Managing AAA Servers

The system uses the following functionalities to manage AAA servers:

Adding AAA Servers

  1. Navigate to the Access Control Page.
  2. Click the Authentication source drop-down menu and select either RADIUS or TACACS.

    The Access Control page lists all current servers. See Access to the Access Control Page.

  3. Click + New Server at the upper right corner of the Servers section.
    Figure 1. + New Server in Access Control Page

    The system pops-up the New Server window.

    Figure 2. New Server Pop-Up Window
  4. Provide the required Information in corresponding fields.
  5. If required, click Test for testing the new configuration. Else, skip to step 8.
  6. Enter your credentials when the Test Server pop-up prompts for it.
    Figure 3. Test Server Pop-Up Window
  7. Click Run Test.

    The system displays test results. If required, modify the configuration based on the test result.

  8. Click Save.

    The server is added to the list of servers in the AAA grid.

Modifying AAA Servers

  1. Navigate to the Access Control Page.
  2. Select desired modes from Authentication source and Authorization source drop-down menus

    The system lists all registered servers of the selected AAA server type. See Access to the Access Control Page.

  3. Click the edit icon available next to IP address of the corresponding server.

    The system pops-up the Edit Server window.

    Figure 4. Edit Server Pop-Up Window
  4. Modify the required information.
  5. If required, click Test to verify latest changes.
  6. Click Save.
    Note: To apply external authentication, there should be at least one enabled server listed in the page.

Adding Vendor Specific Codes to AAA Servers

You can add vendor specific codes to AAA servers for the following:

RADIUS

Arista Vendor Specific Code: add it to the RADIUS dictionary.

VENDOR Arista 30065
BEGIN-VENDOR Arista
ATTRIBUTE Arista-AVPair 1 string
END-VENDOR Arista

To specify role for a user

"bob" Cleartext-Password := "Pa$sW04d"
Arista-AVPair = "shell:cvp-roles=network-admin",
Service-Type = NAS-Prompt-User

TACACS+

For TACACS+ there is no vendor specific code, just different strings.

Note: CloudVision support for TACACS+ servers can be affected with the setting of the “service” parameter. Some TACACS servers may require "service = shell" instead of "service = exec" in the TACACS+ configuration (tacacs.conf).

This example configures user “bob” in the admin group and specifies certain attributes. It specifies a "cvp-roles" attribute for the CloudVision role name (it can also be a list of roles).

A. tacacs.conf
group = admingroup {
 default service = deny
 service = exec {
default attribute = permit
priv-lvl = 15
cvp-roles = network-admin
 } 
	enable = nopassword

}
user = bob {
 login = cleartext "secret"
	member = admingroup
}

B. CVP AAA settings
C. Switch AAA configlet

CISCO ACS

To ensure that authentication and authorization work properly, complete the following procedures.
Creating Identity Groups and Users
  1. Select Users and Identity Stores, and then select Identity Groups.
  2. Make sure a group named <user-group> exists. If this group does not exist, add it.
  3. Add new users under the group named <user-group>.
Creating a Shell Profile using ACS
  1. Go to the Policy Elements page.
  2. Select Device Administration > Shell Profiles.
  3. Click the Create button to create a new shell profile.
  4. Select the Custom Attributes tab, and then add a new mandatory attribute named “cvp-roles”.
  5. Specify one or more of the following values to the new “cvp-roles” attribute:
    • network-admin
    • network-operator
    Note: If you have created custom role(s) under CVP Account Management, you can use them.
  6. Check to make sure that under the “Common Tasks Attributes” table, “Assigned Privilege Level” and “Max Privilege Level” are added by default with and the specified value is 15. Also, verify that requirement is set “Mandatory.”
Creating and Modifying Access Policy
  1. Go to the Access Policies section and select the Default Device Admin policy.
  2. Make sure that “Allow PAP/ASCII” option in the Authorization section is enabled (selected).
  3. In the Authorization section, create a new rule named “Rule-1”.
  4. Make sure that the status of the new rule (“Rule-1”) is Enabled, and set the identity group as “<user-group>”.
  5. Select the shell profile that outlines the cvp-roles for all users under the group named <user-group>.
    Note: Alternatively, you can set add shell profile in the “default rule” section.
  6. Make sure that “Service Selection Rules” (under the “Access Policies” section), is using the policy named “Default Device Admin”. The policy should be listed in the “Results” column of “Service Selection Policy” table, and the “status” column should be green, indicating that the policy is enabled.

    The shell profile should be automatically applied to all users under the ground named <user-group>.

Supported TACACS Types

CloudVision Portal (CVP) supports different types of TACACS. Table Supported TACACS Types lists the supported types of TACACS, including the following information for each TACACS type:
  • Supported version
  • Service shell (whether it is supported for each type)
  • Service exec (only the following attributes are supported):
    • acl
    • default
    • double-quote-values
    • message
    • optional
    • protocol
    • return
    • script
    • set
Table 1. Supported TACACS Types
TACACS Type Supported Version Service Shell Service Exec
tac_plus (Shruberry) F4.0.4.26 Not Applicable Supported
tac_plus (Probono)

201706241310

201503290942/DES

Supported Supported
CISCO ACS

4.4.0.46

5.3.0.40

Supported Not Applicable

Removing AAA Servers

Complete these steps to remove AAA servers:

  1. Navigate to the Access Control page.
  2. Select required options from Authentication source and Authorization source drop-down menus.

    The systems lists all current servers.

  3. Select required servers for removal.
  4. Click Remove Server(s) at the upper right corner of the Servers section.

    The systems lists all current servers.

    Figure 5. Remove AAA Servers
  5. Click Delete.

    The system deletes selected AAA servers.

    Related Topics: