SHARE
TWEET

tac_plus procurve enable

a guest Jun 6th, 2012 143 Never
  1. There are three parts:
  2.  
  3. 2626 Relevant Config
  4. Tac_plus.conf
  5. relevant Logs from Tac_Plus.log
  6.  
  7. #########################################################
  8. ; J8164A Configuration Editor; Created on release #H.08.72
  9.  
  10. hostname "HS0-2626-3"
  11. time timezone -360
  12. time daylight-time-rule Continental-US-and-Canada
  13. no web-management
  14. web-management ssl
  15. no telnet-server
  16.  
  17. aaa authentication login privilege-mode
  18. aaa authentication console login tacacs local
  19. aaa authentication console enable tacacs local
  20. aaa authentication ssh login tacacs local
  21. aaa authentication ssh enable tacacs local
  22. tacacs-server host 10.32.14.5
  23.  
  24. ip ssh
  25. ip ssh key-size 1024
  26. password manager
  27. password operator
  28.  
  29. ####################################################
  30. # tacacs configuration file
  31. # /etc/tac_plus.conf
  32.  
  33. # set the key
  34. key = omitted
  35.  
  36. accounting file = /var/log/tac_plus.acct
  37.  
  38.  
  39. # Groups
  40.  
  41. group = admin {
  42.       default service = permit
  43.       service = exec {
  44.       priv-lvl = 15
  45.       }
  46. }
  47.  
  48.  
  49. # users accounts
  50. user = saint {
  51.        member = admin
  52.        login = des "Omitted"
  53.        enable = des "Omitted"
  54.        name = "Network Administrator"
  55. }
  56.  
  57. user = rancid {
  58.        member = admin
  59.        login = des "omitted"
  60.        enable = des "omitted"
  61.        name = "Rancid Backup"
  62. }
  63.  
  64. #########################################################
  65. ************** /var/log/tac_plus.log   **************
  66.  
  67. Tue Jun  5 21:50:49 2012 [4932]: session_id 1953829860 (0x747513e4), Data length 8 (0x8)
  68. Tue Jun  5 21:50:49 2012 [4932]: End header
  69. Tue Jun  5 21:50:49 2012 [4932]: type=AUTHEN/START, priv_lvl = 15
  70. Tue Jun  5 21:50:49 2012 [4932]: action=login
  71. Tue Jun  5 21:50:49 2012 [4932]: authen_type=ascii
  72. Tue Jun  5 21:50:49 2012 [4932]: service=enable
  73. Tue Jun  5 21:50:49 2012 [4932]: user_len=0 port_len=0 (0x0), rem_addr_len=0 (0x0)
  74. Tue Jun  5 21:50:49 2012 [4932]: data_len=0
  75. Tue Jun  5 21:50:49 2012 [4932]: User:
  76. Tue Jun  5 21:50:49 2012 [4932]: port:
  77. Tue Jun  5 21:50:49 2012 [4932]: rem_addr:
  78. Tue Jun  5 21:50:49 2012 [4932]: data:
  79. Tue Jun  5 21:50:49 2012 [4932]: End packet
  80. Tue Jun  5 21:50:49 2012 [4932]: Authen Start request
  81. Tue Jun  5 21:50:49 2012 [4932]: choose_authen chose enable_fn
  82. Tue Jun  5 21:50:49 2012 [4932]: Calling authentication function
  83. Tue Jun  5 21:50:49 2012 [4932]: Writing AUTHEN/GETPASS size=28
  84. Tue Jun  5 21:50:49 2012 [4932]: PACKET: key={Omitted by davmid}
  85. Tue Jun  5 21:50:49 2012 [4932]: version 192 (0xc0), type 1, seq no 2, flags 0x1
  86. Tue Jun  5 21:50:49 2012 [4932]: session_id 1953829860 (0x747513e4), Data length 16 (0x10)
  87. Tue Jun  5 21:50:49 2012 [4932]: End header
  88. Tue Jun  5 21:50:49 2012 [4932]: type=AUTHEN status=5 (AUTHEN/GETPASS) flags=0x1
  89. Tue Jun  5 21:50:49 2012 [4932]: msg_len=10, data_len=0
  90. Tue Jun  5 21:50:49 2012 [4932]: msg:
  91. Tue Jun  5 21:50:49 2012 [4932]: Password:
  92. Tue Jun  5 21:50:49 2012 [4932]: data:
  93. Tue Jun  5 21:50:49 2012 [4932]: End packet
  94. Tue Jun  5 21:50:49 2012 [4932]: Waiting for packet
  95. Tue Jun  5 21:50:53 2012 [4932]: Read AUTHEN/CONT size=30
  96. Tue Jun  5 21:50:53 2012 [4932]: PACKET: key={Omitted by davmid}
  97. Tue Jun  5 21:50:53 2012 [4932]: version 192 (0xc0), type 1, seq no 3, flags 0x1
  98. Tue Jun  5 21:50:53 2012 [4932]: session_id 1953829860 (0x747513e4), Data length 18 (0x12)
  99. Tue Jun  5 21:50:53 2012 [4932]: End header
  100. Tue Jun  5 21:50:53 2012 [4932]: type=AUTHEN/CONT
  101. Tue Jun  5 21:50:53 2012 [4932]: user_msg_len 13 (0xd), user_data_len 0 (0x0)
  102. Tue Jun  5 21:50:53 2012 [4932]: flags=0x0
  103. Tue Jun  5 21:50:53 2012 [4932]: User msg:
  104. Tue Jun  5 21:50:53 2012 [4932]: {Omitted by davmid}
  105. Tue Jun  5 21:50:53 2012 [4932]: User data:
  106. Tue Jun  5 21:50:53 2012 [4932]: End packet
  107. Tue Jun  5 21:50:53 2012 [4932]: enable query for 'unknown' unknown from 10.25.1.3 rejected
  108. Tue Jun  5 21:50:53 2012 [4932]: Writing AUTHEN/FAIL size=18
  109. Tue Jun  5 21:50:53 2012 [4932]: PACKET: key={omitted by davmid}
  110. Tue Jun  5 21:50:53 2012 [4932]: version 192 (0xc0), type 1, seq no 4, flags 0x1
  111. Tue Jun  5 21:50:53 2012 [4932]: session_id 1953829860 (0x747513e4), Data length 6 (0x6)
  112. Tue Jun  5 21:50:53 2012 [4932]: End header
  113. Tue Jun  5 21:50:53 2012 [4932]: type=AUTHEN status=2 (AUTHEN/FAIL) flags=0x0
  114. Tue Jun  5 21:50:53 2012 [4932]: msg_len=0, data_len=0
  115. Tue Jun  5 21:50:53 2012 [4932]: msg:
  116. Tue Jun  5 21:50:53 2012 [4932]: data:
  117. Tue Jun  5 21:50:53 2012 [4932]: End packet
  118. Tue Jun  5 21:50:53 2012 [4932]: 10.25.1.3: disconnect
  119. Tue Jun  5 22:01:54 2012 [4862]: Received signal 15, shutting down
RAW Paste Data
Top