<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://wiki.itcollege.ee/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Mkurniko</id>
	<title>ICO wiki - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://wiki.itcollege.ee/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Mkurniko"/>
	<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php/Special:Contributions/Mkurniko"/>
	<updated>2026-05-08T09:52:02Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.45.1</generator>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=TACACS%2B&amp;diff=60924</id>
		<title>TACACS+</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=TACACS%2B&amp;diff=60924"/>
		<updated>2013-01-13T09:13:13Z</updated>

		<summary type="html">&lt;p&gt;Mkurniko: /* Kasutajate eemaldamine */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Autor==&lt;br /&gt;
Margus Kurnikov AK21&lt;br /&gt;
&lt;br /&gt;
==Sissejuhatus==&lt;br /&gt;
&lt;br /&gt;
TACACS+ (Terminal Access Controller Access-Control System Plus) on võrguseadmete ligipääsukontrolli protokoll, mis hõlmab endas nii autentimise, autoriseerimise kui ka aruandluse (Authentication, Authorization and Accounting - AAA) teenuseid.&lt;br /&gt;
TACACS+ on kasulik võrguseadmete halduse korraldamisel, kuna teenus võimaldab võrguseadmete kasutajaid ja ligipääsuõigusi tsentraalselt hallata, ehk väldib olukorda, kus võrguadministraator peaks kümnetes/sadades seadmetes haldama seadmete lokaalseid kasutajakontosid. Piisab vaid igasse seadmesse lisada identne AAA konfitükk.&amp;lt;br&amp;gt;&lt;br /&gt;
Andmevahetuseks kasutatakse TCP porti 49.&amp;lt;br&amp;gt;&lt;br /&gt;
Erinevalt RADIUS&#039;st, mis on TACACS+ alternatiiv, eristab viimast autoriseerimise funktsionaalsuse lahutamine, mis võimaldab paindlikumat ligipääsukontrolli - kes võib käivitada käske, milliseid käske, millises seadmes. Iga kasutaja poolt sisestatud käsk saadetakse kesksesse TACACS+ serverisse autoriseerimiseks, kus kontrollitakse, kas vastavat käsku on lubatud käivitada konkreetsel kasutajal või grupil. TACACS+ on võimalik luua käskude käivitamisele näiteks kasutaja-, seadme-, või ajapõhiseid reegleid.&amp;lt;br&amp;gt;&lt;br /&gt;
TACACS+ protokolli tugi on olemas levinud suuremate tootjate võrguseadmetes - Cisco, Juniper/Netscreen, HP, Alcatel/Lucent, Ericsson jt.&amp;lt;br&amp;gt;&lt;br /&gt;
TACACS+ näol on tegemist Cisco poolt arendatud vabavaraga.&lt;br /&gt;
&lt;br /&gt;
Antud kirjutises käsitlen lihtsaid TACACS+ seadistamisvõimalusi.&lt;br /&gt;
&lt;br /&gt;
==Paigaldamine==&lt;br /&gt;
&lt;br /&gt;
TACACS+ teenus paigaldatud Ubuntu 12.04-le.&amp;lt;br&amp;gt;&lt;br /&gt;
Testitava ruuterina kasutusel Cisco 1812.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
TACACS+ teenuse paigaldus:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;apt-get install tacacs+&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Teenuse seadistamine==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Konfiguratsioonifaili manual:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;man tac_plus.conf&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Aruandluse logifail:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;/var/log/tac_plus.acct&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
TACACS+ konfiguratsioonifaili asukoht:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;/etc/tacacs+/tac_plus.conf&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Algupärane konfiguratsioonifail: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
# Created by Henry-Nicolas Tourneur(henry.nicolas@tourneur.be)&lt;br /&gt;
# See man(5) tac_plus.conf for more details&lt;br /&gt;
&lt;br /&gt;
# Define where to log accounting data, this is the default.&lt;br /&gt;
&lt;br /&gt;
accounting file = /var/log/tac_plus.acct&lt;br /&gt;
&lt;br /&gt;
# This is the key that clients have to use to access Tacacs+&lt;br /&gt;
&lt;br /&gt;
key = testing123&lt;br /&gt;
&lt;br /&gt;
# Use /etc/passwd file to do authentication&lt;br /&gt;
    &lt;br /&gt;
#default authentication = file /etc/passwd&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
# You can use feature like per host key with different enable passwords&lt;br /&gt;
#host = 127.0.0.1 {&lt;br /&gt;
#        key = test &lt;br /&gt;
#        type = cisco&lt;br /&gt;
#        enable = &amp;lt;des|cleartext&amp;gt; enablepass&lt;br /&gt;
#        prompt = &amp;quot;Welcome XXX ISP Access Router \n\nUsername:&amp;quot;&lt;br /&gt;
#}&lt;br /&gt;
&lt;br /&gt;
# We also can define local users and specify a file where data is stored.&lt;br /&gt;
# That file may be filled using tac_pwd&lt;br /&gt;
#user = test1 {&lt;br /&gt;
#    name = &amp;quot;Test User&amp;quot;&lt;br /&gt;
#    member = staff&lt;br /&gt;
#    login = file /etc/tacacs/tacacs_passwords&lt;br /&gt;
#}&lt;br /&gt;
&lt;br /&gt;
# We can also specify rules valid per group of users.&lt;br /&gt;
#group = group1 {&lt;br /&gt;
#       cmd = conf {&lt;br /&gt;
#               deny&lt;br /&gt;
#       }&lt;br /&gt;
#}&lt;br /&gt;
&lt;br /&gt;
# Another example : forbid configure command for some hosts&lt;br /&gt;
# for a define range of clients&lt;br /&gt;
#group = group1 {&lt;br /&gt;
#       login = PAM&lt;br /&gt;
#       service = ppp&lt;br /&gt;
#       protocol = ip {&lt;br /&gt;
#               addr = 10.10.0.0/24&lt;br /&gt;
#       }&lt;br /&gt;
#       cmd = conf {&lt;br /&gt;
#               deny .*&lt;br /&gt;
#       }&lt;br /&gt;
#}&lt;br /&gt;
&lt;br /&gt;
user = DEFAULT {&lt;br /&gt;
        login = PAM&lt;br /&gt;
        service = ppp protocol = ip {}&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
# Much more features are availables, like ACL, more service compatibilities,&lt;br /&gt;
# commands authorization, scripting authorization.&lt;br /&gt;
# See the man page for those features.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Kasutajate autentimist on võimalik tac_plus&#039;s seadistada kolmel moel:&lt;br /&gt;
&lt;br /&gt;
* Autentimine lokaalse passwd faili alusel - /etc/passwd&lt;br /&gt;
* Autentimine /etc/tac_plus/tac_plus.conf faili lisatud DES salajaste võtmetega&lt;br /&gt;
* Autentimine PAM-ga LDAP serveri pihta&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Käsitlen kahte esimest varianti:&lt;br /&gt;
&lt;br /&gt;
===Autentimine passwd faili põhjal===&lt;br /&gt;
&lt;br /&gt;
Lisan TACACS+ võtme , mis tuleb ka hallatava(te)sse ruuteri(te)sse seadistada (sellest juttu edaspidi), kommenteerin välja rea, kus määratakse autentimisandmete allikaks /etc/passwd fail.&lt;br /&gt;
&lt;br /&gt;
Loon grupi &amp;quot;net_admins&amp;quot;, omistan Cisco kõrgeima ligipääsutaseme - privilege level 15. Kasutaja &amp;quot;margus&amp;quot; määran grupi &amp;quot;net_admins&amp;quot; liikmeks.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
key = y97A14T2#741zQ+&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
default authentication = file /etc/passwd&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
group = net_admins {&lt;br /&gt;
        default service = permit&lt;br /&gt;
        login = file /etc/passwd&lt;br /&gt;
        enable = file /etc/passwd&lt;br /&gt;
        service = exec {&lt;br /&gt;
                priv-lvl = 15&lt;br /&gt;
                }&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
user = margus {&lt;br /&gt;
        member = net_admins&lt;br /&gt;
}&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Autentimine DES salajase võtmega===&lt;br /&gt;
&lt;br /&gt;
Loon grupi &amp;quot;uusgrupp&amp;quot;, madalaima ligipääsutasemega - privilege level 0.&lt;br /&gt;
&lt;br /&gt;
Kasutaja &amp;quot;jaan&amp;quot; lisan loodud gruppi ja defineerin krüpteeritud parooli.&lt;br /&gt;
&lt;br /&gt;
Parooli krüpteerimiseks kasutan käsku &amp;lt;code&amp;gt;tac_pwd&amp;lt;/code&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
key = y97A14T2#741zQ+&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
group = uusgrupp {&lt;br /&gt;
        default service = permit &lt;br /&gt;
        service = exec {&lt;br /&gt;
                priv-lvl = 0&lt;br /&gt;
                }&lt;br /&gt;
}&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
user = jaan {&lt;br /&gt;
        login = des UT.e3EErKERm2&lt;br /&gt;
        member = uusgrupp&lt;br /&gt;
}&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Autoriseermine===&lt;br /&gt;
&lt;br /&gt;
Autoriseerimine võimaldab keelata või lubada hallatavas võrguseadmes teatud käskude käivitamist. Need reeglid on omistatavad nii kasutajatele kui gruppidele. Reeglid on keelavad või lubavad.&lt;br /&gt;
&lt;br /&gt;
Lihtne näide, kus on loodud grupp &amp;quot;piiratud_ligip22s&amp;quot;, mille liikmetele on lubatud ligipääs vaid ruuterile IP-ga 172.16.1.103.&lt;br /&gt;
&lt;br /&gt;
Grupi liikmetel on keelatud käivitada käske &amp;quot;configure&amp;quot; ja &amp;quot;debug&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
acl = ruuter1_acl {&lt;br /&gt;
        permit = 172.16.1.103&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
group = piiratud_ligip22s {&lt;br /&gt;
        default service = permit&lt;br /&gt;
        login = file /etc/passwd&lt;br /&gt;
        enable = file /etc/passwd&lt;br /&gt;
        service = exec {&lt;br /&gt;
                priv-lvl = 15&lt;br /&gt;
                }&lt;br /&gt;
        cmd = configure {&lt;br /&gt;
                deny &amp;quot;.&amp;quot;&lt;br /&gt;
                }&lt;br /&gt;
        cmd = debug {&lt;br /&gt;
                deny &amp;quot;.&amp;quot;&lt;br /&gt;
                }&lt;br /&gt;
&lt;br /&gt;
        acl = ruuter1_acl&lt;br /&gt;
&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
user = uno {&lt;br /&gt;
        member = piiratud_ligip22s&lt;br /&gt;
}&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Kasutajate eemaldamine===&lt;br /&gt;
&lt;br /&gt;
passwd faili põhjal autentimisega piisab vastavast masinast kasutaja eemaldamisest ja korrektne oleks ka tac_plus.conf failist vastava kasutaja konfiguratsioon eemaldada.&amp;lt;br&amp;gt;&lt;br /&gt;
DES salajase võtmega autentimisel tuleb eemaldada kasutajapõhine konfiguratsioon tac_plus.conf failist.&lt;br /&gt;
&lt;br /&gt;
==Cisco AAA seadistamine==&lt;br /&gt;
&lt;br /&gt;
Lihtsustatud AAA konfiguratsioon Cisco ruuteris&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
! luuakse uus AAA skeem, millega lubatakse sisestada allolevad käsud&lt;br /&gt;
aaa new-model&lt;br /&gt;
!&lt;br /&gt;
! Käsib seadmel iga sisse logiva kasutaja nime ja parooli valideerida TACACS+ serveri pihta&lt;br /&gt;
aaa authentication login default group tacacs+ enable&lt;br /&gt;
!&lt;br /&gt;
! Kui kasutaja on autoriseeritud, siis sisselogimisel viiakse ta kohe exec (enable) režiimi&lt;br /&gt;
aaa authorization exec default group tacacs+ if-authenticated&lt;br /&gt;
!&lt;br /&gt;
! Autoriseeritakse privilege level 15 kasutajaid ja kui TACACS+ server pole kättesaadav, siis kasutatakse lokaalset kasutajakontot&lt;br /&gt;
aaa authorization commands 15 default group tacacs+&lt;br /&gt;
!&lt;br /&gt;
! Salvestab aruandlust privilege level 15 kasutajate kohta:&lt;br /&gt;
aaa accounting commands 15 default start-stop group tacacs+&lt;br /&gt;
!&lt;br /&gt;
! TACACS+ serveri IP&lt;br /&gt;
tacacs-server host 172.16.1.100&lt;br /&gt;
!&lt;br /&gt;
! TACACS+ serveri võti&lt;br /&gt;
tacacs-server key y97A14T2#741zQ+&lt;br /&gt;
!&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Tõrkeotsing==&lt;br /&gt;
&lt;br /&gt;
Kontrollime, kas TACACS+ protsess jookseb:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
ps -ef | grep tac_plus&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Peale igat tac_plus.conf konfiguratsioonimuudatust, tuleb taaskäivitada TACACS+ teenus:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
/etc/init.d/tacacs_plus restart&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Kui teenus ei peaks pärast konfiguratsioonimuudatust käivituma,&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
 * Restarting TACACS+ authentication daemon tacacs+                                     [fail]&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
siis tuleb viga otsida tac_plus.conf failist.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Kasutatud allikad==&lt;br /&gt;
&lt;br /&gt;
http://en.gentoo-wiki.com/wiki/TACACS_Server_using_tac_plus&lt;br /&gt;
&lt;br /&gt;
http://www.stben.net/tacacs/users_guide.html&lt;br /&gt;
&lt;br /&gt;
http://www.debianhelp.co.uk/tacas.htm&lt;br /&gt;
&lt;br /&gt;
http://www.cisco.com/en/US/docs/switches/datacenter/nexus1000/sw/4_0/security/configuration/guide/security_4tacacs.html&lt;br /&gt;
&lt;br /&gt;
http://www.cisco.com/en/US/docs/ios/12_1/security/command/reference/srdathen.html&lt;/div&gt;</summary>
		<author><name>Mkurniko</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=TACACS%2B&amp;diff=60923</id>
		<title>TACACS+</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=TACACS%2B&amp;diff=60923"/>
		<updated>2013-01-13T09:11:52Z</updated>

		<summary type="html">&lt;p&gt;Mkurniko: /* Autoriseermine */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Autor==&lt;br /&gt;
Margus Kurnikov AK21&lt;br /&gt;
&lt;br /&gt;
==Sissejuhatus==&lt;br /&gt;
&lt;br /&gt;
TACACS+ (Terminal Access Controller Access-Control System Plus) on võrguseadmete ligipääsukontrolli protokoll, mis hõlmab endas nii autentimise, autoriseerimise kui ka aruandluse (Authentication, Authorization and Accounting - AAA) teenuseid.&lt;br /&gt;
TACACS+ on kasulik võrguseadmete halduse korraldamisel, kuna teenus võimaldab võrguseadmete kasutajaid ja ligipääsuõigusi tsentraalselt hallata, ehk väldib olukorda, kus võrguadministraator peaks kümnetes/sadades seadmetes haldama seadmete lokaalseid kasutajakontosid. Piisab vaid igasse seadmesse lisada identne AAA konfitükk.&amp;lt;br&amp;gt;&lt;br /&gt;
Andmevahetuseks kasutatakse TCP porti 49.&amp;lt;br&amp;gt;&lt;br /&gt;
Erinevalt RADIUS&#039;st, mis on TACACS+ alternatiiv, eristab viimast autoriseerimise funktsionaalsuse lahutamine, mis võimaldab paindlikumat ligipääsukontrolli - kes võib käivitada käske, milliseid käske, millises seadmes. Iga kasutaja poolt sisestatud käsk saadetakse kesksesse TACACS+ serverisse autoriseerimiseks, kus kontrollitakse, kas vastavat käsku on lubatud käivitada konkreetsel kasutajal või grupil. TACACS+ on võimalik luua käskude käivitamisele näiteks kasutaja-, seadme-, või ajapõhiseid reegleid.&amp;lt;br&amp;gt;&lt;br /&gt;
TACACS+ protokolli tugi on olemas levinud suuremate tootjate võrguseadmetes - Cisco, Juniper/Netscreen, HP, Alcatel/Lucent, Ericsson jt.&amp;lt;br&amp;gt;&lt;br /&gt;
TACACS+ näol on tegemist Cisco poolt arendatud vabavaraga.&lt;br /&gt;
&lt;br /&gt;
Antud kirjutises käsitlen lihtsaid TACACS+ seadistamisvõimalusi.&lt;br /&gt;
&lt;br /&gt;
==Paigaldamine==&lt;br /&gt;
&lt;br /&gt;
TACACS+ teenus paigaldatud Ubuntu 12.04-le.&amp;lt;br&amp;gt;&lt;br /&gt;
Testitava ruuterina kasutusel Cisco 1812.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
TACACS+ teenuse paigaldus:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;apt-get install tacacs+&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Teenuse seadistamine==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Konfiguratsioonifaili manual:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;man tac_plus.conf&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Aruandluse logifail:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;/var/log/tac_plus.acct&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
TACACS+ konfiguratsioonifaili asukoht:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;/etc/tacacs+/tac_plus.conf&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Algupärane konfiguratsioonifail: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
# Created by Henry-Nicolas Tourneur(henry.nicolas@tourneur.be)&lt;br /&gt;
# See man(5) tac_plus.conf for more details&lt;br /&gt;
&lt;br /&gt;
# Define where to log accounting data, this is the default.&lt;br /&gt;
&lt;br /&gt;
