Legal Disclaimer: The resource assets in this website may include abbreviated and/or legacy terminology for HPE Aruba Networking products. See www.arubanetworks.com for current and complete HPE Aruba Networking product lines and names.
TACACS+ Based Enforcement Profile
To review a sample TACACS Terminal Access Controller Access Control System. TACACS is a family of protocols that handles remote authentication and related services for network access control through a centralized server. profile configuration, refer to Sample TACACS Profile Co
Enforcement Profile Configuration
To create a TACACS+ Terminal Access Controller Access Control System+. TACACS+ provides separate authentication, authorization, and accounting services. It is derived from, but not backward compatible with, TACACS. Based Enforcement profile:
1. Navigate to > > .
2. From the page, click .The dialog opens.
3. From the drop-down, select
Figure 1 Add TACACS+ Based Enforcement Profile Dialog
4. Specify the > tab parameters as described in the following table:
|
Parameter |
Action/Description |
|
Template |
Select the template. |
|
Name |
Enter the name of the profile. |
|
Description |
Enter a description of the profile (recommended). |
|
Type |
This field is populated automatically for TACACS+ Terminal Access Controller Access Control System+. TACACS+ provides separate authentication, authorization, and accounting services. It is derived from, but not backward compatible with, TACACS. . |
|
Action |
A TACACS+ Terminal Access Controller Access Control System+. TACACS+ provides separate authentication, authorization, and accounting services. It is derived from, but not backward compatible with, TACACS. based Enforcement profile allows you to set the value to either or . The default value is . If you select the option for the setting, the TACACS+ Terminal Access Controller Access Control System+. TACACS+ provides separate authentication, authorization, and accounting services. It is derived from, but not backward compatible with, TACACS. authentication request is rejected when the enforcement profile is assigned. The option is disabled and is not available for a TACACS+ Terminal Access Controller Access Control System+. TACACS+ provides separate authentication, authorization, and accounting services. It is derived from, but not backward compatible with, TACACS. enforcement profile. ClearPass does not allow the modification of system defined Enforcement Profiles (“[TACACS+ Terminal Access Controller Access Control System+. TACACS+ provides separate authentication, authorization, and accounting services. It is derived from, but not backward compatible with, TACACS. Deny Enforcement Profile]” is set as Action = Accept, by default). HPE Aruba Networking recommends creating a new profile to modify the Action field. The TACACS+ Terminal Access Controller Access Control System+. TACACS+ provides separate authentication, authorization, and accounting services. It is derived from, but not backward compatible with, TACACS. protocol correctly returns an Accept event if the user authenticates correctly, but the defult Deny rule will then also return the privilege level 0 for the TACACS+ Terminal Access Controller Access Control System+. TACACS+ provides separate authentication, authorization, and accounting services. It is derived from, but not backward compatible with, TACACS. authorization. To change this behavior create a new profile to Reject in these circumstances. |
|
Device Group List |
Select a from the drop-down list. All configured device groups are listed in the Configuration > Network > Device Groups page. When one or more device group(s) have been added to Policy Manager, you can select a device group and take one of the following actions: To delete the selected Device Group List entry, click Remove. To see the device group parameters, click View Details. To change the parameters of the selected device group, click Modify. To add a new a device group, click the link. See Adding and Modifying Device Groups. |
Services Configuration
The following figure displays the > dialog:
Figure 2 TACACS+ Based Enforcement > Services Dialog
Specify the > parameters as described in the following table:
|
Parameter |
Action/Description |
|
Privilege Level |
Select a level between and , with being the minimum privilege level and being the highest. Use Privilege Level for basic TACACS+ Terminal Access Controller Access Control System+. TACACS+ provides separate authentication, authorization, and accounting services. It is derived from, but not backward compatible with, TACACS. authentication. |
|
Selected Services |
Select one or more of the following services: Shell PIX Shell ARAP CiscoWLC:Common Aruba:Common junos-exec Infoblox When you select one or more services, the tab is enable. |
|
Export All TACACS+ Terminal Access Controller Access Control System+. TACACS+ provides separate authentication, authorization, and accounting services. It is derived from, but not backward compatible with, TACACS. Services Dictionaries |
