Contents

TACACS+ over IPv6

An IPv6 server can be configured to be used with TACACS+.

Finding Feature Information

Your software release may not support all the features documented in this module. For the latest caveats and feature information, see Bug Search Tool and the release notes for your platform and software release. To find information about the features documented in this module, and to see a list of the releases in which each feature is supported, see the feature information table at the end of this module.

Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to www.cisco.com/​go/​cfn. An account on Cisco.com is not required.

Information About TACACS+ over IPv6

The Terminal Access Controller Access-Control System (TACACS+) security protocol provides centralized validation of users. TACACS+ services are maintained in a database on a TACACS+ daemon typically running on a UNIX or Windows NT workstation. You must have access to and must configure a TACACS+ server before the configured TACACS+ features on your devices are available.

TACACS+ provides for separate authentication, authorization, and accounting facilities. TACACS+ allows for a single access control server (the TACACS+ daemon) to provide each service (authentication, authorization, and accounting) independently. Each service is associated with its own database to take advantage of other services available on that server or on the network, depending on the capabilities of the daemon.

AAA over IPv6

Vendor-specific attributes (VSAs) are used to support Authentication, Authorization and Accounting(AAA) over IPv6. Cisco VSAs are inacl, outacl, prefix, and route.

You can configure prefix pools and pool names by using the AAA protocol. Customers can deploy an IPv6 RADIUS server or a TACACS+ server to communicate with Cisco devices.

TACACS+ Over an IPv6 Transport

An IPv6 server can be configured to use TACACS+. Both IPv6 and IPv4 servers can be configured to use TACACS+ using a name instead of an IPv4 or IPv6 address.

How to Configure TACACS+ over IPv6

Configuring the TACACS+ Server over IPv6

SUMMARY STEPS

    1.    enable

    2.    configure terminal

    3.    tacacs server name

    4.    address ipv6 ipv6-address

    5.    key [0 | 7] key-string

    6.    port [number

    7.    send-nat-address

    8.    single-connection

    9.    timeout seconds


DETAILED STEPS
     Command or ActionPurpose
    Step 1 enable


    Example:
    Router> enable 
     

    Enables privileged EXEC mode.

    • Enter your password if prompted.

     
    Step 2 configure terminal


    Example:
    Router# configure terminal
     

    Enters global configuration mode.

     
    Step 3 tacacs server name


    Example:
    Router(config)# tacacs server server1 
     

    Configures the TACACS+ server for IPv6 and enters TACACS+ server configuration mode.

     
    Step 4 address ipv6 ipv6-address


    Example:
    Router(config-server-tacacs)# address ipv6 2001:DB8:3333:4::5 
     

    Configures the IPv6 address of the TACACS+ server.

     
    Step 5 key [0 | 7] key-string


    Example:
    Router(config-server-tacacs)# key 0 key1 
     

    Configures the per-server encryption key on the TACACS+ server.

     
    Step 6 port [number


    Example:
    Router(config-server-tacacs)# port 12 
     

    Specifies the TCP port to be used for TACACS+ connections.

     
    Step 7 send-nat-address


    Example:
    Router(config-server-tacacs)# send-nat-address 
     

    Sends a client’s post-NAT address to the TACACS+ server.

     
    Step 8 single-connection


    Example:
    Router(config-server-tacacs)# single-connection 
     

    Enables all TACACS packets to be sent to the same server using a single TCP connection.

     
    Step 9 timeout seconds


    Example:
    Router(config-server-tacacs)# timeout 10 
     

    Configures the time to wait for a reply from the specified TACACS server.

     

    Specifying the Source Address in TACACS+ Packets

    SUMMARY STEPS

      1.    enable

      2.    configure terminal

      3.    ipv6 tacacs source-interface type number


    DETAILED STEPS
       Command or ActionPurpose
      Step 1 enable


      Example:
      Router> enable
       

      Enables privileged EXEC mode.

      • Enter your password if prompted.

       
      Step 2 configure terminal


      Example:
      Router# configure terminal
       

      Enters global configuration mode.

       
      Step 3 ipv6 tacacs source-interface type number


      Example:
      Router(config)# ipv6 tacacs source-interface GigabitEthernet 0/0/0
       

      Specifies an interface to use for the source address in TACACS+ packets.

       

      Configuring TACACS+ Server Group Options

      SUMMARY STEPS

        1.    enable

        2.    configure terminal

        3.    aaa group server tacacs+ group-name

        4.    server name server-name

        5.    server-private {ip-address | name | ipv6-address} [nat] [single-connection] [port port-number] [timeout seconds] [key [0 | 7] string]


      DETAILED STEPS
         Command or ActionPurpose
        Step 1 enable


        Example:
        Router> enable 
         

        Enables privileged EXEC mode.

        • Enter your password if prompted.

         
        Step 2 configure terminal


        Example:
        Router# configure terminal
         

        Enters global configuration mode.

         
        Step 3 aaa group server tacacs+ group-name


        Example:
        Router(config)# aaa group server tacacs+ group1 
         

        Groups different TACACS+ server hosts into distinct lists and distinct methods.

         
        Step 4 server name server-name


        Example:
        Router(config-sg-tacacs+)# server name server1 
         

        Specifies an IPv6 TACACS+ server.

         
        Step 5 server-private {ip-address | name | ipv6-address} [nat] [single-connection] [port port-number] [timeout seconds] [key [0 | 7] string]


        Example:
        Router(config-sg-tacacs+)# server-private 2001:DB8:3333:4::5 port 19 key key1 
         

        Configures the IPv6 address of the private TACACS+ server for the group server.

         

        Configuration Examples for TACACS+ over IPv6

        Example: Configuring TACACS+ Server over IPv6

        Device# show tacacs 
        
                    Tacacs+ Server:          server1
                    Server Address:          FE80::200:F8FF:FE21:67CF
                      Socket opens:          0
                     Socket closes:          0
                     Socket aborts:          0
                     Socket errors:          0
                   Socket Timeouts:          0
           Failed Connect Attempts:          0
                Total Packets Sent:          0
                Total Packets Recv:          0
        

        Additional References

        The following sections provide references related to the MSCHAP Version 2 feature.

        Related Documents

        Related Topic

        Document Title

        Configuring PPP interfaces

        PPP Configuration in the Cisco IOS Dial Technologies Configuration Guide , Release 12.4T.

        Descriptions of the tasks and commands necessary to configure and maintain Cisco networking devices

        Cisco IOS Dial Technologies Command Reference

        Lists of IOS Security Commands

        Cisco IOS Security Command Reference

        Configuring PPP authentication using AAA

        Configuring PPP Authentication Using AAA in the Configuring Authentication module in the Cisco IOS Security Configuration Guide: Securing User Services , Release 12.4T.

        Configuring RADIUS Authentication

        Configuring RADIUS module in the Cisco IOS Security Configuration Guide: Securing User Services, Release 12.4T.

        Standards

        Standard

        Title

        No new or modified standards are supported by this feature.

        --

        MIBs

        MIB

        MIBs Link

        No new or modified MIBs are supported by this feature.

        To locate and download MIBs for selected platforms, Cisco IOS releases, and feature sets, use Cisco MIB Locator found at the following URL:

        http:/​/​www.cisco.com/​go/​mibs

        RFCs

        RFC

        Title

        RFC 1661

        Point-to-Point Protocol (PPP)

        RFC 2548

        Microsoft Vendor-specific RADIUS Attributes

        RFC 2759

        Microsoft PPP CHAP Extensions, Version 2

        Technical Assistance

        Description

        Link

        The Cisco Support website provides extensive online resources, including documentation and tools for troubleshooting and resolving technical issues with Cisco products and technologies.

        To receive security and technical information about your products, you can subscribe to various services, such as the Product Alert Tool (accessed from Field Notices), the Cisco Technical Services Newsletter, and Really Simple Syndication (RSS) Feeds.

        Access to most tools on the Cisco Support website requires a Cisco.com user ID and password.

        http:/​/​www.cisco.com/​techsupport

        Feature Information for TACACS+ over IPv6

        The following table provides release information about the feature or features described in this module. This table lists only the software release that introduced support for a given feature in a given software release train. Unless noted otherwise, subsequent releases of that software release train also support that feature.

        Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to www.cisco.com/​go/​cfn. An account on Cisco.com is not required.

        Table 1 Feature Information for TACACS+ over IPv6

        Feature Name

        Releases

        Feature Information

        TACACS+ over IPv6

        Cisco IOS XE Release 3.2S

        TACACS+ over IPv6 is supported.

        The following commands were introduced or modified: aaa group server tacacs+, address ipv6 (TACACS+), ipv6 tacacs source-interface, key (TACACS+), port (TACACS+), send-nat-address, server name (IPv6 TACACS+), server-private (TACACS+), single-connection, tacacs server, timeout (TACACS+).


        TACACS+ over IPv6

        TACACS+ over IPv6

        An IPv6 server can be configured to be used with TACACS+.

        Finding Feature Information

        Your software release may not support all the features documented in this module. For the latest caveats and feature information, see Bug Search Tool and the release notes for your platform and software release. To find information about the features documented in this module, and to see a list of the releases in which each feature is supported, see the feature information table at the end of this module.

        Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to www.cisco.com/​go/​cfn. An account on Cisco.com is not required.

        Information About TACACS+ over IPv6

        The Terminal Access Controller Access-Control System (TACACS+) security protocol provides centralized validation of users. TACACS+ services are maintained in a database on a TACACS+ daemon typically running on a UNIX or Windows NT workstation. You must have access to and must configure a TACACS+ server before the configured TACACS+ features on your devices are available.

        TACACS+ provides for separate authentication, authorization, and accounting facilities. TACACS+ allows for a single access control server (the TACACS+ daemon) to provide each service (authentication, authorization, and accounting) independently. Each service is associated with its own database to take advantage of other services available on that server or on the network, depending on the capabilities of the daemon.

        AAA over IPv6

        Vendor-specific attributes (VSAs) are used to support Authentication, Authorization and Accounting(AAA) over IPv6. Cisco VSAs are inacl, outacl, prefix, and route.

        You can configure prefix pools and pool names by using the AAA protocol. Customers can deploy an IPv6 RADIUS server or a TACACS+ server to communicate with Cisco devices.

        TACACS+ Over an IPv6 Transport

        An IPv6 server can be configured to use TACACS+. Both IPv6 and IPv4 servers can be configured to use TACACS+ using a name instead of an IPv4 or IPv6 address.

        How to Configure TACACS+ over IPv6

        Configuring the TACACS+ Server over IPv6

        SUMMARY STEPS

          1.    enable

          2.    configure terminal

          3.    tacacs server name

          4.    address ipv6 ipv6-address

          5.    key [0 | 7] key-string

          6.    port [number

          7.    send-nat-address

          8.    single-connection

          9.    timeout seconds


        DETAILED STEPS
           Command or ActionPurpose
          Step 1 enable


          Example:
          Router> enable 
           

          Enables privileged EXEC mode.

          • Enter your password if prompted.

           
          Step 2 configure terminal


          Example:
          Router# configure terminal
           

          Enters global configuration mode.

           
          Step 3 tacacs server name


          Example:
          Router(config)# tacacs server server1 
           

          Configures the TACACS+ server for IPv6 and enters TACACS+ server configuration mode.

           
          Step 4 address ipv6 ipv6-address


          Example:
          Router(config-server-tacacs)# address ipv6 2001:DB8:3333:4::5 
           

          Configures the IPv6 address of the TACACS+ server.

           
          Step 5 key [0 | 7] key-string


          Example:
          Router(config-server-tacacs)# key 0 key1 
           

          Configures the per-server encryption key on the TACACS+ server.

           
          Step 6 port [number


          Example:
          Router(config-server-tacacs)# port 12 
           

          Specifies the TCP port to be used for TACACS+ connections.

           
          Step 7 send-nat-address


          Example:
          Router(config-server-tacacs)# send-nat-address 
           

          Sends a client’s post-NAT address to the TACACS+ server.

           
          Step 8 single-connection


          Example:
          Router(config-server-tacacs)# single-connection 
           

          Enables all TACACS packets to be sent to the same server using a single TCP connection.

           
          Step 9 timeout seconds


          Example:
          Router(config-server-tacacs)# timeout 10 
           

          Configures the time to wait for a reply from the specified TACACS server.

           

          Specifying the Source Address in TACACS+ Packets

          SUMMARY STEPS

            1.    enable

            2.    configure terminal

            3.    ipv6 tacacs source-interface type number


          DETAILED STEPS
             Command or ActionPurpose
            Step 1 enable


            Example:
            Router> enable
             

            Enables privileged EXEC mode.

            • Enter your password if prompted.

             
            Step 2 configure terminal


            Example:
            Router# configure terminal
             

            Enters global configuration mode.

             
            Step 3 ipv6 tacacs source-interface type number


            Example:
            Router(config)# ipv6 tacacs source-interface GigabitEthernet 0/0/0
             

            Specifies an interface to use for the source address in TACACS+ packets.

