TACACS+ Configuration Guide Cisco IOS Release 12 · • TACACS Configuration Examples, page 8 •...
Transcript of TACACS+ Configuration Guide Cisco IOS Release 12 · • TACACS Configuration Examples, page 8 •...
TACACS+ Configuration Guide Cisco IOSRelease 12.4T
Americas HeadquartersCisco Systems, Inc.170 West Tasman DriveSan Jose, CA 95134-1706USAhttp://www.cisco.comTel: 408 526-4000 800 553-NETS (6387)Fax: 408 527-0883
THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS,INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND,EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS.
THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPEDWITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITEDWARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY.
The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB’s public domain versionof the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California.
NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS” WITH ALLFAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OFMERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADEPRACTICE.
IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING,WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO ORITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationshipbetween Cisco and any other company. (1110R)
Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and phone numbers. Any examples, command display output,network topology diagrams, and other figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses or phone numbers in illustrative contentis unintentional and coincidental.
© 2012 Cisco Systems, Inc. All rights reserved.
C O N T E N T S
Configuring TACACS 1
Finding Feature Information 1
Prerequisites for Configuring TACACS 1
Restrictions for Configuring TACACS 1
Information About TACACS 1
TACACS Operation 2
TACACS AV Pairs 3
How to Configure TACACS 3
Identifying the TACACS Server Host 4
Setting the TACACS Authentication Key 5
Configuring AAA Server Groups 5
Configuring AAA Server Group Selection Based on DNIS 6
Specifying TACACS Authentication 7
Specifying TACACS Authorization 8
Specifying TACACS Accounting 8
TACACS Configuration Examples 8
TACACS Authentication Examples 8
TACACS Authorization Example 10
TACACS Accounting Example 10
TACACS Server Group Example 11
AAA Server Group Selection Based on DNIS Example 11
TACACS Daemon Configuration Example 12
Additional References 12
Feature Information for Configuring TACACS 13
Per VRF for TACACS Servers 15
Finding Feature Information 15
Prerequisites for Per VRF for TACACS Servers 15
Restrictions for Per VRF for TACACS Servers 15
Information About Per VRF for TACACS Servers 16
TACACS+ Configuration Guide Cisco IOS Release 12.4T iii
Per VRF for TACACS Servers Overview 16
How to Configure Per VRF for TACACS Servers 16
Configuring Per VRF on a TACACS Server 16
Verifying Per VRF for TACACS Servers 19
Configuration Examples for Per VRF for TACACS Servers 20
Configuring Per VRF for TACACS Servers Example 20
Additional References 20
Feature Information for Per VRF for TACACS Servers 21
TACACS Attribute-Value Pairs 23
Information About TACACS Attribute-Value Pairs 23
TACACS Authentication and Authorization AV Pairs 23
TACACS Accounting AV Pairs 65
Additional References 132
Contents
TACACS+ Configuration Guide Cisco IOS Release 12.4Tiv
Configuring TACACS
TACACS+ provides detailed accounting information and flexible administrative control overauthentication and authorization processes. TACACS+ is facilitated through AAA.
• Finding Feature Information, page 1• Prerequisites for Configuring TACACS, page 1• Restrictions for Configuring TACACS, page 1• Information About TACACS, page 1• TACACS AV Pairs, page 3• How to Configure TACACS, page 3• TACACS Configuration Examples, page 8• Additional References, page 12• Feature Information for Configuring TACACS, page 13
Finding Feature InformationYour software release may not support all the features documented in this module. For the latest featureinformation and caveats, see the release notes for your platform and software release. To find informationabout the features documented in this module, and to see a list of the releases in which each feature issupported, see the Feature Information Table at the end of this document.
Use Cisco Feature Navigator to find information about platform support and Cisco software image support.To access Cisco Feature Navigator, go to www.cisco.com/go/cfn. An account on Cisco.com is not required.
Prerequisites for Configuring TACACSYou must have access to and must configure a TACACS+ server before the configured TACACS+ featureson your network access server are available.
Restrictions for Configuring TACACSTACACS+ can be enabled only through AAA commands.
Information About TACACS
TACACS+ Configuration Guide Cisco IOS Release 12.4T 1
TACACS+ is a security application that provides centralized validation of users attempting to gain accessto a router or network access server. TACACS+ services are maintained in a database on a TACACS+daemon running, typically, on a UNIX or Windows NT workstation.
TACACS+ provides for separate and modular authentication, authorization, and accounting facilities.TACACS+ allows for a single access control server (the TACACS+ daemon) to provide each service--authentication, authorization, and accounting--independently. Each service can be tied into its own databaseto take advantage of other services available on that server or on the network, depending on the capabilitiesof the daemon.
The goal of TACACS+ is to provide a methodology for managing multiple network access points from asingle management service. The Cisco family of access servers and routers and the Cisco IOS user interface(for both routers and access servers) can be network access servers.
Network access points enable traditional “dumb” terminals, terminal emulators, workstations, personalcomputers (PCs), and routers in conjunction with suitable adapters (for example, modems or ISDNadapters) to communicate using protocols such as Point-to-Point Protocol (PPP), Serial Line InternetProtocol (SLIP), Compressed SLIP (CSLIP), or AppleTalk Remote Access (ARA) protocol. In otherwords, a network access server provides connections to a single user, to a network or subnetwork, and tointerconnected networks. The entities connected to the network through a network access server are callednetwork access clients; for example, a PC running PPP over a voice-grade circuit is a network access client.TACACS+, administered through the AAA security services, can provide the following services:
• Authentication--Provides complete control of authentication through login and password dialog,challenge and response, messaging support.
The authentication facility provides the ability to conduct an arbitrary dialog with the user (for example,after a login and password are provided, to challenge a user with a number of questions, like home address,mother’s maiden name, service type, and social security number). In addition, the TACACS+authentication service supports sending messages to user screens. For example, a message could notifyusers that their passwords must be changed because of the company’s password aging policy.
• Authorization--Provides fine-grained control over user capabilities for the duration of the user’ssession, including but not limited to setting autocommands, access control, session duration, orprotocol support. You can also enforce restrictions on what commands a user may execute with theTACACS+ authorization feature.
• Accounting--Collects and sends information used for billing, auditing, and reporting to the TACACS+daemon. Network managers can use the accounting facility to track user activity for a security audit orto provide information for user billing. Accounting records include user identities, start and stop times,executed commands (such as PPP), number of packets, and number of bytes.
The TACACS+ protocol provides authentication between the network access server and the TACACS+daemon, and it ensures confidentiality because all protocol exchanges between a network access server anda TACACS+ daemon are encrypted.
You need a system running TACACS+ daemon software to use the TACACS+ functionality on yournetwork access server.
Cisco makes the TACACS+ protocol specification available as a draft RFC for those customers interestedin developing their own TACACS+ software.
• TACACS Operation, page 2
TACACS OperationWhen a user attempts a simple ASCII login by authenticating to a network access server using TACACS+,the following process typically occurs:
TACACS Operation Information About TACACS
TACACS+ Configuration Guide Cisco IOS Release 12.4T2
1 When the connection is established, the network access server will contact the TACACS+ daemon toobtain a username prompt, which is then displayed to the user. The user enters a username and thenetwork access server then contacts the TACACS+ daemon to obtain a password prompt. The networkaccess server displays the password prompt to the user, the user enters a password, and the password isthen sent to the TACACS+ daemon.
Note TACACS+ allows an arbitrary conversation to be held between the daemon and the user until the daemonreceives enough information to authenticate the user. This is usually done by prompting for a username andpassword combination, but may include other items, such as mother’s maiden name, all under the control ofthe TACACS+ daemon.
1 The network access server will eventually receive one of the following responses from the TACACS+daemon:
a ACCEPT--The user is authenticated and service may begin. If the network access server isconfigured to requite authorization, authorization will begin at this time.
b REJECT--The user has failed to authenticate. The user may be denied further access, or will beprompted to retry the login sequence depending on the TACACS+ daemon.
c ERROR--An error occurred at some time during authentication. This can be either at the daemon orin the network connection between the daemon and the network access server. If an ERRORresponse is received, the network access server will typically try to use an alternative method forauthenticating the user.
d CONTINUE--The user is prompted for additional authentication information.2 A PAP login is similar to an ASCII login, except that the username and password arrive at the network
access server in a PAP protocol packet instead of being typed in by the user, so the user is notprompted. PPP CHAP logins are also similar in principle.
Following authentication, the user will also be required to undergo an additional authorization phase, ifauthorization has been enabled on the network access server. Users must first successfully completeTACACS+ authentication before proceeding to TACACS+ authorization.
1 If TACACS+ authorization is required, the TACACS+ daemon is again contacted and it returns anACCEPT or REJECT authorization response. If an ACCEPT response is returned, the response willcontain data in the form of attributes that are used to direct the EXEC or NETWORK session for thatuser, determining services that the user can access. Services include the following:
a Telnet, rlogin, Point-to-Point Protocol (PPP), Serial Line Internet Protocol (SLIP), or EXECservices
b Connection parameters, including the host or client IP address, access list, and user timeouts
TACACS AV PairsThe network access server implements TACACS+ authorization and accounting functions by transmittingand receiving TACACS+ attribute-value (AV) pairs for each user session. For a list of supported TACACS+ AV pairs, refer to the appendix “TACACS+ Attribute-Value Pairs.”
How to Configure TACACSTo configure your router to support TACACS+, you must perform the following tasks:
Configuring TACACSTACACS AV Pairs
TACACS+ Configuration Guide Cisco IOS Release 12.4T 3
• Use the aaa new-model global configuration command to enable AAA. AAA must be configured ifyou plan to use TACACS+.
• Use the aaa authentication global configuration command to define method lists that use TACACS+for authentication. See the Configuring Authentication feature module for more information.
• Use line and interface commands to apply the defined method lists to various interfaces. See theConfiguring Authentication feature module for more information.
• If needed, use the aaa authorization global command to configure authorization for the networkaccess server. Unlike authentication, which can be configured per line or per interface, authorization isconfigured globally for the entire network access server. See the Configuring Authorization featuremodule for more information.
• If needed, use the aaa accounting command to enable accounting for TACACS+ connections. See theConfiguring Accounting feature module for more information.
• Identifying the TACACS Server Host, page 4
• Setting the TACACS Authentication Key, page 5
• Configuring AAA Server Groups, page 5
• Configuring AAA Server Group Selection Based on DNIS, page 6
• Specifying TACACS Authentication, page 7
• Specifying TACACS Authorization, page 8
• Specifying TACACS Accounting, page 8
Identifying the TACACS Server HostThe tacacs-server host command enables you to specify the names of the IP host or hosts maintaining aTACACS+ server. Because the TACACS+ software searches for the hosts in the order specified, thisfeature can be useful for setting up a list of preferred daemons.
Note The tacacs-server host command will be deprecated soon. You can use the server command instead of thetacacs-server host command.
To specify a TACACS+ host, use the following command in global configuration mode:
Command Purpose
Router(config)# tacacs-server host hostname [single-connection] [port integer] [timeout integer] [key string]
Specifies a TACACS+ host.
Using the tacacs-server host command, you can also configure the following options:
• Use the single-connection keyword to specify single-connection (only valid with CiscoSecure Release1.0.1 or later). Rather than have the router open and close a TCP connection to the daemon each time itmust communicate, the single-connection option maintains a single open connection between therouter and the daemon. This is more efficient because it allows the daemon to handle a higher numberof TACACS operations.
Identifying the TACACS Server Host How to Configure TACACS
TACACS+ Configuration Guide Cisco IOS Release 12.4T4
Note The daemon must support single-connection mode for this to be effective, otherwise the connectionbetween the network access server and the daemon will lock up or you will receive spurious errors.
• Use the port integer argument to specify the TCP port number to be used when making connections tothe TACACS+ daemon. The default port number is 49.
• Use the timeout integer argument to specify the period of time (in seconds) the router will wait for aresponse from the daemon before it times out and declares an error.
Note Specifying the timeout value with the tacacs-server host command overrides the default timeout value setwith the tacacs-server timeout command for this server only.
• Use the key string argument to specify an encryption key for encrypting and decrypting all trafficbetween the network access server and the TACACS+ daemon.
Note Specifying the encryption key with the tacacs-server host command overrides the default key set by theglobal configuration tacacs-server key command for this server only.
Because some of the parameters of the tacacs-server host command override global settings made by thetacacs-server timeout and tacacs-server key commands, you can use this command to enhance securityon your network by uniquely configuring individual TACACS+ connections.
Setting the TACACS Authentication KeyTo set the global TACACS+ authentication key and encryption key used to encrypt all exchanges betweenthe network access server and the TACACS+ daemon, use the following command in global configurationmode:
Command Purpose
Router(config)# tacacs-server key keySets the encryption key to match that used on theTACACS+ daemon.
Note The same key must be configured on the TACACS+ daemon for encryption to be successful.
Configuring AAA Server GroupsConfiguring the router to use AAA server groups provides a way to group existing server hosts. This allowsyou to select a subset of the configured server hosts and use them for a particular service. A server group isused in conjunction with a global server-host list. The server group lists the IP addresses of the selectedserver hosts.
Server groups can include multiple host entries as long as each entry has a unique IP address. If twodifferent host entries in the server group are configured for the same service--for example, accounting--thesecond host entry configured acts as fail-over backup to the first one. Using this example, if the first host
Setting the TACACS Authentication KeyHow to Configure TACACS
TACACS+ Configuration Guide Cisco IOS Release 12.4T 5
entry fails to provide accounting services, the network access server will try the second host entry foraccounting services. (The TACACS+ host entries will be tried in the order in which they are configured.)
To define a server host with a server group name, enter the following commands starting in globalconfiguration mode. The listed server must exist in global configuration mode:
SUMMARY STEPS
1. Router(config)# tacacs-server hostname [single-connection] [port integer] [timeout integer] [keystring]
2. Router(config-if)# aaa group server{radius | tacacs+} group-name
3. Router(config-sg)# server ip-address [auth-port port-number] [acct-port port-number]
DETAILED STEPS
Command or Action Purpose
Step 1 Router(config)# tacacs-serverhostname [single-connection][port integer] [timeout integer][key string]
Specifies and defines the IP address of the server host before configuring the AAAserver-group. See Identifying the TACACS Server Host for more information on thetacacs-server host command.
Step 2 Router(config-if)# aaa groupserver{radius | tacacs+} group-name
Defines the AAA server-group with a group name. All members of a group must bethe same type; that is, RADIUS or TACACS+. This command puts the router inserver group subconfiguration mode.
Step 3 Router(config-sg)# server ip-address [auth-port port-number][acct-port port-number]
Associates a particular TACACS+ server with the defined server group. Use theauth-port port-number option to configure a specific UDP port solely forauthentication. Use the acct-port port-number option to configure a specific UDPport solely for accounting.
Repeat this step for each TACACS+ server in the AAA server group.
Note Each server in the group must be defined previously using the tacacs-serverhost command.
Configuring AAA Server Group Selection Based on DNISCisco IOS software allows you to authenticate users to a particular AAA server group based on the DialedNumber Identification Service (DNIS) number of the session. Any phone line (a regular home phone or acommercial T1/PRI line) can be associated with several phone numbers. The DNIS number identifies thenumber that was called to reach you.
For example, suppose you want to share the same phone number with several customers, but you want toknow which customer is calling before you pick up the phone. You can customize how you answer thephone because DNIS allows you to know which customer is calling when you answer.
Cisco routers with either ISDN or internal modems can receive the DNIS number. This functionality allowsusers to assign different TACACS+ server groups for different customers (that is, different TACACS+servers for different DNIS numbers). Additionally, using server groups you can specify the same servergroup for AAA services or a separate server group for each AAA service.
Cisco IOS software provides the flexibility to implement authentication and accounting services in severalways:
Configuring AAA Server Group Selection Based on DNIS How to Configure TACACS
TACACS+ Configuration Guide Cisco IOS Release 12.4T6
• Globally--AAA services are defined using global configuration access list commands and applied ingeneral to all interfaces on a specific network access server.
• Per interface--AAA services are defined using interface configuration commands and appliedspecifically to the interface being configured on a specific network access server.
• DNIS mapping--You can use DNIS to specify an AAA server to supply AAA services.
Because AAA configuration methods can be configured simultaneously, Cisco has established an order ofprecedence to determine which server or groups of servers provide AAA services. The order of precedenceis as follows:
• Per DNIS--If you configure the network access server to use DNIS to identify which server groupprovides AAA services, then this method takes precedence over any additional AAA selection method.
• Per interface--If you configure the network access server per interface to use access lists to determinehow a server provides AAA services, this method takes precedence over any global configurationAAA access lists.
• Globally--If you configure the network access server by using global AAA access lists to determinehow the security server provides AAA services, this method has the lowest precedence.
Note Prior to configuring AAA Server Group Selection Based on DNIS, you must configure the remote securityservers associated with each AAA server group. See Identifying the TACACS Server Host and ConfiguringAAA Server Groups for more information.
To configure the router to select a particular AAA server group based on the DNIS of the server group,configure DNIS mapping. To map a server group with a group name with DNIS number, use the followingcommands in global configuration mode:
SUMMARY STEPS
1. Router(config)# aaa dnis map enable
2. Router(config)# aaa dnis map dnis-number authentication ppp group server-group-name
3. Router(config)# aaa dnis map dnis-number accounting network [none | start-stop | stop-only] groupserver-group-name
DETAILED STEPS
Command or Action Purpose
Step 1 Router(config)# aaa dnis map enable Enables DNIS mapping.
Step 2 Router(config)# aaa dnis map dnis-numberauthentication ppp group server-group-name
Maps a DNIS number to a defined AAA server group; theservers in this server group are being used for authentication.
Step 3 Router(config)# aaa dnis map dnis-number accountingnetwork [none | start-stop | stop-only] group server-group-name
Maps a DNIS number to a defined AAA server group; theservers in this server group are being used for accounting.
Specifying TACACS AuthenticationAfter you have identified the TACACS+ daemon and defined an associated TACACS+ encryption key,you must define method lists for TACACS+ authentication. Because TACACS+ authentication is operated
Specifying TACACS AuthenticationHow to Configure TACACS
TACACS+ Configuration Guide Cisco IOS Release 12.4T 7
via AAA, you need to issue the aaa authentication command, specifying TACACS+ as the authenticationmethod. See the Configuring Authentication feature module for more information.
Specifying TACACS AuthorizationAAA authorization enables you to set parameters that restrict a user’s access to the network. Authorizationvia TACACS+ may be applied to commands, network connections, and EXEC sessions. Because TACACS+ authorization is facilitated through AAA, you must issue the aaa authorization command, specifyingTACACS+ as the authorization method. See the Configuring Authorization feature module for moreinformation.
Specifying TACACS AccountingAAA accounting enables you to track the services users are accessing as well as the amount of networkresources they are consuming. Because TACACS+ accounting is facilitated through AAA, you must issuethe aaa accounting command, specifying TACACS+ as the accounting method. See the ConfiguringAccounting feature module for more information.
TACACS Configuration Examples• TACACS Authentication Examples, page 8
• TACACS Authorization Example, page 10
• TACACS Accounting Example, page 10
• TACACS Server Group Example, page 11
• AAA Server Group Selection Based on DNIS Example, page 11
• TACACS Daemon Configuration Example, page 12
TACACS Authentication ExamplesThe following example shows how to configure TACACS+ as the security protocol for PPP authentication:
aaa new-modelaaa authentication ppp test group tacacs+ localtacacs-server host 10.1.2.3tacacs-server key goawayinterface serial 0 ppp authentication chap pap test
The lines in the preceding sample configuration are defined as follows:
• The aaa new-model command enables the AAA security services.• The aaa authentication command defines a method list, “test,” to be used on serial interfaces running
PPP. The keyword group tacacs+ means that authentication will be done through TACACS+. IfTACACS+ returns an ERROR of some sort during authentication, the keyword local indicates thatauthentication will be attempted using the local database on the network access server.
• The tacacs-server host command identifies the TACACS+ daemon as having an IP address of10.1.2.3. The tacacs-server key command defines the shared encryption key to be “goaway.”
• The interface command selects the line, and the ppp authentication command applies the testmethod list to this line.
Specifying TACACS Authorization TACACS Configuration Examples
TACACS+ Configuration Guide Cisco IOS Release 12.4T8
The following example shows how to configure TACACS+ as the security protocol for PPP authentication,but instead of the “test” method list, the “default” method list is used.
aaa new-modelaaa authentication ppp default if-needed group tacacs+ localtacacs-server host 10.1.2.3tacacs-server key goawayinterface serial 0 ppp authentication chap default
The lines in the preceding sample configuration are defined as follows:
• The aaa new-model command enables the AAA security services.• The aaa authentication command defines a method list, “default,” to be used on serial interfaces
running PPP. The keyword default means that PPP authentication is applied by default to allinterfaces. The if-needed keyword means that if the user has already authenticated by going throughthe ASCII login procedure, then PPP authentication is not necessary and can be skipped. Ifauthentication is needed, the keyword group tacacs+ means that authentication will be done throughTACACS+. If TACACS+ returns an ERROR of some sort during authentication, the keyword localindicates that authentication will be attempted using the local database on the network access server.
• The tacacs-server host command identifies the TACACS+ daemon as having an IP address of10.1.2.3. The tacacs-server key command defines the shared encryption key to be “goaway.”
• The interface command selects the line, and the ppp authentication command applies the defaultmethod list to this line.
The following example shows how to create the same authentication algorithm for PAP, but it calls themethod list “MIS-access” instead of “default”:
aaa new-modelaaa authentication pap MIS-access if-needed group tacacs+ localtacacs-server host 10.1.2.3tacacs-server key goawayinterface serial 0 ppp authentication pap MIS-access
The lines in the preceding sample configuration are defined as follows:
• The aaa new-model command enables the AAA security services.• The aaa authentication command defines a method list, “MIS-access,” to be used on serial interfaces
running PPP. The method list, “MIS-access,” means that PPP authentication is applied to all interfaces.The if-needed keyword means that if the user has already authenticated by going through the ASCIIlogin procedure, then PPP authentication is not necessary and can be skipped. If authentication isneeded, the keyword group tacacs+ means that authentication will be done through TACACS+. IfTACACS+ returns an ERROR of some sort during authentication, the keyword local indicates thatauthentication will be attempted using the local database on the network access server.
• The tacacs-server host command identifies the TACACS+ daemon as having an IP address of10.1.2.3. The tacacs-server key command defines the shared encryption key to be “goaway.”
• The interface command selects the line, and the ppp authentication command applies the defaultmethod list to this line.
The following example shows the configuration for a TACACS+ daemon with an IP address of 10.2.3.4and an encryption key of “apple”:
aaa new-modelaaa authentication login default group tacacs+ localtacacs-server host 10.2.3.4tacacs-server key apple
The lines in the preceding sample configuration are defined as follows:
Configuring TACACSTACACS Configuration Examples
TACACS+ Configuration Guide Cisco IOS Release 12.4T 9
• The aaa new-model command enables the AAA security services.• The aaa authentication command defines the default method list. Incoming ASCII logins on all
interfaces (by default) will use TACACS+ for authentication. If no TACACS+ server responds, thenthe network access server will use the information contained in the local username database forauthentication.
• The tacacs-server host command identifies the TACACS+ daemon as having an IP address of10.2.3.4. The tacacs-server key command defines the shared encryption key to be “apple.”
TACACS Authorization ExampleThe following example shows how to configure TACACS+ as the security protocol for PPP authenticationusing the default method list; it also shows how to configure network authorization via TACACS+:
aaa new-modelaaa authentication ppp default if-needed group tacacs+ localaaa authorization network default group tacacs+tacacs-server host 10.1.2.3tacacs-server key goawayinterface serial 0 ppp authentication chap default
The lines in the preceding sample configuration are defined as follows:
• The aaa new-model command enables the AAA security services.• The aaa authentication command defines a method list, “default,” to be used on serial interfaces
running PPP. The keyword default means that PPP authentication is applied by default to allinterfaces. The if-needed keyword means that if the user has already authenticated by going throughthe ASCII login procedure, then PPP authentication is not necessary and can be skipped. Ifauthentication is needed, the keyword group tacacs+ means that authentication will be done throughTACACS+. If TACACS+ returns an ERROR of some sort during authentication, the keyword localindicates that authentication will be attempted using the local database on the network access server.
• The aaa authorization command configures network authorization via TACACS+. Unlikeauthentication lists, this authorization list always applies to all incoming network connections made tothe network access server.
• The tacacs-server host command identifies the TACACS+ daemon as having an IP address of10.1.2.3. The tacacs-server key command defines the shared encryption key to be “goaway.”
• The interface command selects the line, and the ppp authentication command applies the defaultmethod list to this line.
TACACS Accounting ExampleThe following example shows how to configure TACACS+ as the security protocol for PPP authenticationusing the default method list; it also shows how to configure accounting via TACACS+:
aaa new-modelaaa authentication ppp default if-needed group tacacs+ localaaa accounting network default stop-only group tacacs+tacacs-server host 10.1.2.3tacacs-server key goawayinterface serial 0 ppp authentication chap default
The lines in the preceding sample configuration are defined as follows:
• The aaa new-model command enables the AAA security services.• The aaa authentication command defines a method list, “default,” to be used on serial interfaces
running PPP. The keyword default means that PPP authentication is applied by default to all
TACACS Authorization Example TACACS Configuration Examples
TACACS+ Configuration Guide Cisco IOS Release 12.4T10
interfaces. The if-needed keyword means that if the user has already authenticated by going throughthe ASCII login procedure, then PPP authentication is not necessary and can be skipped. Ifauthentication is needed, the keyword group tacacs+ means that authentication will be done throughTACACS+. If TACACS+ returns an ERROR of some sort during authentication, the keyword localindicates that authentication will be attempted using the local database on the network access server.
• The aaa accounting command configures network accounting via TACACS+. In this example,accounting records describing the session that just terminated will be sent to the TACACS+ daemonwhenever a network connection terminates.
• The tacacs-server host command identifies the TACACS+ daemon as having an IP address of10.1.2.3. The tacacs-server key command defines the shared encryption key to be “goaway.”
• The interface command selects the line, and the ppp authentication command applies the defaultmethod list to this line.
TACACS Server Group ExampleThe following example shows how to create a server group with three different TACACS+ serversmembers:
aaa group server tacacs tacgroup1server 172.16.1.1 server 172.16.1.21 server 172.16.1.31
AAA Server Group Selection Based on DNIS ExampleThe following example shows how to select TACAC+ server groups based on DNIS to provide specificAAA services:
! This command enables AAA.aaa new-model!! The following set of commands configures the TACACS+ servers that will be associated! with one of the defined server groups.tacacs-server host 172.16.0.1 tacacs-server host 172.17.0.1 tacacs-server host 172.18.0.1 tacacs-server host 172.19.0.1 tacacs-server host 172.20.0.1 tacacs-server key abcdefg ! The following commands define the sg1 TACACS+ server group and associate servers ! with it.aaa group server tacacs sg1 server 172.16.0.1 server 172.17.0.1! The following commands define the sg2 TACACS+ server group and associate a server! with it.aaa group server tacacs sg2 server 172.18.0.1! The following commands define the sg3 TACACS+ server group and associate a server! with it.aaa group server tacacs sg3 server 172.19.0.1! The following commands define the default-group TACACS+ server group and associate! a server with it.aaa group server tacacs default-group server 172.20.0.1!! The next set of commands configures default-group tacacs server group parameters.aaa authentication ppp default group default-groupaaa accounting network default start-stop group default-group!! The next set of commands enables DNIS mapping and maps DNIS numbers to the defined
TACACS Server Group ExampleTACACS Configuration Examples
TACACS+ Configuration Guide Cisco IOS Release 12.4T 11
! RADIUS server groups. In this configuration, all PPP connection requests using DNIS! 7777 are sent to the sg1 server group. The accounting records for these connections! (specifically, start-stop records) are handled by the sg2 server group. Calls with a! DNIS of 8888 use server group sg3 for authentication and server group default-group! for accounting. Calls with a DNIS of 9999 use server group default-group for! authentication and server group sg3 for accounting records (stop records only). All! other calls with DNIS other than the ones defined use the server group default-group! for both authentication and stop-start accounting records.aaa dnis map enableaaa dnis map 7777 authentication ppp group sg1aaa dnis map 7777 accounting network start-stop group sg2aaa dnis map 8888 authentication ppp group sg3aaa dnis map 9999 accounting network stop-only group sg3
TACACS Daemon Configuration ExampleThe following example shows a sample configuration of the TACACS+ daemon. The precise syntax usedby your TACACS+ daemon may be different from what is included in this example.
user = mci_customer1 { chap = cleartext “some chap password” service = ppp protocol = ip {inacl#1=”permit ip any any precedence immediate”inacl#2=”deny igrp 0.0.1.2 255.255.0.0 any” }
Additional ReferencesThe following sections provide references related to the Configuring TACACS+ feature.
Related Documents
Related Topic Document Title
AAA Cisco IOS Security Guide: Securing User Services
Standards
Standard Title
No new or modified standards are supported by thisfeature, and support for existing standards has notbeen modified by this feature.
--
MIBs
MIB MIBs Link
No new or modified MIBs are supported by thisfeature, and support for existing MIBs has not beenmodified by this feature.
To locate and download MIBs for selectedplatforms, Cisco IOS releases, and feature sets, useCisco MIB Locator found at the following URL:
http://www.cisco.com/go/mibs
TACACS Daemon Configuration Example Additional References
TACACS+ Configuration Guide Cisco IOS Release 12.4T12
RFCs
RFC Title
No new or modified RFCs are supported by thisfeature.
--
Technical Assistance
Description Link
The Cisco Support website provides extensiveonline resources, including documentation and toolsfor troubleshooting and resolving technical issueswith Cisco products and technologies.
To receive security and technical information aboutyour products, you can subscribe to variousservices, such as the Product Alert Tool (accessedfrom Field Notices), the Cisco Technical ServicesNewsletter, and Really Simple Syndication (RSS)Feeds.
Access to most tools on the Cisco Support websiterequires a Cisco.com user ID and password.
http://www.cisco.com/techsupport
Feature Information for Configuring TACACSThe following table provides release information about the feature or features described in this module.This table lists only the software release that introduced support for a given feature in a given softwarerelease train. Unless noted otherwise, subsequent releases of that software release train also support thatfeature.