Click this link to download the TACACS+ Terminal Access Controller Access Control System+. TACACS+ provides separate authentication, authorization, and accounting services. It is derived from, but not backward compatible with, TACACS. Services dictionary (TacacsServiceDictionary.xml) to the local system. |
|
Authorize Attribute Status |
Select one of the following options: ADD REPLACE FAIL Specifying the option is an instruction to cause the authorization request to fail. |
|
Custom Services |
To add new TACACS+ Terminal Access Controller Access Control System+. TACACS+ provides separate authentication, authorization, and accounting services. It is derived from, but not backward compatible with, TACACS. services or attributes by uploading the modified dictionary, click the link. |
Service Attributes |
|
|
Type |
Click the Type dropdown menu to select a service attribute type. For example, if one of the services you selected was , will be one of the available Service Attribute types. After the services have been selected, you can select the attributes to send from Policy Manager a drop-down list in the Name field). You can also add custom attributes in the Name field. Add service attributes corresponding to the services selected in Selected Services. Policy Manager by default provides attributes for some of the listed services. |
|
Name |
The options displayed for the attribute depend on the attribute that was specified. |
|
Value |
The options displayed for the attribute depend on the and attributes that were specified. |
Command Authorization Configuration
From the Commands tab, you can configure commands and arguments allowed or disallowed for the selected .
Figure 3 TACACS+ Command Authorization Configuration Dialog
1. In the field, select the Shell or PIX shell radio button. Subsequent selections in this tab configure commands and arguments allowed or disallowed for this selection.
2. (Optional) In the field, select the option to allow commands that are not explicitly entered in the Commands field.
3. Next, you must create a list of commands recognized for the specified service type. To add a command, click the button on the tab. The opens.
4. In the Configure TACACS+ Terminal Access Controller Access Control System+. TACACS+ provides separate authentication, authorization, and accounting services. It is derived from, but not backward compatible with, TACACS. Command Authorization dialog, enter values for the following paramters:
Shell Command. A string for the command (for example, ). This is followed by one or more command argument rows.
Command Arguments. The arguments for the command.
Action. To permit use of this command argument, click the Enable to permit check box. If this box is unchecked, the column shows Deny and the command argument is not allowed.
5. asIn the field, select the Permit option to permit this command even if Policy Manager receives arguments for the command that it does not recognize.
6. Select the Deny radio button to deny the command if Policy Manager receives unrecognized arguments.
7. To save and exit, click outside the row you are editing then click .
TACACS Profile Configuration Example
When setting up authentication for TACACS+ Terminal Access Controller Access Control System+. TACACS+ provides separate authentication, authorization, and accounting services. It is derived from, but not backward compatible with, TACACS. , it can be a challenge to configure the correct attributes to send back to ExtraHop for authorization (or permission roles). In order to properly configure Policy Manager to know of these attributes, they must be added to the attribute dictionary.
To configure profile and attribute parameters for TACACS+ Terminal Access Controller Access Control System+. TACACS+ provides separate authentication, authorization, and accounting services. It is derived from, but not backward compatible with, TACACS. based enforcement profiles:
1. Download the ExtraHop_tacacsCPPMdictionary.txt file to insert the correct attributes into the Policy Manager attribute.
2. Log in to Policy Manager.
3. In Policy Manager, navigate to > > . The page opens.
4. To import the ExtraHop_tacacsCPPMdictionary.txt XML Extensible Markup Language. XML is a markup language that defines a set of rules for encoding documents in a format that is both human-readable and machine-readable. file, click the link.
5. Navigate to > .
6. Add the ExtraHop device IP address as a Network Device (for details, see Adding a Network Device).
|
|
Make sure to use the same here as is configured on the ExtraHop device. |
7. Create a TACACS+ Based Enforcement profile as described above, using the ExtraHop TACACS+ Terminal Access Controller Access Control System+. TACACS+ provides separate authentication, authorization, and accounting services. It is derived from, but not backward compatible with, TACACS. attributes that you imported.