By the way, I have encountered another problem. There is no accounting log file in /tmp, I only can find access.log and author.log. I tested the device with anther version tac_plus(yum --enablerepo=nux-misc install tac_plus), It can get the accounting log.
66492: 12:38:45.709 1/89830044: 30.118.110.178 New session
66492: 12:38:45.709 1/89830044: 30.118.110.178 ---<start packet>---
66492: 12:38:45.709 1/89830044: 30.118.110.178 key used: demo
66492: 12:38:45.709 1/89830044: 30.118.110.178 version: 192, type: 2, seq no: 1, flags: unencrypted
66492: 12:38:45.709 1/89830044: 30.118.110.178 session id: 44008389, data length: 49
66492: 12:38:45.709 1/89830044: 30.118.110.178 AUTHOR, priv_lvl=15
66492: 12:38:45.709 1/89830044: 30.118.110.178 authen_type=ascii (1)
66492: 12:38:45.709 1/89830044: 30.118.110.178 authen_method=tacacs+ (6)
66492: 12:38:45.709 1/89830044: 30.118.110.178 service=login (1)
66492: 12:38:45.709 1/89830044: 30.118.110.178 user_len=6 port_len=4 rem_addr_len=12 arg_cnt=2
66492: 12:38:45.709 1/89830044: 30.118.110.178 user (len: 6): 283797
66492: 12:38:45.709 1/89830044: 30.118.110.178 port (len: 4): tty1
66492: 12:38:45.709 1/89830044: 30.118.110.178 rem_addr (len: 12): 10.11.225.69
66492: 12:38:45.709 1/89830044: 30.118.110.178 arg[0] (len: 13): service=shell
66492: 12:38:45.709 1/89830044: 30.118.110.178 arg[1] (len: 4): cmd*
66492: 12:38:45.709 1/89830044: 30.118.110.178 ---<end packet>---
66492: 12:38:45.709 1/89830044: 30.118.110.178 Start authorization request
66492: 12:38:45.709 1/89830044: 30.118.110.178 cfg_get: checking user/group 283797, tag (NULL)
66492: 12:38:45.709 1/89830044: 30.118.110.178 cfg_get: checking user/group admin, tag (NULL)
66492: 12:38:45.709 1/89830044: 30.118.110.178 cfg_get: checking user/group 283797, tag (NULL)
66492: 12:38:45.709 1/89830044: 30.118.110.178 cfg_get: checking user/group admin, tag (NULL)
66492: 12:38:45.709 1/89830044: 30.118.110.178 user '283797' found
66492: 12:38:45.709 1/89830044: 30.118.110.178 cfg_get: checking user/group 283797, tag (NULL)
66492: 12:38:45.709 1/89830044: 30.118.110.178
283...@30.118.110.178: not found: svcname=shell@world protocol=
66492: 12:38:45.709 1/89830044: 30.118.110.178
283...@30.118.110.178: not found: svcname=shell protocol=
66492: 12:38:45.709 1/89830044: 30.118.110.178 cfg_get: checking user/group admin, tag (NULL)
66492: 12:38:45.709 1/89830044: 30.118.110.178
283...@30.118.110.178: not found: svcname=shell@world protocol=
66492: 12:38:45.709 1/89830044: 30.118.110.178
283...@30.118.110.178: found: svcname=shell protocol=
66492: 12:38:45.709 1/89830044: 30.118.110.178 nas:service=shell (passed thru)
66492: 12:38:45.709 1/89830044: 30.118.110.178 nas:cmd* (passed thru)
66492: 12:38:45.709 1/89830044: 30.118.110.178 nas:absent srv:priv-lvl=15 -> add priv-lvl=15 (k)
66492: 12:38:45.709 1/89830044: 30.118.110.178 added 1 args
66492: 12:38:45.709 1/89830044: 30.118.110.178 Writing AUTHOR/PASS_ADD size=30
66492: 12:38:45.709 1/89830044: 30.118.110.178 ---<start packet>---
66492: 12:38:45.709 1/89830044: 30.118.110.178 key used: demo