Use Cisco Feature Navigator to find information about platform support and Cisco software image support.To access Cisco Feature Navigator, go to www.cisco.com/go/cfn. An account on Cisco.com is not required.
Table 1 Feature Information for Configuring TACACS+
Feature Name Releases Feature Information
Configuring TACACS+ 10.0 TACACS+ provides detailedaccounting information andflexible administrative controlover authentication andauthorization processes.TACACS+ is facilitated throughAAA and can be enabled onlythrough AAA commands.
In Cisco IOS Release 10.0, thisfeature was introduced.
Configuring TACACSFeature Information for Configuring TACACS
TACACS+ Configuration Guide Cisco IOS Release 12.4T 13
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S.and other countries. To view a list of Cisco trademarks, go to this URL: www.cisco.com/go/trademarks.Third-party trademarks mentioned are the property of their respective owners. The use of the word partnerdoes not imply a partnership relationship between Cisco and any other company. (1110R)
Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to beactual addresses and phone numbers. Any examples, command display output, network topology diagrams,and other figures included in the document are shown for illustrative purposes only. Any use of actual IPaddresses or phone numbers in illustrative content is unintentional and coincidental.
Configuring TACACS
TACACS+ Configuration Guide Cisco IOS Release 12.4T14
Per VRF for TACACS Servers
The Per VRF for TACACS+ Servers feature allows per virtual route forwarding (per VRF) to beconfigured for authentication, authorization, and accounting (AAA) on TACACS+ servers.
• Finding Feature Information, page 15• Prerequisites for Per VRF for TACACS Servers, page 15• Restrictions for Per VRF for TACACS Servers, page 15• Information About Per VRF for TACACS Servers, page 16• How to Configure Per VRF for TACACS Servers, page 16• Configuration Examples for Per VRF for TACACS Servers, page 20• Additional References, page 20• Feature Information for Per VRF for TACACS Servers, page 21
Finding Feature InformationYour software release may not support all the features documented in this module. For the latest featureinformation and caveats, see the release notes for your platform and software release. To find informationabout the features documented in this module, and to see a list of the releases in which each feature issupported, see the Feature Information Table at the end of this document.
Use Cisco Feature Navigator to find information about platform support and Cisco software image support.To access Cisco Feature Navigator, go to www.cisco.com/go/cfn. An account on Cisco.com is not required.
Prerequisites for Per VRF for TACACS Servers• TACACS+ server access is required.• Experience configuring TACACS+, AAA and per VRF AAA, and group servers is necessary.
Restrictions for Per VRF for TACACS Servers• The VRF instance must be specified before per VRF for a TACACS+ server is configured.
TACACS+ Configuration Guide Cisco IOS Release 12.4T 15
Information About Per VRF for TACACS Servers• Per VRF for TACACS Servers Overview, page 16
Per VRF for TACACS Servers OverviewThe Per VRF for TACACS+ Servers feature allows per VRF AAA to be configured on TACACS+ servers.Prior to Cisco IOS Release 12.3(7)T, this functionality was available only on RADIUS servers.
How to Configure Per VRF for TACACS Servers• Configuring Per VRF on a TACACS Server, page 16
• Verifying Per VRF for TACACS Servers, page 19
Configuring Per VRF on a TACACS ServerThe initial steps in this procedure are used to configure AAA and a server group, create a VRF routingtable, and configure an interface. Steps 10 through 13 are used to configure the per VRF on a TACACS+server feature:
SUMMARY STEPS
1. enable
2. configure terminal
3. ip vrf vrf-name
4. rd route-distinguisher
5. exit
6. interface interface-name
7. ip vrf forwarding vrf-name
8. ip address ip-address mask [secondary]
9. exit
10. aaa group server tacacs+ group-name
11. server-private {ip-address | name} [nat] [single-connection] [port port-number] [timeout seconds][key [0 | 7] string]
12. ip vrf forwarding vrf-name
13. ip tacacs source-interface subinterface-name
14. exit
Per VRF for TACACS Servers Overview Information About Per VRF for TACACS Servers
TACACS+ Configuration Guide Cisco IOS Release 12.4T16
DETAILED STEPS
Command or Action Purpose
Step 1 enable
Example:
Router> enable
Enables privileged EXEC mode.
• Enter your password if prompted.
Step 2 configure terminal
Example:
Router# configure terminal
Enters global configuration mode.
Step 3 ip vrf vrf-name
Example:
Router (config)# ip vrf cisco
Configures a VRF table and enters VRFconfiguration mode.
Step 4 rd route-distinguisher
Example:
Router (config-vrf)# rd 100:1
Creates routing and forwarding tables for a VRFinstance.
Step 5 exit
Example:
Router (config-vrf)# exit
Exits VRF configuration mode.
Step 6 interface interface-name
Example:
Router (config)# interface Loopback0
Configures an interface and enters interfaceconfiguration mode.
Step 7 ip vrf forwarding vrf-name
Example:
Router (config-if)# ip vrf forwarding cisco
Configures a VRF for the interface.
Per VRF for TACACS ServersHow to Configure Per VRF for TACACS Servers
TACACS+ Configuration Guide Cisco IOS Release 12.4T 17
Command or Action Purpose
Step 8 ip address ip-address mask [secondary]
Example:
Router (config-if)# ip address 10.0.0.2 255.0.0.0
Sets a primary or secondary IP address for aninterface.
Step 9 exit
Example:
Router (config-if)# exit
Exits interface configuration mode.
Step 10 aaa group server tacacs+ group-name
Example:
Router (config)# aaa group server tacacs+ tacacs1
Groups different TACACS+ server hosts intodistinct lists and distinct methods and enters server-group configuration mode.
Step 11 server-private {ip-address | name} [nat] [single-connection][port port-number] [timeout seconds] [key [0 | 7] string]
Example:
Router (config-sg-tacacs+)# server-private 10.1.1.1 port 19 key cisco
Configures the IP address of the private TACACS+server for the group server.
Step 12 ip vrf forwarding vrf-name
Example:
Router (config-sg-tacacs+)# ip vrf forwarding cisco
Configures the VRF reference of a AAA TACACS+server group.
Step 13 ip tacacs source-interface subinterface-name
Example:
Router (config-sg-tacacs+)# ip tacacs source-interface Loopback0
Uses the IP address of a specified interface for alloutgoing TACACS+ packets.
Step 14 exit
Example:
Router (config-sg-tacacs)# exit
Exits server-group configuration mode.
Per VRF for TACACS Servers How to Configure Per VRF for TACACS Servers
TACACS+ Configuration Guide Cisco IOS Release 12.4T18
Verifying Per VRF for TACACS ServersTo verify the per VRF TACACS+ configuration, perform the following steps:
Note The debug commands may be used in any order.
SUMMARY STEPS
1. enable
2. debug tacacs authentication
3. debug tacacs authorization
4. debug tacacs accounting
5. debug tacacs packets
DETAILED STEPS
Command or Action Purpose
Step 1 enable
Example:
Router> enable
Enables privileged EXEC mode.
• Enter your password if prompted.
Step 2 debug tacacs authentication
Example:
Router# debug tacacs authentication
Displays information about AAA/TACACS+ authentication.
Step 3 debug tacacs authorization
Example:
Router# debug tacacs authorization
Displays information about AAA/TACACS+ authorization.
Step 4 debug tacacs accounting
Example:
Router# debug tacacs accounting
Displays information about accountable events as they occur.
Verifying Per VRF for TACACS ServersHow to Configure Per VRF for TACACS Servers
TACACS+ Configuration Guide Cisco IOS Release 12.4T 19
Command or Action Purpose
Step 5 debug tacacs packets
Example:
Router# debug tacacs packets
Displays information about TACACS+ packets.
Configuration Examples for Per VRF for TACACS Servers• Configuring Per VRF for TACACS Servers Example, page 20
Configuring Per VRF for TACACS Servers ExampleThe following output example shows that the group server tacacs1 is configured for per VRF AAAservices:
aaa group server tacacs+ tacacs1 server-private 10.1.1.1 port 19 key cisco ip vrf forwarding cisco ip tacacs source-interface Loopback0 ip vrf cisco rd 100:1 interface Loopback0 ip address 10.0.0.2 255.0.0.0 ip vrf forwarding cisco
Additional ReferencesThe following sections provide references related to Per VRF for TACACS+ Servers..
Related Documents
Related Topic Document Title
Configuring TACACS+ Configuring TACACS+ module.
Per VRF AAA Per VRF AAA module.
Security commands Cisco IOS Security Command Reference
Standards
Standard Title
No new or modified standards are supported by thisfeature, and support for existing standards has notbeen modified by this feature.
--
Configuring Per VRF for TACACS Servers Example Configuration Examples for Per VRF for TACACS Servers
TACACS+ Configuration Guide Cisco IOS Release 12.4T20
MIBs
MIB MIBs Link
No new or modified MIBs are supported by thisfeature, and support for existing MIBs has not beenmodified by this feature.
To locate and download MIBs for selectedplatforms, Cisco IOS releases, and feature sets, useCisco MIB Locator found at the following URL:
http://www.cisco.com/go/mibs
RFCs
RFC Title
No new or modified RFCs are supported by thisfeature, and support for existing RFCs has not beenmodified by this feature.
--
Technical Assistance
Description Link
The Cisco Support website provides extensiveonline resources, including documentation and toolsfor troubleshooting and resolving technical issueswith Cisco products and technologies.
To receive security and technical information aboutyour products, you can subscribe to variousservices, such as the Product Alert Tool (accessedfrom Field Notices), the Cisco Technical ServicesNewsletter, and Really Simple Syndication (RSS)Feeds.
Access to most tools on the Cisco Support websiterequires a Cisco.com user ID and password.
http://www.cisco.com/cisco/web/support/index.html
Feature Information for Per VRF for TACACS ServersThe following table provides release information about the feature or features described in this module.This table lists only the software release that introduced support for a given feature in a given softwarerelease train. Unless noted otherwise, subsequent releases of that software release train also support thatfeature.
Use Cisco Feature Navigator to find information about platform support and Cisco software image support.To access Cisco Feature Navigator, go to www.cisco.com/go/cfn. An account on Cisco.com is not required.
Per VRF for TACACS ServersFeature Information for Per VRF for TACACS Servers
TACACS+ Configuration Guide Cisco IOS Release 12.4T 21
Table 2 Feature Information for Per VRF for TACACS+ Servers
Feature Name Releases Feature Information
Per VRF for TACACS+ Servers 12.3(7)T 12.2(33)SRA112.2(33)SXI 12.2(33)SXH412.2(54)SG
The Per VRF for TACACS+Servers feature allows per virtualroute forwarding (per VRF) to beconfigured for authentication,authorization, and accounting(AAA) on TACACS+ servers.
This feature was introduced inCisco IOS Release 12.3(7)T.
This feature was integrated intoCisco IOS Release12.2(33)SRA1.
This feature was integrated intoCisco IOS Release 12.2(33)SXI.
This feature was integrated intoCisco IOS Release12.2(33)SXH4.
The following commands wereintroduced or modified: ip tacacssource-interface, ip vrfforwarding (server-group),server-private (TACACS+).
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S.and other countries. To view a list of Cisco trademarks, go to this URL: www.cisco.com/go/trademarks.Third-party trademarks mentioned are the property of their respective owners. The use of the word partnerdoes not imply a partnership relationship between Cisco and any other company. (1110R)
Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to beactual addresses and phone numbers. Any examples, command display output, network topology diagrams,and other figures included in the document are shown for illustrative purposes only. Any use of actual IPaddresses or phone numbers in illustrative content is unintentional and coincidental.
Per VRF for TACACS Servers
TACACS+ Configuration Guide Cisco IOS Release 12.4T22
TACACS Attribute-Value Pairs
Terminal Access Controller Access Control System Plus (TACACS+) attribute-value (AV) pairs are usedto define specific authentication, authorization, and accounting elements in a user profile that is stored onthe TACACS+ daemon. This module lists the TACACS+ AV pairs currently supported.
• Information About TACACS Attribute-Value Pairs, page 23• Additional References, page 132
Information About TACACS Attribute-Value Pairs• TACACS Authentication and Authorization AV Pairs, page 23
• TACACS Accounting AV Pairs, page 65
TACACS Authentication and Authorization AV PairsThe following table lists and describes the supported TACACS+ authentication and authorization AV pairsand specifies the Cisco IOS release in which they are implemented.
Table 3 Supported TACACS+ Authentication and Authorization AV Pairs
Attribute Description 11.0 11.1 11.2 11.3 12.0 12.1 12.2
acl=x ASCIInumberrepresentinga connectionaccess list.Used onlywhenservice=shell.
yes yes yes yes yes yes yes
TACACS+ Configuration Guide Cisco IOS Release 12.4T 23
Attribute Description 11.0 11.1 11.2 11.3 12.0 12.1 12.2
addr=x A networkaddress.Used withservice=slip,service=ppp, andprotocol=ip.Contains theIP addressthat theremote hostshould usewhenconnectingvia SLIP orPPP/IP. Forexample,addr=10.2.3.4.
yes yes yes yes yes yes yes
TACACS Attribute-Value Pairs Information About TACACS Attribute-Value Pairs
TACACS+ Configuration Guide Cisco IOS Release 12.4T24
Attribute Description 11.0 11.1 11.2 11.3 12.0 12.1 12.2
addr-pool=x Specifies thename of alocal poolfrom whichto get theaddress ofthe remotehost. Usedwithservice=pppandprotocol=ip.
Note thataddr-poolworks inconjunctionwith localpooling. Itspecifies thename of alocal pool(which mustbepreconfigured on thenetworkaccessserver). Usethe ip-localpoolcommand todeclare localpools. Forexample:
ip address-pool local
ip local poolboo 10.0.0.110.0.0.10
ip local poolmoo10.0.0.110.0.0.20
You canthen useTACACS+to returnaddr-
yes yes yes yes yes yes yes
TACACS Attribute-Value PairsInformation About TACACS Attribute-Value Pairs
TACACS+ Configuration Guide Cisco IOS Release 12.4T 25
Attribute Description 11.0 11.1 11.2 11.3 12.0 12.1 12.2
pool=boo oraddr-pool=mooto indicatethe addresspool fromwhich youwant to getthis remotenode’saddress.
autocmd=x Specifies anautocommand to beexecuted atEXECstartup (forexample,autocmd=telnetexample.com). Usedonly withservice=shell.
yes yes yes yes yes yes yes
TACACS Attribute-Value Pairs Information About TACACS Attribute-Value Pairs
TACACS+ Configuration Guide Cisco IOS Release 12.4T26
Attribute Description 11.0 11.1 11.2 11.3 12.0 12.1 12.2
callback-dialstring
Sets thetelephonenumber fora callback(forexample:callback-dialstring=408-555-1212). Value isNULL, or adial-string.A NULLvalueindicatesthat theservicemightchoose toget the dialstringthroughother means.Used withservice=arap,service=slip,service=ppp,service=shell. Not validfor ISDN.
no yes yes yes yes yes yes
TACACS Attribute-Value PairsInformation About TACACS Attribute-Value Pairs
TACACS+ Configuration Guide Cisco IOS Release 12.4T 27
Attribute Description 11.0 11.1 11.2 11.3 12.0 12.1 12.2
callback-line
The numberof a TTYline to usefor callback(forexample:callback-line=4).Used withservice=arap,service=slip,service=ppp,service=shell. Not validfor ISDN.
no yes yes yes yes yes yes
callback-rotary
The numberof a rotarygroup(between 0and 100inclusive) touse forcallback (forexample:callback-rotary=34).Used withservice=arap,service=slip,service=ppp,service=shell. Not validfor ISDN.
no yes yes yes yes yes yes
TACACS Attribute-Value Pairs Information About TACACS Attribute-Value Pairs
TACACS+ Configuration Guide Cisco IOS Release 12.4T28
Attribute Description 11.0 11.1 11.2 11.3 12.0 12.1 12.2
cmd-arg=x Anargument toa shell(EXEC)command.Thisindicates anargumentfor the shellcommandthat is to berun.Multiplecmd-argattributescan bespecified,and they areorderdependent.
