group = root {
service = netscreen {
vsys = root
privilege = root
}
}When I do that I get "'vsys' unexpected".
Here is the entire netscreen documentation on how to configure netscreen to use tacacs.
Any ideas what do I do wrong?
Cheers
Elad
[ScreenOS] How to configure TACACS to work with the Juniper firewall
SUMMARY:This article provides information on how to configure both the Juniper firewall and the TACACS server to enable user administration of the Juniper firewall device.PROBLEM OR GOAL:How to configure both the Juniper firewall and the TACACS server to enable user administration of the Juniper firewall device.CAUSE:
SOLUTION:The usage of TACACS+ as an external authentication server for administration purposes is supported from ScreenOS 6.0.0 or later.
Note: TACACS+ is not supported for use as an authentication server for xauth or policy authentication.On the firewall device, the TACACS server object has to be configured. In this example, the TACACS server is termed asexternal. The CLI commands required for this are as follows:
set auth-server "external" id 1
set auth-server "external" server-name "192.168.1.33"
set auth-server "external" account-type admin
set auth-server "external" type tacacs
set auth-server "external" tacacs secret "QNM5OpXHNyCNyKsww1C+vDPFEpnHEFS+bw=="
set auth-server "external" tacacs port 49Note: The TACACS secret is netscreen; but in the config file, it is hashed for security purposes.
The external server also has to be configured as an admin auth server:
On the ACS server, the attributes have to be configured to match the required admin user privileges. Launch the web interface via the ACSAdmin application. The procedure is as follows:
set admin auth server "external"
set admin auth remote root
set admin privilege get-external
- Click Interface Configuration and select TACACS+ (Cisco IOS).
- Add a new service known as netscreen and leave the protocol field blank.
- Select both the user and group check boxes.
- Click Submit.
When the netscreen service is defined, the attributes per user can be defined. On the user configuration, scroll down to the bottom and select the netscreen (this is case sensitive) Custom attributes check boxes. Specify the attributes in thecustom attributes field.The custom attributes that can be specified are as follows:
Root Root RW Root RO VSYS RW VSYS RO vsys= root root root vsys-name vsys-name privilege= root read-write read-only vsys-read-write vsys-read-only For example, assume that attributes have to be configured for read-write users in the root VSYS. The attributes that can specified are:
Note: If the Cisco ACS server is not used as the TACACS server, the config file should be formatted, as shown in the following example (using vsys = root and privilege = root):
vsys=root
privilege=read-writeThe Following verification command can be used to check user authentication on the firewall:group = root { service = netscreen { vsys = root privilege = root } } user = joe { login = cleartext joe service = netscreen { vsys = root privilege = root } }After a user is logged in via TACACS:nsisg1000-> get admin auth
Id : 1 Auth Server : external
Type : TACACS Server Name/IP: 192.168.1.33
Backup1: Backup2 :
Idle Timeout: 10 Account Type : admin
Forced Timeout: 0 (Disabled)
Fail-over revert interval: Disabled
TACACS shared secret: QNM5OpXHNyCNyKsww1C+vDPFEpnHEFS+bw==
TACACS server port: 49
TACACS retry timeout: 0
nsisg1000->The following debug commands can be used for troubleshooting:nsisg1000-> get admin user login No. Name Vsys Date Time Source IP Addr Auth Type --- ---------- ---------- ---------- -------- ------- --------------- --------- 1 test Root 2001-07-12 09:22:27 telnet 192.168.1.33 tacacs >>>>>>>>> 2 netscreen Root 2001-07-12 09:19:28 console 0.0.0.0 local
debug admin all
debug auth all