accounting file = /var/log/tac_plus.acct&lt;br /&gt;
&lt;br /&gt;
# This is the key that clients have to use to access Tacacs+&lt;br /&gt;
&lt;br /&gt;
key = testing123&lt;br /&gt;
&lt;br /&gt;
# Use /etc/passwd file to do authentication&lt;br /&gt;
    &lt;br /&gt;
#default authentication = file /etc/passwd&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
# You can use feature like per host key with different enable passwords&lt;br /&gt;
#host = 127.0.0.1 {&lt;br /&gt;
#        key = test &lt;br /&gt;
#        type = cisco&lt;br /&gt;
#        enable = &amp;lt;des|cleartext&amp;gt; enablepass&lt;br /&gt;
#        prompt = &amp;quot;Welcome XXX ISP Access Router \n\nUsername:&amp;quot;&lt;br /&gt;
#}&lt;br /&gt;
&lt;br /&gt;
# We also can define local users and specify a file where data is stored.&lt;br /&gt;
# That file may be filled using tac_pwd&lt;br /&gt;
#user = test1 {&lt;br /&gt;
#    name = &amp;quot;Test User&amp;quot;&lt;br /&gt;
#    member = staff&lt;br /&gt;
#    login = file /etc/tacacs/tacacs_passwords&lt;br /&gt;
#}&lt;br /&gt;
&lt;br /&gt;
# We can also specify rules valid per group of users.&lt;br /&gt;
#group = group1 {&lt;br /&gt;
#       cmd = conf {&lt;br /&gt;
#               deny&lt;br /&gt;
#       }&lt;br /&gt;
#}&lt;br /&gt;
&lt;br /&gt;
# Another example : forbid configure command for some hosts&lt;br /&gt;
# for a define range of clients&lt;br /&gt;
#group = group1 {&lt;br /&gt;
#       login = PAM&lt;br /&gt;
#       service = ppp&lt;br /&gt;
#       protocol = ip {&lt;br /&gt;
#               addr = 10.10.0.0/24&lt;br /&gt;
#       }&lt;br /&gt;
#       cmd = conf {&lt;br /&gt;
#               deny .*&lt;br /&gt;
#       }&lt;br /&gt;
#}&lt;br /&gt;
&lt;br /&gt;
user = DEFAULT {&lt;br /&gt;
        login = PAM&lt;br /&gt;
        service = ppp protocol = ip {}&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
# Much more features are availables, like ACL, more service compatibilities,&lt;br /&gt;
# commands authorization, scripting authorization.&lt;br /&gt;
# See the man page for those features.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Kasutajate autentimist on võimalik tac_plus&#039;s seadistada kolmel moel:&lt;br /&gt;
&lt;br /&gt;
* Autentimine lokaalse passwd faili alusel - /etc/passwd&lt;br /&gt;
* Autentimine /etc/tac_plus/tac_plus.conf faili lisatud DES salajaste võtmetega&lt;br /&gt;
* Autentimine PAM-ga LDAP serveri pihta&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Käsitlen kahte esimest varianti:&lt;br /&gt;
&lt;br /&gt;
===Autentimine passwd faili põhjal===&lt;br /&gt;
&lt;br /&gt;
Lisan TACACS+ võtme , mis tuleb ka hallatava(te)sse ruuteri(te)sse seadistada (sellest juttu edaspidi), kommenteerin välja rea, kus määratakse autentimisandmete allikaks /etc/passwd fail.&lt;br /&gt;
&lt;br /&gt;
Loon grupi &amp;quot;net_admins&amp;quot;, omistan Cisco kõrgeima ligipääsutaseme - privilege level 15. Kasutaja &amp;quot;margus&amp;quot; määran grupi &amp;quot;net_admins&amp;quot; liikmeks.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
key = y97A14T2#741zQ+&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
default authentication = file /etc/passwd&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
group = net_admins {&lt;br /&gt;
        default service = permit&lt;br /&gt;
        login = file /etc/passwd&lt;br /&gt;
        enable = file /etc/passwd&lt;br /&gt;
        service = exec {&lt;br /&gt;
                priv-lvl = 15&lt;br /&gt;
                }&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
user = margus {&lt;br /&gt;
        member = net_admins&lt;br /&gt;
}&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Autentimine DES salajase võtmega===&lt;br /&gt;
&lt;br /&gt;
Loon grupi &amp;quot;uusgrupp&amp;quot;, madalaima ligipääsutasemega - privilege level 0.&lt;br /&gt;
&lt;br /&gt;
Kasutaja &amp;quot;jaan&amp;quot; lisan loodud gruppi ja defineerin krüpteeritud parooli.&lt;br /&gt;
&lt;br /&gt;
Parooli krüpteerimiseks kasutan käsku &amp;lt;code&amp;gt;tac_pwd&amp;lt;/code&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
key = y97A14T2#741zQ+&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
group = uusgrupp {&lt;br /&gt;
        default service = permit &lt;br /&gt;
        service = exec {&lt;br /&gt;
                priv-lvl = 0&lt;br /&gt;
                }&lt;br /&gt;
}&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
user = jaan {&lt;br /&gt;
        login = des UT.e3EErKERm2&lt;br /&gt;
        member = uusgrupp&lt;br /&gt;
}&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Autoriseermine===&lt;br /&gt;
&lt;br /&gt;
Autoriseerimine võimaldab keelata või lubada hallatavas võrguseadmes teatud käskude käivitamist. Need reeglid on omistatavad nii kasutajatele kui gruppidele. Reeglid on keelavad või lubavad.&lt;br /&gt;
&lt;br /&gt;
Lihtne näide, kus on loodud grupp &amp;quot;piiratud_ligip22s&amp;quot;, mille liikmetele on lubatud ligipääs vaid ruuterile IP-ga 172.16.1.103.&lt;br /&gt;
&lt;br /&gt;
Grupi liikmetel on keelatud käivitada käske &amp;quot;configure&amp;quot; ja &amp;quot;debug&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
acl = ruuter1_acl {&lt;br /&gt;
        permit = 172.16.1.103&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
group = piiratud_ligip22s {&lt;br /&gt;
        default service = permit&lt;br /&gt;
        login = file /etc/passwd&lt;br /&gt;
        enable = file /etc/passwd&lt;br /&gt;
        service = exec {&lt;br /&gt;
                priv-lvl = 15&lt;br /&gt;
                }&lt;br /&gt;
        cmd = configure {&lt;br /&gt;
                deny &amp;quot;.&amp;quot;&lt;br /&gt;
                }&lt;br /&gt;
        cmd = debug {&lt;br /&gt;
                deny &amp;quot;.&amp;quot;&lt;br /&gt;
                }&lt;br /&gt;
&lt;br /&gt;
        acl = ruuter1_acl&lt;br /&gt;
&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
user = uno {&lt;br /&gt;
        member = piiratud_ligip22s&lt;br /&gt;
}&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Kasutajate eemaldamine===&lt;br /&gt;
&lt;br /&gt;
passwd faili põhjal autentimisega piisab vastavast masinast kasutaja eemaldamisest ja korrektne oleks ka tac_plus.conf failist vastava kasutaja konfiguratsioon eemaldada.&amp;lt;br&amp;gt;&lt;br /&gt;
DES salajase võtmega autentimisel piisab kui eemaldada kasutajapõhine konfiguratsioon tac_plus.conf failist.&lt;br /&gt;
&lt;br /&gt;
==Cisco AAA seadistamine==&lt;br /&gt;
&lt;br /&gt;
Lihtsustatud AAA konfiguratsioon Cisco ruuteris&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
! luuakse uus AAA skeem, millega lubatakse sisestada allolevad käsud&lt;br /&gt;
aaa new-model&lt;br /&gt;
!&lt;br /&gt;
! Käsib seadmel iga sisse logiva kasutaja nime ja parooli valideerida TACACS+ serveri pihta&lt;br /&gt;
aaa authentication login default group tacacs+ enable&lt;br /&gt;
!&lt;br /&gt;
! Kui kasutaja on autoriseeritud, siis sisselogimisel viiakse ta kohe exec (enable) režiimi&lt;br /&gt;
aaa authorization exec default group tacacs+ if-authenticated&lt;br /&gt;
!&lt;br /&gt;
! Autoriseeritakse privilege level 15 kasutajaid ja kui TACACS+ server pole kättesaadav, siis kasutatakse lokaalset kasutajakontot&lt;br /&gt;
aaa authorization commands 15 default group tacacs+&lt;br /&gt;
!&lt;br /&gt;
! Salvestab aruandlust privilege level 15 kasutajate kohta:&lt;br /&gt;
aaa accounting commands 15 default start-stop group tacacs+&lt;br /&gt;
!&lt;br /&gt;
! TACACS+ serveri IP&lt;br /&gt;
tacacs-server host 172.16.1.100&lt;br /&gt;
!&lt;br /&gt;
! TACACS+ serveri võti&lt;br /&gt;
tacacs-server key y97A14T2#741zQ+&lt;br /&gt;
!&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Tõrkeotsing==&lt;br /&gt;
&lt;br /&gt;
Kontrollime, kas TACACS+ protsess jookseb:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
ps -ef | grep tac_plus&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Peale igat tac_plus.conf konfiguratsioonimuudatust, tuleb taaskäivitada TACACS+ teenus:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
/etc/init.d/tacacs_plus restart&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Kui teenus ei peaks pärast konfiguratsioonimuudatust käivituma,&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
 * Restarting TACACS+ authentication daemon tacacs+                                     [fail]&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
siis tuleb viga otsida tac_plus.conf failist.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Kasutatud allikad==&lt;br /&gt;
&lt;br /&gt;
http://en.gentoo-wiki.com/wiki/TACACS_Server_using_tac_plus&lt;br /&gt;
&lt;br /&gt;
http://www.stben.net/tacacs/users_guide.html&lt;br /&gt;
&lt;br /&gt;
http://www.debianhelp.co.uk/tacas.htm&lt;br /&gt;
&lt;br /&gt;
http://www.cisco.com/en/US/docs/switches/datacenter/nexus1000/sw/4_0/security/configuration/guide/security_4tacacs.html&lt;br /&gt;
&lt;br /&gt;
http://www.cisco.com/en/US/docs/ios/12_1/security/command/reference/srdathen.html&lt;/div&gt;</summary>
		<author><name>Mkurniko</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=TACACS%2B&amp;diff=60922</id>
		<title>TACACS+</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=TACACS%2B&amp;diff=60922"/>
		<updated>2013-01-13T09:03:55Z</updated>

		<summary type="html">&lt;p&gt;Mkurniko: /* Sissejuhatus */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Autor==&lt;br /&gt;
Margus Kurnikov AK21&lt;br /&gt;
&lt;br /&gt;
==Sissejuhatus==&lt;br /&gt;
&lt;br /&gt;
TACACS+ (Terminal Access Controller Access-Control System Plus) on võrguseadmete ligipääsukontrolli protokoll, mis hõlmab endas nii autentimise, autoriseerimise kui ka aruandluse (Authentication, Authorization and Accounting - AAA) teenuseid.&lt;br /&gt;
TACACS+ on kasulik võrguseadmete halduse korraldamisel, kuna teenus võimaldab võrguseadmete kasutajaid ja ligipääsuõigusi tsentraalselt hallata, ehk väldib olukorda, kus võrguadministraator peaks kümnetes/sadades seadmetes haldama seadmete lokaalseid kasutajakontosid. Piisab vaid igasse seadmesse lisada identne AAA konfitükk.&amp;lt;br&amp;gt;&lt;br /&gt;
Andmevahetuseks kasutatakse TCP porti 49.&amp;lt;br&amp;gt;&lt;br /&gt;
Erinevalt RADIUS&#039;st, mis on TACACS+ alternatiiv, eristab viimast autoriseerimise funktsionaalsuse lahutamine, mis võimaldab paindlikumat ligipääsukontrolli - kes võib käivitada käske, milliseid käske, millises seadmes. Iga kasutaja poolt sisestatud käsk saadetakse kesksesse TACACS+ serverisse autoriseerimiseks, kus kontrollitakse, kas vastavat käsku on lubatud käivitada konkreetsel kasutajal või grupil. TACACS+ on võimalik luua käskude käivitamisele näiteks kasutaja-, seadme-, või ajapõhiseid reegleid.&amp;lt;br&amp;gt;&lt;br /&gt;
TACACS+ protokolli tugi on olemas levinud suuremate tootjate võrguseadmetes - Cisco, Juniper/Netscreen, HP, Alcatel/Lucent, Ericsson jt.&amp;lt;br&amp;gt;&lt;br /&gt;
TACACS+ näol on tegemist Cisco poolt arendatud vabavaraga.&lt;br /&gt;
&lt;br /&gt;
Antud kirjutises käsitlen lihtsaid TACACS+ seadistamisvõimalusi.&lt;br /&gt;
&lt;br /&gt;
==Paigaldamine==&lt;br /&gt;
&lt;br /&gt;
TACACS+ teenus paigaldatud Ubuntu 12.04-le.&amp;lt;br&amp;gt;&lt;br /&gt;
Testitava ruuterina kasutusel Cisco 1812.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
TACACS+ teenuse paigaldus:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;apt-get install tacacs+&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Teenuse seadistamine==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Konfiguratsioonifaili manual:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;man tac_plus.conf&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Aruandluse logifail:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;/var/log/tac_plus.acct&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
TACACS+ konfiguratsioonifaili asukoht:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;/etc/tacacs+/tac_plus.conf&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Algupärane konfiguratsioonifail: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
# Created by Henry-Nicolas Tourneur(henry.nicolas@tourneur.be)&lt;br /&gt;
# See man(5) tac_plus.conf for more details&lt;br /&gt;
&lt;br /&gt;
# Define where to log accounting data, this is the default.&lt;br /&gt;
&lt;br /&gt;
accounting file = /var/log/tac_plus.acct&lt;br /&gt;
&lt;br /&gt;
# This is the key that clients have to use to access Tacacs+&lt;br /&gt;
&lt;br /&gt;
key = testing123&lt;br /&gt;
&lt;br /&gt;
# Use /etc/passwd file to do authentication&lt;br /&gt;
    &lt;br /&gt;
#default authentication = file /etc/passwd&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
# You can use feature like per host key with different enable passwords&lt;br /&gt;
#host = 127.0.0.1 {&lt;br /&gt;
#        key = test &lt;br /&gt;
#        type = cisco&lt;br /&gt;
#        enable = &amp;lt;des|cleartext&amp;gt; enablepass&lt;br /&gt;
#        prompt = &amp;quot;Welcome XXX ISP Access Router \n\nUsername:&amp;quot;&lt;br /&gt;
#}&lt;br /&gt;
&lt;br /&gt;
# We also can define local users and specify a file where data is stored.&lt;br /&gt;
# That file may be filled using tac_pwd&lt;br /&gt;
#user = test1 {&lt;br /&gt;
#    name = &amp;quot;Test User&amp;quot;&lt;br /&gt;
#    member = staff&lt;br /&gt;
#    login = file /etc/tacacs/tacacs_passwords&lt;br /&gt;
#}&lt;br /&gt;
&lt;br /&gt;
# We can also specify rules valid per group of users.&lt;br /&gt;
#group = group1 {&lt;br /&gt;
#       cmd = conf {&lt;br /&gt;
#               deny&lt;br /&gt;
#       }&lt;br /&gt;
#}&lt;br /&gt;
&lt;br /&gt;
# Another example : forbid configure command for some hosts&lt;br /&gt;
# for a define range of clients&lt;br /&gt;
#group = group1 {&lt;br /&gt;
#       login = PAM&lt;br /&gt;
#       service = ppp&lt;br /&gt;
#       protocol = ip {&lt;br /&gt;
#               addr = 10.10.0.0/24&lt;br /&gt;
#       }&lt;br /&gt;
#       cmd = conf {&lt;br /&gt;
#               deny .*&lt;br /&gt;
#       }&lt;br /&gt;
#}&lt;br /&gt;
&lt;br /&gt;
user = DEFAULT {&lt;br /&gt;
        login = PAM&lt;br /&gt;
        service = ppp protocol = ip {}&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
# Much more features are availables, like ACL, more service compatibilities,&lt;br /&gt;
# commands authorization, scripting authorization.&lt;br /&gt;
# See the man page for those features.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Kasutajate autentimist on võimalik tac_plus&#039;s seadistada kolmel moel:&lt;br /&gt;
&lt;br /&gt;
* Autentimine lokaalse passwd faili alusel - /etc/passwd&lt;br /&gt;
* Autentimine /etc/tac_plus/tac_plus.conf faili lisatud DES salajaste võtmetega&lt;br /&gt;
* Autentimine PAM-ga LDAP serveri pihta&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Käsitlen kahte esimest varianti:&lt;br /&gt;
&lt;br /&gt;
===Autentimine passwd faili põhjal===&lt;br /&gt;
&lt;br /&gt;
Lisan TACACS+ võtme , mis tuleb ka hallatava(te)sse ruuteri(te)sse seadistada (sellest juttu edaspidi), kommenteerin välja rea, kus määratakse autentimisandmete allikaks /etc/passwd fail.&lt;br /&gt;
&lt;br /&gt;
Loon grupi &amp;quot;net_admins&amp;quot;, omistan Cisco kõrgeima ligipääsutaseme - privilege level 15. Kasutaja &amp;quot;margus&amp;quot; määran grupi &amp;quot;net_admins&amp;quot; liikmeks.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
key = y97A14T2#741zQ+&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
default authentication = file /etc/passwd&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
group = net_admins {&lt;br /&gt;
        default service = permit&lt;br /&gt;
        login = file /etc/passwd&lt;br /&gt;
        enable = file /etc/passwd&lt;br /&gt;
        service = exec {&lt;br /&gt;
                priv-lvl = 15&lt;br /&gt;
                }&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
user = margus {&lt;br /&gt;
        member = net_admins&lt;br /&gt;
}&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Autentimine DES salajase võtmega===&lt;br /&gt;