Note ThisTACACS+ AVpaircannot beused withRADIUSattribute26.
yes yes yes yes yes yes yes
TACACS Attribute-Value PairsInformation About TACACS Attribute-Value Pairs
TACACS+ Configuration Guide Cisco IOS Release 12.4T 29
Attribute Description 11.0 11.1 11.2 11.3 12.0 12.1 12.2
cmd=x A shell(EXEC)command.Thisindicates thecommandname for ashellcommandthat is to berun. Thisattributemust bespecified ifserviceequals“shell.” ANULL valueindicatesthat the shellitself isbeingreferred to.
Note ThisTACACS+ AVpaircannot beused withRADIUSattribute26.
yes yes yes yes yes yes yes
data-service Used withtheservice=outbound andprotocol=ip.
no no no no no yes yes
dial-number Defines thenumber todial. Usedwith theservice=outbound andprotocol=ip.
no no no no no yes yes
TACACS Attribute-Value Pairs Information About TACACS Attribute-Value Pairs
TACACS+ Configuration Guide Cisco IOS Release 12.4T30
Attribute Description 11.0 11.1 11.2 11.3 12.0 12.1 12.2
dns-servers= Identifies aDNS server(primary orsecondary)that can berequested byMicrosoftPPP clientsfrom thenetworkaccessserverduring IPCPnegotiation.To be usedwithservice=pppandprotocol=ip.The IPaddressidentifyingeach DNSserver isentered indotteddecimalformat.
no no no yes yes yes yes
TACACS Attribute-Value PairsInformation About TACACS Attribute-Value Pairs
TACACS+ Configuration Guide Cisco IOS Release 12.4T 31
Attribute Description 11.0 11.1 11.2 11.3 12.0 12.1 12.2
force-56 Determineswhether thenetworkaccessserver usesonly the 56K portion ofa channel,even whenall 64 Kappear to beavailable.To turn onthisattribute,use the“true” value(force-56=true). Anyother valueis treated asfalse. Usedwith theservice=outbound andprotocol=ip.
no no no no no yes yes
gw-password
Specifies thepasswordfor the homegatewayduring theL2F tunnelauthentication. Usedwithservice=pppandprotocol=vpdn.
no no yes yes yes yes yes
TACACS Attribute-Value Pairs Information About TACACS Attribute-Value Pairs
TACACS+ Configuration Guide Cisco IOS Release 12.4T32
Attribute Description 11.0 11.1 11.2 11.3 12.0 12.1 12.2
idletime=x Sets a value,in minutes,after whichan idlesession isterminated.A value ofzeroindicates notimeout.
no yes yes yes yes yes yes
inacl#<n> ASCIIaccess listidentifier foran inputaccess list tobe installedand appliedto aninterface forthe durationof thecurrentconnection.Used withservice=pppandprotocol=ip,and serviceservice=pppand protocol=ipx. Per-user accesslists do notcurrentlywork withISDNinterfaces.
no no no yes yes yes yes
TACACS Attribute-Value PairsInformation About TACACS Attribute-Value Pairs
TACACS+ Configuration Guide Cisco IOS Release 12.4T 33
Attribute Description 11.0 11.1 11.2 11.3 12.0 12.1 12.2
inacl=x ASCIIidentifier foran interfaceinput accesslist. Usedwithservice=pppandprotocol=ip.Per-useraccess listsdo notcurrentlywork withISDNinterfaces.
yes yes yes yes yes yes yes
TACACS Attribute-Value Pairs Information About TACACS Attribute-Value Pairs
TACACS+ Configuration Guide Cisco IOS Release 12.4T34
Attribute Description 11.0 11.1 11.2 11.3 12.0 12.1 12.2
interface-config#<n>
Specifiesuser-specificAAAinterfaceconfigurationinformationwith VirtualProfiles.Theinformationthat followsthe equalsign (=) canbe anyCisco IOSinterfaceconfiguration command.Multipleinstances oftheattributesare allowed,but eachinstancemust have auniquenumber.Used withservice=pppandprotocol=lcp.
Note Thisattributereplacesthe“interface-config=”attribute.
no no no yes yes yes yes
TACACS Attribute-Value PairsInformation About TACACS Attribute-Value Pairs
TACACS+ Configuration Guide Cisco IOS Release 12.4T 35
Attribute Description 11.0 11.1 11.2 11.3 12.0 12.1 12.2
ip-addresses Space-separatedlist ofpossible IPaddressesthat can beused for theend-point ofa tunnel.Used withservice=pppandprotocol=vpdn.
no no yes yes yes yes yes
TACACS Attribute-Value Pairs Information About TACACS Attribute-Value Pairs
TACACS+ Configuration Guide Cisco IOS Release 12.4T36
Attribute Description 11.0 11.1 11.2 11.3 12.0 12.1 12.2
l2tp-busy-disconnect
If a vpdn-group on anLNS uses avirtual-templatethat isconfiguredto be pre-cloned, thisattribute willcontrol thedispositionof a newL2TPsession thatfinds no pre-clonedinterface towhich toconnect. Ifthe attributeis true (thedefault), thesession willbedisconnected by theLNS.Otherwise, anewinterfacewill becloned fromthe virtual-template.Used withservice=pppandprotocol=vpdn.
no no no no no yes yes
TACACS Attribute-Value PairsInformation About TACACS Attribute-Value Pairs
TACACS+ Configuration Guide Cisco IOS Release 12.4T 37
Attribute Description 11.0 11.1 11.2 11.3 12.0 12.1 12.2
l2tp-cm-local-window-size
Specifies themaximumreceivewindow sizefor L2TPcontrolmessages.This value isadvertised tothe peerduringtunnelestablishment. Usedwithservice=pppandprotocol=vpdn.
no no no no no yes yes
l2tp-drop-out-of- order
Respectssequencenumbers ondata packetsby droppingthose thatare receivedout of order.This doesnot ensurethatsequencenumberswill be senton datapackets, justhow tohandle themif they arereceived.Used withservice=pppandprotocol=vpdn.
no no no no no yes yes
TACACS Attribute-Value Pairs Information About TACACS Attribute-Value Pairs
TACACS+ Configuration Guide Cisco IOS Release 12.4T38
Attribute Description 11.0 11.1 11.2 11.3 12.0 12.1 12.2
l2tp-hello-interval
Specifies thenumber ofseconds forthe hellokeepaliveinterval.Hellopackets aresent whenno data hasbeen sent ona tunnel forthe numberof secondsconfiguredhere. Usedwithservice=pppandprotocol=vpdn.
no no no no no yes yes
l2tp-hidden-avp
Whenenabled,sensitiveAVPs inL2TPcontrolmessagesarescrambledor hidden.Used withservice=pppandprotocol=vpdn.
no no no no no yes yes
TACACS Attribute-Value PairsInformation About TACACS Attribute-Value Pairs
TACACS+ Configuration Guide Cisco IOS Release 12.4T 39
Attribute Description 11.0 11.1 11.2 11.3 12.0 12.1 12.2
l2tp-nosession-timeout
Specifies thenumber ofseconds thata tunnel willstay activewith nosessionsbeforetiming outand shuttingdown. Usedwithservice=pppandprotocol=vpdn.
no no no no no yes yes
l2tp-tos-reflect
Copies theIP ToS fieldfrom the IPheader ofeachpayloadpacket to theIP header ofthe tunnelpacket forpacketsentering thetunnel at theLNS. Usedwithservice=pppandprotocol=vpdn.
no no no no no yes yes
l2tp-tunnel-authen
If thisattribute isset, itperformsL2TP tunnelauthentication. Usedwithservice=pppandprotocol=vpdn.
no no no no no yes yes
TACACS Attribute-Value Pairs Information About TACACS Attribute-Value Pairs
TACACS+ Configuration Guide Cisco IOS Release 12.4T40
Attribute Description 11.0 11.1 11.2 11.3 12.0 12.1 12.2
l2tp-tunnel-password
Sharedsecret usedfor L2TPtunnelauthentication and AVPhiding. Usedwithservice=pppandprotocol=vpdn.
no no no no no yes yes
l2tp-udp-checksum
This is anauthorization attributeand defineswhetherL2TPshouldperformUDPchecksumsfor datapackets.Valid valuesare “yes”and “no.”The defaultis no. Usedwithservice=pppandprotocol=vpdn.
no no no no no yes yes
TACACS Attribute-Value PairsInformation About TACACS Attribute-Value Pairs
TACACS+ Configuration Guide Cisco IOS Release 12.4T 41
Attribute Description 11.0 11.1 11.2 11.3 12.0 12.1 12.2
link-compression=
Defineswhether toturn on orturn off“stac”compressionover a PPPlink. Usedwithservice=ppp.
Linkcompressionis defined asa numericvalue asfollows:
• 0: None• 1: Stac• 2: Stac-
Draft-9• 3: MS-
Stac
no no no yes yes yes yes
TACACS Attribute-Value Pairs Information About TACACS Attribute-Value Pairs
TACACS+ Configuration Guide Cisco IOS Release 12.4T42
Attribute Description 11.0 11.1 11.2 11.3 12.0 12.1 12.2
load-threshold=<n>
Sets the loadthreshold forthe caller atwhichadditionallinks areeither addedto or deletedfrom themultilinkbundle. Ifthe loadgoes abovethe specifiedvalue,additionallinks areadded. If theload goesbelow thespecifiedvalue, linksare deleted.Used withservice=pppandprotocol=multilink. Therange for<n> is from1 to 255.
no no no yes yes yes yes
TACACS Attribute-Value PairsInformation About TACACS Attribute-Value Pairs
TACACS+ Configuration Guide Cisco IOS Release 12.4T 43
Attribute Description 11.0 11.1 11.2 11.3 12.0 12.1 12.2
map-class Allows theuser profileto referenceinformationconfiguredin a mapclass of thesame nameon thenetworkaccessserver thatdials out.Used withtheservice=outbound andprotocol=ip.
no no no no no yes yes
max-links=<n>
Restricts thenumber oflinks that auser canhave in amultilinkbundle.Used withservice=pppandprotocol=multilink. Therange for<n> is from1 to 255.
no no no yes yes yes yes
min-links Sets theminimumnumber oflinks forMLP. Usedwithservice=pppandprotocol=multilink,protocol=vpdn.
no no no no no yes yes
TACACS Attribute-Value Pairs Information About TACACS Attribute-Value Pairs
TACACS+ Configuration Guide Cisco IOS Release 12.4T44
Attribute Description 11.0 11.1 11.2 11.3 12.0 12.1 12.2
nas-password
Specifies thepasswordfor thenetworkaccessserverduring theL2F tunnelauthentication. Usedwithservice=pppandprotocol=vpdn.
no no yes yes yes yes yes
nocallback-verify
Indicatesthat nocallbackverificationis required.The onlyvalid valuefor thisparameter is1 (forexample,nocallback-verify=1).Used withservice=arap,service=slip,service=ppp,service=shell. There isnoauthentication oncallback.Not validfor ISDN.
no yes yes yes yes yes yes
TACACS Attribute-Value PairsInformation About TACACS Attribute-Value Pairs
TACACS+ Configuration Guide Cisco IOS Release 12.4T 45
Attribute Description 11.0 11.1 11.2 11.3 12.0 12.1 12.2
noescape=x Preventsuser fromusing anescapecharacter.Used withservice=shell. Can beeither trueor false (forexample,noescape=true).
yes yes yes yes yes yes yes
nohangup=x Used withservice=shell. Specifiesthenohangupoption,whichmeans thatafter anEXEC shellisterminated,the user ispresentedwith anotherlogin(username)prompt. Canbe eithertrue or false(forexample,nohangup=false).
yes yes yes yes yes yes yes
TACACS Attribute-Value Pairs Information About TACACS Attribute-Value Pairs
TACACS+ Configuration Guide Cisco IOS Release 12.4T46
Attribute Description 11.0 11.1 11.2 11.3 12.0 12.1 12.2
old-prompts Allowsproviders tomake theprompts inTACACS+appearidentical tothose ofearliersystems(TACACSandExtendedTACACS).This allowsadministrators toupgradefromTACACS orExtendedTACACS toTACACS+transparently to users.
yes yes yes yes yes yes yes
TACACS Attribute-Value PairsInformation About TACACS Attribute-Value Pairs
TACACS+ Configuration Guide Cisco IOS Release 12.4T 47
Attribute Description 11.0 11.1 11.2 11.3 12.0 12.1 12.2
outacl#<n> ASCIIaccess listidentifier foran interfaceoutputaccess list tobe installedand appliedto aninterface forthe durationof thecurrentcondition.Used withservice=pppandprotocol=ip,and serviceservice=pppandprotocol=ipx. Per-useraccess listsdo notcurrentlywork withISDNinterfaces.
no no no yes yes yes yes
TACACS Attribute-Value Pairs Information About TACACS Attribute-Value Pairs
TACACS+ Configuration Guide Cisco IOS Release 12.4T48
Attribute Description 11.0 11.1 11.2 11.3 12.0 12.1 12.2
outacl=x ASCIIidentifier foran interfaceoutputaccess list.Used withservice=pppandprotocol=ip,and serviceservice=pppandprotocol=ipx. Containsan IP outputaccess listfor SLIP orPPP/IP (forexample,outacl=4).The accesslist itselfmust bepreconfigured on therouter. Per-user accesslists do notcurrentlywork withISDNinterfaces.
yes (PPP/IPonly)
yes yes yes yes yes yes
pool-def#<n>
Defines IPaddresspools on thenetworkaccessserver. Usedwithservice=pppandprotocol=ip.
no no no yes yes yes yes
TACACS Attribute-Value PairsInformation About TACACS Attribute-Value Pairs
TACACS+ Configuration Guide Cisco IOS Release 12.4T 49
Attribute Description 11.0 11.1 11.2 11.3 12.0 12.1 12.2
pool-timeout=
Defines (inconjunctionwith pool-def) IPaddresspools on thenetworkaccessserver.DuringIPCPaddressnegotiation,if an IP poolname isspecified fora user (seethe addr-poolattribute), acheck ismade to seeif the namedpool isdefined onthe networkaccessserver. If itis, the poolis consultedfor an IPaddress.Used withservice=pppandprotocol=ip.
no no yes yes yes yes yes
TACACS Attribute-Value Pairs Information About TACACS Attribute-Value Pairs
TACACS+ Configuration Guide Cisco IOS Release 12.4T50
Attribute Description 11.0 11.1 11.2 11.3 12.0 12.1 12.2
port-type Indicates thetype ofphysicalport thenetworkaccessserver isusing toauthenticatethe user.
