26530: 12:04:54.454 3/f2db2aaa: 1.1.1.1 cfg_get: checking user/group tom.vaknin, tag (NULL)
26530: 12:04:54.454 3/f2db2aaa: 1.1.1.1
tom.v...@10.10.10.10: ACL __internal__realm_default: NAS matched (unrestricted)
26530: 12:04:54.454 3/f2db2aaa: 1.1.1.1
tom.v...@10.10.10.10: ACL __internal__realm_default: NAC matched (unrestricted)
26530: 12:04:54.454 3/f2db2aaa: 1.1.1.1
tom.v...@10.10.10.10: ACL __internal__realm_default: Port matched (unrestricted)
26530: 12:04:54.454 3/f2db2aaa: 1.1.1.1
tom.v...@10.10.10.10: ACL __internal__realm_default line 1: Realm "default" <=> "default"
26530: 12:04:54.454 3/f2db2aaa: 1.1.1.1
tom.v...@10.10.10.10: ACL __internal__realm_default: Realm matched
26530: 12:04:54.454 3/f2db2aaa: 1.1.1.1
tom.v...@10.10.10.10: ACL __internal__realm_default: Timespec matched (unrestricted)
26530: 12:04:54.454 3/f2db2aaa: 1.1.1.1
tom.v...@10.10.10.10: ACL __internal__realm_default: ACL matched (unrestricted)
26530: 12:04:54.454 3/f2db2aaa: 1.1.1.1 cfg_get: checking user/group Networking, tag (NULL)
26530: 12:04:54.454 3/f2db2aaa: 1.1.1.1
tom.v...@10.10.10.10: ACL __internal__realm_default: match (cached)
26530: 12:04:54.454 3/f2db2aaa: 1.1.1.1 cfg_get: checking user/group ipgroup, tag (NULL)
26530: 12:04:54.454 3/f2db2aaa: 1.1.1.1 user lookup succeded
26530: 12:04:54.454 3/f2db2aaa: 1.1.1.1 Writing AUTHEN/GETPASS size=262
26530: 12:04:54.454 3/f2db2aaa: 1.1.1.1 ---<start packet>---
26530: 12:04:54.454 3/f2db2aaa: 1.1.1.1 key used: sharedkey
26530: 12:04:54.454 3/f2db2aaa: 1.1.1.1 version: 192, type: 1, seq no: 2, flags: unencrypted
26530: 12:04:54.454 3/f2db2aaa: 1.1.1.1 session id: aa2adbf2 data length: 250
26530: 12:04:54.454 3/f2db2aaa: 1.1.1.1 packet body (len: 250): \005\001\000ô\000\000\n\nWARNING: This router system and data herein are available\n only for authorized purposes and by authorized users.\n Use for any other purpose may result in administrative\n or legal actions against the user.\n\n\n\nPassword:
...
BANNER
...
26530: 12:04:54.454 3/f2db2aaa: 1.1.1.1 AUTHEN status=5 (AUTHEN/GETPASS) flags=0x1
26530: 12:04:54.454 3/f2db2aaa: 1.1.1.1 msg_len=244, data_len=0
26530: 12:04:54.454 3/f2db2aaa: 1.1.1.1 msg (len: 244): \n\nWARNING: This router system and data herein are available\n only for authorized purposes and by authorized users.\n Use for any other purpose may result in administrative\n or legal actions against the user.\n\n\n\nPassword:
...
BANNER
...
