Hi Marc,
The NAS device frequently attempts to connect to the Tacacs+ Server to check if it is functioning properly. However, the excessive number of these attempts results in too many meaningless connections. Is there a way to reject or block such connection behavior?
122495: 15:11:34.624 4/001549f0: 172.29.195.114 New tacacs session
122495: 15:11:34.624 4/001549f0: 172.29.195.114 ---<start packet>---
122495: 15:11:34.624 4/001549f0: 172.29.195.114 key used: xxx
122495: 15:11:34.624 4/001549f0: 172.29.195.114 version: 192, type: 1, seq no: 1, flags: unencrypted
122495: 15:11:34.624 4/001549f0: 172.29.195.114 session id: 001549f0, data length: 17
122495: 15:11:34.624 4/001549f0: 172.29.195.114 packet body (len: 17):
122495: 15:11:34.624 4/001549f0: 172.29.195.114 0000 01 01 01 01 00 04 05 00 74 74 79 30 61 73 79 6e ........ tty0asyn
122495: 15:11:34.624 4/001549f0: 172.29.195.114 0010 63 c
122495: 15:11:34.624 4/001549f0: 172.29.195.114 AUTHEN/START, priv_lvl=1
122495: 15:11:34.624 4/001549f0: 172.29.195.114 action=login (1)
122495: 15:11:34.624 4/001549f0: 172.29.195.114 authen_type=ascii (1)
122495: 15:11:34.624 4/001549f0: 172.29.195.114 service=login (1)
122495: 15:11:34.624 4/001549f0: 172.29.195.114 user_len=0 port_len=4 rem_addr_len=5
122495: 15:11:34.624 4/001549f0: 172.29.195.114 data_len=0
122495: 15:11:34.624 4/001549f0: 172.29.195.114 user (len: 0):
122495: 15:11:34.624 4/001549f0: 172.29.195.114 port (len: 4): tty0
122495: 15:11:34.624 4/001549f0: 172.29.195.114 rem_addr (len: 5): async
122495: 15:11:34.624 4/001549f0: 172.29.195.114 data (len: 0):
122495: 15:11:34.624 4/001549f0: 172.29.195.114 ---<end packet>--
122495: 15:11:34.624 4/001549f0: 172.29.195.114 authen: hdr->seq_no: 1
122495: 15:11:34.624 4/001549f0: 172.29.195.114 Writing AUTHEN/GETUSER size=62
122495: 15:11:34.624 4/001549f0: 172.29.195.114 ---<start packet>---
122495: 15:11:34.624 4/001549f0: 172.29.195.114 key used: xxx
122495: 15:11:34.624 4/001549f0: 172.29.195.114 version: 192, type: 1, seq no: 2, flags: unencrypted
122495: 15:11:34.624 4/001549f0: 172.29.195.114 session id: 001549f0, data length: 50
122495: 15:11:34.624 4/001549f0: 172.29.195.114 packet body (len: 50):
122495: 15:11:34.624 4/001549f0: 172.29.195.114 0000 04 00 00 2c 00 00 57 65 6c 63 6f 6d 65 2c 20 79 ...,..We lcome, y
122495: 15:11:34.624 4/001549f0: 172.29.195.114 0010 6f 75 27 72 65 20 63 6f 6d 69 6e 67 20 66 72 6f ou're co ming fro
122495: 15:11:34.624 4/001549f0: 172.29.195.114 0020 6d 20 61 73 79 6e 63 0a 55 73 65 72 6e 61 6d 65 m async. Username
122495: 15:11:34.624 4/001549f0: 172.29.195.114 0030 3a 20 :
122495: 15:11:34.624 4/001549f0: 172.29.195.114 AUTHEN, status=4 (AUTHEN/GETUSER) flags=0x0
122495: 15:11:34.624 4/001549f0: 172.29.195.114 msg_len=44, data_len=0
122495: 15:11:34.624 4/001549f0: 172.29.195.114 msg (len: 44): Welcome, you're coming from async\nUsername:
122495: 15:11:34.624 4/001549f0: 172.29.195.114 data (len: 0):
122495: 15:11:34.624 4/001549f0: 172.29.195.114 ---<end packet>---
122495: 15:12:04.624 4/001549f0: 172.29.195.114 ---<start packet>---
122495: 15:12:04.624 4/001549f0: 172.29.195.114 key used: chtfttx
122495: 15:12:04.624 4/001549f0: 172.29.195.114 version: 192, type: 1, seq no: 3, flags: unencrypted
122495: 15:12:04.624 4/001549f0: 172.29.195.114 session id: 001549f0, data length: 23
122495: 15:12:04.624 4/001549f0: 172.29.195.114 packet body (len: 23):
122495: 15:12:04.624 4/001549f0: 172.29.195.114 0000 00 00 00 12 01 55 73 65 72 20 49 6e 70 75 74 20 .....Use r Input
122495: 15:12:04.624 4/001549f0: 172.29.195.114 0010 54 69 6d 65 6f 75 74 Timeout
122495: 15:12:04.624 4/001549f0: 172.29.195.114 AUTHEN/CONT user_msg_len=0, user_data_len=18
122495: 15:12:04.624 4/001549f0: 172.29.195.114 user_msg (len: 0):
122495: 15:12:04.624 4/001549f0: 172.29.195.114 user_data (len: 18): User Input Timeout
122495: 15:12:04.624 4/001549f0: 172.29.195.114 ---<end packet>---
122495: 15:12:04.624 4/001549f0: 172.29.195.114 authen: hdr->seq_no: 3
122495: 15:12:04.624 4/001549f0: 172.29.195.114 aborted by request (User Input Timeout) from async on tty0 aborted by request