Physicalports areindicated bya numericvalue asfollows:
• 0:Asynchronous
• 1:Synchronous
• 2:ISDN-Synchronous
• 3:ISDN-Asynchronous(V.120)
• 4:ISDN-Asynchronous(V.110)
• 5:Virtual
Used withservice=anyandprotocol=aaa.
no no no no no yes yes
TACACS Attribute-Value PairsInformation About TACACS Attribute-Value Pairs
TACACS+ Configuration Guide Cisco IOS Release 12.4T 51
Attribute Description 11.0 11.1 11.2 11.3 12.0 12.1 12.2
ppp-vj-slot-compression
Instructs theCisco routernot to useslotcompressionwhensending VJ-compressedpackets overa PPP link.
no no no yes yes yes yes
priv-lvl=x Privilegelevel to beassigned forthe EXEC.Used withservice=shell. Privilegelevels rangefrom 0 to15, with 15being thehighest.
yes yes yes yes yes yes yes
TACACS Attribute-Value Pairs Information About TACACS Attribute-Value Pairs
TACACS+ Configuration Guide Cisco IOS Release 12.4T52
Attribute Description 11.0 11.1 11.2 11.3 12.0 12.1 12.2
protocol=x A protocolthat is asubset of aservice. Anexamplewould beany PPPNCP.Currentlyknownvalues arelcp, ip, ipx,atalk, vines,lat,xremote,tn3270,telnet,rlogin, pad,vpdn, osicp,deccp, ccp,cdp,bridging,xns, nbf,bap,multilink,andunknown.
yes yes yes yes yes yes yes
TACACS Attribute-Value PairsInformation About TACACS Attribute-Value Pairs
TACACS+ Configuration Guide Cisco IOS Release 12.4T 53
Attribute Description 11.0 11.1 11.2 11.3 12.0 12.1 12.2
proxyacl#<n>
Allowsusers toconfigurethedownloadable userprofiles(dynamicACLs) byusing theauthentication proxyfeature sothat userscan have theconfiguredauthorization to permittraffic goingthrough theconfiguredinterfaces.Used withtheservice=shell andprotocol=exec.
no no no no no yes yes
TACACS Attribute-Value Pairs Information About TACACS Attribute-Value Pairs
TACACS+ Configuration Guide Cisco IOS Release 12.4T54
Attribute Description 11.0 11.1 11.2 11.3 12.0 12.1 12.2
route Specifies aroute to beapplied toan interface.Used withservice=slip,service=ppp, andprotocol=ip.
Duringnetworkauthorization, the routeattribute canbe used tospecify aper-userstatic route,to beinstalled byTACACS+as follows:
route=”dst_addressmask[gateway]”
Thisindicates atemporarystatic routethat is to beapplied. Thedst_address,mask, andgateway areexpected tobe in theusualdotted-decimalnotation,with thesamemeanings asin thefamiliar iprouteconfiguratio
no yes yes yes yes yes yes
TACACS Attribute-Value PairsInformation About TACACS Attribute-Value Pairs
TACACS+ Configuration Guide Cisco IOS Release 12.4T 55
Attribute Description 11.0 11.1 11.2 11.3 12.0 12.1 12.2
n commandon anetworkaccessserver.
If gatewayis omitted,the peer’saddress isthe gateway.The route isexpungedwhen theconnectionterminates.
route#<n> Like theroute AVpair, thisspecifies aroute to beapplied toan interface,but theseroutes arenumbered,allowingmultipleroutes to beapplied.Used withservice=pppandprotocol=ip,andservice=pppandprotocol=ipx.
no no no yes yes yes yes
TACACS Attribute-Value Pairs Information About TACACS Attribute-Value Pairs
TACACS+ Configuration Guide Cisco IOS Release 12.4T56
Attribute Description 11.0 11.1 11.2 11.3 12.0 12.1 12.2
routing=x Specifieswhetherroutinginformationis to bepropagatedto andacceptedfrom thisinterface.Used withservice=slip,service=ppp, andprotocol=ip.Equivalentin functionto the /routing flagin SLIP andPPPcommands.Can eitherbe true orfalse (forexample,routing=true).
yes yes yes yes yes yes yes
TACACS Attribute-Value PairsInformation About TACACS Attribute-Value Pairs
TACACS+ Configuration Guide Cisco IOS Release 12.4T 57
Attribute Description 11.0 11.1 11.2 11.3 12.0 12.1 12.2
rte-fltr-in#<n>
Specifies aninput accesslistdefinition tobe installedand appliedto routingupdates onthe currentinterface forthe durationof thecurrentconnection.Used withservice=pppandprotocol=ip,and withservice=pppandprotocol=ipx.
no no no yes yes yes yes
rte-fltr-out#<n>
Specifies anoutputaccess listdefinition tobe installedand appliedto routingupdates onthe currentinterface forthe durationof thecurrentconnection.Used withservice=pppandprotocol=ip,and withservice=pppandprotocol=ipx.
no no no yes yes yes yes
TACACS Attribute-Value Pairs Information About TACACS Attribute-Value Pairs
TACACS+ Configuration Guide Cisco IOS Release 12.4T58
Attribute Description 11.0 11.1 11.2 11.3 12.0 12.1 12.2
sap#<n> SpecifiesstaticServiceAdvertisingProtocol(SAP)entries to beinstalled forthe durationof aconnection.Used withservice=pppandprotocol=ipx.
no no no yes yes yes yes
sap-fltr-in#<n>
Specifies aninput SAPfilter accesslistdefinition tobe installedand appliedon thecurrentinterface forthe durationof thecurrentconnection.Used withservice=pppandprotocol=ipx.
no no no yes yes yes yes
TACACS Attribute-Value PairsInformation About TACACS Attribute-Value Pairs
TACACS+ Configuration Guide Cisco IOS Release 12.4T 59
Attribute Description 11.0 11.1 11.2 11.3 12.0 12.1 12.2
sap-fltr-out#<n>
Specifies anoutput SAPfilter accesslistdefinition tobe installedand appliedon thecurrentinterface forthe durationof thecurrentconnection.Used withservice=pppandprotocol=ipx.
no no no yes yes yes yes
send-auth Defines theprotocol touse (PAP orCHAP) forusername-passwordauthentication followingCLIDauthentication. Usedwithservice=anyandprotocol=aaa.
no no no no no yes yes
TACACS Attribute-Value Pairs Information About TACACS Attribute-Value Pairs
TACACS+ Configuration Guide Cisco IOS Release 12.4T60
Attribute Description 11.0 11.1 11.2 11.3 12.0 12.1 12.2
send-secret Specifies thepasswordthat theNAS needsto respondto achap/paprequest fromthe remoteend of aconnectionon anoutgoingcall. Usedwithservice=pppandprotocol=ip.
no no no no no yes yes
service=x The primaryservice.Specifying aserviceattributeindicatesthat this is arequest forauthorization oraccountingof thatservice.Currentvalues areslip, ppp,arap, shell,tty-daemon,connection,and system.Thisattributemust alwaysbe included.
yes yes yes yes yes yes yes
TACACS Attribute-Value PairsInformation About TACACS Attribute-Value Pairs
TACACS+ Configuration Guide Cisco IOS Release 12.4T 61
Attribute Description 11.0 11.1 11.2 11.3 12.0 12.1 12.2
source-ip=x Used as thesource IPaddress ofall VPDNpacketsgenerated aspart of aVPDNtunnel. Thisis equivalentto the Ciscovpdnoutgoingglobalconfiguration command.
no no yes yes yes yes yes
TACACS Attribute-Value Pairs Information About TACACS Attribute-Value Pairs
TACACS+ Configuration Guide Cisco IOS Release 12.4T62
Attribute Description 11.0 11.1 11.2 11.3 12.0 12.1 12.2
spi Carries theauthenticationinformationneeded bythe homeagent toauthenticatea mobilenode duringregistration.Theinformationis in thesame syntaxas the ipmobilesecure host<addr>configuration command.Basically itcontains therest of theconfiguration commandthat followsthat string,verbatim. Itprovides theSecurityParameterIndex (SPI),key,authenticationalgorithm,authentication mode,and replayprotectiontimestamprange. Usedwith theservice=mobileip andprotocol=ip.
no no no no no yes yes
TACACS Attribute-Value PairsInformation About TACACS Attribute-Value Pairs
TACACS+ Configuration Guide Cisco IOS Release 12.4T 63
Attribute Description 11.0 11.1 11.2 11.3 12.0 12.1 12.2
timeout=x The numberof minutesbefore anEXEC orARAsessiondisconnects(forexample,timeout=60). A value ofzeroindicates notimeout.Used withservice=arap.
yes yes yes yes yes yes yes
tunnel-id Specifies theusernamethat will beused toauthenticatethe tunnelover whichtheindividualuser MIDwill beprojected.This isanalogous tothe remotename in thevpdnoutgoingcommand.Used withservice=pppandprotocol=vpdn.
no no yes yes yes yes yes
TACACS Attribute-Value Pairs Information About TACACS Attribute-Value Pairs
TACACS+ Configuration Guide Cisco IOS Release 12.4T64
Attribute Description 11.0 11.1 11.2 11.3 12.0 12.1 12.2
wins-servers=
Identifies aWindowsNT serverthat can berequested byMicrosoftPPP clientsfrom thenetworkaccessserverduring IPCPnegotiation.To be usedwithservice=pppandprotocol=ip.The IPaddressidentifyingeachWindowsNT server isentered indotteddecimalformat.
no no no yes yes yes yes
zonelist=x A numericzonelistvalue. Usedwithservice=arap. SpecifiesanAppleTalkzonelist forARA (forexample,zonelist=5).
yes yes yes yes yes yes yes
See Configuring TACACS+. module for the documents used to configure TACACS+, and TACACS+authentication and authorization.
TACACS Accounting AV PairsThe following table lists and describes the supported TACACS+ accounting AV pairs and specifies theCisco IOS release in which they are implemented.
TACACS Accounting AV PairsInformation About TACACS Attribute-Value Pairs
TACACS+ Configuration Guide Cisco IOS Release 12.4T 65
Table 4 Supported TACACS+ Accounting AV Pairs
Attribute Description 11.0 11.1 11.2 11.3 12.0 12.1 12.2
Abort-Cause If the faxsessionaborts,indicates thesystemcomponentthat signaledthe abort.Examples ofsystemcomponentsthat couldtrigger anabort areFAP (FaxApplicationProcess),TIFF (theTIFF readeror the TIFFwriter), fax-mail client,fax-mailserver,ESMTPclient, orESMTPserver.
no no no no no yes yes
bytes_in The numberof inputbytestransferredduring thisconnection.
yes yes yes yes yes yes yes
bytes_out The numberof outputbytestransferredduring thisconnection.
yes yes yes yes yes yes yes
Call-Type Describesthe type offax activity:fax receiveor fax send.
no no no no no yes yes
TACACS Attribute-Value Pairs Information About TACACS Attribute-Value Pairs
TACACS+ Configuration Guide Cisco IOS Release 12.4T66
Attribute Description 11.0 11.1 11.2 11.3 12.0 12.1 12.2
cmd Thecommandthe userexecuted.
yes yes yes yes yes yes yes
data-rate This AVpair hasbeenrenamed.See nas-rx-speed.
TACACS Attribute-Value PairsInformation About TACACS Attribute-Value Pairs
TACACS+ Configuration Guide Cisco IOS Release 12.4T 67
Attribute Description 11.0 11.1 11.2 11.3 12.0 12.1 12.2
disc-cause Specifies thereason aconnectionwas takenoff-line. TheDisconnect-Causeattribute issent inaccounting-stop records.Thisattributealso causesstop recordsto begeneratedwithout firstgeneratingstart recordsifdisconnection occursbeforeauthentication isperformed.Refer to thefollowingtable(DisconnectCauseExtensions)for a list ofDisconnect-Causevalues andtheirmeanings.
no no no yes yes yes yes
TACACS Attribute-Value Pairs Information About TACACS Attribute-Value Pairs
TACACS+ Configuration Guide Cisco IOS Release 12.4T68
Attribute Description 11.0 11.1 11.2 11.3 12.0 12.1 12.2
disc-cause-ext
Extends thedisc-causeattribute tosupportvendor-specificreasons whya connectionwas takenoff-line.
no no no yes yes yes yes
elapsed_time
The elapsedtime inseconds forthe action.Useful whenthe devicedoes notkeep realtime.
yes yes yes yes yes yes yes
Email-Server-Address
Indicates theIP addressof the e-mailserverhandling theon-rampfax-mailmessage.
no no no no no yes yes
Email-Server-Ack-Flag
Indicatesthat the on-rampgateway hasreceived apositiveacknowledgment fromthe e-mailserveracceptingthe fax-mailmessage.
no no no no no yes yes
TACACS Attribute-Value PairsInformation About TACACS Attribute-Value Pairs
TACACS+ Configuration Guide Cisco IOS Release 12.4T 69
Attribute Description 11.0 11.1 11.2 11.3 12.0 12.1 12.2
event Informationincluded intheaccountingpacket thatdescribes astate changein the router.Eventsdescribedareaccountingstarting andaccountingstopping.
yes yes yes yes yes yes yes
Fax-Account-Id-Origin
Indicates theaccount IDorigin asdefined bysystemadministrator for themmoip aaareceive-idor themmoip aaasend-idcommand.
no no no no no yes yes
Fax-Auth-Status
Indicateswhether ornotauthentication for thisfax sessionwassuccessful.Possiblevalues forthis field aresuccess,failed,bypassed, orunknown.
no no no no no yes yes
TACACS Attribute-Value Pairs Information About TACACS Attribute-Value Pairs
TACACS+ Configuration Guide Cisco IOS Release 12.4T70
Attribute Description 11.0 11.1 11.2 11.3 12.0 12.1 12.2
Fax-Connect-Speed
Indicates themodemspeed atwhich thisfax-mailwas initiallytransmittedor received.Possiblevalues are1200, 4800,9600, and14400.
no no no no no yes yes
Fax-Coverpage-Flag
Indicateswhether ornot a coverpage wasgenerated bythe off-rampgateway forthis faxsession.Trueindicatesthat a coverpage wasgenerated;false meansthat a coverpage wasnotgenerated.
no no no no no yes yes
Fax-Dsn-Address
Indicates theaddress towhich DSNswill be sent.
no no no no no yes yes
TACACS Attribute-Value PairsInformation About TACACS Attribute-Value Pairs
TACACS+ Configuration Guide Cisco IOS Release 12.4T 71
Attribute Description 11.0 11.1 11.2 11.3 12.0 12.1 12.2
Fax-Dsn-Flag
Indicateswhether ornot DSN hasbeenenabled.Trueindicatesthat DSNhas beenenabled;false meansthat DSNhas not beenenabled.
no no no no no yes yes
Fax-Mdn-Address
Indicates theaddress towhichMDNs willbe sent.