26530: 12:04:54.454 3/f2db2aaa: 1.1.1.1 00f0 72 64 3a 20 rd:
26530: 12:04:54.454 3/f2db2aaa: 1.1.1.1 data (len: 0):
26530: 12:04:54.454 3/f2db2aaa: 1.1.1.1 ---<end packet>---
26530: 12:04:54.459 3/f2db2aaa: 1.1.1.1 ---<start packet>---
26530: 12:04:54.459 3/f2db2aaa: 1.1.1.1 key used: sharedkey
26530: 12:04:54.459 3/f2db2aaa: 1.1.1.1 version: 192, type: 1, seq no: 3, flags: unencrypted
26530: 12:04:54.459 3/f2db2aaa: 1.1.1.1 session id: aa2adbf2 data length: 13
26530: 12:04:54.459 3/f2db2aaa: 1.1.1.1 packet body (len: 13): \000\b\000\000\000userpass
26530: 12:04:54.459 3/f2db2aaa: 1.1.1.1 0000 00 08 00 00 00 4c 61 62 61 74 34 35 36 .....user paa
26530: 12:04:54.459 3/f2db2aaa: 1.1.1.1 AUTHEN/CONT user_msg_len=8, user_data_len=0
26530: 12:04:54.459 3/f2db2aaa: 1.1.1.1 user_msg (len: 8): userpass
26530: 12:04:54.459 3/f2db2aaa: 1.1.1.1 0000 4c 61 62 61 74 34 35 36 userpass
26530: 12:04:54.459 3/f2db2aaa: 1.1.1.1 user_data (len: 0):
26530: 12:04:54.459 3/f2db2aaa: 1.1.1.1 ---<end packet>---
26530: 12:04:54.459 3/f2db2aaa: 1.1.1.1 authen: hdr->seq_no: 3
26530: 12:04:54.459 3/f2db2aaa: 1.1.1.1 looking for user tom.vaknin realm default
26530: 12:04:54.459 3/f2db2aaa: 1.1.1.1 cfg_get: checking user/group tom.vaknin, tag (NULL)
26530: 12:04:54.459 3/f2db2aaa: 1.1.1.1
tom.v...@10.10.10.10: ACL __internal__realm_default: match (cached)
26530: 12:04:54.459 3/f2db2aaa: 1.1.1.1 cfg_get: checking user/group Networking, tag (NULL)
26530: 12:04:54.459 3/f2db2aaa: 1.1.1.1
tom.v...@10.10.10.10: ACL __internal__realm_default: match (cached)
26530: 12:04:54.459 3/f2db2aaa: 1.1.1.1 cfg_get: checking user/group ipgroup, tag (NULL)
26530: 12:04:54.459 3/f2db2aaa: 1.1.1.1 user lookup succeded
26530: 12:04:54.471 0/00000000: - creating user tom.vaknin in realm default
...
all groups from AD
...
26530: 12:04:54.471 3/f2db2aaa: 1.1.1.1 looking for user tom.vaknin realm default
26530: 12:04:54.471 3/f2db2aaa: 1.1.1.1 cfg_get: checking user/group tom.vaknin, tag (NULL)
26530: 12:04:54.471 3/f2db2aaa: 1.1.1.1
tom.v...@10.10.10.10: ACL __internal__realm_default: match (cached)
...
Groups from tac.file and AD
...
26530: 12:04:54.471 3/f2db2aaa: 1.1.1.1 Writing AUTHEN/PASS size=18
26530: 12:04:54.471 3/f2db2aaa: 1.1.1.1 ---<start packet>---
26530: 12:04:54.471 3/f2db2aaa: 1.1.1.1 key used: sharedkey
26530: 12:04:54.471 3/f2db2aaa: 1.1.1.1 version: 192, type: 1, seq no: 4, flags: unencrypted
26530: 12:04:54.471 3/f2db2aaa: 1.1.1.1 session id: aa2adbf2 data length: 6
26530: 12:04:54.471 3/f2db2aaa: 1.1.1.1 packet body (len: 6): \001\000\000\000\000\000
26530: 12:04:54.471 3/f2db2aaa: 1.1.1.1 0000 01 00 00 00 00 00 ......