66492: 12:38:45.709 1/89830044: 30.118.110.178 version: 192, type: 2, seq no: 2, flags: unencrypted
66492: 12:38:45.709 1/89830044: 30.118.110.178 session id: 44008389, data length: 18
66492: 12:38:45.709 1/89830044: 30.118.110.178 AUTHOR/REPLY, status=1 (AUTHOR/PASS_ADD)
66492: 12:38:45.709 1/89830044: 30.118.110.178 msg_len=0, data_len=0, arg_cnt=1
66492: 12:38:45.709 1/89830044: 30.118.110.178 msg (len: 0):
66492: 12:38:45.709 1/89830044: 30.118.110.178 data (len: 0):
66492: 12:38:45.709 1/89830044: 30.118.110.178 arg[0] (len: 11): priv-lvl=15
66492: 12:38:45.709 1/89830044: 30.118.110.178 ---<end packet>---
66492: 12:39:02.077 2/bb8e2250: 30.118.110.178 New session
66492: 12:39:02.077 2/bb8e2250: 30.118.110.178 ---<start packet>---
66492: 12:39:02.077 2/bb8e2250: 30.118.110.178 key used: demo
66492: 12:39:02.077 2/bb8e2250: 30.118.110.178 version: 192, type: 3, seq no: 1, flags: unencrypted
66492: 12:39:02.077 2/bb8e2250: 30.118.110.178 session id: 50228ebb, data length: 111
66492: 12:39:02.077 2/bb8e2250: 30.118.110.178 Packet malformed, skipping detailed dump.
66492: 12:39:02.077 2/bb8e2250: 30.118.110.178 ---<end packet>---
66492: 12:39:02.077 2/bb8e2250: 30.118.110.178 Writing ACCT size=56
66492: 12:39:02.077 2/bb8e2250: 30.118.110.178 ---<start packet>---
66492: 12:39:02.077 2/bb8e2250: 30.118.110.178 key used: demo
66492: 12:39:02.077 2/bb8e2250: 30.118.110.178 version: 192, type: 3, seq no: 2, flags: unencrypted
66492: 12:39:02.077 2/bb8e2250: 30.118.110.178 session id: 50228ebb, data length: 44
66492: 12:39:02.077 2/bb8e2250: 30.118.110.178 ACCT/REPLY, status=2, msg_len=39, data_len=0
66492: 12:39:02.077 2/bb8e2250: 30.118.110.178 msg (len: 39): Illegal packet (version=0xc0 type=0x03)
66492: 12:39:02.077 2/bb8e2250: 30.118.110.178 data (len: 0):
66492: 12:39:02.077 2/bb8e2250: 30.118.110.178 ---<end packet>---
66492: 12:39:37.886 3/f6dd4055: 30.118.110.178 New session
66492: 12:39:37.886 3/f6dd4055: 30.118.110.178 ---<start packet>---
66492: 12:39:37.886 3/f6dd4055: 30.118.110.178 key used: demo
66492: 12:39:37.886 3/f6dd4055: 30.118.110.178 version: 192, type: 3, seq no: 1, flags: unencrypted
66492: 12:39:37.886 3/f6dd4055: 30.118.110.178 session id: 5540ddf6, data length: 105
66492: 12:39:37.886 3/f6dd4055: 30.118.110.178 Packet malformed, skipping detailed dump.
66492: 12:39:37.886 3/f6dd4055: 30.118.110.178 ---<end packet>---
66492: 12:39:37.886 3/f6dd4055: 30.118.110.178 Writing ACCT size=56
66492: 12:39:37.886 3/f6dd4055: 30.118.110.178 ---<start packet>---
66492: 12:39:37.886 3/f6dd4055: 30.118.110.178 key used: demo
66492: 12:39:37.886 3/f6dd4055: 30.118.110.178 version: 192, type: 3, seq no: 2, flags: unencrypted
66492: 12:39:37.886 3/f6dd4055: 30.118.110.178 session id: 5540ddf6, data length: 44
66492: 12:39:37.886 3/f6dd4055: 30.118.110.178 ACCT/REPLY, status=2, msg_len=39, data_len=0
66492: 12:39:37.886 3/f6dd4055: 30.118.110.178 msg (len: 39): Illegal packet (version=0xc0 type=0x03)
66492: 12:39:37.886 3/f6dd4055: 30.118.110.178 data (len: 0):
66492: 12:39:37.886 3/f6dd4055: 30.118.110.178 ---<end packet>---