TACACS+ and RADIUS Control
This appendix describes using TACACS+ and RADIUS servers to control administrative access to the Analytics Node.
Using AAA Services with Arista Analytics
Select remote Authentication, Authorization, and Accounting (AAA) services using TACACS+ or RADIUS servers to control administrative access to the Analytics Node CLI.
| Attributes | Values |
|---|---|
| BSN-User-Role | admin
read-only bigtap-admin bigtap-read-only |

A remotely authenticated admin user has full administrative privileges. Authenticate the read-only users on the switch remotely. Read-only access is not configurable for locally authenticated user accounts.
- TACACS, SNMP, and user configuration are not visible to the read-only user in the output from the show running-config command.
- show snmp, show user, and show support commands are disabled for the read-only user.
Note: Local authentication and authorization take precedence over remote authentication and authorization.
- Supported attribute name: BSN-User-Role
- Supported attribute values: admin, read-only
Select a TACACS+ server to maintain administrative access control instead of using the Analytics Node local database. However, it is a best practice to keep the local database as the secondary authentication and authorization method in case the remote server becomes unavailable.
DMF TACACS+ Configuration
The DANZ Monitoring Fabric (DMF) requires the following configuration on TACACS+ servers and the configuration required on the Analytics Node.
Authentication Method
- Configure the TACACS+ server to accept ASCII authentication packets. Do not select the single connect-only protocol feature.
- The DMF TACACS+ client uses the ASCII authentication method. It does not use PAP.
Device Administration
- Configure the TACACS+ server to connect to the device administration login service.
- Do not use a network access connection method, such as PPP.
Group Memberships
- Create a bigtap-admin group. Make all DANZ Monitoring Fabric users part of this group.
- TACACS+ group membership is specified using the BSN-User-Role AV Pair as part of TACACS+ session authorization.
- Configure the TACACS+ server for session authorization, not for command authorization.
Note: The BSN-User-Role attribute must be specified as Optional in the tac_plus.conf file to use the same user credentials to access ANET and non-ANET devices.
Enabling Remote Authentication and Authorization on the Analytics Node
analytics-1# tacacs server host 10.2.3.201
analytics -1# aaa authentication login default group tacacs+ local
analytics -1# aaa authorization exec default group tacacs+ local
All users in the bigtap-admin group on TACACS+ server 10.2.3.201 have full access to the Arista Analytics Node.
User Lockout
(config)#aaa authentication policy lockout failure F window W duration D
max-failures = F = [1..255] duration = D = [1..(2^32 - 1)] window = W = [1..(2^32 - 1)]
Adding a TACACS+ Server
analytics -1(config-switch)# show run switch BMF-DELIVERY-SWITCH-1 tacacs override-enabled
tacacs server host 1.1.1.1 key 7 020700560208
tacacs server key 7 020700560208
analytics -1(config-switch)#
It displays the TACACS+ key value as a type7 secret instead of plaintext.
Complete the following steps to configure the Analytics Node with TACACS+ to control administrative access to the switch.
tacacs server <server> [key {<plaintext-key> | 0 <plaintext-key> | 7 <encrypted-key>}
analytics -1(config-switch)# tacacs server 10.1.1.1 key 0 secret
In case of a missing key, it uses an empty key.
Each TACACS+ server connection can be encrypted using a pre-shared key.
analytics -1# tacacs server host <ip-address> key <plaintextkey>
analytics -1# tacacs server host <ip-address> key 0 <plaintextkey>
analytics -1# tacacs server host <ip-address> key 7 <plaintextkey>
Replace plaintextkey with a password up to 63 characters in length. This key can be specified either globally or for each host. The first two forms accept a plaintext (literal) key, and the last form accepts a pseudo-encrypted key, such as that displayed with show running-config.
It uses the global key value when no key is specified for a given host. An empty key is assumed when no key is specified globally or specified for a given host.
analytics-1(config-switch)# tacacs server 10.1.1.1 key 7 0832494d1b1c11
Setting up a TACACS+ Server
After installing the TACACS+ server, complete the following steps to set up authentication and authorization for Analytics Node with the TACACS+ server:
Credentials for the Analytics Node and Other Devices
To use the same user credentials for the Analytics Node and other devices, a specific setting in the tac_plus.conf file is necessary. Configure the BSN-User-Role attribute within the tac_plus.conf file as "Optional".
group = group-admin {
default service = permit
service = exec {
optional BSN-User-Role = "admin"
}
}
RBAC-based Configuration for Non-default Group User
Using RADIUS for Managing Access
RADIUS does not separate authentication and authorization. Be careful when authorizing a user account with a remote RADIUS server to use the password configured for the user on the remote server.
- admin: Administrator access, including all CLI modes and debug options.
- read-only: Login access, including most show commands.
The admin group provides complete access to all network resources, while the read-only group provides read-only access to all network resources.
- Accounting: local, local and remote, or remote.
- Authentication: local, local then remote, remote then local, or remote.
- Authorization: local, local then remote, remote then local, or remote.
Note: Fallback to local authentication occurs only when the remote server is unavailable, not when authentication fails.
| Supported attribute names | Supported attribute values |
|---|---|
| BSN-User-Role | admin
read-only bigtap-admin bigtap-read-only |
The BSN-AV-Pair attribute sends CLI command activity accounting to the RADIUS server.
Adding a RADIUS Server
radius server host <server-address> [timeout {<timeout>}][key {{<plaintext>} | 0 {<plaintext>} | 7 {<secret>}}]
analytics-1(config)# radius server host 192.168.17.101 key admin
You can enter this command up to five times to specify multiple RADIUS servers. The Analytics Node tries to connect to each server in the order they are configured.