26530: 12:04:54.471 3/f2db2aaa: 1.1.1.1 AUTHEN status=1 (AUTHEN/PASS) flags=0x0
26530: 12:04:54.471 3/f2db2aaa: 1.1.1.1 msg_len=0, data_len=0
26530: 12:04:54.471 3/f2db2aaa: 1.1.1.1 msg (len: 0):
26530: 12:04:54.471 3/f2db2aaa: 1.1.1.1 data (len: 0):
26530: 12:04:54.471 3/f2db2aaa: 1.1.1.1 ---<end packet>---
26530: 12:04:54.503 4/00000000: - cidr match level 0 = allother
26530: 12:04:54.503 4/00000000: - connection request from 1.1.1.1 (key: sharedkey)
26530: 12:04:54.503 4/be5c0a42: 1.1.1.1 New session
26530: 12:04:54.503 4/be5c0a42: 1.1.1.1 ---<start packet>---
26530: 12:04:54.503 4/be5c0a42: 1.1.1.1 key used: sharedkey
26530: 12:04:54.503 4/be5c0a42: 1.1.1.1 version: 192, type: 2, seq no: 1, flags: unencrypted
26530: 12:04:54.503 4/be5c0a42: 1.1.1.1 session id: 420a5cbe data length: 53
26530: 12:04:54.503 4/be5c0a42: 1.1.1.1 packet body (len: 53): \006\001\001\001\n\004\f\002\r\004tom.vaknintty210.10.10.10service=shellcmd*
26530: 12:04:54.503 4/be5c0a42: 1.1.1.1 0000 06 01 01 01 0a 04 0c 02 0d 04 74 6f 6d 2e 76 61 ........ ..
tom.va26530: 12:04:54.503 4/be5c0a42: 1.1.1.1 0010 6b 6e 69 6e 74 74 79 32 31 30 2e 31 30 2e 31 38 knintty2 10.10.18
26530: 12:04:54.503 4/be5c0a42: 1.1.1.1 0020 32 2e 36 33 73 65 72 76 69 63 65 3d 73 68 65 6c 2.63serv ice=shel
26530: 12:04:54.503 4/be5c0a42: 1.1.1.1 0030 6c 63 6d 64 2a lcmd*
26530: 12:04:54.503 4/be5c0a42: 1.1.1.1 AUTHOR priv_lvl=1 authen=1 method=tacacs+ (6) svc=1
26530: 12:04:54.503 4/be5c0a42: 1.1.1.1 user_len=10 port_len=4 rem_addr_len=12 arg_cnt=2
26530: 12:04:54.503 4/be5c0a42: 1.1.1.1 user (len: 10): tom.vaknin
26530: 12:04:54.503 4/be5c0a42: 1.1.1.1 0000 74 6f 6d 2e 76 61 6b 6e 69 6e tom.vakn in
26530: 12:04:54.503 4/be5c0a42: 1.1.1.1 port (len: 4): tty2
26530: 12:04:54.503 4/be5c0a42: 1.1.1.1 0000 74 74 79 32 tty2
26530: 12:04:54.503 4/be5c0a42: 1.1.1.1 rem_addr (len: 12): 10.10.10.10
26530: 12:04:54.503 4/be5c0a42: 1.1.1.1 0000 31 30 2e 31 30 2e 31 38 32 2e 36 33 10.10.10.10
26530: 12:04:54.503 4/be5c0a42: 1.1.1.1 arg[0] (len: 13): service=shell
26530: 12:04:54.503 4/be5c0a42: 1.1.1.1 0000 73 65 72 76 69 63 65 3d 73 68 65 6c 6c service= shell
26530: 12:04:54.503 4/be5c0a42: 1.1.1.1 arg[1] (len: 4): cmd*
26530: 12:04:54.503 4/be5c0a42: 1.1.1.1 0000 63 6d 64 2a cmd*
26530: 12:04:54.503 4/be5c0a42: 1.1.1.1 ---<end packet>---
26530: 12:04:54.503 4/be5c0a42: 1.1.1.1 Start authorization request
26530: 12:04:54.503 4/be5c0a42: 1.1.1.1 cfg_get: checking user/group tom.vaknin, tag (NULL)
...
