TACACS CONFIGURATION FOR NETSCREEN FIREWALL

Beginning with ScreenOS 6.0.0 TACACS+ as an external authentication server for administration purposes is supported.

Below is this example scenario of TACACS server object where the TACACS server is called “AUTH“. The CLI commands required for this are as follows:

set auth-server “AUTH” id 1
set auth-server “AUTH” server-name “172.16.0.10”
set auth-server “AUTH” account-type admin
set auth-server “AUTH” type tacacs
set auth-server “AUTH” tacacs secret Screen05
set auth-server “AUTH” tacacs port 49
Note:- Here Screen05 is the secret password which will be seen hashed in config file.
The AUTH server will be configured as admin auth server as below –
set admin auth server “AUTH
set admin auth remote root
set admin privilege get-external
On the ACS server web interface via the ACS Admin application, following steps need to be followed –
  1. Click Interface Configuration, and select TACACS+ (Cisco IOS)
  2. Add a new service called “netscreen”, and leave the protocol field blank
  3. Check both the user and group check box.
  4. Click Submit

On the user configuration, scroll down to the bottom and select the netscreen (case sensitive) Custom attributes check boxes. Specify the attributes in the custom attributes field.The attributes that can be specified are as follows:

tacacs-configuration-for-netscreen-firewall

Note: TACACS+ is not supported for use as an authentication server for xauth or policy authentication.

The verification and debug commands are –

-> get admin auth
-> get admin user login
debug admin all
debug auth all
Please follow and like us:

Related Post

Add Comment

Social Media Auto Publish Powered By : XYZScripts.com
Select your currency