no no no no no yes yes
Fax-Mdn-Flag
Indicateswhether ornot messagedeliverynotification(MDN) hasbeenenabled.Trueindicatesthat MDNhad beenenabled;false meansthat MDNhad not beenenabled.
no no no no no yes yes
TACACS Attribute-Value Pairs Information About TACACS Attribute-Value Pairs
TACACS+ Configuration Guide Cisco IOS Release 12.4T72
Attribute Description 11.0 11.1 11.2 11.3 12.0 12.1 12.2
Fax-Modem-Time
Indicates theamount oftime inseconds themodem sentfax data (x)and theamount oftime inseconds ofthe total faxsession (y),whichincludesboth fax-mail andPSTN time,in the formx/y. Forexample,10/15 meansthat thetransfer timetook 10seconds, andthe total faxsession took15 seconds.
no no no no no yes yes
Fax-Msg-Id=
Indicates aunique faxmessageidentification numberassigned byStore andForwardFax.
no no no no no yes yes
TACACS Attribute-Value PairsInformation About TACACS Attribute-Value Pairs
TACACS+ Configuration Guide Cisco IOS Release 12.4T 73
Attribute Description 11.0 11.1 11.2 11.3 12.0 12.1 12.2
Fax-Pages Indicates thenumber ofpagestransmittedor receivedduring thisfax session.This pagecountincludescover pages.
no no no no no yes yes
Fax-Process-Abort- Flag
Indicatesthat the faxsession wasaborted orsuccessful.True meansthat thesession wasaborted;false meansthat thesession wassuccessful.
no no no no no yes yes
Fax-Recipient-Count
Indicates thenumber ofrecipientsfor this faxtransmission. Until e-mail serverssupportSessionmode, thenumbershould be 1.
no no no no no yes yes
TACACS Attribute-Value Pairs Information About TACACS Attribute-Value Pairs
TACACS+ Configuration Guide Cisco IOS Release 12.4T74
Attribute Description 11.0 11.1 11.2 11.3 12.0 12.1 12.2
Gateway-Id Indicates thename of thegateway thatprocessedthe faxsession. Thenameappears inthefollowingformat:hostname.domain-name
no no no no no yes yes
mlp-links-max
Gives thecount oflinks whichare knownto have beenin a givenmultilinksession atthe time theaccountingrecord isgenerated.
no no no yes yes yes yes
mlp-sess-id Reports theidentification number ofthe multilinkbundle whenthe sessioncloses. Thisattributeapplies tosessions thatare part of amultilinkbundle. Thisattribute issent inauthentication-responsepackets.
no no no yes yes yes yes
TACACS Attribute-Value PairsInformation About TACACS Attribute-Value Pairs
TACACS+ Configuration Guide Cisco IOS Release 12.4T 75
Attribute Description 11.0 11.1 11.2 11.3 12.0 12.1 12.2
nas-rx-speed Specifies theaveragenumber ofbits persecond overthe courseof theconnection’slifetime.Thisattribute issent inaccounting-stop records.
no no no yes yes yes yes
nas-tx-speed Reports thetransmitspeednegotiatedby the twomodems.
no no no yes yes yes yes
paks_in The numberof inputpacketstransferredduring thisconnection.
yes yes yes yes yes yes yes
paks_out The numberof outputpacketstransferredduring thisconnection.
yes yes yes yes yes yes yes
port The port theuser waslogged in to.
yes yes yes yes yes yes yes
Port-Used Indicates theslot/portnumber ofthe CiscoAS5300used toeithertransmit orreceive thisfax-mail.
no no no no no yes yes
TACACS Attribute-Value Pairs Information About TACACS Attribute-Value Pairs
TACACS+ Configuration Guide Cisco IOS Release 12.4T76
Attribute Description 11.0 11.1 11.2 11.3 12.0 12.1 12.2
pre-bytes-in Records thenumber ofinput bytesbeforeauthentication. Thisattribute issent inaccounting-stop records.
no no no yes yes yes yes
pre-bytes-out
Records thenumber ofoutput bytesbeforeauthentication. Thisattribute issent inaccounting-stop records.
no no no yes yes yes yes
pre-paks-in Records thenumber ofinputpacketsbeforeauthentication. Thisattribute issent inaccounting-stop records.
no no no yes yes yes yes
pre-paks-out Records thenumber ofoutputpacketsbeforeauthentication. The Pre-Output-Packetsattribute issent inaccounting-stop records.
no no no yes yes yes yes
TACACS Attribute-Value PairsInformation About TACACS Attribute-Value Pairs
TACACS+ Configuration Guide Cisco IOS Release 12.4T 77
Attribute Description 11.0 11.1 11.2 11.3 12.0 12.1 12.2
pre-session-time
Specifies thelength oftime, inseconds,from when acall firstconnects towhen itcompletesauthentication.
no no no yes yes yes yes
priv_level Theprivilegelevelassociatedwith theaction.
yes yes yes yes yes yes yes
protocol The protocolassociatedwith theaction.
yes yes yes yes yes yes yes
reason Informationincluded intheaccountingpacket thatdescribesthe eventthat causeda systemchange.Eventsdescribedare systemreload,systemshutdown,or whenaccountingisreconfigured(turned onor off).
yes yes yes yes yes yes yes
service The servicethe userused.
yes yes yes yes yes yes yes
TACACS Attribute-Value Pairs Information About TACACS Attribute-Value Pairs
TACACS+ Configuration Guide Cisco IOS Release 12.4T78
Attribute Description 11.0 11.1 11.2 11.3 12.0 12.1 12.2
start_time The time theactionstarted (insecondssince theepoch,12:00 a.m.Jan 1 1970).The clockmust beconfiguredto receivethisinformation.
yes yes yes yes yes yes yes
stop_time The time theactionstopped (insecondssince theepoch.) Theclock mustbeconfiguredto receivethisinformation.
yes yes yes yes yes yes yes
task_id Start andstop recordsfor the sameevent musthavematching(unique)task_idnumbers.
yes yes yes yes yes yes yes
timezone The timezoneabbreviationfor alltimestampsincluded inthis packet.
yes yes yes yes yes yes yes
TACACS Attribute-Value PairsInformation About TACACS Attribute-Value Pairs
TACACS+ Configuration Guide Cisco IOS Release 12.4T 79
Attribute Description 11.0 11.1 11.2 11.3 12.0 12.1 12.2
xmit-rate This AVpair hasbeenrenamed.See nas-tx-speed.
The following table lists the cause codes and descriptions for the Disconnect Cause Extended (disc-cause-ext) attribute.
Table 5 Disconnect Cause Extensions
CauseCodes
Description
11.0 11.1 11.2 11.3 12.0 12.1 12.2 12.3
1000 - NoReason
No reasonfor thedisconnect.
no no no no yes yes yes yes
1001 - NoDisconnect
The eventwas not adisconnect.
no no no no yes yes yes yes
1002 -Unknown
The reasonfor thedisconnectisunknown.This codecan appearwhen theremoteconnectiongoes down.
no no no no yes yes yes yes
1003 - CallDisconnect
The callhasdisconnected.
no no no no yes yes yes yes
1004 -CLIDAuth Fail
Callingline ID(CLID)authentication hasfailed.
no no no no yes yes yes yes
TACACS Attribute-Value Pairs Information About TACACS Attribute-Value Pairs
TACACS+ Configuration Guide Cisco IOS Release 12.4T80
CauseCodes
Description
11.0 11.1 11.2 11.3 12.0 12.1 12.2 12.3
1009 - NoModemAvailable
Themodem isnotavailable.
no no no no yes yes yes yes
1010 - NoCarrier
Themodemneverdetecteddata carrierdetect(DCD).This codecan appearif adisconnectoccursduring theinitialmodemconnection.
no no no no yes yes yes yes
1011 -LostCarrier
ThemodemdetectedDCD butbecameinactive.This codecan appearif adisconnectoccursduring theinitialmodemconnection.
no no no no yes yes yes yes
TACACS Attribute-Value PairsInformation About TACACS Attribute-Value Pairs
TACACS+ Configuration Guide Cisco IOS Release 12.4T 81
CauseCodes
Description
11.0 11.1 11.2 11.3 12.0 12.1 12.2 12.3
1012 - NoModemResults
The resultcodescould notbe parsed.This codecan appearif adisconnectoccursduring theinitialmodemconnection.
no no no no yes yes yes yes
1020 - TSUser Exit
The userexitednormallyfrom theterminalserver.This codeis relatedtoimmediateTelnet andraw TCPdisconnects during aterminalserversession.
no no no no yes yes yes yes
TACACS Attribute-Value Pairs Information About TACACS Attribute-Value Pairs
TACACS+ Configuration Guide Cisco IOS Release 12.4T82
CauseCodes
Description
11.0 11.1 11.2 11.3 12.0 12.1 12.2 12.3
1021 - IdleTimeout
The userexitedfrom theterminalserverbecausethe idletimerexpired.This codeis relatedtoimmediateTelnet andraw TCPdisconnects during aterminalserversession.
no no no no yes yes yes yes
1022 - TSExit Telnet
The userexitednormallyfrom aTelnetsession.This codeis relatedtoimmediateTelnet andraw TCPdisconnects during aterminalserversession.
no no no no yes yes yes yes
TACACS Attribute-Value PairsInformation About TACACS Attribute-Value Pairs
TACACS+ Configuration Guide Cisco IOS Release 12.4T 83
CauseCodes
Description
11.0 11.1 11.2 11.3 12.0 12.1 12.2 12.3
1023 - TSNo IPAddr
The usercould notswitch toSerial LineInternetProtocol(SLIP) orPPPbecausethe remotehost hadno IPaddress orbecausethedynamicpool couldnot assignone. Thiscode isrelated toimmediateTelnet andraw TCPdisconnects during aterminalserversession.
no no no no yes yes yes yes
1024 - TSTCP RawExit
The userexitednormallyfrom a rawTCPsession.This codeis relatedtoimmediateTelnet andraw TCPdisconnects during aterminalserversession.
no no no no yes yes yes yes
TACACS Attribute-Value Pairs Information About TACACS Attribute-Value Pairs
TACACS+ Configuration Guide Cisco IOS Release 12.4T84
CauseCodes
Description
11.0 11.1 11.2 11.3 12.0 12.1 12.2 12.3
1025 - TSBadPassword
The loginprocessendedbecausethe userfailed toenter acorrectpasswordafter threeattempts.This codeis relatedtoimmediateTelnet andraw TCPdisconnects during aterminalserversession.
no no no no yes yes yes yes
1026 - TSNo TCPRaw
The rawTCPoption isnotenabled.This codeis relatedtoimmediateTelnet andraw TCPdisconnects during aterminalserversession.
no no no no yes yes yes yes
TACACS Attribute-Value PairsInformation About TACACS Attribute-Value Pairs
TACACS+ Configuration Guide Cisco IOS Release 12.4T 85
CauseCodes
Description
11.0 11.1 11.2 11.3 12.0 12.1 12.2 12.3
1027 - TSCNTL-C
The loginprocessendedbecausethe usertyped Ctrl-C. Thiscode isrelated toimmediateTelnet andraw TCPdisconnects during aterminalserversession.
no no no no yes yes yes yes
1028 - TSSessionEnd
Theterminalserversession hasended.This codeis relatedtoimmediateTelnet andraw TCPdisconnects during aterminalserversession.
no no no no yes yes yes yes
TACACS Attribute-Value Pairs Information About TACACS Attribute-Value Pairs
TACACS+ Configuration Guide Cisco IOS Release 12.4T86
CauseCodes
Description
11.0 11.1 11.2 11.3 12.0 12.1 12.2 12.3
1029 - TSCloseVconn
The userclosed thevirtualconnection. This codeis relatedtoimmediateTelnet andraw TCPdisconnects during aterminalserversession.
no no no no yes yes yes yes
1030 - TSEnd Vconn
The virtualconnectionhas ended.This codeis relatedtoimmediateTelnet andraw TCPdisconnects during aterminalserversession.
no no no no yes yes yes yes
1031 - TSRloginExit
The userexitednormallyfrom anRloginsession.This codeis relatedtoimmediateTelnet andraw TCPdisconnects during aterminalserversession.
no no no no yes yes yes yes
TACACS Attribute-Value PairsInformation About TACACS Attribute-Value Pairs
TACACS+ Configuration Guide Cisco IOS Release 12.4T 87
CauseCodes
Description
11.0 11.1 11.2 11.3 12.0 12.1 12.2 12.3
1032 - TSRlogin OptInvalid
The userselected aninvalidRloginoption.This codeis relatedtoimmediateTelnet andraw TCPdisconnects during aterminalserversession.
no no no no yes yes yes yes
1033 - TSInsuffResources
The accessserver hasinsufficientresourcesfor theterminalserversession.This codeis relatedtoimmediateTelnet andraw TCPdisconnects during aterminalserversession.
no no no no yes yes yes yes
TACACS Attribute-Value Pairs Information About TACACS Attribute-Value Pairs
TACACS+ Configuration Guide Cisco IOS Release 12.4T88
CauseCodes
Description
11.0 11.1 11.2 11.3 12.0 12.1 12.2 12.3
1040 - PPPLCPTimeout
PPP linkcontrolprotocol(LCP)negotiationtimed outwhilewaiting fora responsefrom apeer. ThiscodeconcernsPPPconnections.
no no no no yes yes yes yes
1041 - PPPLCP Fail
There wasa failure toconvergeon PPPLCPnegotiations. ThiscodeconcernsPPPconnections.
no no no no yes yes yes yes
1042 - PPPPap Fail
PPPPasswordAuthenticationProtocol(PAP)authentication failed.This codeconcernsPPPconnections.
no no no no yes yes yes yes
TACACS Attribute-Value PairsInformation About TACACS Attribute-Value Pairs
TACACS+ Configuration Guide Cisco IOS Release 12.4T 89
CauseCodes
Description
11.0 11.1 11.2 11.3 12.0 12.1 12.2 12.3
1043 - PPPCHAP Fail
PPPChallengeHandshakeAuthenticationProtocol(CHAP)authentication failed.This codeconcernsPPPconnections.
no no no no yes yes yes yes
1044 - PPPRemoteFail
Authentication failedfrom theremoteserver.This codeconcernsPPPsessions.
no no no no yes yes yes yes
1045 - PPPReceiveTerm
The peersent a PPPtermination request.This codeconcernsPPPconnections.
no no no no yes yes yes yes
PPP LCPClose(1046)
LCP got acloserequestfrom theupper layerwhile LCPwas in anopen state.This codeconcernsPPPconnections.
no no no no yes yes yes yes
TACACS Attribute-Value Pairs Information About TACACS Attribute-Value Pairs
TACACS+ Configuration Guide Cisco IOS Release 12.4T90
CauseCodes
Description
11.0 11.1 11.2 11.3 12.0 12.1 12.2 12.3
1047 - PPPNo NCP
LCPclosedbecause noNCPs wereopen. ThiscodeconcernsPPPconnections.
no no no no yes yes yes yes
1048 - PPPMP Error
LCPclosedbecause itcould notdetermineto whichMultilinkPPPbundle thatit shouldadd theuser. ThiscodeconcernsPPPconnections.
no no no no yes yes yes yes
1049 - PPPMaxChannels
LCPclosedbecausethe accessservercould notadd anymorechannels toan MPsession.This codeconcernsPPPconnections.
no no no no yes yes yes yes
TACACS Attribute-Value PairsInformation About TACACS Attribute-Value Pairs
TACACS+ Configuration Guide Cisco IOS Release 12.4T 91
CauseCodes
Description
11.0 11.1 11.2 11.3 12.0 12.1 12.2 12.3
1050 - TSTables Full
The rawTCP orTelnetinternalsessiontables arefull. Thiscoderelates toimmediateTelnet andraw TCPdisconnects andcontainsmorespecificinformation than theTelnet andTCP codeslistedearlier inthis table.
no no no no yes yes yes yes
1051 - TSResourceFull
Internalresourcesare full.This coderelates toimmediateTelnet andraw TCPdisconnects andcontainsmorespecificinformation than theTelnet andTCP codeslistedearlier inthis table.
no no no no yes yes yes yes
TACACS Attribute-Value Pairs Information About TACACS Attribute-Value Pairs
TACACS+ Configuration Guide Cisco IOS Release 12.4T92
CauseCodes
Description
11.0 11.1 11.2 11.3 12.0 12.1 12.2 12.3
1052 - TSInvalid IPAddr
The IPaddress forthe Telnethost isinvalid.This coderelates toimmediateTelnet andraw TCPdisconnects andcontainsmorespecificinformation than theTelnet andTCP codeslistedearlier inthis table.
no no no no yes yes yes yes
1053 - TSBadHostname
The accessservercould notresolve thehost name.This coderelates toimmediateTelnet andraw TCPdisconnects andcontainsmorespecificinformation than theTelnet andTCP codeslistedearlier inthis table.
no no no no yes yes yes yes
TACACS Attribute-Value PairsInformation About TACACS Attribute-Value Pairs
TACACS+ Configuration Guide Cisco IOS Release 12.4T 93
CauseCodes
Description
11.0 11.1 11.2 11.3 12.0 12.1 12.2 12.3
1054 - TSBad Port
The accessserverdetected abad ormissingportnumber.This coderelates toimmediateTelnet andraw TCPdisconnects andcontainsmorespecificinformation than theTelnet andTCP codeslistedearlier inthis table.
no no no no yes yes yes yes
1060 -TCP Reset
The hostreset theTCPconnection. The TCPstack canreturn thisdisconnectcodeduring animmediateTelnet orraw TCPsession.
no no no no yes yes yes yes
TACACS Attribute-Value Pairs Information About TACACS Attribute-Value Pairs
TACACS+ Configuration Guide Cisco IOS Release 12.4T94
CauseCodes
Description
11.0 11.1 11.2 11.3 12.0 12.1 12.2 12.3
1061 -TCPConnection Refused
The hostrefused theTCPconnection. The TCPstack canreturn thisdisconnectcodeduring animmediateTelnet orraw TCPsession.
no no no no yes yes yes yes
1062 -TCPTimeout
The TCPconnectiontimed out.The TCPstack canreturn thisdisconnectcodeduring animmediateTelnet orraw TCPsession.
no no no no yes yes yes yes
1063 -TCPForeignHost Close
A foreignhost closedthe TCPconnection. The TCPstack canreturn thisdisconnectcodeduring animmediateTelnet orraw TCPsession.
no no no no yes yes yes yes
TACACS Attribute-Value PairsInformation About TACACS Attribute-Value Pairs
TACACS+ Configuration Guide Cisco IOS Release 12.4T 95
CauseCodes
Description
11.0 11.1 11.2 11.3 12.0 12.1 12.2 12.3
1064 -TCP NetUnreachable
The TCPnetworkwasunreachable. TheTCP stackcan returnthisdisconnectcodeduring animmediateTelnet orraw TCPsession.
no no no no yes yes yes yes
1065 -TCP HostUnreachable
The TCPhost wasunreachable. TheTCP stackcan returnthisdisconnectcodeduring animmediateTelnet orraw TCPsession.
no no no no yes yes yes yes
1066 -TCP NetAdminUnreachable
The TCPnetworkwasadministrativelyunreachable. TheTCP stackcan returnthisdisconnectcodeduring animmediateTelnet orraw TCPsession.
no no no no yes yes yes yes
TACACS Attribute-Value Pairs Information About TACACS Attribute-Value Pairs
TACACS+ Configuration Guide Cisco IOS Release 12.4T96
CauseCodes
Description
11.0 11.1 11.2 11.3 12.0 12.1 12.2 12.3
1067 -TCP HostAdminUnreachable
The TCPhost wasadministrativelyunreachable. TheTCP stackcan returnthisdisconnectcodeduring animmediateTelnet orraw TCPsession.
no no no no yes yes yes yes
1068 -TCP PortUnreachable
The TCPport wasunreachable. TheTCP stackcan returnthisdisconnectcodeduring animmediateTelnet orraw TCPsession.
no no no no yes yes yes yes
1100 -SessionTimeout
Thesessiontimed outbecausethere wasno activityon a PPPlink. Thiscodeapplies toall sessiontypes.
no no no no yes yes yes yes
TACACS Attribute-Value PairsInformation About TACACS Attribute-Value Pairs
TACACS+ Configuration Guide Cisco IOS Release 12.4T 97
CauseCodes
Description
11.0 11.1 11.2 11.3 12.0 12.1 12.2 12.3
1101 -SecurityFail
Thesessionfailed forsecurityreasons.This codeapplies toall sessiontypes.
no no no no yes yes yes yes
1102 -Callback
Thesessionended forcallback.This codeapplies toall sessiontypes.
no no no no yes yes yes yes
1120 -Unsupported
One endrefused thecallbecausetheprotocolwasdisabled orunsupported. Thiscodeapplies toall sessiontypes.
no no no no yes yes yes yes
1150 -RadiusDisc
TheRADIUSserverrequestedthedisconnect.
no no no no yes yes yes yes
1151 -LocalAdminDisc
The localadministrator hasdisconnected.
no no no no yes yes yes yes
TACACS Attribute-Value Pairs Information About TACACS Attribute-Value Pairs
TACACS+ Configuration Guide Cisco IOS Release 12.4T98
CauseCodes
Description
11.0 11.1 11.2 11.3 12.0 12.1 12.2 12.3
1152 -SNMPDisc
SimpleNetworkManagement Protocol(SNMP)hasdisconnected.
no no no no yes yes yes yes
1160 -V110Retries
Theallowedretries forV110synchronization havebeenexceeded.
no no no no yes yes yes yes
1170 - PPPAuthTimeout
Authenticationtimeout.This codeapplies toPPPsessions.
no no no no yes yes yes yes
1180 -LocalHangup
The calldisconnected as theresult of alocalhangup.
no no no no yes yes yes yes
1185 -RemoteHangup
The calldisconnected becausethe remoteend hungup.
no no no no yes yes yes yes
1190 - T1Quiesced
The calldisconnected becausethe T1 linethat carriedit wasquiesced.
no no no no yes yes yes yes
TACACS Attribute-Value PairsInformation About TACACS Attribute-Value Pairs
TACACS+ Configuration Guide Cisco IOS Release 12.4T 99
CauseCodes
Description
11.0 11.1 11.2 11.3 12.0 12.1 12.2 12.3
1195 - CallDuration
The calldisconnected becausethe calldurationexceededthemaximumamount oftimeallowed bythe MaxCall Minsor MaxDS0 Minsparameteron theaccessserver.
no no no no yes yes yes yes
1600 -VPDNUserDisconnect
The userdisconnected. Thisvalueapplies tovirtualprivatedial-upnetwork(VPDN)sessions.
no no no no no no yes yes
1601 -VPDNCarrierLoss
Carrierloss hasoccurred.This codeapplies toVPDNsessions.
no no no no no no yes yes
1602 -VPDN NoResources
There arenoresources.This codeapplies toVPDNsessions.
no no no no no no yes yes
TACACS Attribute-Value Pairs Information About TACACS Attribute-Value Pairs
TACACS+ Configuration Guide Cisco IOS Release 12.4T100
CauseCodes
Description
11.0 11.1 11.2 11.3 12.0 12.1 12.2 12.3
1603 -VPDNBadControlPacket
Thecontrolpacket isinvalid.This codeapplies toVPDNsessions.
no no no no no no yes yes
1604 -VPDNAdminDisconnect
Theadministratordisconnected. Thiscodeapplies toVPDNsessions.
no no no no no no yes yes
1605 -VPDNTunnelDown/Setup Fail
The tunnelis down orthe setupfailed. Thiscodeapplies toVPDNsessions.
no no no no no no yes yes
1606 -VPDNLocal PPPDisconnect
There wasa local PPPdisconnect.This codeapplies toVPDNsessions.
no no no no no no yes yes
1607 -VPDNSoftshut/SessionLimit
Newsessionscannot beestablishedon theVPNtunnel.This codeapplies toVPDNsessions.
no no no no no no yes yes
TACACS Attribute-Value PairsInformation About TACACS Attribute-Value Pairs
TACACS+ Configuration Guide Cisco IOS Release 12.4T 101
CauseCodes
Description
11.0 11.1 11.2 11.3 12.0 12.1 12.2 12.3
1608 -VPDNCallRedirected
The callwasredirected.This codeapplies toVPDNsessions.
no no no no no no yes yes
1801 -Q850Unassigned Number
Thenumberhas notbeenassigned.This codeapplies toISDN ormodemcalls thatcame inoverISDN.
no no no no no no no yes
TACACS Attribute-Value Pairs Information About TACACS Attribute-Value Pairs
TACACS+ Configuration Guide Cisco IOS Release 12.4T102
CauseCodes
Description
11.0 11.1 11.2 11.3 12.0 12.1 12.2 12.3
1802 -Q850 NoRoute
Theequipmentthat issendingthis codehasreceived arequest toroute thecallthrough aparticulartransitnetworkthat it doesnotrecognize.Theequipmentthat issendingthis codedoes notrecognizethe transitnetworkbecauseeither thetransitnetworkdoes notexist orbecausethatparticulartransitnetwork,while itdoes exist,does notserve theequipmentthat issendingthis code.This codeapplies toISDN or
no no no no no no no yes
TACACS Attribute-Value PairsInformation About TACACS Attribute-Value Pairs
TACACS+ Configuration Guide Cisco IOS Release 12.4T 103
CauseCodes
Description
11.0 11.1 11.2 11.3 12.0 12.1 12.2 12.3
modemcalls thatcame inoverISDN.
1803 -Q850 NoRoute ToDestination
The calledpartycannot bereachedbecausethenetworkthroughwhich thecall hasbeenrouteddoes notserve thedestinationthat isdesired.This codeapplies toISDN ormodemcalls thatcame inoverISDN.
no no no no no no no yes
TACACS Attribute-Value Pairs Information About TACACS Attribute-Value Pairs
TACACS+ Configuration Guide Cisco IOS Release 12.4T104
CauseCodes
Description
11.0 11.1 11.2 11.3 12.0 12.1 12.2 12.3
1806 -Q850ChannelUnacceptable
Thechannelthat hasbeen mostrecentlyidentifiedis notacceptableto thesendingentity foruse in thiscall. Thiscodeapplies toISDN ormodemcalls thatcame inoverISDN.
no no no no no no no yes
1816 -Q850NormalClearing
The call isbeingclearedbecauseone of theusers whois involvedin the callhasrequestedthat thecall becleared.This codeapplies toISDN ormodemcalls thatcame inoverISDN.
no no no no no no no yes
TACACS Attribute-Value PairsInformation About TACACS Attribute-Value Pairs
TACACS+ Configuration Guide Cisco IOS Release 12.4T 105
CauseCodes
Description
11.0 11.1 11.2 11.3 12.0 12.1 12.2 12.3
1817 -Q850 UserBusy
The calledparty isunable toacceptanothercallbecausethe user-busyconditionhas beenencountered. Thiscode maybegeneratedby thecalled useror by thenetwork.In the caseof the user,the userequipmentiscompatiblewith thecall. Thiscodeapplies toISDN ormodemcalls thatcame inoverISDN.
no no no no no no no yes
TACACS Attribute-Value Pairs Information About TACACS Attribute-Value Pairs
TACACS+ Configuration Guide Cisco IOS Release 12.4T106
CauseCodes
Description
11.0 11.1 11.2 11.3 12.0 12.1 12.2 12.3
1818 -Q850 NoUserResponding
Used whena calledparty doesnotrespond toa call-establishmentmessagewith eitheran alertingor connectindicationwithin theprescribedperiod oftime thatwasallocated.This codeapplies toISDN ormodemcalls thatcame inoverISDN.
no no no no no no no yes
TACACS Attribute-Value PairsInformation About TACACS Attribute-Value Pairs
TACACS+ Configuration Guide Cisco IOS Release 12.4T 107
CauseCodes
Description
11.0 11.1 11.2 11.3 12.0 12.1 12.2 12.3
1819 -Q850 NoUserAnswer
The calledparty hasbeenalerted butdoes notrespondwith aconnectindicationwithin aprescribedperiod oftime. Thiscodeapplies toISDN ormodemcalls thatcame inoverISDN.
no no no no no no no yes
TACACS Attribute-Value Pairs Information About TACACS Attribute-Value Pairs
TACACS+ Configuration Guide Cisco IOS Release 12.4T108
CauseCodes
Description
11.0 11.1 11.2 11.3 12.0 12.1 12.2 12.3
1821 -Q850 CallRejected
Theequipmentthat issendingthis codedoes notwish toaccept thiscallalthough itcould haveacceptedthe callbecausetheequipmentthat issendingthis code isneitherbusy norincompatible. Thiscode mayalso begeneratedby thenetwork,indicatingthat thecall wascleareddue to asupplementaryserviceconstraint.Thediagnosticfield maycontainadditionalinformation about thesupplementaryservice andreason for
no no no no no no no yes
TACACS Attribute-Value PairsInformation About TACACS Attribute-Value Pairs
TACACS+ Configuration Guide Cisco IOS Release 12.4T 109
CauseCodes
Description
11.0 11.1 11.2 11.3 12.0 12.1 12.2 12.3
rejection.This codeapplies toISDN ormodemcalls thatcame inoverISDN.