&lt;br /&gt;
Loon grupi &amp;quot;uusgrupp&amp;quot;, madalaima ligipääsutasemega - privilege level 0.&lt;br /&gt;
&lt;br /&gt;
Kasutaja &amp;quot;jaan&amp;quot; lisan loodud gruppi ja defineerin krüpteeritud parooli.&lt;br /&gt;
&lt;br /&gt;
Parooli krüpteerimiseks kasutan käsku &amp;lt;code&amp;gt;tac_pwd&amp;lt;/code&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
key = y97A14T2#741zQ+&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
group = uusgrupp {&lt;br /&gt;
        default service = permit &lt;br /&gt;
        service = exec {&lt;br /&gt;
                priv-lvl = 0&lt;br /&gt;
                }&lt;br /&gt;
}&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
user = jaan {&lt;br /&gt;
        login = des UT.e3EErKERm2&lt;br /&gt;
        member = uusgrupp&lt;br /&gt;
}&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Autoriseermine===&lt;br /&gt;
&lt;br /&gt;
Autoriseerimine võimaldab keelata või lubada hallatavas võrguseadmes teatud käskude käivitamist. Need reeglid on omistatavad nii kasutajatele kui gruppidele. Reeglid on keelavad või lubavad.&lt;br /&gt;
&lt;br /&gt;
Lihtne näide, kus on loodud grupp &amp;quot;piiratud_ligip22s&amp;quot;, mille liikmetele on lubatud ligipääs vaid ruuterile IP-ga 172.16.1.103.&lt;br /&gt;
&lt;br /&gt;
Grupi liikmetel on keelatud käivitada käske &amp;quot;configure&amp;quot; ja &amp;quot;debug&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
acl = ruuter1_acl {&lt;br /&gt;
        permit = 172.16.1.103&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
group = piiratud_ligip22s {&lt;br /&gt;
        default service = permit&lt;br /&gt;
        login = file /etc/passwd&lt;br /&gt;
        enable = file /etc/passwd&lt;br /&gt;
        service = exec {&lt;br /&gt;
                priv-lvl = 15&lt;br /&gt;
                }&lt;br /&gt;
        cmd = configure {&lt;br /&gt;
                deny &amp;quot;.&amp;quot;&lt;br /&gt;
                }&lt;br /&gt;
        cmd = debug {&lt;br /&gt;
                deny &amp;quot;.&amp;quot;&lt;br /&gt;
                }&lt;br /&gt;
&lt;br /&gt;
        acl = ruuter1_acl&lt;br /&gt;
&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
user = uno {&lt;br /&gt;
        member = piiratud_ligip22s&lt;br /&gt;
}&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Cisco AAA seadistamine==&lt;br /&gt;
&lt;br /&gt;
Lihtsustatud AAA konfiguratsioon Cisco ruuteris&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
! luuakse uus AAA skeem, millega lubatakse sisestada allolevad käsud&lt;br /&gt;
aaa new-model&lt;br /&gt;
!&lt;br /&gt;
! Käsib seadmel iga sisse logiva kasutaja nime ja parooli valideerida TACACS+ serveri pihta&lt;br /&gt;
aaa authentication login default group tacacs+ enable&lt;br /&gt;
!&lt;br /&gt;
! Kui kasutaja on autoriseeritud, siis sisselogimisel viiakse ta kohe exec (enable) režiimi&lt;br /&gt;
aaa authorization exec default group tacacs+ if-authenticated&lt;br /&gt;
!&lt;br /&gt;
! Autoriseeritakse privilege level 15 kasutajaid ja kui TACACS+ server pole kättesaadav, siis kasutatakse lokaalset kasutajakontot&lt;br /&gt;
aaa authorization commands 15 default group tacacs+&lt;br /&gt;
!&lt;br /&gt;
! Salvestab aruandlust privilege level 15 kasutajate kohta:&lt;br /&gt;
aaa accounting commands 15 default start-stop group tacacs+&lt;br /&gt;
!&lt;br /&gt;
! TACACS+ serveri IP&lt;br /&gt;
tacacs-server host 172.16.1.100&lt;br /&gt;
!&lt;br /&gt;
! TACACS+ serveri võti&lt;br /&gt;
tacacs-server key y97A14T2#741zQ+&lt;br /&gt;
!&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Tõrkeotsing==&lt;br /&gt;
&lt;br /&gt;
Kontrollime, kas TACACS+ protsess jookseb:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
ps -ef | grep tac_plus&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Peale igat tac_plus.conf konfiguratsioonimuudatust, tuleb taaskäivitada TACACS+ teenus:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
/etc/init.d/tacacs_plus restart&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Kui teenus ei peaks pärast konfiguratsioonimuudatust käivituma,&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
 * Restarting TACACS+ authentication daemon tacacs+                                     [fail]&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
siis tuleb viga otsida tac_plus.conf failist.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Kasutatud allikad==&lt;br /&gt;
&lt;br /&gt;
http://en.gentoo-wiki.com/wiki/TACACS_Server_using_tac_plus&lt;br /&gt;
&lt;br /&gt;
http://www.stben.net/tacacs/users_guide.html&lt;br /&gt;
&lt;br /&gt;
http://www.debianhelp.co.uk/tacas.htm&lt;br /&gt;
&lt;br /&gt;
http://www.cisco.com/en/US/docs/switches/datacenter/nexus1000/sw/4_0/security/configuration/guide/security_4tacacs.html&lt;br /&gt;
&lt;br /&gt;
http://www.cisco.com/en/US/docs/ios/12_1/security/command/reference/srdathen.html&lt;/div&gt;</summary>
		<author><name>Mkurniko</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=TACACS%2B&amp;diff=60920</id>
		<title>TACACS+</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=TACACS%2B&amp;diff=60920"/>
		<updated>2013-01-13T08:44:15Z</updated>

		<summary type="html">&lt;p&gt;Mkurniko: /* Sissejuhatus */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Autor==&lt;br /&gt;
Margus Kurnikov AK21&lt;br /&gt;
&lt;br /&gt;
==Sissejuhatus==&lt;br /&gt;
&lt;br /&gt;
TACACS+ (Terminal Access Controller Access-Control System Plus) on võrguseadmete ligipääsukontrolli protokoll, mis hõlmab endas nii autentimise, autoriseerimise kui ka aruandluse (Authentication, Authorization and Accounting - AAA) teenuseid.&lt;br /&gt;
TACACS+ on kasulik võrguseadmete halduse korraldamisel, kuna teenus võimaldab võrguseadmete kasutajaid ja ligipääsuõigusi tsentraalselt hallata, ehk väldib olukorda, kus võrguadministraator peaks kümnetes/sadades seadmetes haldama seadmete lokaalseid kasutajakontosid. Piisab vaid igasse seadmesse lisada identne AAA konfitükk.&amp;lt;br&amp;gt;&lt;br /&gt;
Andmevahetuseks kasutatakse TCP porti 49.&amp;lt;br&amp;gt;&lt;br /&gt;
Erinevalt RADIUS&#039;st, mis on TACACS+ alternatiiv, eristab viimast autoriseerimise funktsionaalsuse lahutamine, mis võimaldab paindlikumat ligipääsukontrolli - kes võib käivitada käske, milliseid käske, millises seadmes. Iga kasutaja poolt sisestatud käsk saadetakse kesksesse TACACS+ serverisse autoriseerimiseks, kus kontrollitakse, kas vastavat käsku on lubatud käivitada konkreetsel kasutajal või grupil. TACACS+ on võimalik luua käskude käivitamisele näiteks kasutaja-, seadme-, või ajapõhiseid reegleid.&amp;lt;br&amp;gt;&lt;br /&gt;
TACACS+ protokolli tugi on olemas levinud suuremate tootjate võrguseadmetes - Cisco, Juniper/Netscreen, HP, Alcatel/Lucent, Ericsson jt.&lt;br /&gt;
&lt;br /&gt;
Antud kirjutises käsitlen lihtsaid TACACS+ seadistamisvõimalusi.&lt;br /&gt;
&lt;br /&gt;
==Paigaldamine==&lt;br /&gt;
&lt;br /&gt;
TACACS+ teenus paigaldatud Ubuntu 12.04-le.&amp;lt;br&amp;gt;&lt;br /&gt;
Testitava ruuterina kasutusel Cisco 1812.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
TACACS+ teenuse paigaldus:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;apt-get install tacacs+&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Teenuse seadistamine==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Konfiguratsioonifaili manual:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;man tac_plus.conf&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Aruandluse logifail:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;/var/log/tac_plus.acct&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
TACACS+ konfiguratsioonifaili asukoht:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;/etc/tacacs+/tac_plus.conf&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Algupärane konfiguratsioonifail: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
# Created by Henry-Nicolas Tourneur(henry.nicolas@tourneur.be)&lt;br /&gt;
# See man(5) tac_plus.conf for more details&lt;br /&gt;
&lt;br /&gt;
# Define where to log accounting data, this is the default.&lt;br /&gt;
&lt;br /&gt;
accounting file = /var/log/tac_plus.acct&lt;br /&gt;
&lt;br /&gt;
# This is the key that clients have to use to access Tacacs+&lt;br /&gt;
&lt;br /&gt;
key = testing123&lt;br /&gt;
&lt;br /&gt;
# Use /etc/passwd file to do authentication&lt;br /&gt;
    &lt;br /&gt;
#default authentication = file /etc/passwd&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
# You can use feature like per host key with different enable passwords&lt;br /&gt;
#host = 127.0.0.1 {&lt;br /&gt;
#        key = test &lt;br /&gt;
#        type = cisco&lt;br /&gt;
#        enable = &amp;lt;des|cleartext&amp;gt; enablepass&lt;br /&gt;
#        prompt = &amp;quot;Welcome XXX ISP Access Router \n\nUsername:&amp;quot;&lt;br /&gt;
#}&lt;br /&gt;
&lt;br /&gt;
# We also can define local users and specify a file where data is stored.&lt;br /&gt;
# That file may be filled using tac_pwd&lt;br /&gt;
#user = test1 {&lt;br /&gt;
#    name = &amp;quot;Test User&amp;quot;&lt;br /&gt;
#    member = staff&lt;br /&gt;
#    login = file /etc/tacacs/tacacs_passwords&lt;br /&gt;
#}&lt;br /&gt;
&lt;br /&gt;
# We can also specify rules valid per group of users.&lt;br /&gt;
#group = group1 {&lt;br /&gt;
#       cmd = conf {&lt;br /&gt;
#               deny&lt;br /&gt;
#       }&lt;br /&gt;
#}&lt;br /&gt;
&lt;br /&gt;
# Another example : forbid configure command for some hosts&lt;br /&gt;
# for a define range of clients&lt;br /&gt;
#group = group1 {&lt;br /&gt;
#       login = PAM&lt;br /&gt;
#       service = ppp&lt;br /&gt;
#       protocol = ip {&lt;br /&gt;
#               addr = 10.10.0.0/24&lt;br /&gt;
#       }&lt;br /&gt;
#       cmd = conf {&lt;br /&gt;
#               deny .*&lt;br /&gt;
#       }&lt;br /&gt;
#}&lt;br /&gt;
&lt;br /&gt;
user = DEFAULT {&lt;br /&gt;
        login = PAM&lt;br /&gt;
        service = ppp protocol = ip {}&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
# Much more features are availables, like ACL, more service compatibilities,&lt;br /&gt;
# commands authorization, scripting authorization.&lt;br /&gt;
# See the man page for those features.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Kasutajate autentimist on võimalik tac_plus&#039;s seadistada kolmel moel:&lt;br /&gt;
&lt;br /&gt;
* Autentimine lokaalse passwd faili alusel - /etc/passwd&lt;br /&gt;
* Autentimine /etc/tac_plus/tac_plus.conf faili lisatud DES salajaste võtmetega&lt;br /&gt;
* Autentimine PAM-ga LDAP serveri pihta&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Käsitlen kahte esimest varianti:&lt;br /&gt;
&lt;br /&gt;
===Autentimine passwd faili põhjal===&lt;br /&gt;
&lt;br /&gt;
Lisan TACACS+ võtme , mis tuleb ka hallatava(te)sse ruuteri(te)sse seadistada (sellest juttu edaspidi), kommenteerin välja rea, kus määratakse autentimisandmete allikaks /etc/passwd fail.&lt;br /&gt;
&lt;br /&gt;
Loon grupi &amp;quot;net_admins&amp;quot;, omistan Cisco kõrgeima ligipääsutaseme - privilege level 15. Kasutaja &amp;quot;margus&amp;quot; määran grupi &amp;quot;net_admins&amp;quot; liikmeks.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
key = y97A14T2#741zQ+&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
default authentication = file /etc/passwd&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
group = net_admins {&lt;br /&gt;
        default service = permit&lt;br /&gt;
        login = file /etc/passwd&lt;br /&gt;
        enable = file /etc/passwd&lt;br /&gt;
        service = exec {&lt;br /&gt;
                priv-lvl = 15&lt;br /&gt;
                }&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
user = margus {&lt;br /&gt;
        member = net_admins&lt;br /&gt;
}&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Autentimine DES salajase võtmega===&lt;br /&gt;
&lt;br /&gt;
Loon grupi &amp;quot;uusgrupp&amp;quot;, madalaima ligipääsutasemega - privilege level 0.&lt;br /&gt;
&lt;br /&gt;
Kasutaja &amp;quot;jaan&amp;quot; lisan loodud gruppi ja defineerin krüpteeritud parooli.&lt;br /&gt;
&lt;br /&gt;
Parooli krüpteerimiseks kasutan käsku &amp;lt;code&amp;gt;tac_pwd&amp;lt;/code&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
key = y97A14T2#741zQ+&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
group = uusgrupp {&lt;br /&gt;
        default service = permit &lt;br /&gt;
        service = exec {&lt;br /&gt;
                priv-lvl = 0&lt;br /&gt;
                }&lt;br /&gt;
}&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
user = jaan {&lt;br /&gt;
        login = des UT.e3EErKERm2&lt;br /&gt;
        member = uusgrupp&lt;br /&gt;
}&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Autoriseermine===&lt;br /&gt;
&lt;br /&gt;
Autoriseerimine võimaldab keelata või lubada hallatavas võrguseadmes teatud käskude käivitamist. Need reeglid on omistatavad nii kasutajatele kui gruppidele. Reeglid on keelavad või lubavad.&lt;br /&gt;
&lt;br /&gt;
Lihtne näide, kus on loodud grupp &amp;quot;piiratud_ligip22s&amp;quot;, mille liikmetele on lubatud ligipääs vaid ruuterile IP-ga 172.16.1.103.&lt;br /&gt;
&lt;br /&gt;
Grupi liikmetel on keelatud käivitada käske &amp;quot;configure&amp;quot; ja &amp;quot;debug&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
acl = ruuter1_acl {&lt;br /&gt;
        permit = 172.16.1.103&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
group = piiratud_ligip22s {&lt;br /&gt;
        default service = permit&lt;br /&gt;
        login = file /etc/passwd&lt;br /&gt;
        enable = file /etc/passwd&lt;br /&gt;
        service = exec {&lt;br /&gt;
                priv-lvl = 15&lt;br /&gt;
                }&lt;br /&gt;
        cmd = configure {&lt;br /&gt;
                deny &amp;quot;.&amp;quot;&lt;br /&gt;
                }&lt;br /&gt;
        cmd = debug {&lt;br /&gt;
                deny &amp;quot;.&amp;quot;&lt;br /&gt;
                }&lt;br /&gt;
&lt;br /&gt;
        acl = ruuter1_acl&lt;br /&gt;
&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
user = uno {&lt;br /&gt;
        member = piiratud_ligip22s&lt;br /&gt;
}&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Cisco AAA seadistamine==&lt;br /&gt;
&lt;br /&gt;
Lihtsustatud AAA konfiguratsioon Cisco ruuteris&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
! luuakse uus AAA skeem, millega lubatakse sisestada allolevad käsud&lt;br /&gt;
aaa new-model&lt;br /&gt;
!&lt;br /&gt;
! Käsib seadmel iga sisse logiva kasutaja nime ja parooli valideerida TACACS+ serveri pihta&lt;br /&gt;
aaa authentication login default group tacacs+ enable&lt;br /&gt;
!&lt;br /&gt;
! Kui kasutaja on autoriseeritud, siis sisselogimisel viiakse ta kohe exec (enable) režiimi&lt;br /&gt;
aaa authorization exec default group tacacs+ if-authenticated&lt;br /&gt;
!&lt;br /&gt;
! Autoriseeritakse privilege level 15 kasutajaid ja kui TACACS+ server pole kättesaadav, siis kasutatakse lokaalset kasutajakontot&lt;br /&gt;
aaa authorization commands 15 default group tacacs+&lt;br /&gt;
!&lt;br /&gt;
! Salvestab aruandlust privilege level 15 kasutajate kohta:&lt;br /&gt;
aaa accounting commands 15 default start-stop group tacacs+&lt;br /&gt;
!&lt;br /&gt;
! TACACS+ serveri IP&lt;br /&gt;
tacacs-server host 172.16.1.100&lt;br /&gt;
!&lt;br /&gt;
! TACACS+ serveri võti&lt;br /&gt;
tacacs-server key y97A14T2#741zQ+&lt;br /&gt;
!&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Tõrkeotsing==&lt;br /&gt;
&lt;br /&gt;
Kontrollime, kas TACACS+ protsess jookseb:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
ps -ef | grep tac_plus&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Peale igat tac_plus.conf konfiguratsioonimuudatust, tuleb taaskäivitada TACACS+ teenus:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
/etc/init.d/tacacs_plus restart&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Kui teenus ei peaks pärast konfiguratsioonimuudatust käivituma,&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
