Hi guys!
I have found the next CLI command:
aaa authentication login default group radius group tacacs+ local
Firstly I try to break down into smaller pieces like:
- authentication list: default (lines vty, console & aux)
- server-group: tacacs and radius
- fallback: local username
But in this case, I wanted to know if fails RADIUS, the authentication will use TACACS+…
Thanks!
Hello Alfredo,
Yes, this will work, to test this. You can test this with a single device. I’ll use one router:
R1(config)#aaa authentication login default group radius group tacacs+ local
R1(config)#radius server RADIUS
R1(config-radius-server)#address ipv4 192.168.1.100
R1(config-radius-server)#key CISCO
R1(config)#tacacs server TACACS
R1(config-server-tacacs)#address ipv4 192.168.1.101
R1(config-server-tacacs)#key CISCO
The RADIUS and TACACS server are not there. Enable these three debugs:
R1#debug aaa authentication
R1#debug radius authentication
R1#debug tacacs authentication
And telnet to your own IP address:
R1#telnet 1.1.1.1
Trying 1.1.1.1 ... Open
User Access Verification
Username:
Password:
AAA/BIND(00000015): Bind i/f
AAA/AUTHEN/LOGIN (00000015): Pick method list 'default'
RADIUS/ENCODE(00000015): ask "Username: "
RADIUS/ENCODE(00000015): send packet; GET_USERADMIN
RADIUS/ENCODE(00000015): ask "Password: "
RADIUS/ENCODE(00000015): send packet; GET_PASSWORD
RADIUS/ENCODE(00000015):Orig. component type = Exec
RADIUS/ENCODE(00000015): dropping service type, "radius-server attribute 6 on-for-login-auth" is off
RADIUS(00000015): Config NAS IP: 0.0.0.0
RADIUS(00000015): Config NAS IPv6: ::
RADIUS/ENCODE(00000015): acct_session_id: 5
RADIUS(00000015): sending
RADIUS/ENCODE: Best Local IP-Address 1.1.1.1 for Radius-Server 192.168.1.100
RADIUS(00000015): Send Access-Request to 192.168.1.100:1645 onvrf(0) id 1645/3, len 71
RADIUS: authenticator 9B 39 E8 3D 34 2A 30 A5 - 95 63 04 DB 6B E0 C2 0A
RADIUS: User-Name [1] 7 "ADMIN"
RADIUS: User-Password [2] 18 *
RADIUS: NAS-Port [5] 6 578
RADIUS: NAS-Port-Id [87] 8 "tty578"
RADIUS: NAS-Port-Type [61] 6 Virtual [5]
RADIUS: NAS-IP-Address [4] 6 1.1.1.1
RADIUS(00000015): Sending a IPv4 Radius Packet
RADIUS(00000015): Started 5 sec timeout
RADIUS(00000015): Request timed out!
RADIUS: Retransmit to (192.168.1.100:1645,1646) for id 1645/3
RADIUS(00000015): Started 5 sec timeout
RADIUS(00000015): Request timed out!
%RADIUS-4-RADIUS_DEAD: RADIUS server 192.168.1.100:1645,1646 is not responding.
%RADIUS-4-RADIUS_ALIVE: RADIUS server 192.168.1.100:1645,1646 is being marked alive.
RADIUS: Retransmit to (192.168.1.100:1645,1646) for id 1645/3
RADIUS(00000015): Started 5 sec timeout
RADIUS(00000015): Request timed out!
RADIUS: Retransmit to (192.168.1.100:1645,1646) for id 1645/3
RADIUS(00000015): Started 5 sec timeout
RADIUS(00000015): Request timed out!
RADIUS: No response from (192.168.1.100:1645,1646) for id 1645/3
RADIUS/DECODE: No response from radius-server; parse response; FAIL
RADIUS/DECODE: Case error(no response/ bad packet/ op decode);parse response; FAIL
TPLUS: Queuing AAA Authentication request 21 for processing
TPLUS(00000015) login timer started 1020 sec timeout
TPLUS: processing authentication start request id 21
TPLUS: Authentication start packet created for 21(ADMIN)
TPLUS: Using server 192.168.1.101
TPLUS(00000015)/0: Connect Error No route to host
See how it starts with RADIUS, then attempts TACACS+ and eventually falls back to local?
Rene
So after trying the RADIUS server, if fails this server the access will be denied. It make sense?
Thanks in advance!
Hello Alfredo,
If the RADIUS server is unreachable then it will try the TACACS+ server.
If the RADIUS server is reachable but the user credentials are incorrect/missing, then authentication fails.
Rene
1 Like