Groups
...
26530: 12:04:54.503 4/be5c0a42: 1.1.1.1 cfg_get_svc_attrs_func: found svcname=shell proto=
26530: 12:04:54.503 4/be5c0a42: 1.1.1.1 nas:service=shell (passed thru)
26530: 12:04:54.503 4/be5c0a42: 1.1.1.1 nas:cmd* (passed thru)
26530: 12:04:54.503 4/be5c0a42: 1.1.1.1 nas:absent srv:idletime=30 -> add idletime=30 (k)
26530: 12:04:54.503 4/be5c0a42: 1.1.1.1 nas:absent srv:priv-lvl=15 -> add priv-lvl=15 (k)
26530: 12:04:54.503 4/be5c0a42: 1.1.1.1 nas:absent srv:timeout=60 -> add timeout=60 (k)
26530: 12:04:54.503 4/be5c0a42: 1.1.1.1 added 3 args
26530: 12:04:54.503 4/be5c0a42: 1.1.1.1 Writing AUTHOR/PASS_ADD size=53
26530: 12:04:54.503 4/be5c0a42: 1.1.1.1 ---<start packet>---
26530: 12:04:54.503 4/be5c0a42: 1.1.1.1 key used: sharedkey
26530: 12:04:54.503 4/be5c0a42: 1.1.1.1 version: 192, type: 2, seq no: 2, flags: unencrypted
26530: 12:04:54.503 4/be5c0a42: 1.1.1.1 session id: 420a5cbe data length: 41
26530: 12:04:54.503 4/be5c0a42: 1.1.1.1 packet body (len: 41): \001\003\000\000\000\000\v\v\nidletime=30priv-lvl=15timeout=60
26530: 12:04:54.503 4/be5c0a42: 1.1.1.1 0000 01 03 00 00 00 00 0b 0b 0a 69 64 6c 65 74 69 6d ........ .idletim
26530: 12:04:54.503 4/be5c0a42: 1.1.1.1 0010 65 3d 33 30 70 72 69 76 2d 6c 76 6c 3d 31 35 74 e=30priv -lvl=15t
26530: 12:04:54.503 4/be5c0a42: 1.1.1.1 0020 69 6d 65 6f 75 74 3d 36 30 imeout=6 0
26530: 12:04:54.503 4/be5c0a42: 1.1.1.1 AUTHOR/REPLY status=1 (AUTHOR/PASS_ADD)
26530: 12:04:54.503 4/be5c0a42: 1.1.1.1 msg_len=0, data_len=0, arg_cnt=3
26530: 12:04:54.503 4/be5c0a42: 1.1.1.1 msg (len: 0):
26530: 12:04:54.503 4/be5c0a42: 1.1.1.1 data (len: 0):
26530: 12:04:54.503 4/be5c0a42: 1.1.1.1 arg[0] (len: 11): idletime=30
26530: 12:04:54.503 4/be5c0a42: 1.1.1.1 0000 69 64 6c 65 74 69 6d 65 3d 33 30 idletime =30
26530: 12:04:54.503 4/be5c0a42: 1.1.1.1 arg[1] (len: 11): priv-lvl=15
26530: 12:04:54.503 4/be5c0a42: 1.1.1.1 0000 70 72 69 76 2d 6c 76 6c 3d 31 35 priv-lvl =15
26530: 12:04:54.503 4/be5c0a42: 1.1.1.1 arg[2] (len: 10): timeout=60
26530: 12:04:54.503 4/be5c0a42: 1.1.1.1 0000 74 69 6d 65 6f 75 74 3d 36 30 timeout= 60
26530: 12:04:54.503 4/be5c0a42: 1.1.1.1 ---<end packet>---
Full HP log: