TACACS and AAA
TACACS+ stands for Terminal Access Controller Access-Control System Plus. TACACS provides AAA systems mainly used for network devices.
AAA stands for Authentication, Authorization, and Accounting.
- Authentication – Validates users and systems
 - Authorization – Allow access based on user, system, or process
 - Accounting – Tracking who accessed the device and what they did
 
Alcatel-Lucent Router
configure system security
     password
	authentication-order tacplus local
	attempts 5 time 5 lockout 5
     exit
     tacplus
	timeout 5
	server 1 address <acs server IP> secret "<shared key>"
	authorization
	accounting
	no shutdown
    exit
exit
ALU devices typically use the system interface as a source IP address.
Cisco
AAA Model Configuration Statements
aaa new-model aaa authentication login default group tacacs+ local aaa authentication login vtymethod group tacacs+ local aaa authentication login nopass none aaa authentication enable default group tacacs+ enable aaa authorization exec default group tacacs+ if-authenticated aaa accounting exec default start-stop group tacacs+ aaa accounting commands 15 default start-stop group tacacs+ aaa accounting connection default start-stop group tacacs+ aaa accounting system default start-stop group tacacs+
Assign an Interface that was used in the ACS Configuration
Typically it will either be the loopback interface or the interface in which the packet hits first to get to the device.
ip tacacs source-interface <source interfaceIP>
tacacs-server host <acs server IP> tacacs-server key <shared key>
Cisco Nexus
Enable TACACS feature
feature tacacs+
Configure AAA
tacacs-server host <acs server IP> key <shared secret>
aaa group server tacacs+ ACS 
    server <acs server IP>
    use-vrf management
    source-interface mgmt0
aaa authentication login default group ACS 
aaa accounting default group ACS 
Juniper
EX Series
Set the Authentication Order
set system authentication-order tacplus set system authentication-order password
Authentication Configuration
set system tacplus-server <acs server IP> port 49 set system tacplus-server <acs server IP> secret "<shared key>" set system tacplus-server <acs server IP> timeout 5 set system tacplus-server <acs server IP> source-address <source interface IP>
Accounting Configuration
set system accounting events login set system accounting events change-log set system accounting events interactive-commands set system accounting destination tacplus server <acs server IP> secret "<shared key>" set system accounting destination tacplus server <acs server IP> source-address <source interface IP>
Authorization Configuration aka Login Templates
set system login user remote full-name "all remote users" set system login user remote class read-only set system login user neteng full-name "Network Engineers" set system login user neteng class super-user
ACS Attribute Configuration
Cisco ACS 5.x
In ACS 5.x, you will create a separate Access Policy for Juniper. The attribute setting needed will cause issues with Cisco devices if they are using the same policy. The main issue seen will be Privilege denied when attempt to scp a file to or from the device from a server.
You must set a custom attribute under Policy Elements > Authorization and Permissions > Device Administration > Shell Profiles for the Network Engineer group to have super user access level.
Edit the Network Engineer or super user profile and click the Custom Attributes tab and add:
Attribute=local-user-name Value=neteng
HP
AAA Model Configuration Statements
aaa authentication login privilege-mode aaa authentication console login tacacs local aaa authentication console enable tacacs local aaa authentication ssh login tacacs local aaa authentication ssh enable tacacs local
tacacs-server host <acs server IP> tacacs-server key "<shared key>"