 old 4400 WLC's.
 
Before 7.116 code upgrade...I remember 5508 was working on and off and now they are not.
 
Same configs on SW, WLC and ACS.
 
Debug on WLC gives..below message when Tacacs is attempted..
*aaaQueueReader: Oct 25 09:20:41.700: tplus_processAuthRequest: memory alloc failed for tplus
 
Not sure why statistics show zero...?? Radius is working for users.
 
(wlc03) >show tacacs auth statistics

Authentication Servers:
 
Server Index..................................... 1
Server Address................................... 10.3.121.21
Msg Round Trip Time.............................. 0 (msec)
First Requests................................... 0
Retry Requests................................... 0
Accept Responses................................. 0
Reject Responses................................. 0
 
[ Code].....

View 7 Replies


ADVERTISEMENT

Cisco :: WLC 5508 Use TACACS To Authenticate Admins / With Maximum Privileges

Sep 23, 2012

I have an issue with two wlc 5508 in the same mobility group. We use TACACS to authenticate admins, with maximum privileges.
 
When I want to configure cleanair, or some security functions (such as ACL, or password policies), I have an error message saying that my privileges are not enough.When I use local account, it works well.
 
At the begining, I thought it was a TACACS issue, but I have the same problem with WCS and SNMP. Cleanair doesn't appears in config menu, and I have an error message for security function.

View 10 Replies View Related

Cisco AAA/Identity/Nac :: C4948-10G / Tacacs+ Not Working On VRF Interface?

Feb 3, 2013

C4948-10G switch running IOS 15.0(2)SG ?ACS 4.2 cannot authenticate on the vrf interface. The issue on vrf aaa authentication.
 
aaa new-model
!
!
aaa authentication login default group tacacs+ local
aaa authentication login no_tacacs local
aaa authentication enable default group tacacs+ enable

[code]....

View 13 Replies View Related

Cisco AAA/Identity/Nac :: TACACS Authentication Working Via SSH But Not HTTP (ACS 5.1 / 3560)

Aug 26, 2010

My switches are able to successfully authenticate user access against ACS 5.1 via SSH with TACACS+, but I am not able to authenticate via HTTPS with TACACS+.  I don't even get a log in ACS when attempting to authenticate via HTTPS.
 
Here is my AAA config, followed by a debug:
 
aaa new-modelaaa authentication login ACCESS group tacacs+ localaaa authorization consoleaaa authorization config-commandsaaa authorization exec ACCESS group tacacs+ aaa authorization commands 1 Priv1 group tacacs+ none

[Code]......

View 8 Replies View Related

Cisco AAA/Identity/Nac :: Catalyst 3750 - TACACS Authentication Stopped Working

Jul 25, 2011

We have a Catalyst 3750 switch that failed over to local login after the Tacacs authentication stopped working. I went through the configuration settings and everything appears to be identical to another switch in this same building.

View 4 Replies View Related

Cisco Wireless :: SSO Not Working On 5508

Jun 4, 2013

I am trying to setup SSO between my primary and secondary 5508 controller, and it doesn't appear to be working. I lose connection to both devices after the reboot and then have to console in and disable redundancy manually to regain connectivity. Is there something special required for this to work that isn't apparent?

View 4 Replies View Related

Cisco Wireless :: AIR-LAP1310N-E-K9 Not Working With 5508

Sep 13, 2012

We had cisco 5508 with 6.0.182.0All 1041 and 1310 worked fine with 5508. Then we upgraded controller to 7.2.110.0.
1041 still worked, but 1310 - no.

Error: Sep 14 14:11:19.248: %LWAPP-5-CHANGED: CAPWAP changed state to DISCOVERY

View 2 Replies View Related

Cisco Wireless :: New 5508 DHCP For Management VLAN Not Working?

Sep 25, 2012

I have a new 5508 that I am setting up.  My first one from scratch.
 
Interfaces:
managment -> 10.10.10.10 ->dhcp 10.10.10.1
voice -> 10.10.7.1 ->dhcp 10.10.10.1
guest -> 192.168.1.2 ->dhcp 192.168.1.2
 
Local DHCP (via the 5508) is for the guest network while the management and voice use the Windows DHCP server.
 
My problem, Voice and guest work fine.  I have two SSID's (one 802.1X and the other PSK) that use the management interface that will not get an IP.  I have enabled  dhcp proxy from the cli on the controller.  I tried with the management VLAN tagged and untagged.

View 2 Replies View Related

Cisco Wireless :: WLC 5508 Software Version Working With ISE1.1.2?

Feb 24, 2013

My understanding is that for fully WLC 5508 integration with ISE 1.1.2, it needs Version 7.2.103.0.  Question is if customer has 5508 with either 7.0.230 or 7.0.98, and ISE 1.1.2, can AAA part work?  what part will not work, any potential issue if they don't upgrade 5508 to 7.2.103?

View 2 Replies View Related

Cisco Wireless :: 5508 Office Extend Working In Mixed Environment

Feb 4, 2010

If we have a mixed environment of 4400 and 5500 controllers will the office extend features still work or will we have to run a seperate wireless domain from the 5508 for the aps that we need office extend on?

View 2 Replies View Related

Cisco Wireless :: 5508 - Apple OS 6 Not Working On Open Access Network

Sep 24, 2012

I am beginning to get many emails from users who have recently upgraded to OS6 and saying now they cannot connect to our open access wireless network. We use a separate server that users must agree to a user agreement page and they say they get it, but after agreeing, it goes blank and they cannot connect. I am using mostly Cisco 3502's with the 5508 controller using 7.0.112.0 IOS version. Nobody in our IT department has yet to test OS6 yet.

View 9 Replies View Related

Cisco Wireless :: Why Is Web Page Auth On MAC Filter Failure Also Not Working On 5508

Jul 22, 2012

I have implemented a Guest WLAN solution as per the recommended design from Cisco. We have two internal WiSM2 controllers providing services for Internal secure SSIDs. Both these controllers are members of a Mobility and RF management group.
 
Two 5508 controllers have been installed in our DMZ for resilience and have been placed into a separate Mobility group. All controllers (internal and external) have been linked together as mobility neighbours in a full mesh and a new SSID for Web Guest traffic has been anchored to the controllers in the DMZ.
 
Web page authentication works perfectly fine, but I cannot for the life of me get the MAC filtering override to work, i.e. if a MAC address is present, do not redirect to the splash page for web auth. I know I can get around this by just creating two separate SSIDs. But the business is used to just having the one SSID for all guest traffic. Is this a known limitation when anchoring SSIDs to controllers in the DMZ ?

View 1 Replies View Related

Cisco Wireless :: 5508 - WebPage Auth On MAC Filter Failure Not Working On Anchor

Nov 1, 2011

I have implemented a Guest WLAN solution as per the recommended design from Cisco. We have two internal WiSM2 controllers providing services for Internal secure SSIDs. Both these controllers are members of a Mobility and RF management group.
 
Two 5508 controllers have been installed in our DMZ for resilience and have been placed into a separate Mobility group. All controllers (internal and external) have been linked together as mobility neighbours in a full mesh and a new SSID for Web Guest traffic has been anchored to the controllers in the DMZ.
 
Web page authentication works perfectly fine, but I cannot for the life of me get the MAC filtering override to work, i.e. if a MAC address is present, do not redirect to the splash page for web auth.

View 6 Replies View Related

Cisco :: Airplay Not Working With WLC 5508

Apr 30, 2013

I just installed a WLC 5508, running 7.4 code.  I can not seem to get the Airplay to work with apple TVs.  The iPads and Airplay are on the same wireless network.  What can I do to get it to work?  Is there any documentation on how to get Airplay to work?

View 1 Replies View Related

Cisco :: 5508 / Radius Authentication Not Working?

Apr 8, 2013

I have a 5508 controller running 7.4.100 and have a WLAN where I have radius configured. On my controller the client machine I'm using appears but the radius authentication doesn't appear to be working. Is there anything on the controller I can do to verify that the request is even being sent to my Microsoft IAS server? The log on the server doesn't show any requests from the controller so my early days guess is the controller isn't actually sending it.

View 3 Replies View Related

Cisco :: Getting Braford Network Manager Working On 5508 Controller

Oct 4, 2011

Any deign guide for getting the Braford Network Manager working on a Cisco 5508 controller.

View 1 Replies View Related

Cisco Wireless :: How To Configure ACS5.2 For TACACS Management Authentication Of WCS

Sep 12, 2011

Is there a decent guide on how to configure ACS5.2 for TACACS management authentication of WCS?

View 2 Replies View Related

Cisco :: NCS TACACS Accounting Via ACS 5.4

Mar 4, 2013

If I choose to authenticate NCS users through Cisco ACS (5.4 in this instance) via TACACS, do I still have the ability to do accounting to track what changes they have made?  I'm not getting anything in the TACACS accounting reports and I don't see anywhere to configure TACACS for accounting within NCS gui like I can on a WLC.  I know that NCS has an internal audit trail but if a users account is both a local account on NCS as well as an account being authenticated through ACS does the Audit trail on NCS for that local user still contain the information about changes the user made?  I ask because it looks like it does but I want to make sure I'm not going mad.  Here is my example:
 
Local account username:  NCS_Admin2AD account via TACACS username:  NCS_Admin2
 
Audit trail for the NCS_Admin2 account on NCS looks like changes are being logged to NCS even though the user is logging in with their AD credentials via TACACS.

View 4 Replies View Related

Cisco AAA/Identity/Nac :: ACS 5.3 And TACACS + Authentication From VPN?

Mar 4, 2012

I have a Cisco ASA (8.2) setup with remote access for my users using Cisco VPN client. The authentication is passed off to my ACS 5.3 which then checks with AD. What I've done so far is create Access Policy rule where I define specifically the Location and NDG where the ASA is and then a DenyAllCommands command set. This should pass authentications just fine but this also gives those users the ability to remote connect directly into the ASA and login successfully. Even though there is a Deny Commands there I still would prefer they get Access Denied as a message. If I do a Deny Access on the ShellProfile then this stops the login authentication altogether.

View 2 Replies View Related

Cisco :: Authenticating LMS 4.x Users Via TACACS+ On ACS 5.3.0

Jul 12, 2012

how to Configure ACS 5.x so LMS 4 users can authenticate via TACACS+?  I have ACS 5.x setup and authenticating to Active Directory.  Have changed the LMS 4.x Authentication Module to TACACS+.  Have gotten past the user / password problem by configuring a local user in LMS 4.x.  Now, am hitting the Default rule in ACS and Shell Profile is deny access.. 

View 1 Replies View Related

Cisco AAA/Identity/Nac :: Cannot Authenticate AD For Tacacs ACS 5.0

May 24, 2011

I think i've got everything set up to authenticate against AD for Tacacs+ device logins.  When i check the logs, i see:"24408 User authentication against Active Directory failed since  user has entered the wrong password".  This leads me to believe that it is checking AD correctly, however if i enter the password correctly for the same AD user, there is no log at all...no pass, no fail.
 
If i look at the Tacacs debugs on the switch, i see the following:May 25 10:55:07.927 CDT: TAC+: ver=192 id=874699084 received AUTHEN status = ERRORMay 25 10:55:09.932 CDT: TAC+: send abort reason=Unknown

Obviously the switch is communicating to ACS, and ACS is passing info back to the switch.  ACS also appears to be communicating effectively with AD since it knows when i put in an incorrect password for the specific user.

View 2 Replies View Related

Cisco VPN :: Clinet Tacacs+ Authentication On ASA5510?

Mar 25, 2011

How to be able to locate a sample, working configuration of tacacs+ authentication on the ASA5510?

View 2 Replies View Related

Cisco AAA/Identity/Nac :: NCS TACACS+ With ACS 4.2 - Authentication / Authorization?

Sep 13, 2011

I tried to configure TACACS+ authentication / authorization for NCS via ACS 4.2. For that I followed the configuration guide:
 
1. Configured the service for NCS with HTTP (see attachment)
 
2. Added the tasks to the user (see attachment)
  
When I try to login on the NCS it fails, in the logs on the NCS I see the following lines:
 
09/14/11 16:53:03.333 TRACE [system] [http-443-7] [TACACS+ AAAModule] Creating authorization socket   - To Server:  192.168.49.14  - For User:  netadmin
09/14/11 16:53:03.335 TRACE [system] [http-443-7] [TACACS+ AAAModule] Sending authorization request packet  - To Server:  192.168.49.14  - For User:  netadmin
09/14/11 16:53:03.336 TRACE [system] [http-443-7] [TACACS+ AAAModule] Receiving authorization response packet  - From Server:  192.168.49.14  - For User:  netadmin

[code].....

View 7 Replies View Related

Cisco AAA/Identity/Nac :: ACS 5.2 - TACACS For Network Access

Feb 27, 2011

I found that TACACS should be available for network access with ACS 5.2:(url) But when I'm trying to create Rule tu allow PPP authentication against TACACS server I get error.

View 2 Replies View Related

Cisco AAA/Identity/Nac :: To Configure MS ACS 4.1.1.23 To Allow Linux TACACS

Sep 20, 2011

I am running ACS 4.1.1.23 on a Microsoft server and I am trying to get TACACS to work with two Linux servers.  The servers are capable of TACACS, are using port 49 and have the correct shared secret.  I believe I do not have the devices configured properly on the ACS side.  These 2 servers currently are using RADIUS and we are getting bit by the bug where the ACS application will start rejecting RADIUS authentication requests but still accept TACACS requests.

View 6 Replies View Related

Cisco :: CiscoWorks LMS 3.2 With TACACS Role Authentication?

Jan 4, 2011

I'm trying to get user authentication backed off to ACS 5.1, I've got it working but not the way I'd like.  This is using the TACACS settings not ACS mode.I've created a local user in CW and assigned it to the correct roles, then created a user in ACS with the same name and a different password and this works fine.My question is can I set the roles on the TACACS server using a shell profile/custom attributes.  All the documentation I can find is for ACS v4?

View 15 Replies View Related

Cisco AAA/Identity/Nac :: ACS 5.x Tacacs Accounting Report

May 14, 2013

I am setting up reports for tacacs accounting on ACS 5.3.  However, accounting only seems to work after entering enable mode on the switch.  I would like to see all commands, even the enable command when in privlage 1 mode.

View 2 Replies View Related

Cisco AAA/Identity/Nac :: ACS 5.2 - TACACS And JunOS Authorization?

Mar 4, 2012

I can get it to authenticate.  But I've read some posts on ACS 4.2 and authorization, but I don't find anything similar.I want to control down to what commands the authenticated user can run.  I want the defintion to come from the ACS server, or at least control it from the ACS server.  I want to minimize the changes on the JunOS side,but if it can't be easily done, I'll change the JunOS side.

View 10 Replies View Related

Cisco AAA/Identity/Nac :: ACS 5.3 / Tacacs Authorization Restrictions

Nov 14, 2012

ACS 5.3 configured with two rules, 1 rule for standard level 15 access for the Network Engineers and a 2nd rule to allow some limited access to switches: The limited access account has enough command set access to change the vlan on a switchport, so Configure Terminal, Interface FAx/x and switchport access vlan x.
 
Switch configuration:     
 
aaa authentication login default group tacacs+ local
aaa authentication enable default group tacacs+ enable
aaa authorization console
aaa authorization config-commands
aaa authorization exec default group tacacs+ local
aaa authorization commands 0 default group tacacs+ local
aaa authorization commands 1 default group tacacs+ local
aaa authorization commands 15 default group tacacs+ local
aaa session-id common
 
Everything works well and the limited access users can only perform the commands i've setup.
 
Problem:The problem i've encountered is when one of the network engineers makes a change that would stop the device from being able to see the ACS server it stops allowing any commands to be typed in the router/switch. Additionally if you then connect to the device and login with the local username and password the device then waits for it to hit the TACACS server timeout for every command you enter. This is obviously very slow and painful for the engineer.
 
Question:Is there a way to set this up so the engineer logging in with full Level 15 access doesn't have to have each command authorized by the ACS server but still allow the limited access accounts to be able to make interface changes?

View 1 Replies View Related

Cisco :: Sync Archive Failed LMS 3.2 Using TACACS

Mar 18, 2012

Iam using LMS 3.2. In short, there is 2 type of router, 2800series and 2900series. These device already join to TACACS server. When I try to sync archive I got:

- failed on 2900series
- successful on 2800series
 
I have doing same config (credential, snmp, protocol for sync archive), for those device on ciscoworks but why I find the error??

View 5 Replies View Related

Cisco AAA/Identity/Nac :: Switches TACACS Or RADIUS With ACS 4.2

Aug 14, 2011

So far i managed my switches with TACACS+, however now i've to deploy 802.1X, requiring RADIUS only. For what i know, ACS (i'm using 4.2) allows to define a device using only TACACS or RADIUS, but not both. Do i am right? Or there is a way to define an AAA client to communicate with the same ACS using both the protocols?
 
Supposing i am right, i was then considering the following options: - configure all of the switches to use radius for any service (authentication, authorization etc ec) This simplifies the task, but i lose the TACACS+ services for the switches. Is this a big loss?
 
- configure the L3 switches to use a second Loopback, just for RADIUS services. This would allow to still use the TACACS+ but would require a new network just for the RADIUS service; furthermore L2 switches doesn't support two IP addresses and would require anyway a migration to RADIUS.

A considerable administrative overhead, in other words. I'm not willing to deploy a second RADIUS (ACS, Windows, whatever), in this moment.
 
The key point is this: reading around i see Cisco documentation recommending always to use TACACS+ for management, but in this situation is not possibile. In general, every time the device has a role of network admission  (switch or access-point) RADIUS seems to be the protocol of choice. Moving to RADIUS would have some major drawback or only a change in the communication protocol? (I know the difference between TACACS+ and RADIUS: tcp vs udp, encryption of the whole packet vs encryption of only the password).

View 3 Replies View Related

Cisco AAA/Identity/Nac :: ACS 5.2 TACACS+ And Two Factor Authentication?

May 1, 2013

I want to setup two factor authentication via ACS 5.2 TACACS+ without having to use a token (such as that by RSA).  Is there a way to do it?
 
More info:
 
Users from unconnected AD domains will be connecting to the routers and switches.There is a certificate server available to generate certificates.SSHv2 is the current login protocol.

View 5 Replies View Related

Cisco AAA/Identity/Nac :: ACS 5.3 Tacacs Authorization Logs?

Jan 15, 2012

Noticed tacacs authorization logs when you change password for a user ?? in authorization logs I can see the new password but same I can not see in accounting logs ? is it a normal behaviour ?? or do we need to do something to hide the password in authorization logs ?
  
For example if i type command username xyz priv 15 secret cisco 123
 
I see this command in accounting logs as uername xyz oriv 15 secret *** where as in tacacs authorization logs it shows username xyz priv 15 secret cisco 123

View 1 Replies View Related







Copyrights 2005-15 www.BigResource.com, All rights reserved