You can configure the TACACS server using the following command:
Command
[no] tacacs-server host <ipv4 | ipv6> [timeout<value> ] [key <value> ] [auth_type (chap |
pap | mschap | login) ] [port <value>] [priority <value> ]
Description
TACACS configuration
Parameters
IPv4 or v6 Address , timeout, key, auth_type, port, priority values
Mode
CONFIG
You can verify the configuration by using the command(s) below:
To Configure Global TACACS parameters, use the below command:
Command
[no] tacacs [authtype (chap | pap | mschap | login)] [passkey <value>] [timeout <value>]
Description
TACACS global configuration
Parameters
Timeout, key, auth_type, passkey values
Mode
CONFIG
You can verify the configuration by using the command(s) below:
RADIUS is commonly used in enterprise and service provider networks to authenticate and authorize users before granting them access to network services.
In SONiC NOS, RADIUS is supported to achieve a crucial role in securing and managing network access by providing a centralized authentication, authorization, and accounting framework. SONiC switch performs a Client - network access server (NAS) role.
RADIUS is not supported on these platforms: EdgeCore AS5812 & EdgeCore AS7712
You can verify the configuration by using the command(s) below:
You can verify the configuration by using the command(s) below:
AAA stands for Authentication, Authorization and Accounting. These protocols were defined by the Internet Engineering Task Force and are intended to provide an Authentication, Authorization, and Accounting (AAA) framework for applications, such as network access or IP mobility in both local and roaming situations.
TACACS uses (either TCP or UDP) port 49 by default. TACACS allows a client to accept a username and password and send a query to a TACACS authentication server, sometimes called a TACACS daemon or simply TACACSD. It would determine whether to accept or deny the authentication request and send a response back. In this way, the process of making the decision is "opened up" and the algorithms and data used to make the decision are under the complete control of the TACACS daemon.
RADIUS, which stands for Remote Authentication Dial-In User Service, is a network protocol commonly used for centralized authentication, authorization, and accounting (AAA) management. Similar to TACACS, RADIUS is designed to allow clients to authenticate and request services from a centralized server, referred to as a RADIUS server or RADIUS daemon.
When using fail-through, if the primary TACACS server fails to respond within a specified timeout period, the authentication request is automatically forwarded to the next authentication method configured, such as a local database or a different authentication server.
If we disable fail-through, the system fails to authenticate with a reachable TACACS+ server the system does not attempt to authenticate with the next TACACS+ server.
The fallback is mainly intended to provide an alternative way to authenticate users when there’s an issue with the primary authentication server or method, not to give users multiple attempts to authenticate with different methods.
Fallback operates at the AAA (Authentication, Authorization, and Accounting) level, allowing the network device or system to switch to the secondary TACACS server when the primary server is not available.
In summary, failthrough refers to the process of falling back to an alternative authentication method if the primary TACACS server fails to respond, while fallback involves switching to a backup TACACS server when the primary server is unavailable for AAA services.
You can configure the Authentication, Authorization and Accounting (AAA) using the following command:
You can verify the configuration by using the command(s) below:
Command
[no] radius [auth-type <<chap|pap|mschapv2> default pap>] [nasip ] [key ] [source-ip ] [retransmit ] [timeout ]
Description
Configure RADIUS
Parameters
auth-type, nasip, key, source-ip, retransmit, timeout
Mode
CONFIG
Command
[no] radius-server host key [auth-type <chap|pap|mschapv2> default pap] [auth-port <range[1:65535] default 1812>] [priority <integer default 1>] source-intf [retransmit ] [timeout ]
Description
Configure RADIUS
Parameters
auth-type, auth-port, priority,source-interface, retransmit, timeout
Mode
CONFIG
Command
[no] aaa authentication (failthrough disable | fallback disable |login tacacs)
Description
AAA configuration
Parameters
None
Mode
CONFIG