1822 -Q850NumberChanged
Thenumberthat isindicatedfor thecalledparty is nolongerassigned.The newcalledpartynumbermayoptionallybeincluded inthediagnosticfield. Thiscodeapplies toISDN ormodemcalls thatcame inoverISDN.
no no no no no no no yes
TACACS Attribute-Value Pairs Information About TACACS Attribute-Value Pairs
TACACS+ Configuration Guide Cisco IOS Release 12.4T110
CauseCodes
Description
11.0 11.1 11.2 11.3 12.0 12.1 12.2 12.3
1827 -Q850Destination Out ofOrder
Thedestinationthat wasindicatedby the usercannot bereachedbecausetheinterface tothedestinationis notfunctioning correctly.The term“notfunctioningcorrectly”indicatesthat asignalingmessagewas unableto bedeliveredto theremoteparty. Thiscodeapplies toISDN ormodemcalls thatcame inoverISDN.
no no no no no no no yes
TACACS Attribute-Value PairsInformation About TACACS Attribute-Value Pairs
TACACS+ Configuration Guide Cisco IOS Release 12.4T 111
CauseCodes
Description
11.0 11.1 11.2 11.3 12.0 12.1 12.2 12.3
1828 -Q850InvalidNumberFormat
The calledpartycannot bereachedbecausethe calledpartynumber isnot in avalidformat oris notcomplete.This codeapplies toISDN ormodemcalls thatcame inoverISDN.
no no no no no no no yes
1829 -Q850FacilityRejected
This codeis returnedwhen asupplementaryservicethat wasrequestedby the usercannot beprovidedby thenetwork.This codeapplies toISDN ormodemcalls thathave comein overISDN.
no no no no no no no yes
TACACS Attribute-Value Pairs Information About TACACS Attribute-Value Pairs
TACACS+ Configuration Guide Cisco IOS Release 12.4T112
CauseCodes
Description
11.0 11.1 11.2 11.3 12.0 12.1 12.2 12.3
1830 -Q850Responding to StatusEnquiry
This codeis includedin theSTATUSmessagewhen thereason forgeneratingtheSTATUSmessagewas thepriorreceipt of aSTATUSENQUIRYmessage.This codeapplies toISDN ormodemcalls thatcame inoverISDN.
no no no no no no no yes
1831 -Q850Unspecified Cause
No othercodeapplies.This codeapplies toISDN ormodemcalls thatcame inoverISDN.
no no no no no no no yes
TACACS Attribute-Value PairsInformation About TACACS Attribute-Value Pairs
TACACS+ Configuration Guide Cisco IOS Release 12.4T 113
CauseCodes
Description
11.0 11.1 11.2 11.3 12.0 12.1 12.2 12.3
1834 -Q850 NoCircuitAvailable
No circuitor channelis availableto handlethe call.This codeapplies toISDN ormodemcalls thatcame inoverISDN.
no no no no no no no yes
1838 -Q850NetworkOut ofOrder
Thenetwork isnotfunctioning correctlyand theconditionis likely tolast arelativelylongperiod oftime. Thiscodeapplies toISDN ormodemcalls thatcame inoverISDN.
no no no no no no no yes
TACACS Attribute-Value Pairs Information About TACACS Attribute-Value Pairs
TACACS+ Configuration Guide Cisco IOS Release 12.4T114
CauseCodes
Description
11.0 11.1 11.2 11.3 12.0 12.1 12.2 12.3
1841 -Q850TemporaryFailure
Thenetwork isnotfunctioning correctlyand theconditionis notlikely tolast a longperiod oftime. Thiscodeapplies toISDN ormodemcalls thatcame inoverISDN.
no no no no no no no yes
1842 -Q850NetworkCongestion
Thenetwork iscongested.This codeapplies toISDN ormodemcalls thatcame inoverISDN.
no no no no no no no yes
TACACS Attribute-Value PairsInformation About TACACS Attribute-Value Pairs
TACACS+ Configuration Guide Cisco IOS Release 12.4T 115
CauseCodes
Description
11.0 11.1 11.2 11.3 12.0 12.1 12.2 12.3
1843 -Q850AccessInfoDiscarded
This codeindicatesthat thenetworkcould notdeliveraccessinformation to theremoteuser asrequested.This codeapplies toISDN ormodemcalls thatcame inoverISDN.
no no no no no no no yes
1844 -Q850RequestedChannelNotAvailable
This codeis returnedwhen thecircuit orchannelthat isindicatedby therequestingentitycannot beprovidedby theother sideof theinterface.This codeapplies toISDN ormodemcalls thatcame inoverISDN.
no no no no no no no yes
TACACS Attribute-Value Pairs Information About TACACS Attribute-Value Pairs
TACACS+ Configuration Guide Cisco IOS Release 12.4T116
CauseCodes
Description
11.0 11.1 11.2 11.3 12.0 12.1 12.2 12.3
1845 -Q850 CallPre-empted
The callwaspreempted.This codeapplies toISDN ormodemcalls thatcame inoverISDN.
no no no no no no no yes
1847 -Q850ResourceUnavailable
This codeis used toreport aresource-unavailable eventonly whenno othercode in theresource-unavailable classapplies.This codeapplies toISDN ormodemcalls thatcame inoverISDN.
no no no no no no no yes
1850 -Q850FacilityNotSubscribed
Not asubscribedfacility.This codeapplies toISDN ormodemcalls thatcame inoverISDN.
no no no no no no no yes
TACACS Attribute-Value PairsInformation About TACACS Attribute-Value Pairs
TACACS+ Configuration Guide Cisco IOS Release 12.4T 117
CauseCodes
Description
11.0 11.1 11.2 11.3 12.0 12.1 12.2 12.3
1852 -Q850OutgoingCallBarred
Althoughthe callingparty is amember ofthe closeduser groupfor theoutgoingclosed usergroup call,outgoingcalls arenotallowedfor thismember.This codeapplies toISDN ormodemcalls thatcame inoverISDN.
no no no no no no no yes
TACACS Attribute-Value Pairs Information About TACACS Attribute-Value Pairs
TACACS+ Configuration Guide Cisco IOS Release 12.4T118
CauseCodes
Description
11.0 11.1 11.2 11.3 12.0 12.1 12.2 12.3
Q850IncomingCallBarred(1854)
Althoughthe calledparty is amember ofthe closeduser groupfor theincomingclosed usergroup call,incomingcalls arenotallowed tothismember.This codeapplies toISDN ormodemcalls thathave comein overISDN.
no no no no no no no yes
TACACS Attribute-Value PairsInformation About TACACS Attribute-Value Pairs
TACACS+ Configuration Guide Cisco IOS Release 12.4T 119
CauseCodes
Description
11.0 11.1 11.2 11.3 12.0 12.1 12.2 12.3
1858 -Q850BearerCapabilityNotAvailable
The userhasrequested abearercapabilitythat isimplemented by theequipmentthatgeneratedthis codebut that isnotavailableat thistime. Thiscodeapplies toISDN ormodemcalls thathave comein overISDN.
no no no no no no no yes
TACACS Attribute-Value Pairs Information About TACACS Attribute-Value Pairs
TACACS+ Configuration Guide Cisco IOS Release 12.4T120
CauseCodes
Description
11.0 11.1 11.2 11.3 12.0 12.1 12.2 12.3
1863 -Q850ServiceNotAvailable
The codeis used toreport aservice- oroption-not-availableevent onlywhen noother codein theservice- oroption-not-availableclassapplies.This codeapplies toISDN ormodemcalls thathave comein overISDN.
no no no no no no no yes
1865 -Q850BearerCapabilityNotImplemented
Theequipmentthat issendingthis codedoes notsupport thebearercapabilitythat wasrequested.This codeapplies toISDN ormodemcalls thathave comein overISDN.
no no no no no no no yes
TACACS Attribute-Value PairsInformation About TACACS Attribute-Value Pairs
TACACS+ Configuration Guide Cisco IOS Release 12.4T 121
CauseCodes
Description
11.0 11.1 11.2 11.3 12.0 12.1 12.2 12.3
1866 -Q850ChannelNotImplemented
Theequipmentthat issendingthis codedoes notsupport thechanneltype thatwasrequested.This codeapplies toISDN ormodemcalls thathave comein overISDN.
no no no no no no no yes
1869 -Q850FacilityNotImplemented
Thesupplementaryservicerequestedby the usercannot beprovidedby thenetwork.This codeapplies toISDN ormodemcalls thathave comein overISDN.
no no no no no no no yes
TACACS Attribute-Value Pairs Information About TACACS Attribute-Value Pairs
TACACS+ Configuration Guide Cisco IOS Release 12.4T122
CauseCodes
Description
11.0 11.1 11.2 11.3 12.0 12.1 12.2 12.3
1881 -Q850InvalidCallReference
Theequipmentthat issendingthis codehasreceived amessagehaving acallreferencethat is notcurrentlyin use onthe user-networkinterface.This codeapplies toISDN ormodemcalls thathave comein overISDN.
no no no no no no no yes
TACACS Attribute-Value PairsInformation About TACACS Attribute-Value Pairs
TACACS+ Configuration Guide Cisco IOS Release 12.4T 123
CauseCodes
Description
11.0 11.1 11.2 11.3 12.0 12.1 12.2 12.3
1882 -Q850ChannelDoes NotExist
Thechannelmostrecentlyidentifiedis notacceptableto thesendingentity foruse in thiscall. Thiscodeapplies toISDN ormodemcalls thathave comein overISDN.This codeapplies toISDN ormodemcalls thathave comein overISDN.
no no no no no no no yes
TACACS Attribute-Value Pairs Information About TACACS Attribute-Value Pairs
TACACS+ Configuration Guide Cisco IOS Release 12.4T124
CauseCodes
Description
11.0 11.1 11.2 11.3 12.0 12.1 12.2 12.3
1888 -Q850IncompatibleDestination
Theequipmentthat issendingthis codehasreceived arequest toestablish acall thathas low-layercompatibility or othercompatibilityattributesthat cannotbeaccommodated. Thiscodeapplies toISDN ormodemcalls thathave comein overISDN.
no no no no no no no yes
TACACS Attribute-Value PairsInformation About TACACS Attribute-Value Pairs
TACACS+ Configuration Guide Cisco IOS Release 12.4T 125
CauseCodes
Description
11.0 11.1 11.2 11.3 12.0 12.1 12.2 12.3
1896 -Q850MandatoryInfoElement IsMissing
Theequipmentthat issendingthis codehasreceived amessagethat ismissing aninformation elementthat mustbe presentin themessagebefore thatmessagecan beprocessed.This codeapplies toISDN ormodemcalls thathave comein overISDN.
no no no no no no no yes
TACACS Attribute-Value Pairs Information About TACACS Attribute-Value Pairs
TACACS+ Configuration Guide Cisco IOS Release 12.4T126
CauseCodes
Description
11.0 11.1 11.2 11.3 12.0 12.1 12.2 12.3
1897 -Q850 NonExistentMessageType
Theequipmentthat issendingthis codehasreceived amessagewith amessagetype that itdoes notrecognizeeitherbecausethis is amessagethat is notdefined orthat isdefined butnotimplemented by theequipmentthat issendingthis code.This codeapplies toISDN ormodemcalls thathave comein overISDN.
no no no no no no no yes
TACACS Attribute-Value PairsInformation About TACACS Attribute-Value Pairs
TACACS+ Configuration Guide Cisco IOS Release 12.4T 127
CauseCodes
Description
11.0 11.1 11.2 11.3 12.0 12.1 12.2 12.3
1898 -Q850InvalidMessage
This codeis used toreport aninvalidmessagewhen noother codein theinvalidmessageclassapplies.This codeapplies toISDN ormodemcalls thathave comein overISDN.
no no no no no no no yes
1899 -Q850 BadInfoElement
Theinformation elementnotrecognized. This codeapplies toISDN ormodemcalls thathave comein overISDN.
no no no no no no no yes
TACACS Attribute-Value Pairs Information About TACACS Attribute-Value Pairs
TACACS+ Configuration Guide Cisco IOS Release 12.4T128
CauseCodes
Description
11.0 11.1 11.2 11.3 12.0 12.1 12.2 12.3
1900 -Q850InvalidElementContents
Theequipmentthat issendingthis codehasreceivedaninformation elementthat it hasimplemented;however,one ormore fieldsin theinformation elementare codedin such away thathas notbeenimplemented by theequipmentthat issendingthis code.This codeapplies toISDN ormodemcalls thathave comein overISDN.
no no no no no no no yes
TACACS Attribute-Value PairsInformation About TACACS Attribute-Value Pairs
TACACS+ Configuration Guide Cisco IOS Release 12.4T 129
CauseCodes
Description
11.0 11.1 11.2 11.3 12.0 12.1 12.2 12.3
1901 -Q850WrongMessagefor State
Themessagethat wasreceived isincompatible with thecall state.This codeapplies toISDN ormodemcalls thathave comein overISDN.
no no no no no no no yes
1902 -Q850Recoveryon TimerExpiration
Aprocedurehas beeninitiated bytheexpirationof a timerinassociationwith error-handlingprocedures. This codeapplies toISDN ormodemcalls thathave comein overISDN.
no no no no no no no yes
TACACS Attribute-Value Pairs Information About TACACS Attribute-Value Pairs
TACACS+ Configuration Guide Cisco IOS Release 12.4T130
CauseCodes
Description
11.0 11.1 11.2 11.3 12.0 12.1 12.2 12.3
1903 -Q850 InfoElementError
Theequipmentthat issendingthis codehasreceived amessagethatincludesinformation elementsorparametersthat are notrecognizedbecausetheinformation elementidentifiersorparamenternames arenot definedor aredefined butnotimplemented by theequipmentthat issendingthis code.This codeapplies toISDN ormodemcalls thathave comein overISDN.
no no no no no no no yes
TACACS Attribute-Value PairsInformation About TACACS Attribute-Value Pairs
TACACS+ Configuration Guide Cisco IOS Release 12.4T 131
CauseCodes
Description
11.0 11.1 11.2 11.3 12.0 12.1 12.2 12.3
1911 -Q850ProtocolError
This codeis used toreport aprotocolerror eventonly whenno othercode in theprotocolerror classapplies.This codeapplies toISDN ormodemcalls thathave comein overISDN.
no no no no no no no yes
1927 -Q850UnspecifiedInternetworkingEvent
There hasbeen anerror wheninterworking with anetworkthat doesnotprovidecodes foractionsthat ittakes. Thiscodeapplies toISDN ormodemcalls thathave comein overISDN.
no no no no no no no yes
Additional ReferencesThe following sections provide references related to TACACS+ Attribute-Value Pairs.
TACACS Attribute-Value Pairs Additional References
TACACS+ Configuration Guide Cisco IOS Release 12.4T132
Related Documents
Related Topic Document Title
TACACS+ authentication Configuring Authentication module.
TACACS+ Authorization Configuring Authorization module.
TACACS+ accounting Configuring Accounting module.
TACACS+ Configuring TACACS+ module.
Standards
Standard Title
None. --
MIBs
MIB MIBs Link
None. To locate and download MIBs for selectedplatforms, Cisco IOS releases, and feature sets, useCisco MIB Locator found at the following URL:
http://www.cisco.com/go/mibs
RFCs
RFC Title
None. --
Technical Assistance
Description Link
The Cisco Support website provides extensiveonline resources, including documentation and toolsfor troubleshooting and resolving technical issueswith Cisco products and technologies.
To receive security and technical information aboutyour products, you can subscribe to variousservices, such as the Product Alert Tool (accessedfrom Field Notices), the Cisco Technical ServicesNewsletter, and Really Simple Syndication (RSS)Feeds.
Access to most tools on the Cisco Support websiterequires a Cisco.com user ID and password.
http://www.cisco.com/techsupport
TACACS Attribute-Value PairsAdditional References
TACACS+ Configuration Guide Cisco IOS Release 12.4T 133
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S.and other countries. To view a list of Cisco trademarks, go to this URL: www.cisco.com/go/trademarks.Third-party trademarks mentioned are the property of their respective owners. The use of the word partnerdoes not imply a partnership relationship between Cisco and any other company. (1110R)
Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to beactual addresses and phone numbers. Any examples, command display output, network topology diagrams,and other figures included in the document are shown for illustrative purposes only. Any use of actual IPaddresses or phone numbers in illustrative content is unintentional and coincidental.
TACACS Attribute-Value Pairs
TACACS+ Configuration Guide Cisco IOS Release 12.4T134