             

            Configuring TACACS+ Server Group Options

            SUMMARY STEPS

              1.    enable

              2.    configure terminal

              3.    aaa group server tacacs+ group-name

              4.    server name server-name

              5.    server-private {ip-address | name | ipv6-address} [nat] [single-connection] [port port-number] [timeout seconds] [key [0 | 7] string]


            DETAILED STEPS
               Command or ActionPurpose
              Step 1 enable


              Example:
              Router> enable 
               

              Enables privileged EXEC mode.

              • Enter your password if prompted.

               
              Step 2 configure terminal


              Example:
              Router# configure terminal
               

              Enters global configuration mode.

               
              Step 3 aaa group server tacacs+ group-name


              Example:
              Router(config)# aaa group server tacacs+ group1 
               

              Groups different TACACS+ server hosts into distinct lists and distinct methods.

               
              Step 4 server name server-name


              Example:
              Router(config-sg-tacacs+)# server name server1 
               

              Specifies an IPv6 TACACS+ server.

               
              Step 5 server-private {ip-address | name | ipv6-address} [nat] [single-connection] [port port-number] [timeout seconds] [key [0 | 7] string]


              Example:
              Router(config-sg-tacacs+)# server-private 2001:DB8:3333:4::5 port 19 key key1 
               

              Configures the IPv6 address of the private TACACS+ server for the group server.

               

              Configuration Examples for TACACS+ over IPv6

              Example: Configuring TACACS+ Server over IPv6

              Device# show tacacs 
              
                          Tacacs+ Server:          server1
                          Server Address:          FE80::200:F8FF:FE21:67CF
                            Socket opens:          0
                           Socket closes:          0
                           Socket aborts:          0
                           Socket errors:          0
                         Socket Timeouts:          0
                 Failed Connect Attempts:          0
                      Total Packets Sent:          0
                      Total Packets Recv:          0
              

              Additional References

              The following sections provide references related to the MSCHAP Version 2 feature.

              Related Documents

              Related Topic

              Document Title

              Configuring PPP interfaces

              PPP Configuration in the Cisco IOS Dial Technologies Configuration Guide , Release 12.4T.

              Descriptions of the tasks and commands necessary to configure and maintain Cisco networking devices

              Cisco IOS Dial Technologies Command Reference

              Lists of IOS Security Commands

              Cisco IOS Security Command Reference

              Configuring PPP authentication using AAA

              Configuring PPP Authentication Using AAA in the Configuring Authentication module in the Cisco IOS Security Configuration Guide: Securing User Services , Release 12.4T.

              Configuring RADIUS Authentication

              Configuring RADIUS module in the Cisco IOS Security Configuration Guide: Securing User Services, Release 12.4T.

              Standards

              Standard

              Title

              No new or modified standards are supported by this feature.

              --

              MIBs

              MIB

              MIBs Link

              No new or modified MIBs are supported by this feature.

              To locate and download MIBs for selected platforms, Cisco IOS releases, and feature sets, use Cisco MIB Locator found at the following URL:

              http:/​/​www.cisco.com/​go/​mibs

              RFCs

              RFC

              Title

              RFC 1661

              Point-to-Point Protocol (PPP)

              RFC 2548

              Microsoft Vendor-specific RADIUS Attributes

              RFC 2759

              Microsoft PPP CHAP Extensions, Version 2

              Technical Assistance

              Description

              Link

              The Cisco Support website provides extensive online resources, including documentation and tools for troubleshooting and resolving technical issues with Cisco products and technologies.

              To receive security and technical information about your products, you can subscribe to various services, such as the Product Alert Tool (accessed from Field Notices), the Cisco Technical Services Newsletter, and Really Simple Syndication (RSS) Feeds.

              Access to most tools on the Cisco Support website requires a Cisco.com user ID and password.

              http:/​/​www.cisco.com/​techsupport

              Feature Information for TACACS+ over IPv6

              The following table provides release information about the feature or features described in this module. This table lists only the software release that introduced support for a given feature in a given software release train. Unless noted otherwise, subsequent releases of that software release train also support that feature.

              Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to www.cisco.com/​go/​cfn. An account on Cisco.com is not required.

              Table 1 Feature Information for TACACS+ over IPv6

              Feature Name

              Releases

              Feature Information

              TACACS+ over IPv6

              Cisco IOS XE Release 3.2S

              TACACS+ over IPv6 is supported.

              The following commands were introduced or modified: aaa group server tacacs+, address ipv6 (TACACS+), ipv6 tacacs source-interface, key (TACACS+), port (TACACS+), send-nat-address, server name (IPv6 TACACS+), server-private (TACACS+), single-connection, tacacs server, timeout (TACACS+).