Document toolboxDocument toolbox

Authenticating Admin Accounts Using TACACS+

You can configure the Multi-Grid Master to authenticate admins against TACACS+ (Terminal Access Controller Access-Control System Plus) servers. TACACS+ provides separate authentication, authorization, and accounting services. To ensure reliable delivery, it uses TCP as its transport protocol, and to ensure confidentiality, all protocol exchanges between the TACACS+ server and its clients are encrypted. For detailed information about TACACS+, refer to the Internet draft http://tools.ietf.org/html/draft-grant-tacacs-02.
In addition, you can configure a custom service, infoblox, on the TACACS+ server, and then define a user group and specify the group name in the custom attribute infoblox-admin-group. Ensure that you apply the user group to the custom service infoblox. On the Multi-Grid Master, you define a group with the same name and add it to the authentication policy. Then when the TACACS+ server responds to an authentication and authorization request and includes the infoblox-admin-group attribute, The Multi-Grid Master can match the group name with the group in the authentication policy and automatically assign the admin to that group.
Figure 4.5 illustrates the TACACS+ authentication and authorization process when PAP/CHAP authentication is used.

Figure 4.5 TACACS+ Authentication


TACACS+ Accounting
When you enable TACACS+ accounting, the Multi-Grid Master sends the TACACS+ accounting server a TACACS+ accounting event with the same information that it sends to the Audit Log for any user command/event. The Multi-Grid Master sends an accounting start packet when a user first logs in successfully using TACACS+
authentication, and it sends an accounting STOP packet when a user logs out of the GUI or CLI or when a GUI or CLI session times out. If a product restarts or software failure occurs, the Multi-Grid Master drops any outstanding accounting packets. Note that audit log entries that are greater than 3,600 characters are truncated in accounting events sent to TACAS+ servers.

Configuring TACACS+

Complete the following tasks to enable the Multi-Grid Master and the TACACS+ servers to communicate. On each TACACS+ server that you are adding to the authentication server group:

  • For Windows TACACS+ servers, add the appliance as an AAA client. This step is not required for LINUX TACACS+ servers.
  • Determine which user group on the TACACS+ server is used to match the admin group on the Multi-Grid Master, and then configure the following settings for the user group:
    • Add "infoblox" as a custom service.
    • Define the custom attribute for the group, in the format: infoblox-admin-group= group_name. For example, infoblox-admin-group=remoteadmins1. The group name can have a maximum of 64 characters.

On the Multi-Grid Master:

  • Create a TACACS+ authentication server group. You can create only one TACACS+ server group. For more information, see Configuring a TACACS+ Authentication Server Group.
  • Create the local admin group in Multi-Grid Master that matches the user group on the TACACS+ server. Note that the admin group name must match the group name specified in the TACACS+ server and in the custom attribute. For example, if the custom attribute is infoblox-admin-group=remoteadmins1, then the admin group name must be remoteadmins1. In addition, you can designate a default admin group for remote admins. For information about configuring group permissions and privileges, see /wiki/spaces/mgmadminguide/pages/911180917
  • In the authentication policy, add the newly configured TACACS+ server group and the TACACS+ admin group name. See /wiki/spaces/mgmadminguide/pages/911181365 for more information about configuring an admin policy.

Configuring a TACACS+ Authentication Server Group

You can add multiple TACACS+ servers to the TACACS+ authentication server group. the Multi-Grid Master sends authentication requests to the TACACS+ servers in the order they are listed. The Multi-Grid Master sends authentication requests to the first server on the list. If that server is unreachable or generates an error, then the Multi-Grid Master sends the request to the next server in the list that has not been previously queried, and so on. The Multi-Grid Master logs an error message in syslog if all servers have been queried and they all generate errors or are unreachable.
To configure a TACACS+ authentication server group:

  1. From the Administration tab, click the Authentication Server Groups tab.
  2. Click the TACACS+ Services subtab and click the Add icon.
  3. In the Add TACACS+ Service wizard, complete the following:
    • Name: Enter a name for the server group.
    • TACACS+ Servers: Click the Add icon and complete the following:
      • Server Name or IP address: The name or IP address of the TACACS+ server.
      • Comment: You can enter additional information about the server.
      • Port: The TCP destination port for TACACS+ communication. This port is used for authentication, accounting and authorization packets. The default is port 49.
      • Authentication Type: Select ASCII, PAP or CHAP. The default is CHAP.
      • Shared Secret: The shared key that the appliance and the TACACS+ server use to encrypt and decrypt messages.
      • Connection Interface: The interface on the appliance that is used to connect to the authentication server group. You can use either the LAN or MGMT interface.
      • Enable Accounting: Select this to enable the Multi-Grid Master to send accounting information to the TACACS+ server.
      • Disable Server: Select this to prevent queries from being sent to this server. You can retain the configuration, but disable the service.
      Click Test to test the configuration. Click Add to add the TACACS+ server to the list.
      When you add multiple TACACS+ servers, the appliance lists the servers in the order you added them. This list also determines the order in which the appliance attempts to contact a TACACS+ server. You can move a server up or down the list by selecting it and clicking the up or down arrow.
    • Authentication/Authorization: Optionally, modify the authentication and authorization settings. These settings apply to all TACACS+ servers that you configure on the appliance.
    • Timeout(s): Specify the number of seconds or milliseconds that the appliance waits for a response from the TACACS+ server before it tries to contact it again. The amount of time before the server is retried. The default and minimum is 5000, and the maximum is 60000.
      • Retries: Specify how many times the appliance attempts to contact a TACACS+ server and fails before it tries to contact the next server on the list. The default is 0. The maximum is 5.
    • Accounting: Optionally, modify the Accounting settings.
      • Timeout(s): Specify the number of seconds or milliseconds that the appliance waits for a response from the TACACS+ server. The amount of time before the server is retried. The default and minimum is 1000, and the maximum is 30000.
      • Retries: Specify how many times the appliance attempts to contact an accounting TACACS+ server and fails before it tries to contact the next accounting server on the list. The default is 0. The maximum is 5.
    • Comment: Enter additional information about the service.
    • Disable: Select this to retain an inactive TACACS+ authentication service profile.
  4. Save the configuration.