 * Restarting TACACS+ authentication daemon tacacs+                                     [fail]&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
siis tuleb viga otsida tac_plus.conf failist.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Kasutatud allikad==&lt;br /&gt;
&lt;br /&gt;
http://en.gentoo-wiki.com/wiki/TACACS_Server_using_tac_plus&lt;br /&gt;
&lt;br /&gt;
http://www.stben.net/tacacs/users_guide.html&lt;br /&gt;
&lt;br /&gt;
http://www.debianhelp.co.uk/tacas.htm&lt;br /&gt;
&lt;br /&gt;
http://www.cisco.com/en/US/docs/switches/datacenter/nexus1000/sw/4_0/security/configuration/guide/security_4tacacs.html&lt;br /&gt;
&lt;br /&gt;
http://www.cisco.com/en/US/docs/ios/12_1/security/command/reference/srdathen.html&lt;/div&gt;</summary>
		<author><name>Mkurniko</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=TACACS%2B&amp;diff=60919</id>
		<title>TACACS+</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=TACACS%2B&amp;diff=60919"/>
		<updated>2013-01-13T08:43:58Z</updated>

		<summary type="html">&lt;p&gt;Mkurniko: /* Sissejuhatus */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Autor==&lt;br /&gt;
Margus Kurnikov AK21&lt;br /&gt;
&lt;br /&gt;
==Sissejuhatus==&lt;br /&gt;
&lt;br /&gt;
TACACS+ (Terminal Access Controller Access-Control System Plus) on võrguseadmete ligipääsukontrolli protokoll, mis hõlmab endas nii autentimise, autoriseerimise kui ka aruandluse (Authentication, Authorization and Accounting - AAA) teenuseid.&lt;br /&gt;
TACACS+ on kasulik võrguseadmete halduse korraldamisel, kuna teenus võimaldab võrguseadmete kasutajaid ja ligipääsuõigusi tsentraalselt hallata, ehk väldib olukorda, kus võrguadministraator peaks kümnetes/sadades seadmetes haldama seadmete lokaalseid kasutajakontosid. Piisab vaid igasse seadmesse lisada identne AAA konfitükk.&lt;br /&gt;
Andmevahetuseks kasutatakse TCP porti 49.&amp;lt;br&amp;gt;&lt;br /&gt;
Erinevalt RADIUS&#039;st, mis on TACACS+ alternatiiv, eristab viimast autoriseerimise funktsionaalsuse lahutamine, mis võimaldab paindlikumat ligipääsukontrolli - kes võib käivitada käske, milliseid käske, millises seadmes. Iga kasutaja poolt sisestatud käsk saadetakse kesksesse TACACS+ serverisse autoriseerimiseks, kus kontrollitakse, kas vastavat käsku on lubatud käivitada konkreetsel kasutajal või grupil. TACACS+ on võimalik luua käskude käivitamisele näiteks kasutaja-, seadme-, või ajapõhiseid reegleid.&amp;lt;br&amp;gt;&lt;br /&gt;
TACACS+ protokolli tugi on olemas levinud suuremate tootjate võrguseadmetes - Cisco, Juniper/Netscreen, HP, Alcatel/Lucent, Ericsson jt.&lt;br /&gt;
&lt;br /&gt;
Antud kirjutises käsitlen lihtsaid TACACS+ seadistamisvõimalusi.&lt;br /&gt;
&lt;br /&gt;
==Paigaldamine==&lt;br /&gt;
&lt;br /&gt;
TACACS+ teenus paigaldatud Ubuntu 12.04-le.&amp;lt;br&amp;gt;&lt;br /&gt;
Testitava ruuterina kasutusel Cisco 1812.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
TACACS+ teenuse paigaldus:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;apt-get install tacacs+&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Teenuse seadistamine==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Konfiguratsioonifaili manual:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;man tac_plus.conf&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Aruandluse logifail:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;/var/log/tac_plus.acct&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
TACACS+ konfiguratsioonifaili asukoht:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;/etc/tacacs+/tac_plus.conf&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Algupärane konfiguratsioonifail: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
# Created by Henry-Nicolas Tourneur(henry.nicolas@tourneur.be)&lt;br /&gt;
# See man(5) tac_plus.conf for more details&lt;br /&gt;
&lt;br /&gt;
# Define where to log accounting data, this is the default.&lt;br /&gt;
&lt;br /&gt;
accounting file = /var/log/tac_plus.acct&lt;br /&gt;
&lt;br /&gt;
# This is the key that clients have to use to access Tacacs+&lt;br /&gt;
&lt;br /&gt;
key = testing123&lt;br /&gt;
&lt;br /&gt;
# Use /etc/passwd file to do authentication&lt;br /&gt;
    &lt;br /&gt;
#default authentication = file /etc/passwd&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
# You can use feature like per host key with different enable passwords&lt;br /&gt;
#host = 127.0.0.1 {&lt;br /&gt;
#        key = test &lt;br /&gt;
#        type = cisco&lt;br /&gt;
#        enable = &amp;lt;des|cleartext&amp;gt; enablepass&lt;br /&gt;
#        prompt = &amp;quot;Welcome XXX ISP Access Router \n\nUsername:&amp;quot;&lt;br /&gt;
#}&lt;br /&gt;
&lt;br /&gt;
# We also can define local users and specify a file where data is stored.&lt;br /&gt;
# That file may be filled using tac_pwd&lt;br /&gt;
#user = test1 {&lt;br /&gt;
#    name = &amp;quot;Test User&amp;quot;&lt;br /&gt;
#    member = staff&lt;br /&gt;
#    login = file /etc/tacacs/tacacs_passwords&lt;br /&gt;
#}&lt;br /&gt;
&lt;br /&gt;
# We can also specify rules valid per group of users.&lt;br /&gt;
#group = group1 {&lt;br /&gt;
#       cmd = conf {&lt;br /&gt;
#               deny&lt;br /&gt;
#       }&lt;br /&gt;
#}&lt;br /&gt;
&lt;br /&gt;
# Another example : forbid configure command for some hosts&lt;br /&gt;
# for a define range of clients&lt;br /&gt;
#group = group1 {&lt;br /&gt;
#       login = PAM&lt;br /&gt;
#       service = ppp&lt;br /&gt;
#       protocol = ip {&lt;br /&gt;
#               addr = 10.10.0.0/24&lt;br /&gt;
#       }&lt;br /&gt;
#       cmd = conf {&lt;br /&gt;
#               deny .*&lt;br /&gt;
#       }&lt;br /&gt;
#}&lt;br /&gt;
&lt;br /&gt;
user = DEFAULT {&lt;br /&gt;
        login = PAM&lt;br /&gt;
        service = ppp protocol = ip {}&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
# Much more features are availables, like ACL, more service compatibilities,&lt;br /&gt;
# commands authorization, scripting authorization.&lt;br /&gt;
# See the man page for those features.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Kasutajate autentimist on võimalik tac_plus&#039;s seadistada kolmel moel:&lt;br /&gt;
&lt;br /&gt;
* Autentimine lokaalse passwd faili alusel - /etc/passwd&lt;br /&gt;
* Autentimine /etc/tac_plus/tac_plus.conf faili lisatud DES salajaste võtmetega&lt;br /&gt;
* Autentimine PAM-ga LDAP serveri pihta&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Käsitlen kahte esimest varianti:&lt;br /&gt;
&lt;br /&gt;
===Autentimine passwd faili põhjal===&lt;br /&gt;
&lt;br /&gt;
Lisan TACACS+ võtme , mis tuleb ka hallatava(te)sse ruuteri(te)sse seadistada (sellest juttu edaspidi), kommenteerin välja rea, kus määratakse autentimisandmete allikaks /etc/passwd fail.&lt;br /&gt;
&lt;br /&gt;
Loon grupi &amp;quot;net_admins&amp;quot;, omistan Cisco kõrgeima ligipääsutaseme - privilege level 15. Kasutaja &amp;quot;margus&amp;quot; määran grupi &amp;quot;net_admins&amp;quot; liikmeks.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
key = y97A14T2#741zQ+&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
default authentication = file /etc/passwd&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
group = net_admins {&lt;br /&gt;
        default service = permit&lt;br /&gt;
        login = file /etc/passwd&lt;br /&gt;
        enable = file /etc/passwd&lt;br /&gt;
        service = exec {&lt;br /&gt;
                priv-lvl = 15&lt;br /&gt;
                }&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
user = margus {&lt;br /&gt;
        member = net_admins&lt;br /&gt;
}&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Autentimine DES salajase võtmega===&lt;br /&gt;
&lt;br /&gt;
Loon grupi &amp;quot;uusgrupp&amp;quot;, madalaima ligipääsutasemega - privilege level 0.&lt;br /&gt;
&lt;br /&gt;
Kasutaja &amp;quot;jaan&amp;quot; lisan loodud gruppi ja defineerin krüpteeritud parooli.&lt;br /&gt;
&lt;br /&gt;
Parooli krüpteerimiseks kasutan käsku &amp;lt;code&amp;gt;tac_pwd&amp;lt;/code&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
key = y97A14T2#741zQ+&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
group = uusgrupp {&lt;br /&gt;
        default service = permit &lt;br /&gt;
        service = exec {&lt;br /&gt;
                priv-lvl = 0&lt;br /&gt;
                }&lt;br /&gt;
}&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
user = jaan {&lt;br /&gt;
        login = des UT.e3EErKERm2&lt;br /&gt;
        member = uusgrupp&lt;br /&gt;
}&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Autoriseermine===&lt;br /&gt;
&lt;br /&gt;
Autoriseerimine võimaldab keelata või lubada hallatavas võrguseadmes teatud käskude käivitamist. Need reeglid on omistatavad nii kasutajatele kui gruppidele. Reeglid on keelavad või lubavad.&lt;br /&gt;
&lt;br /&gt;
Lihtne näide, kus on loodud grupp &amp;quot;piiratud_ligip22s&amp;quot;, mille liikmetele on lubatud ligipääs vaid ruuterile IP-ga 172.16.1.103.&lt;br /&gt;
&lt;br /&gt;
Grupi liikmetel on keelatud käivitada käske &amp;quot;configure&amp;quot; ja &amp;quot;debug&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
acl = ruuter1_acl {&lt;br /&gt;
        permit = 172.16.1.103&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
group = piiratud_ligip22s {&lt;br /&gt;
        default service = permit&lt;br /&gt;
        login = file /etc/passwd&lt;br /&gt;
        enable = file /etc/passwd&lt;br /&gt;
        service = exec {&lt;br /&gt;
                priv-lvl = 15&lt;br /&gt;
                }&lt;br /&gt;
        cmd = configure {&lt;br /&gt;
                deny &amp;quot;.&amp;quot;&lt;br /&gt;
                }&lt;br /&gt;
        cmd = debug {&lt;br /&gt;
                deny &amp;quot;.&amp;quot;&lt;br /&gt;
                }&lt;br /&gt;
&lt;br /&gt;
        acl = ruuter1_acl&lt;br /&gt;
&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
user = uno {&lt;br /&gt;
        member = piiratud_ligip22s&lt;br /&gt;
}&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Cisco AAA seadistamine==&lt;br /&gt;
&lt;br /&gt;
Lihtsustatud AAA konfiguratsioon Cisco ruuteris&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
! luuakse uus AAA skeem, millega lubatakse sisestada allolevad käsud&lt;br /&gt;
aaa new-model&lt;br /&gt;
!&lt;br /&gt;
! Käsib seadmel iga sisse logiva kasutaja nime ja parooli valideerida TACACS+ serveri pihta&lt;br /&gt;
aaa authentication login default group tacacs+ enable&lt;br /&gt;
!&lt;br /&gt;
! Kui kasutaja on autoriseeritud, siis sisselogimisel viiakse ta kohe exec (enable) režiimi&lt;br /&gt;
aaa authorization exec default group tacacs+ if-authenticated&lt;br /&gt;
!&lt;br /&gt;
! Autoriseeritakse privilege level 15 kasutajaid ja kui TACACS+ server pole kättesaadav, siis kasutatakse lokaalset kasutajakontot&lt;br /&gt;
aaa authorization commands 15 default group tacacs+&lt;br /&gt;
!&lt;br /&gt;
! Salvestab aruandlust privilege level 15 kasutajate kohta:&lt;br /&gt;
aaa accounting commands 15 default start-stop group tacacs+&lt;br /&gt;
!&lt;br /&gt;
! TACACS+ serveri IP&lt;br /&gt;
tacacs-server host 172.16.1.100&lt;br /&gt;
!&lt;br /&gt;
! TACACS+ serveri võti&lt;br /&gt;
tacacs-server key y97A14T2#741zQ+&lt;br /&gt;
!&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Tõrkeotsing==&lt;br /&gt;
&lt;br /&gt;
Kontrollime, kas TACACS+ protsess jookseb:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
ps -ef | grep tac_plus&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Peale igat tac_plus.conf konfiguratsioonimuudatust, tuleb taaskäivitada TACACS+ teenus:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
/etc/init.d/tacacs_plus restart&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Kui teenus ei peaks pärast konfiguratsioonimuudatust käivituma,&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
 * Restarting TACACS+ authentication daemon tacacs+                                     [fail]&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
siis tuleb viga otsida tac_plus.conf failist.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Kasutatud allikad==&lt;br /&gt;
&lt;br /&gt;
http://en.gentoo-wiki.com/wiki/TACACS_Server_using_tac_plus&lt;br /&gt;
&lt;br /&gt;
http://www.stben.net/tacacs/users_guide.html&lt;br /&gt;
&lt;br /&gt;
http://www.debianhelp.co.uk/tacas.htm&lt;br /&gt;
&lt;br /&gt;
http://www.cisco.com/en/US/docs/switches/datacenter/nexus1000/sw/4_0/security/configuration/guide/security_4tacacs.html&lt;br /&gt;
&lt;br /&gt;
http://www.cisco.com/en/US/docs/ios/12_1/security/command/reference/srdathen.html&lt;/div&gt;</summary>
		<author><name>Mkurniko</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=TACACS%2B&amp;diff=59544</id>
		<title>TACACS+</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=TACACS%2B&amp;diff=59544"/>
		<updated>2012-12-15T22:07:03Z</updated>

		<summary type="html">&lt;p&gt;Mkurniko: /* Sissejuhatus */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Autor==&lt;br /&gt;
Margus Kurnikov AK21&lt;br /&gt;
&lt;br /&gt;
==Sissejuhatus==&lt;br /&gt;
&lt;br /&gt;
TACACS+ (Terminal Access Controller Access-Control System Plus) on võrguseadmete ligipääsukontrolli protokoll, mis hõlmab endas nii autentimise, autoriseerimise kui ka aruandluse (Authentication, Authorization and Accounting - AAA) teenuseid. Andmevahetuseks kasutatakse TCP porti 49.&amp;lt;br&amp;gt;&lt;br /&gt;
Erinevalt RADIUS&#039;st, mis on TACACS+ alternatiiv, eristab viimast autoriseerimise funktsionaalsuse lahutamine, mis võimaldab paindlikumat ligipääsukontrolli - kes võib käivitada käske, milliseid käske, millises seadmes. Iga kasutaja poolt sisestatud käsk saadetakse kesksesse TACACS+ serverisse autoriseerimiseks, kus kontrollitakse, kas vastavat käsku on lubatud käivitada konkreetsel kasutajal või grupil. TACACS+ on võimalik luua käskude käivitamisele näiteks kasutaja-, seadme-, või ajapõhiseid reegleid.&amp;lt;br&amp;gt;&lt;br /&gt;
TACACS+ protokolli tugi on olemas levinud suuremate tootjate võrguseadmetes - Cisco, Juniper/Netscreen, HP, Alcatel/Lucent, Ericsson jt.&lt;br /&gt;
&lt;br /&gt;
Antud kirjutises käsitlen lihtsaid TACACS+ seadistamisvõimalusi.&lt;br /&gt;
&lt;br /&gt;
==Paigaldamine==&lt;br /&gt;
&lt;br /&gt;
TACACS+ teenus paigaldatud Ubuntu 12.04-le.&amp;lt;br&amp;gt;&lt;br /&gt;
Testitava ruuterina kasutusel Cisco 1812.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
TACACS+ teenuse paigaldus:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;apt-get install tacacs+&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Teenuse seadistamine==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Konfiguratsioonifaili manual:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;man tac_plus.conf&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Aruandluse logifail:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;/var/log/tac_plus.acct&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
TACACS+ konfiguratsioonifaili asukoht:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;/etc/tacacs+/tac_plus.conf&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Algupärane konfiguratsioonifail: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
# Created by Henry-Nicolas Tourneur(henry.nicolas@tourneur.be)&lt;br /&gt;
# See man(5) tac_plus.conf for more details&lt;br /&gt;
&lt;br /&gt;
# Define where to log accounting data, this is the default.&lt;br /&gt;
&lt;br /&gt;
accounting file = /var/log/tac_plus.acct&lt;br /&gt;
&lt;br /&gt;
# This is the key that clients have to use to access Tacacs+&lt;br /&gt;
&lt;br /&gt;
key = testing123&lt;br /&gt;
&lt;br /&gt;
# Use /etc/passwd file to do authentication&lt;br /&gt;
    &lt;br /&gt;
#default authentication = file /etc/passwd&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
# You can use feature like per host key with different enable passwords&lt;br /&gt;
#host = 127.0.0.1 {&lt;br /&gt;
#        key = test &lt;br /&gt;
#        type = cisco&lt;br /&gt;
#        enable = &amp;lt;des|cleartext&amp;gt; enablepass&lt;br /&gt;
#        prompt = &amp;quot;Welcome XXX ISP Access Router \n\nUsername:&amp;quot;&lt;br /&gt;
#}&lt;br /&gt;
&lt;br /&gt;
# We also can define local users and specify a file where data is stored.&lt;br /&gt;
# That file may be filled using tac_pwd&lt;br /&gt;
#user = test1 {&lt;br /&gt;
#    name = &amp;quot;Test User&amp;quot;&lt;br /&gt;
#    member = staff&lt;br /&gt;
#    login = file /etc/tacacs/tacacs_passwords&lt;br /&gt;
#}&lt;br /&gt;
&lt;br /&gt;
# We can also specify rules valid per group of users.&lt;br /&gt;
#group = group1 {&lt;br /&gt;
#       cmd = conf {&lt;br /&gt;
#               deny&lt;br /&gt;
#       }&lt;br /&gt;
#}&lt;br /&gt;
&lt;br /&gt;
# Another example : forbid configure command for some hosts&lt;br /&gt;
# for a define range of clients&lt;br /&gt;
#group = group1 {&lt;br /&gt;
#       login = PAM&lt;br /&gt;
#       service = ppp&lt;br /&gt;
#       protocol = ip {&lt;br /&gt;
#               addr = 10.10.0.0/24&lt;br /&gt;
#       }&lt;br /&gt;
#       cmd = conf {&lt;br /&gt;
#               deny .*&lt;br /&gt;
#       }&lt;br /&gt;
#}&lt;br /&gt;
&lt;br /&gt;
user = DEFAULT {&lt;br /&gt;
        login = PAM&lt;br /&gt;
        service = ppp protocol = ip {}&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
# Much more features are availables, like ACL, more service compatibilities,&lt;br /&gt;
# commands authorization, scripting authorization.&lt;br /&gt;
# See the man page for those features.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Kasutajate autentimist on võimalik tac_plus&#039;s seadistada kolmel moel:&lt;br /&gt;
&lt;br /&gt;
* Autentimine lokaalse passwd faili alusel - /etc/passwd&lt;br /&gt;
* Autentimine /etc/tac_plus/tac_plus.conf faili lisatud DES salajaste võtmetega&lt;br /&gt;
* Autentimine PAM-ga LDAP serveri pihta&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Käsitlen kahte esimest varianti:&lt;br /&gt;
&lt;br /&gt;
===Autentimine passwd faili põhjal===&lt;br /&gt;
&lt;br /&gt;
Lisan TACACS+ võtme , mis tuleb ka hallatava(te)sse ruuteri(te)sse seadistada (sellest juttu edaspidi), kommenteerin välja rea, kus määratakse autentimisandmete allikaks /etc/passwd fail.&lt;br /&gt;
&lt;br /&gt;
Loon grupi &amp;quot;net_admins&amp;quot;, omistan Cisco kõrgeima ligipääsutaseme - privilege level 15. Kasutaja &amp;quot;margus&amp;quot; määran grupi &amp;quot;net_admins&amp;quot; liikmeks.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
key = y97A14T2#741zQ+&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
default authentication = file /etc/passwd&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
group = net_admins {&lt;br /&gt;
        default service = permit&lt;br /&gt;
        login = file /etc/passwd&lt;br /&gt;
        enable = file /etc/passwd&lt;br /&gt;
        service = exec {&lt;br /&gt;
                priv-lvl = 15&lt;br /&gt;
                }&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
user = margus {&lt;br /&gt;
        member = net_admins&lt;br /&gt;
}&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Autentimine DES salajase võtmega===&lt;br /&gt;
&lt;br /&gt;
Loon grupi &amp;quot;uusgrupp&amp;quot;, madalaima ligipääsutasemega - privilege level 0.&lt;br /&gt;
&lt;br /&gt;
Kasutaja &amp;quot;jaan&amp;quot; lisan loodud gruppi ja defineerin krüpteeritud parooli.&lt;br /&gt;
&lt;br /&gt;
Parooli krüpteerimiseks kasutan käsku &amp;lt;code&amp;gt;tac_pwd&amp;lt;/code&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
key = y97A14T2#741zQ+&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
group = uusgrupp {&lt;br /&gt;
        default service = permit &lt;br /&gt;
        service = exec {&lt;br /&gt;
                priv-lvl = 0&lt;br /&gt;
                }&lt;br /&gt;
}&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
user = jaan {&lt;br /&gt;
        login = des UT.e3EErKERm2&lt;br /&gt;
        member = uusgrupp&lt;br /&gt;
}&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Autoriseermine===&lt;br /&gt;
&lt;br /&gt;
Autoriseerimine võimaldab keelata või lubada hallatavas võrguseadmes teatud käskude käivitamist. Need reeglid on omistatavad nii kasutajatele kui gruppidele. Reeglid on keelavad või lubavad.&lt;br /&gt;
&lt;br /&gt;
Lihtne näide, kus on loodud grupp &amp;quot;piiratud_ligip22s&amp;quot;, mille liikmetele on lubatud ligipääs vaid ruuterile IP-ga 172.16.1.103.&lt;br /&gt;
&lt;br /&gt;
Grupi liikmetel on keelatud käivitada käske &amp;quot;configure&amp;quot; ja &amp;quot;debug&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
acl = ruuter1_acl {&lt;br /&gt;
        permit = 172.16.1.103&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
group = piiratud_ligip22s {&lt;br /&gt;
        default service = permit&lt;br /&gt;
        login = file /etc/passwd&lt;br /&gt;
        enable = file /etc/passwd&lt;br /&gt;
        service = exec {&lt;br /&gt;
                priv-lvl = 15&lt;br /&gt;
                }&lt;br /&gt;
        cmd = configure {&lt;br /&gt;
                deny &amp;quot;.&amp;quot;&lt;br /&gt;
                }&lt;br /&gt;
        cmd = debug {&lt;br /&gt;
                deny &amp;quot;.&amp;quot;&lt;br /&gt;
                }&lt;br /&gt;
&lt;br /&gt;
        acl = ruuter1_acl&lt;br /&gt;
&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
user = uno {&lt;br /&gt;
        member = piiratud_ligip22s&lt;br /&gt;
}&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Cisco AAA seadistamine==&lt;br /&gt;
&lt;br /&gt;
Lihtsustatud AAA konfiguratsioon Cisco ruuteris&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
! luuakse uus AAA skeem, millega lubatakse sisestada allolevad käsud&lt;br /&gt;
aaa new-model&lt;br /&gt;
!&lt;br /&gt;
! Käsib seadmel iga sisse logiva kasutaja nime ja parooli valideerida TACACS+ serveri pihta&lt;br /&gt;
aaa authentication login default group tacacs+ enable&lt;br /&gt;
!&lt;br /&gt;
! Kui kasutaja on autoriseeritud, siis sisselogimisel viiakse ta kohe exec (enable) režiimi&lt;br /&gt;
aaa authorization exec default group tacacs+ if-authenticated&lt;br /&gt;
!&lt;br /&gt;
! Autoriseeritakse privilege level 15 kasutajaid ja kui TACACS+ server pole kättesaadav, siis kasutatakse lokaalset kasutajakontot&lt;br /&gt;
aaa authorization commands 15 default group tacacs+&lt;br /&gt;
!&lt;br /&gt;
! Salvestab aruandlust privilege level 15 kasutajate kohta:&lt;br /&gt;
aaa accounting commands 15 default start-stop group tacacs+&lt;br /&gt;
!&lt;br /&gt;
! TACACS+ serveri IP&lt;br /&gt;
tacacs-server host 172.16.1.100&lt;br /&gt;
!&lt;br /&gt;
! TACACS+ serveri võti&lt;br /&gt;
tacacs-server key y97A14T2#741zQ+&lt;br /&gt;
!&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Tõrkeotsing==&lt;br /&gt;
&lt;br /&gt;
Kontrollime, kas TACACS+ protsess jookseb:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
ps -ef | grep tac_plus&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Peale igat tac_plus.conf konfiguratsioonimuudatust, tuleb taaskäivitada TACACS+ teenus:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
/etc/init.d/tacacs_plus restart&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Kui teenus ei peaks pärast konfiguratsioonimuudatust käivituma,&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
 * Restarting TACACS+ authentication daemon tacacs+                                     [fail]&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
siis tuleb viga otsida tac_plus.conf failist.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Kasutatud allikad==&lt;br /&gt;
&lt;br /&gt;
http://en.gentoo-wiki.com/wiki/TACACS_Server_using_tac_plus&lt;br /&gt;
&lt;br /&gt;
http://www.stben.net/tacacs/users_guide.html&lt;br /&gt;
&lt;br /&gt;
http://www.debianhelp.co.uk/tacas.htm&lt;br /&gt;
&lt;br /&gt;
http://www.cisco.com/en/US/docs/switches/datacenter/nexus1000/sw/4_0/security/configuration/guide/security_4tacacs.html&lt;br /&gt;
&lt;br /&gt;
http://www.cisco.com/en/US/docs/ios/12_1/security/command/reference/srdathen.html&lt;/div&gt;</summary>
		<author><name>Mkurniko</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=TACACS%2B&amp;diff=59543</id>
		<title>TACACS+</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=TACACS%2B&amp;diff=59543"/>
		<updated>2012-12-15T22:04:23Z</updated>

		<summary type="html">&lt;p&gt;Mkurniko: /* Autoriseermine */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Autor==&lt;br /&gt;
Margus Kurnikov AK21&lt;br /&gt;
&lt;br /&gt;
==Sissejuhatus==&lt;br /&gt;
&lt;br /&gt;
TACACS+ (Terminal Access Controller Access-Control System Plus) on võrguseadmete ligipääsukontrolli protokoll, mis hõlmab endas nii autentimise, autoriseerimise kui ka aruandluse teenuseid. Andmevahetuseks kasutatakse TCP porti 49.&amp;lt;br&amp;gt;&lt;br /&gt;
Erinevalt RADIUS&#039;st, mis on TACACS+ alternatiiv, eristab viimast autoriseerimise funktsionaalsuse lahutamine, mis võimaldab paindlikumat ligipääsukontrolli - kes võib käivitada käske, milliseid käske, millises seadmes. Iga kasutaja poolt sisestatud käsk saadetakse kesksesse TACACS+ serverisse autoriseerimiseks, kus kontrollitakse, kas vastavat käsku on lubatud käivitada konkreetsel kasutajal või grupil. TACACS+ on võimalik luua käskude käivitamisele näiteks kasutaja-, seadme-, või ajapõhiseid reegleid.&amp;lt;br&amp;gt;&lt;br /&gt;
TACACS+ protokolli tugi on olemas levinud suuremate tootjate võrguseadmetes - Cisco, Juniper/Netscreen, HP, Alcatel/Lucent, Ericsson jt.&lt;br /&gt;
&lt;br /&gt;
Antud kirjutises käsitlen lihtsaid TACACS+ seadistamisvõimalusi.&lt;br /&gt;
&lt;br /&gt;
==Paigaldamine==&lt;br /&gt;
&lt;br /&gt;
TACACS+ teenus paigaldatud Ubuntu 12.04-le.&amp;lt;br&amp;gt;&lt;br /&gt;
Testitava ruuterina kasutusel Cisco 1812.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
TACACS+ teenuse paigaldus:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;apt-get install tacacs+&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Teenuse seadistamine==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Konfiguratsioonifaili manual:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;man tac_plus.conf&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Aruandluse logifail:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;/var/log/tac_plus.acct&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
TACACS+ konfiguratsioonifaili asukoht:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;/etc/tacacs+/tac_plus.conf&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Algupärane konfiguratsioonifail: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
# Created by Henry-Nicolas Tourneur(henry.nicolas@tourneur.be)&lt;br /&gt;
# See man(5) tac_plus.conf for more details&lt;br /&gt;
&lt;br /&gt;
# Define where to log accounting data, this is the default.&lt;br /&gt;
&lt;br /&gt;
accounting file = /var/log/tac_plus.acct&lt;br /&gt;
&lt;br /&gt;
# This is the key that clients have to use to access Tacacs+&lt;br /&gt;
&lt;br /&gt;
key = testing123&lt;br /&gt;
&lt;br /&gt;
# Use /etc/passwd file to do authentication&lt;br /&gt;
    &lt;br /&gt;
#default authentication = file /etc/passwd&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
# You can use feature like per host key with different enable passwords&lt;br /&gt;
#host = 127.0.0.1 {&lt;br /&gt;
#        key = test &lt;br /&gt;
#        type = cisco&lt;br /&gt;
#        enable = &amp;lt;des|cleartext&amp;gt; enablepass&lt;br /&gt;
#        prompt = &amp;quot;Welcome XXX ISP Access Router \n\nUsername:&amp;quot;&lt;br /&gt;
#}&lt;br /&gt;
&lt;br /&gt;
# We also can define local users and specify a file where data is stored.&lt;br /&gt;
# That file may be filled using tac_pwd&lt;br /&gt;
#user = test1 {&lt;br /&gt;
#    name = &amp;quot;Test User&amp;quot;&lt;br /&gt;
#    member = staff&lt;br /&gt;
#    login = file /etc/tacacs/tacacs_passwords&lt;br /&gt;
#}&lt;br /&gt;
&lt;br /&gt;
# We can also specify rules valid per group of users.&lt;br /&gt;
#group = group1 {&lt;br /&gt;
#       cmd = conf {&lt;br /&gt;
#               deny&lt;br /&gt;
#       }&lt;br /&gt;
#}&lt;br /&gt;
&lt;br /&gt;
# Another example : forbid configure command for some hosts&lt;br /&gt;
# for a define range of clients&lt;br /&gt;
#group = group1 {&lt;br /&gt;
#       login = PAM&lt;br /&gt;
#       service = ppp&lt;br /&gt;
#       protocol = ip {&lt;br /&gt;
#               addr = 10.10.0.0/24&lt;br /&gt;
#       }&lt;br /&gt;
#       cmd = conf {&lt;br /&gt;
#               deny .*&lt;br /&gt;
#       }&lt;br /&gt;
#}&lt;br /&gt;
&lt;br /&gt;
user = DEFAULT {&lt;br /&gt;
        login = PAM&lt;br /&gt;
        service = ppp protocol = ip {}&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
# Much more features are availables, like ACL, more service compatibilities,&lt;br /&gt;
# commands authorization, scripting authorization.&lt;br /&gt;
# See the man page for those features.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Kasutajate autentimist on võimalik tac_plus&#039;s seadistada kolmel moel:&lt;br /&gt;
&lt;br /&gt;
* Autentimine lokaalse passwd faili alusel - /etc/passwd&lt;br /&gt;
* Autentimine /etc/tac_plus/tac_plus.conf faili lisatud DES salajaste võtmetega&lt;br /&gt;
* Autentimine PAM-ga LDAP serveri pihta&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Käsitlen kahte esimest varianti:&lt;br /&gt;
&lt;br /&gt;
===Autentimine passwd faili põhjal===&lt;br /&gt;
&lt;br /&gt;
Lisan TACACS+ võtme , mis tuleb ka hallatava(te)sse ruuteri(te)sse seadistada (sellest juttu edaspidi), kommenteerin välja rea, kus määratakse autentimisandmete allikaks /etc/passwd fail.&lt;br /&gt;
&lt;br /&gt;
Loon grupi &amp;quot;net_admins&amp;quot;, omistan Cisco kõrgeima ligipääsutaseme - privilege level 15. Kasutaja &amp;quot;margus&amp;quot; määran grupi &amp;quot;net_admins&amp;quot; liikmeks.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
key = y97A14T2#741zQ+&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
default authentication = file /etc/passwd&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
group = net_admins {&lt;br /&gt;
        default service = permit&lt;br /&gt;
        login = file /etc/passwd&lt;br /&gt;
        enable = file /etc/passwd&lt;br /&gt;
        service = exec {&lt;br /&gt;
                priv-lvl = 15&lt;br /&gt;
                }&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
user = margus {&lt;br /&gt;
        member = net_admins&lt;br /&gt;
}&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Autentimine DES salajase võtmega===&lt;br /&gt;
&lt;br /&gt;
Loon grupi &amp;quot;uusgrupp&amp;quot;, madalaima ligipääsutasemega - privilege level 0.&lt;br /&gt;
&lt;br /&gt;
Kasutaja &amp;quot;jaan&amp;quot; lisan loodud gruppi ja defineerin krüpteeritud parooli.&lt;br /&gt;
&lt;br /&gt;
Parooli krüpteerimiseks kasutan käsku &amp;lt;code&amp;gt;tac_pwd&amp;lt;/code&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
key = y97A14T2#741zQ+&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
group = uusgrupp {&lt;br /&gt;
        default service = permit &lt;br /&gt;
        service = exec {&lt;br /&gt;
                priv-lvl = 0&lt;br /&gt;
                }&lt;br /&gt;
}&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
user = jaan {&lt;br /&gt;
        login = des UT.e3EErKERm2&lt;br /&gt;
        member = uusgrupp&lt;br /&gt;
}&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Autoriseermine===&lt;br /&gt;
&lt;br /&gt;
Autoriseerimine võimaldab keelata või lubada hallatavas võrguseadmes teatud käskude käivitamist. Need reeglid on omistatavad nii kasutajatele kui gruppidele. Reeglid on keelavad või lubavad.&lt;br /&gt;
&lt;br /&gt;
Lihtne näide, kus on loodud grupp &amp;quot;piiratud_ligip22s&amp;quot;, mille liikmetele on lubatud ligipääs vaid ruuterile IP-ga 172.16.1.103.&lt;br /&gt;
&lt;br /&gt;
Grupi liikmetel on keelatud käivitada käske &amp;quot;configure&amp;quot; ja &amp;quot;debug&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
acl = ruuter1_acl {&lt;br /&gt;
        permit = 172.16.1.103&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
group = piiratud_ligip22s {&lt;br /&gt;
        default service = permit&lt;br /&gt;
        login = file /etc/passwd&lt;br /&gt;
        enable = file /etc/passwd&lt;br /&gt;
        service = exec {&lt;br /&gt;
                priv-lvl = 15&lt;br /&gt;
                }&lt;br /&gt;
        cmd = configure {&lt;br /&gt;
                deny &amp;quot;.&amp;quot;&lt;br /&gt;
                }&lt;br /&gt;
        cmd = debug {&lt;br /&gt;
                deny &amp;quot;.&amp;quot;&lt;br /&gt;
                }&lt;br /&gt;
&lt;br /&gt;
        acl = ruuter1_acl&lt;br /&gt;
&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
user = uno {&lt;br /&gt;
        member = piiratud_ligip22s&lt;br /&gt;
}&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Cisco AAA seadistamine==&lt;br /&gt;
&lt;br /&gt;
Lihtsustatud AAA konfiguratsioon Cisco ruuteris&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
! luuakse uus AAA skeem, millega lubatakse sisestada allolevad käsud&lt;br /&gt;
aaa new-model&lt;br /&gt;
!&lt;br /&gt;
! Käsib seadmel iga sisse logiva kasutaja nime ja parooli valideerida TACACS+ serveri pihta&lt;br /&gt;
aaa authentication login default group tacacs+ enable&lt;br /&gt;
!&lt;br /&gt;
! Kui kasutaja on autoriseeritud, siis sisselogimisel viiakse ta kohe exec (enable) režiimi&lt;br /&gt;
aaa authorization exec default group tacacs+ if-authenticated&lt;br /&gt;
!&lt;br /&gt;
! Autoriseeritakse privilege level 15 kasutajaid ja kui TACACS+ server pole kättesaadav, siis kasutatakse lokaalset kasutajakontot&lt;br /&gt;
aaa authorization commands 15 default group tacacs+&lt;br /&gt;
!&lt;br /&gt;
! Salvestab aruandlust privilege level 15 kasutajate kohta:&lt;br /&gt;
aaa accounting commands 15 default start-stop group tacacs+&lt;br /&gt;
!&lt;br /&gt;
! TACACS+ serveri IP&lt;br /&gt;
tacacs-server host 172.16.1.100&lt;br /&gt;
!&lt;br /&gt;
! TACACS+ serveri võti&lt;br /&gt;
tacacs-server key y97A14T2#741zQ+&lt;br /&gt;
!&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Tõrkeotsing==&lt;br /&gt;
&lt;br /&gt;
Kontrollime, kas TACACS+ protsess jookseb:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
ps -ef | grep tac_plus&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Peale igat tac_plus.conf konfiguratsioonimuudatust, tuleb taaskäivitada TACACS+ teenus:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
/etc/init.d/tacacs_plus restart&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Kui teenus ei peaks pärast konfiguratsioonimuudatust käivituma,&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
 * Restarting TACACS+ authentication daemon tacacs+                                     [fail]&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
siis tuleb viga otsida tac_plus.conf failist.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Kasutatud allikad==&lt;br /&gt;
&lt;br /&gt;
http://en.gentoo-wiki.com/wiki/TACACS_Server_using_tac_plus&lt;br /&gt;
&lt;br /&gt;
http://www.stben.net/tacacs/users_guide.html&lt;br /&gt;
&lt;br /&gt;
http://www.debianhelp.co.uk/tacas.htm&lt;br /&gt;
&lt;br /&gt;
http://www.cisco.com/en/US/docs/switches/datacenter/nexus1000/sw/4_0/security/configuration/guide/security_4tacacs.html&lt;br /&gt;
&lt;br /&gt;
http://www.cisco.com/en/US/docs/ios/12_1/security/command/reference/srdathen.html&lt;/div&gt;</summary>
		<author><name>Mkurniko</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=TACACS%2B&amp;diff=59541</id>
		<title>TACACS+</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=TACACS%2B&amp;diff=59541"/>
		<updated>2012-12-15T22:03:50Z</updated>

		<summary type="html">&lt;p&gt;Mkurniko: /* Autoriseermine */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Autor==&lt;br /&gt;
Margus Kurnikov AK21&lt;br /&gt;
&lt;br /&gt;
==Sissejuhatus==&lt;br /&gt;
&lt;br /&gt;
TACACS+ (Terminal Access Controller Access-Control System Plus) on võrguseadmete ligipääsukontrolli protokoll, mis hõlmab endas nii autentimise, autoriseerimise kui ka aruandluse teenuseid. Andmevahetuseks kasutatakse TCP porti 49.&amp;lt;br&amp;gt;&lt;br /&gt;
Erinevalt RADIUS&#039;st, mis on TACACS+ alternatiiv, eristab viimast autoriseerimise funktsionaalsuse lahutamine, mis võimaldab paindlikumat ligipääsukontrolli - kes võib käivitada käske, milliseid käske, millises seadmes. Iga kasutaja poolt sisestatud käsk saadetakse kesksesse TACACS+ serverisse autoriseerimiseks, kus kontrollitakse, kas vastavat käsku on lubatud käivitada konkreetsel kasutajal või grupil. TACACS+ on võimalik luua käskude käivitamisele näiteks kasutaja-, seadme-, või ajapõhiseid reegleid.&amp;lt;br&amp;gt;&lt;br /&gt;
TACACS+ protokolli tugi on olemas levinud suuremate tootjate võrguseadmetes - Cisco, Juniper/Netscreen, HP, Alcatel/Lucent, Ericsson jt.&lt;br /&gt;
&lt;br /&gt;
Antud kirjutises käsitlen lihtsaid TACACS+ seadistamisvõimalusi.&lt;br /&gt;
&lt;br /&gt;
==Paigaldamine==&lt;br /&gt;
&lt;br /&gt;
TACACS+ teenus paigaldatud Ubuntu 12.04-le.&amp;lt;br&amp;gt;&lt;br /&gt;
Testitava ruuterina kasutusel Cisco 1812.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
TACACS+ teenuse paigaldus:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;apt-get install tacacs+&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Teenuse seadistamine==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Konfiguratsioonifaili manual:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;man tac_plus.conf&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Aruandluse logifail:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;/var/log/tac_plus.acct&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
TACACS+ konfiguratsioonifaili asukoht:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;/etc/tacacs+/tac_plus.conf&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Algupärane konfiguratsioonifail: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
# Created by Henry-Nicolas Tourneur(henry.nicolas@tourneur.be)&lt;br /&gt;
# See man(5) tac_plus.conf for more details&lt;br /&gt;
&lt;br /&gt;
# Define where to log accounting data, this is the default.&lt;br /&gt;
&lt;br /&gt;
accounting file = /var/log/tac_plus.acct&lt;br /&gt;
&lt;br /&gt;
# This is the key that clients have to use to access Tacacs+&lt;br /&gt;
&lt;br /&gt;
key = testing123&lt;br /&gt;
&lt;br /&gt;
# Use /etc/passwd file to do authentication&lt;br /&gt;
    &lt;br /&gt;
#default authentication = file /etc/passwd&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
# You can use feature like per host key with different enable passwords&lt;br /&gt;
#host = 127.0.0.1 {&lt;br /&gt;
#        key = test &lt;br /&gt;
#        type = cisco&lt;br /&gt;
#        enable = &amp;lt;des|cleartext&amp;gt; enablepass&lt;br /&gt;
#        prompt = &amp;quot;Welcome XXX ISP Access Router \n\nUsername:&amp;quot;&lt;br /&gt;
#}&lt;br /&gt;
&lt;br /&gt;
# We also can define local users and specify a file where data is stored.&lt;br /&gt;
# That file may be filled using tac_pwd&lt;br /&gt;
#user = test1 {&lt;br /&gt;
#    name = &amp;quot;Test User&amp;quot;&lt;br /&gt;
#    member = staff&lt;br /&gt;
#    login = file /etc/tacacs/tacacs_passwords&lt;br /&gt;
#}&lt;br /&gt;
&lt;br /&gt;
# We can also specify rules valid per group of users.&lt;br /&gt;
#group = group1 {&lt;br /&gt;
#       cmd = conf {&lt;br /&gt;
#               deny&lt;br /&gt;
#       }&lt;br /&gt;
#}&lt;br /&gt;
&lt;br /&gt;
# Another example : forbid configure command for some hosts&lt;br /&gt;
# for a define range of clients&lt;br /&gt;
#group = group1 {&lt;br /&gt;
#       login = PAM&lt;br /&gt;
#       service = ppp&lt;br /&gt;
#       protocol = ip {&lt;br /&gt;
#               addr = 10.10.0.0/24&lt;br /&gt;
#       }&lt;br /&gt;
#       cmd = conf {&lt;br /&gt;
#               deny .*&lt;br /&gt;
#       }&lt;br /&gt;
#}&lt;br /&gt;
&lt;br /&gt;
user = DEFAULT {&lt;br /&gt;
        login = PAM&lt;br /&gt;
        service = ppp protocol = ip {}&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
# Much more features are availables, like ACL, more service compatibilities,&lt;br /&gt;
# commands authorization, scripting authorization.&lt;br /&gt;
# See the man page for those features.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Kasutajate autentimist on võimalik tac_plus&#039;s seadistada kolmel moel:&lt;br /&gt;
&lt;br /&gt;
* Autentimine lokaalse passwd faili alusel - /etc/passwd&lt;br /&gt;
* Autentimine /etc/tac_plus/tac_plus.conf faili lisatud DES salajaste võtmetega&lt;br /&gt;
* Autentimine PAM-ga LDAP serveri pihta&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Käsitlen kahte esimest varianti:&lt;br /&gt;
&lt;br /&gt;
===Autentimine passwd faili põhjal===&lt;br /&gt;
&lt;br /&gt;
Lisan TACACS+ võtme , mis tuleb ka hallatava(te)sse ruuteri(te)sse seadistada (sellest juttu edaspidi), kommenteerin välja rea, kus määratakse autentimisandmete allikaks /etc/passwd fail.&lt;br /&gt;
&lt;br /&gt;
Loon grupi &amp;quot;net_admins&amp;quot;, omistan Cisco kõrgeima ligipääsutaseme - privilege level 15. Kasutaja &amp;quot;margus&amp;quot; määran grupi &amp;quot;net_admins&amp;quot; liikmeks.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
key = y97A14T2#741zQ+&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
default authentication = file /etc/passwd&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
group = net_admins {&lt;br /&gt;
        default service = permit&lt;br /&gt;
        login = file /etc/passwd&lt;br /&gt;
        enable = file /etc/passwd&lt;br /&gt;
        service = exec {&lt;br /&gt;
                priv-lvl = 15&lt;br /&gt;
                }&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
user = margus {&lt;br /&gt;
        member = net_admins&lt;br /&gt;
}&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Autentimine DES salajase võtmega===&lt;br /&gt;
&lt;br /&gt;
Loon grupi &amp;quot;uusgrupp&amp;quot;, madalaima ligipääsutasemega - privilege level 0.&lt;br /&gt;
&lt;br /&gt;
Kasutaja &amp;quot;jaan&amp;quot; lisan loodud gruppi ja defineerin krüpteeritud parooli.&lt;br /&gt;
&lt;br /&gt;
Parooli krüpteerimiseks kasutan käsku &amp;lt;code&amp;gt;tac_pwd&amp;lt;/code&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
key = y97A14T2#741zQ+&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
group = uusgrupp {&lt;br /&gt;
        default service = permit &lt;br /&gt;
        service = exec {&lt;br /&gt;
                priv-lvl = 0&lt;br /&gt;
                }&lt;br /&gt;
}&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
user = jaan {&lt;br /&gt;
        login = des UT.e3EErKERm2&lt;br /&gt;
        member = uusgrupp&lt;br /&gt;
}&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Autoriseermine===&lt;br /&gt;
&lt;br /&gt;
Autoriseerimine võimaldab keelata või lubada hallatavas võrguseadmes teatud käskude käivitamist. Need reeglid on omistatavad nii kasutajatele kui gruppidele. Reeglid on keelavad või lubavad.&lt;br /&gt;
&lt;br /&gt;
Lihtne näide, kus on loodud grupp &amp;quot;piiratud_ligip22s&amp;quot;, mille liikmetele on lubatud ligipääs vaid ruuterile IP-ga 172.16.1.103.&lt;br /&gt;
&lt;br /&gt;
Grupi liikmetel on keelatud käivitada käske &amp;quot;configure&amp;quot; ega &amp;quot;debug&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
acl = ruuter1_acl {&lt;br /&gt;
        permit = 172.16.1.103&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
group = piiratud_ligip22s {&lt;br /&gt;
        default service = permit&lt;br /&gt;
        login = file /etc/passwd&lt;br /&gt;
        enable = file /etc/passwd&lt;br /&gt;
        service = exec {&lt;br /&gt;
                priv-lvl = 15&lt;br /&gt;
                }&lt;br /&gt;
        cmd = configure {&lt;br /&gt;
                deny &amp;quot;.&amp;quot;&lt;br /&gt;
                }&lt;br /&gt;
        cmd = debug {&lt;br /&gt;
                deny &amp;quot;.&amp;quot;&lt;br /&gt;
                }&lt;br /&gt;
&lt;br /&gt;
        acl = ruuter1_acl&lt;br /&gt;
&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
user = uno {&lt;br /&gt;
        member = piiratud_ligip22s&lt;br /&gt;
}&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Cisco AAA seadistamine==&lt;br /&gt;
&lt;br /&gt;
Lihtsustatud AAA konfiguratsioon Cisco ruuteris&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
! luuakse uus AAA skeem, millega lubatakse sisestada allolevad käsud&lt;br /&gt;
aaa new-model&lt;br /&gt;
!&lt;br /&gt;
! Käsib seadmel iga sisse logiva kasutaja nime ja parooli valideerida TACACS+ serveri pihta&lt;br /&gt;
aaa authentication login default group tacacs+ enable&lt;br /&gt;
!&lt;br /&gt;
! Kui kasutaja on autoriseeritud, siis sisselogimisel viiakse ta kohe exec (enable) režiimi&lt;br /&gt;
aaa authorization exec default group tacacs+ if-authenticated&lt;br /&gt;
!&lt;br /&gt;
! Autoriseeritakse privilege level 15 kasutajaid ja kui TACACS+ server pole kättesaadav, siis kasutatakse lokaalset kasutajakontot&lt;br /&gt;
aaa authorization commands 15 default group tacacs+&lt;br /&gt;
!&lt;br /&gt;
! Salvestab aruandlust privilege level 15 kasutajate kohta:&lt;br /&gt;
aaa accounting commands 15 default start-stop group tacacs+&lt;br /&gt;
!&lt;br /&gt;
! TACACS+ serveri IP&lt;br /&gt;
tacacs-server host 172.16.1.100&lt;br /&gt;
!&lt;br /&gt;
! TACACS+ serveri võti&lt;br /&gt;
tacacs-server key y97A14T2#741zQ+&lt;br /&gt;
!&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Tõrkeotsing==&lt;br /&gt;
&lt;br /&gt;
Kontrollime, kas TACACS+ protsess jookseb:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
ps -ef | grep tac_plus&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Peale igat tac_plus.conf konfiguratsioonimuudatust, tuleb taaskäivitada TACACS+ teenus:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
/etc/init.d/tacacs_plus restart&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Kui teenus ei peaks pärast konfiguratsioonimuudatust käivituma,&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
 * Restarting TACACS+ authentication daemon tacacs+                                     [fail]&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
siis tuleb viga otsida tac_plus.conf failist.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Kasutatud allikad==&lt;br /&gt;
&lt;br /&gt;
http://en.gentoo-wiki.com/wiki/TACACS_Server_using_tac_plus&lt;br /&gt;
&lt;br /&gt;
http://www.stben.net/tacacs/users_guide.html&lt;br /&gt;
&lt;br /&gt;
http://www.debianhelp.co.uk/tacas.htm&lt;br /&gt;
&lt;br /&gt;
http://www.cisco.com/en/US/docs/switches/datacenter/nexus1000/sw/4_0/security/configuration/guide/security_4tacacs.html&lt;br /&gt;
&lt;br /&gt;
http://www.cisco.com/en/US/docs/ios/12_1/security/command/reference/srdathen.html&lt;/div&gt;</summary>
		<author><name>Mkurniko</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=TACACS%2B&amp;diff=59540</id>
		<title>TACACS+</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=TACACS%2B&amp;diff=59540"/>
		<updated>2012-12-15T22:02:56Z</updated>

		<summary type="html">&lt;p&gt;Mkurniko: /* Autentimine passwd faili põhjal */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Autor==&lt;br /&gt;
Margus Kurnikov AK21&lt;br /&gt;
&lt;br /&gt;
==Sissejuhatus==&lt;br /&gt;
&lt;br /&gt;
TACACS+ (Terminal Access Controller Access-Control System Plus) on võrguseadmete ligipääsukontrolli protokoll, mis hõlmab endas nii autentimise, autoriseerimise kui ka aruandluse teenuseid. Andmevahetuseks kasutatakse TCP porti 49.&amp;lt;br&amp;gt;&lt;br /&gt;
Erinevalt RADIUS&#039;st, mis on TACACS+ alternatiiv, eristab viimast autoriseerimise funktsionaalsuse lahutamine, mis võimaldab paindlikumat ligipääsukontrolli - kes võib käivitada käske, milliseid käske, millises seadmes. Iga kasutaja poolt sisestatud käsk saadetakse kesksesse TACACS+ serverisse autoriseerimiseks, kus kontrollitakse, kas vastavat käsku on lubatud käivitada konkreetsel kasutajal või grupil. TACACS+ on võimalik luua käskude käivitamisele näiteks kasutaja-, seadme-, või ajapõhiseid reegleid.&amp;lt;br&amp;gt;&lt;br /&gt;
TACACS+ protokolli tugi on olemas levinud suuremate tootjate võrguseadmetes - Cisco, Juniper/Netscreen, HP, Alcatel/Lucent, Ericsson jt.&lt;br /&gt;
&lt;br /&gt;
Antud kirjutises käsitlen lihtsaid TACACS+ seadistamisvõimalusi.&lt;br /&gt;
&lt;br /&gt;
==Paigaldamine==&lt;br /&gt;
&lt;br /&gt;
TACACS+ teenus paigaldatud Ubuntu 12.04-le.&amp;lt;br&amp;gt;&lt;br /&gt;
Testitava ruuterina kasutusel Cisco 1812.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
TACACS+ teenuse paigaldus:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;apt-get install tacacs+&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Teenuse seadistamine==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Konfiguratsioonifaili manual:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;man tac_plus.conf&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Aruandluse logifail:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;/var/log/tac_plus.acct&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
TACACS+ konfiguratsioonifaili asukoht:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;/etc/tacacs+/tac_plus.conf&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Algupärane konfiguratsioonifail: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
# Created by Henry-Nicolas Tourneur(henry.nicolas@tourneur.be)&lt;br /&gt;
# See man(5) tac_plus.conf for more details&lt;br /&gt;
&lt;br /&gt;
# Define where to log accounting data, this is the default.&lt;br /&gt;
&lt;br /&gt;
accounting file = /var/log/tac_plus.acct&lt;br /&gt;
&lt;br /&gt;
# This is the key that clients have to use to access Tacacs+&lt;br /&gt;
&lt;br /&gt;
key = testing123&lt;br /&gt;
&lt;br /&gt;
# Use /etc/passwd file to do authentication&lt;br /&gt;
    &lt;br /&gt;
#default authentication = file /etc/passwd&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
# You can use feature like per host key with different enable passwords&lt;br /&gt;
#host = 127.0.0.1 {&lt;br /&gt;
#        key = test &lt;br /&gt;
#        type = cisco&lt;br /&gt;
#        enable = &amp;lt;des|cleartext&amp;gt; enablepass&lt;br /&gt;
#        prompt = &amp;quot;Welcome XXX ISP Access Router \n\nUsername:&amp;quot;&lt;br /&gt;
#}&lt;br /&gt;
&lt;br /&gt;
# We also can define local users and specify a file where data is stored.&lt;br /&gt;
# That file may be filled using tac_pwd&lt;br /&gt;
#user = test1 {&lt;br /&gt;
#    name = &amp;quot;Test User&amp;quot;&lt;br /&gt;
#    member = staff&lt;br /&gt;
#    login = file /etc/tacacs/tacacs_passwords&lt;br /&gt;
#}&lt;br /&gt;
&lt;br /&gt;
# We can also specify rules valid per group of users.&lt;br /&gt;
#group = group1 {&lt;br /&gt;
#       cmd = conf {&lt;br /&gt;
#               deny&lt;br /&gt;
#       }&lt;br /&gt;
#}&lt;br /&gt;
&lt;br /&gt;
# Another example : forbid configure command for some hosts&lt;br /&gt;
# for a define range of clients&lt;br /&gt;
#group = group1 {&lt;br /&gt;
#       login = PAM&lt;br /&gt;
#       service = ppp&lt;br /&gt;
#       protocol = ip {&lt;br /&gt;
#               addr = 10.10.0.0/24&lt;br /&gt;
#       }&lt;br /&gt;
#       cmd = conf {&lt;br /&gt;
#               deny .*&lt;br /&gt;
#       }&lt;br /&gt;
#}&lt;br /&gt;
&lt;br /&gt;
user = DEFAULT {&lt;br /&gt;
        login = PAM&lt;br /&gt;
        service = ppp protocol = ip {}&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
# Much more features are availables, like ACL, more service compatibilities,&lt;br /&gt;
# commands authorization, scripting authorization.&lt;br /&gt;
# See the man page for those features.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Kasutajate autentimist on võimalik tac_plus&#039;s seadistada kolmel moel:&lt;br /&gt;
&lt;br /&gt;
* Autentimine lokaalse passwd faili alusel - /etc/passwd&lt;br /&gt;
* Autentimine /etc/tac_plus/tac_plus.conf faili lisatud DES salajaste võtmetega&lt;br /&gt;
* Autentimine PAM-ga LDAP serveri pihta&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Käsitlen kahte esimest varianti:&lt;br /&gt;
&lt;br /&gt;
===Autentimine passwd faili põhjal===&lt;br /&gt;
&lt;br /&gt;
Lisan TACACS+ võtme , mis tuleb ka hallatava(te)sse ruuteri(te)sse seadistada (sellest juttu edaspidi), kommenteerin välja rea, kus määratakse autentimisandmete allikaks /etc/passwd fail.&lt;br /&gt;
&lt;br /&gt;
Loon grupi &amp;quot;net_admins&amp;quot;, omistan Cisco kõrgeima ligipääsutaseme - privilege level 15. Kasutaja &amp;quot;margus&amp;quot; määran grupi &amp;quot;net_admins&amp;quot; liikmeks.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
key = y97A14T2#741zQ+&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
default authentication = file /etc/passwd&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
group = net_admins {&lt;br /&gt;
        default service = permit&lt;br /&gt;
        login = file /etc/passwd&lt;br /&gt;
        enable = file /etc/passwd&lt;br /&gt;
        service = exec {&lt;br /&gt;
                priv-lvl = 15&lt;br /&gt;
                }&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
user = margus {&lt;br /&gt;
        member = net_admins&lt;br /&gt;
}&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Autentimine DES salajase võtmega===&lt;br /&gt;
&lt;br /&gt;
Loon grupi &amp;quot;uusgrupp&amp;quot;, madalaima ligipääsutasemega - privilege level 0.&lt;br /&gt;
&lt;br /&gt;
Kasutaja &amp;quot;jaan&amp;quot; lisan loodud gruppi ja defineerin krüpteeritud parooli.&lt;br /&gt;
&lt;br /&gt;
Parooli krüpteerimiseks kasutan käsku &amp;lt;code&amp;gt;tac_pwd&amp;lt;/code&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
key = y97A14T2#741zQ+&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
group = uusgrupp {&lt;br /&gt;
        default service = permit &lt;br /&gt;
        service = exec {&lt;br /&gt;
                priv-lvl = 0&lt;br /&gt;
                }&lt;br /&gt;
}&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
user = jaan {&lt;br /&gt;
        login = des UT.e3EErKERm2&lt;br /&gt;
        member = uusgrupp&lt;br /&gt;
}&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Autoriseermine===&lt;br /&gt;
&lt;br /&gt;
Autoriseerimine võimaldab keelata hallatavas võrguseadmes teatud käskude käivitamist. Need reeglid on omistatavad nii kasutajatele kui gruppidele. Reeglid on keelavad või lubavad.&lt;br /&gt;
&lt;br /&gt;
Lihtne näide, kus on loodud grupp &amp;quot;piiratud_ligip22s&amp;quot;, mille liikmetele on lubatud ligipääs vaid ruuterile IP-ga 172.16.1.103.&lt;br /&gt;
&lt;br /&gt;
Grupi liikmetel on keelatud käivitada käske &amp;quot;configure&amp;quot; ega &amp;quot;debug&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
acl = ruuter1_acl {&lt;br /&gt;
        permit = 172.16.1.103&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
group = piiratud_ligip22s {&lt;br /&gt;
        default service = permit&lt;br /&gt;
        login = file /etc/passwd&lt;br /&gt;
        enable = file /etc/passwd&lt;br /&gt;
        service = exec {&lt;br /&gt;
                priv-lvl = 15&lt;br /&gt;
                }&lt;br /&gt;
        cmd = configure {&lt;br /&gt;
                deny &amp;quot;.&amp;quot;&lt;br /&gt;
                }&lt;br /&gt;
        cmd = debug {&lt;br /&gt;
                deny &amp;quot;.&amp;quot;&lt;br /&gt;
                }&lt;br /&gt;
&lt;br /&gt;
        acl = ruuter1_acl&lt;br /&gt;
&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
user = uno {&lt;br /&gt;
        member = piiratud_ligip22s&lt;br /&gt;
}&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Cisco AAA seadistamine==&lt;br /&gt;
&lt;br /&gt;
Lihtsustatud AAA konfiguratsioon Cisco ruuteris&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
! luuakse uus AAA skeem, millega lubatakse sisestada allolevad käsud&lt;br /&gt;
aaa new-model&lt;br /&gt;
!&lt;br /&gt;
! Käsib seadmel iga sisse logiva kasutaja nime ja parooli valideerida TACACS+ serveri pihta&lt;br /&gt;
aaa authentication login default group tacacs+ enable&lt;br /&gt;
!&lt;br /&gt;
! Kui kasutaja on autoriseeritud, siis sisselogimisel viiakse ta kohe exec (enable) režiimi&lt;br /&gt;
aaa authorization exec default group tacacs+ if-authenticated&lt;br /&gt;
!&lt;br /&gt;
! Autoriseeritakse privilege level 15 kasutajaid ja kui TACACS+ server pole kättesaadav, siis kasutatakse lokaalset kasutajakontot&lt;br /&gt;
aaa authorization commands 15 default group tacacs+&lt;br /&gt;
!&lt;br /&gt;
! Salvestab aruandlust privilege level 15 kasutajate kohta:&lt;br /&gt;
aaa accounting commands 15 default start-stop group tacacs+&lt;br /&gt;
!&lt;br /&gt;
! TACACS+ serveri IP&lt;br /&gt;
tacacs-server host 172.16.1.100&lt;br /&gt;
!&lt;br /&gt;
! TACACS+ serveri võti&lt;br /&gt;
tacacs-server key y97A14T2#741zQ+&lt;br /&gt;
!&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Tõrkeotsing==&lt;br /&gt;
&lt;br /&gt;
Kontrollime, kas TACACS+ protsess jookseb:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
ps -ef | grep tac_plus&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Peale igat tac_plus.conf konfiguratsioonimuudatust, tuleb taaskäivitada TACACS+ teenus:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
/etc/init.d/tacacs_plus restart&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Kui teenus ei peaks pärast konfiguratsioonimuudatust käivituma,&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
 * Restarting TACACS+ authentication daemon tacacs+                                     [fail]&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
siis tuleb viga otsida tac_plus.conf failist.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Kasutatud allikad==&lt;br /&gt;
&lt;br /&gt;
http://en.gentoo-wiki.com/wiki/TACACS_Server_using_tac_plus&lt;br /&gt;
&lt;br /&gt;
http://www.stben.net/tacacs/users_guide.html&lt;br /&gt;
&lt;br /&gt;
http://www.debianhelp.co.uk/tacas.htm&lt;br /&gt;
&lt;br /&gt;
http://www.cisco.com/en/US/docs/switches/datacenter/nexus1000/sw/4_0/security/configuration/guide/security_4tacacs.html&lt;br /&gt;
&lt;br /&gt;
http://www.cisco.com/en/US/docs/ios/12_1/security/command/reference/srdathen.html&lt;/div&gt;</summary>
		<author><name>Mkurniko</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=TACACS%2B&amp;diff=59537</id>
		<title>TACACS+</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=TACACS%2B&amp;diff=59537"/>
		<updated>2012-12-15T21:59:13Z</updated>

		<summary type="html">&lt;p&gt;Mkurniko: /* Kasutatud allikad */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Autor==&lt;br /&gt;
Margus Kurnikov AK21&lt;br /&gt;
&lt;br /&gt;
==Sissejuhatus==&lt;br /&gt;
&lt;br /&gt;
TACACS+ (Terminal Access Controller Access-Control System Plus) on võrguseadmete ligipääsukontrolli protokoll, mis hõlmab endas nii autentimise, autoriseerimise kui ka aruandluse teenuseid. Andmevahetuseks kasutatakse TCP porti 49.&amp;lt;br&amp;gt;&lt;br /&gt;
Erinevalt RADIUS&#039;st, mis on TACACS+ alternatiiv, eristab viimast autoriseerimise funktsionaalsuse lahutamine, mis võimaldab paindlikumat ligipääsukontrolli - kes võib käivitada käske, milliseid käske, millises seadmes. Iga kasutaja poolt sisestatud käsk saadetakse kesksesse TACACS+ serverisse autoriseerimiseks, kus kontrollitakse, kas vastavat käsku on lubatud käivitada konkreetsel kasutajal või grupil. TACACS+ on võimalik luua käskude käivitamisele näiteks kasutaja-, seadme-, või ajapõhiseid reegleid.&amp;lt;br&amp;gt;&lt;br /&gt;
TACACS+ protokolli tugi on olemas levinud suuremate tootjate võrguseadmetes - Cisco, Juniper/Netscreen, HP, Alcatel/Lucent, Ericsson jt.&lt;br /&gt;
&lt;br /&gt;
Antud kirjutises käsitlen lihtsaid TACACS+ seadistamisvõimalusi.&lt;br /&gt;
&lt;br /&gt;
==Paigaldamine==&lt;br /&gt;
&lt;br /&gt;
TACACS+ teenus paigaldatud Ubuntu 12.04-le.&amp;lt;br&amp;gt;&lt;br /&gt;
Testitava ruuterina kasutusel Cisco 1812.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
TACACS+ teenuse paigaldus:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;apt-get install tacacs+&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Teenuse seadistamine==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Konfiguratsioonifaili manual:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;man tac_plus.conf&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Aruandluse logifail:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;/var/log/tac_plus.acct&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
TACACS+ konfiguratsioonifaili asukoht:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;/etc/tacacs+/tac_plus.conf&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Algupärane konfiguratsioonifail: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
# Created by Henry-Nicolas Tourneur(henry.nicolas@tourneur.be)&lt;br /&gt;
# See man(5) tac_plus.conf for more details&lt;br /&gt;
&lt;br /&gt;
# Define where to log accounting data, this is the default.&lt;br /&gt;
&lt;br /&gt;
accounting file = /var/log/tac_plus.acct&lt;br /&gt;
&lt;br /&gt;
# This is the key that clients have to use to access Tacacs+&lt;br /&gt;
&lt;br /&gt;
key = testing123&lt;br /&gt;
&lt;br /&gt;
# Use /etc/passwd file to do authentication&lt;br /&gt;
    &lt;br /&gt;
#default authentication = file /etc/passwd&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
# You can use feature like per host key with different enable passwords&lt;br /&gt;
#host = 127.0.0.1 {&lt;br /&gt;
#        key = test &lt;br /&gt;
#        type = cisco&lt;br /&gt;
#        enable = &amp;lt;des|cleartext&amp;gt; enablepass&lt;br /&gt;
#        prompt = &amp;quot;Welcome XXX ISP Access Router \n\nUsername:&amp;quot;&lt;br /&gt;
#}&lt;br /&gt;
&lt;br /&gt;
# We also can define local users and specify a file where data is stored.&lt;br /&gt;
# That file may be filled using tac_pwd&lt;br /&gt;
#user = test1 {&lt;br /&gt;
#    name = &amp;quot;Test User&amp;quot;&lt;br /&gt;
#    member = staff&lt;br /&gt;
#    login = file /etc/tacacs/tacacs_passwords&lt;br /&gt;
#}&lt;br /&gt;
&lt;br /&gt;
# We can also specify rules valid per group of users.&lt;br /&gt;
#group = group1 {&lt;br /&gt;
#       cmd = conf {&lt;br /&gt;
#               deny&lt;br /&gt;
#       }&lt;br /&gt;
#}&lt;br /&gt;
&lt;br /&gt;
# Another example : forbid configure command for some hosts&lt;br /&gt;
# for a define range of clients&lt;br /&gt;
#group = group1 {&lt;br /&gt;
#       login = PAM&lt;br /&gt;
#       service = ppp&lt;br /&gt;
#       protocol = ip {&lt;br /&gt;
#               addr = 10.10.0.0/24&lt;br /&gt;
#       }&lt;br /&gt;
#       cmd = conf {&lt;br /&gt;
#               deny .*&lt;br /&gt;
#       }&lt;br /&gt;
#}&lt;br /&gt;
&lt;br /&gt;
user = DEFAULT {&lt;br /&gt;
        login = PAM&lt;br /&gt;
        service = ppp protocol = ip {}&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
# Much more features are availables, like ACL, more service compatibilities,&lt;br /&gt;
# commands authorization, scripting authorization.&lt;br /&gt;
# See the man page for those features.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Kasutajate autentimist on võimalik tac_plus&#039;s seadistada kolmel moel:&lt;br /&gt;
&lt;br /&gt;
* Autentimine lokaalse passwd faili alusel - /etc/passwd&lt;br /&gt;
* Autentimine /etc/tac_plus/tac_plus.conf faili lisatud DES salajaste võtmetega&lt;br /&gt;
* Autentimine PAM-ga LDAP serveri pihta&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Käsitlen kahte esimest varianti:&lt;br /&gt;
&lt;br /&gt;
===Autentimine passwd faili põhjal===&lt;br /&gt;
&lt;br /&gt;
Lisan TACACS+ võtme , mis tuleb ka hallatava(te)sse ruuteri(te)sse seadistada (sellest juttu edaspidi), kommenteerin välja rea, kus määratakse autentimisandmete allikaks /etc/passwd fail.&lt;br /&gt;
&lt;br /&gt;
Loon grupi &amp;quot;net_admins&amp;quot;, omistan Cisco kõrgeim ligipääsutaseme - privilege level 15. Kasutaja &amp;quot;margus&amp;quot; määran grupi &amp;quot;net_admins&amp;quot; liikmeks.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
key = y97A14T2#741zQ+&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
default authentication = file /etc/passwd&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
group = net_admins {&lt;br /&gt;
        default service = permit&lt;br /&gt;
        login = file /etc/passwd&lt;br /&gt;
        enable = file /etc/passwd&lt;br /&gt;
        service = exec {&lt;br /&gt;
                priv-lvl = 15&lt;br /&gt;
                }&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
user = margus {&lt;br /&gt;
        member = net_admins&lt;br /&gt;
}&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Autentimine DES salajase võtmega===&lt;br /&gt;
&lt;br /&gt;
Loon grupi &amp;quot;uusgrupp&amp;quot;, madalaima ligipääsutasemega - privilege level 0.&lt;br /&gt;
&lt;br /&gt;
Kasutaja &amp;quot;jaan&amp;quot; lisan loodud gruppi ja defineerin krüpteeritud parooli.&lt;br /&gt;
&lt;br /&gt;
Parooli krüpteerimiseks kasutan käsku &amp;lt;code&amp;gt;tac_pwd&amp;lt;/code&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
key = y97A14T2#741zQ+&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
group = uusgrupp {&lt;br /&gt;
        default service = permit &lt;br /&gt;
        service = exec {&lt;br /&gt;
                priv-lvl = 0&lt;br /&gt;
                }&lt;br /&gt;
}&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
user = jaan {&lt;br /&gt;
        login = des UT.e3EErKERm2&lt;br /&gt;
        member = uusgrupp&lt;br /&gt;
}&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Autoriseermine===&lt;br /&gt;
&lt;br /&gt;
Autoriseerimine võimaldab keelata hallatavas võrguseadmes teatud käskude käivitamist. Need reeglid on omistatavad nii kasutajatele kui gruppidele. Reeglid on keelavad või lubavad.&lt;br /&gt;
&lt;br /&gt;
Lihtne näide, kus on loodud grupp &amp;quot;piiratud_ligip22s&amp;quot;, mille liikmetele on lubatud ligipääs vaid ruuterile IP-ga 172.16.1.103.&lt;br /&gt;
&lt;br /&gt;
Grupi liikmetel on keelatud käivitada käske &amp;quot;configure&amp;quot; ega &amp;quot;debug&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
acl = ruuter1_acl {&lt;br /&gt;
        permit = 172.16.1.103&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
group = piiratud_ligip22s {&lt;br /&gt;
        default service = permit&lt;br /&gt;
        login = file /etc/passwd&lt;br /&gt;
        enable = file /etc/passwd&lt;br /&gt;
        service = exec {&lt;br /&gt;
                priv-lvl = 15&lt;br /&gt;
                }&lt;br /&gt;
        cmd = configure {&lt;br /&gt;
                deny &amp;quot;.&amp;quot;&lt;br /&gt;
                }&lt;br /&gt;
        cmd = debug {&lt;br /&gt;
                deny &amp;quot;.&amp;quot;&lt;br /&gt;
                }&lt;br /&gt;
&lt;br /&gt;
        acl = ruuter1_acl&lt;br /&gt;
&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
user = uno {&lt;br /&gt;
        member = piiratud_ligip22s&lt;br /&gt;
}&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Cisco AAA seadistamine==&lt;br /&gt;
&lt;br /&gt;
Lihtsustatud AAA konfiguratsioon Cisco ruuteris&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
! luuakse uus AAA skeem, millega lubatakse sisestada allolevad käsud&lt;br /&gt;
aaa new-model&lt;br /&gt;
!&lt;br /&gt;
! Käsib seadmel iga sisse logiva kasutaja nime ja parooli valideerida TACACS+ serveri pihta&lt;br /&gt;
aaa authentication login default group tacacs+ enable&lt;br /&gt;
!&lt;br /&gt;
! Kui kasutaja on autoriseeritud, siis sisselogimisel viiakse ta kohe exec (enable) režiimi&lt;br /&gt;
aaa authorization exec default group tacacs+ if-authenticated&lt;br /&gt;
!&lt;br /&gt;
! Autoriseeritakse privilege level 15 kasutajaid ja kui TACACS+ server pole kättesaadav, siis kasutatakse lokaalset kasutajakontot&lt;br /&gt;
aaa authorization commands 15 default group tacacs+&lt;br /&gt;
!&lt;br /&gt;
! Salvestab aruandlust privilege level 15 kasutajate kohta:&lt;br /&gt;
aaa accounting commands 15 default start-stop group tacacs+&lt;br /&gt;
!&lt;br /&gt;
! TACACS+ serveri IP&lt;br /&gt;
tacacs-server host 172.16.1.100&lt;br /&gt;
!&lt;br /&gt;
! TACACS+ serveri võti&lt;br /&gt;
tacacs-server key y97A14T2#741zQ+&lt;br /&gt;
!&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Tõrkeotsing==&lt;br /&gt;
&lt;br /&gt;
Kontrollime, kas TACACS+ protsess jookseb:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
ps -ef | grep tac_plus&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Peale igat tac_plus.conf konfiguratsioonimuudatust, tuleb taaskäivitada TACACS+ teenus:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
/etc/init.d/tacacs_plus restart&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Kui teenus ei peaks pärast konfiguratsioonimuudatust käivituma,&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
 * Restarting TACACS+ authentication daemon tacacs+                                     [fail]&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
siis tuleb viga otsida tac_plus.conf failist.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Kasutatud allikad==&lt;br /&gt;
&lt;br /&gt;
http://en.gentoo-wiki.com/wiki/TACACS_Server_using_tac_plus&lt;br /&gt;
&lt;br /&gt;
http://www.stben.net/tacacs/users_guide.html&lt;br /&gt;
&lt;br /&gt;
http://www.debianhelp.co.uk/tacas.htm&lt;br /&gt;
&lt;br /&gt;
http://www.cisco.com/en/US/docs/switches/datacenter/nexus1000/sw/4_0/security/configuration/guide/security_4tacacs.html&lt;br /&gt;
&lt;br /&gt;
http://www.cisco.com/en/US/docs/ios/12_1/security/command/reference/srdathen.html&lt;/div&gt;</summary>
		<author><name>Mkurniko</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=TACACS%2B&amp;diff=59536</id>
		<title>TACACS+</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=TACACS%2B&amp;diff=59536"/>
		<updated>2012-12-15T21:59:01Z</updated>

		<summary type="html">&lt;p&gt;Mkurniko: /* Tõrkeotsing */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Autor==&lt;br /&gt;
Margus Kurnikov AK21&lt;br /&gt;
&lt;br /&gt;
==Sissejuhatus==&lt;br /&gt;
&lt;br /&gt;
TACACS+ (Terminal Access Controller Access-Control System Plus) on võrguseadmete ligipääsukontrolli protokoll, mis hõlmab endas nii autentimise, autoriseerimise kui ka aruandluse teenuseid. Andmevahetuseks kasutatakse TCP porti 49.&amp;lt;br&amp;gt;&lt;br /&gt;
Erinevalt RADIUS&#039;st, mis on TACACS+ alternatiiv, eristab viimast autoriseerimise funktsionaalsuse lahutamine, mis võimaldab paindlikumat ligipääsukontrolli - kes võib käivitada käske, milliseid käske, millises seadmes. Iga kasutaja poolt sisestatud käsk saadetakse kesksesse TACACS+ serverisse autoriseerimiseks, kus kontrollitakse, kas vastavat käsku on lubatud käivitada konkreetsel kasutajal või grupil. TACACS+ on võimalik luua käskude käivitamisele näiteks kasutaja-, seadme-, või ajapõhiseid reegleid.&amp;lt;br&amp;gt;&lt;br /&gt;
TACACS+ protokolli tugi on olemas levinud suuremate tootjate võrguseadmetes - Cisco, Juniper/Netscreen, HP, Alcatel/Lucent, Ericsson jt.&lt;br /&gt;
&lt;br /&gt;
Antud kirjutises käsitlen lihtsaid TACACS+ seadistamisvõimalusi.&lt;br /&gt;
&lt;br /&gt;
==Paigaldamine==&lt;br /&gt;
&lt;br /&gt;
TACACS+ teenus paigaldatud Ubuntu 12.04-le.&amp;lt;br&amp;gt;&lt;br /&gt;
Testitava ruuterina kasutusel Cisco 1812.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
TACACS+ teenuse paigaldus:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;apt-get install tacacs+&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Teenuse seadistamine==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Konfiguratsioonifaili manual:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;man tac_plus.conf&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Aruandluse logifail:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;/var/log/tac_plus.acct&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
TACACS+ konfiguratsioonifaili asukoht:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;/etc/tacacs+/tac_plus.conf&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Algupärane konfiguratsioonifail: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
# Created by Henry-Nicolas Tourneur(henry.nicolas@tourneur.be)&lt;br /&gt;
# See man(5) tac_plus.conf for more details&lt;br /&gt;
&lt;br /&gt;
# Define where to log accounting data, this is the default.&lt;br /&gt;
&lt;br /&gt;
accounting file = /var/log/tac_plus.acct&lt;br /&gt;
&lt;br /&gt;
# This is the key that clients have to use to access Tacacs+&lt;br /&gt;
&lt;br /&gt;
key = testing123&lt;br /&gt;
&lt;br /&gt;
# Use /etc/passwd file to do authentication&lt;br /&gt;
    &lt;br /&gt;
#default authentication = file /etc/passwd&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
# You can use feature like per host key with different enable passwords&lt;br /&gt;
#host = 127.0.0.1 {&lt;br /&gt;
#        key = test &lt;br /&gt;
#        type = cisco&lt;br /&gt;
#        enable = &amp;lt;des|cleartext&amp;gt; enablepass&lt;br /&gt;
#        prompt = &amp;quot;Welcome XXX ISP Access Router \n\nUsername:&amp;quot;&lt;br /&gt;
#}&lt;br /&gt;
&lt;br /&gt;
# We also can define local users and specify a file where data is stored.&lt;br /&gt;
# That file may be filled using tac_pwd&lt;br /&gt;
#user = test1 {&lt;br /&gt;
#    name = &amp;quot;Test User&amp;quot;&lt;br /&gt;
#    member = staff&lt;br /&gt;
#    login = file /etc/tacacs/tacacs_passwords&lt;br /&gt;
#}&lt;br /&gt;
&lt;br /&gt;
# We can also specify rules valid per group of users.&lt;br /&gt;
#group = group1 {&lt;br /&gt;
#       cmd = conf {&lt;br /&gt;
#               deny&lt;br /&gt;
#       }&lt;br /&gt;
#}&lt;br /&gt;
&lt;br /&gt;
# Another example : forbid configure command for some hosts&lt;br /&gt;
# for a define range of clients&lt;br /&gt;
#group = group1 {&lt;br /&gt;
#       login = PAM&lt;br /&gt;
#       service = ppp&lt;br /&gt;
#       protocol = ip {&lt;br /&gt;
#               addr = 10.10.0.0/24&lt;br /&gt;
#       }&lt;br /&gt;
#       cmd = conf {&lt;br /&gt;
#               deny .*&lt;br /&gt;
#       }&lt;br /&gt;
#}&lt;br /&gt;
&lt;br /&gt;
user = DEFAULT {&lt;br /&gt;
        login = PAM&lt;br /&gt;
        service = ppp protocol = ip {}&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
# Much more features are availables, like ACL, more service compatibilities,&lt;br /&gt;
# commands authorization, scripting authorization.&lt;br /&gt;
# See the man page for those features.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Kasutajate autentimist on võimalik tac_plus&#039;s seadistada kolmel moel:&lt;br /&gt;
&lt;br /&gt;
* Autentimine lokaalse passwd faili alusel - /etc/passwd&lt;br /&gt;
* Autentimine /etc/tac_plus/tac_plus.conf faili lisatud DES salajaste võtmetega&lt;br /&gt;
* Autentimine PAM-ga LDAP serveri pihta&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Käsitlen kahte esimest varianti:&lt;br /&gt;
&lt;br /&gt;
===Autentimine passwd faili põhjal===&lt;br /&gt;
&lt;br /&gt;
Lisan TACACS+ võtme , mis tuleb ka hallatava(te)sse ruuteri(te)sse seadistada (sellest juttu edaspidi), kommenteerin välja rea, kus määratakse autentimisandmete allikaks /etc/passwd fail.&lt;br /&gt;
&lt;br /&gt;
Loon grupi &amp;quot;net_admins&amp;quot;, omistan Cisco kõrgeim ligipääsutaseme - privilege level 15. Kasutaja &amp;quot;margus&amp;quot; määran grupi &amp;quot;net_admins&amp;quot; liikmeks.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
key = y97A14T2#741zQ+&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
default authentication = file /etc/passwd&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
group = net_admins {&lt;br /&gt;
        default service = permit&lt;br /&gt;
        login = file /etc/passwd&lt;br /&gt;
        enable = file /etc/passwd&lt;br /&gt;
        service = exec {&lt;br /&gt;
                priv-lvl = 15&lt;br /&gt;
                }&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
user = margus {&lt;br /&gt;
        member = net_admins&lt;br /&gt;
}&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Autentimine DES salajase võtmega===&lt;br /&gt;
&lt;br /&gt;
Loon grupi &amp;quot;uusgrupp&amp;quot;, madalaima ligipääsutasemega - privilege level 0.&lt;br /&gt;
&lt;br /&gt;
Kasutaja &amp;quot;jaan&amp;quot; lisan loodud gruppi ja defineerin krüpteeritud parooli.&lt;br /&gt;
&lt;br /&gt;
Parooli krüpteerimiseks kasutan käsku &amp;lt;code&amp;gt;tac_pwd&amp;lt;/code&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
key = y97A14T2#741zQ+&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
group = uusgrupp {&lt;br /&gt;
        default service = permit &lt;br /&gt;
        service = exec {&lt;br /&gt;
                priv-lvl = 0&lt;br /&gt;
                }&lt;br /&gt;
}&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
user = jaan {&lt;br /&gt;
        login = des UT.e3EErKERm2&lt;br /&gt;
        member = uusgrupp&lt;br /&gt;
}&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Autoriseermine===&lt;br /&gt;
&lt;br /&gt;
Autoriseerimine võimaldab keelata hallatavas võrguseadmes teatud käskude käivitamist. Need reeglid on omistatavad nii kasutajatele kui gruppidele. Reeglid on keelavad või lubavad.&lt;br /&gt;
&lt;br /&gt;
Lihtne näide, kus on loodud grupp &amp;quot;piiratud_ligip22s&amp;quot;, mille liikmetele on lubatud ligipääs vaid ruuterile IP-ga 172.16.1.103.&lt;br /&gt;
&lt;br /&gt;
Grupi liikmetel on keelatud käivitada käske &amp;quot;configure&amp;quot; ega &amp;quot;debug&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
acl = ruuter1_acl {&lt;br /&gt;
        permit = 172.16.1.103&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
group = piiratud_ligip22s {&lt;br /&gt;
        default service = permit&lt;br /&gt;
        login = file /etc/passwd&lt;br /&gt;
        enable = file /etc/passwd&lt;br /&gt;
        service = exec {&lt;br /&gt;
                priv-lvl = 15&lt;br /&gt;
                }&lt;br /&gt;
        cmd = configure {&lt;br /&gt;
                deny &amp;quot;.&amp;quot;&lt;br /&gt;
                }&lt;br /&gt;
        cmd = debug {&lt;br /&gt;
                deny &amp;quot;.&amp;quot;&lt;br /&gt;
                }&lt;br /&gt;
&lt;br /&gt;
        acl = ruuter1_acl&lt;br /&gt;
&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
user = uno {&lt;br /&gt;
        member = piiratud_ligip22s&lt;br /&gt;
}&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Cisco AAA seadistamine==&lt;br /&gt;
&lt;br /&gt;
Lihtsustatud AAA konfiguratsioon Cisco ruuteris&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
! luuakse uus AAA skeem, millega lubatakse sisestada allolevad käsud&lt;br /&gt;
aaa new-model&lt;br /&gt;
!&lt;br /&gt;
! Käsib seadmel iga sisse logiva kasutaja nime ja parooli valideerida TACACS+ serveri pihta&lt;br /&gt;
aaa authentication login default group tacacs+ enable&lt;br /&gt;
!&lt;br /&gt;
! Kui kasutaja on autoriseeritud, siis sisselogimisel viiakse ta kohe exec (enable) režiimi&lt;br /&gt;
aaa authorization exec default group tacacs+ if-authenticated&lt;br /&gt;
!&lt;br /&gt;
! Autoriseeritakse privilege level 15 kasutajaid ja kui TACACS+ server pole kättesaadav, siis kasutatakse lokaalset kasutajakontot&lt;br /&gt;
aaa authorization commands 15 default group tacacs+&lt;br /&gt;
!&lt;br /&gt;
! Salvestab aruandlust privilege level 15 kasutajate kohta:&lt;br /&gt;
aaa accounting commands 15 default start-stop group tacacs+&lt;br /&gt;
!&lt;br /&gt;
! TACACS+ serveri IP&lt;br /&gt;
tacacs-server host 172.16.1.100&lt;br /&gt;
!&lt;br /&gt;
! TACACS+ serveri võti&lt;br /&gt;
tacacs-server key y97A14T2#741zQ+&lt;br /&gt;
!&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Tõrkeotsing==&lt;br /&gt;
&lt;br /&gt;
Kontrollime, kas TACACS+ protsess jookseb:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
ps -ef | grep tac_plus&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Peale igat tac_plus.conf konfiguratsioonimuudatust, tuleb taaskäivitada TACACS+ teenus:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
/etc/init.d/tacacs_plus restart&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Kui teenus ei peaks pärast konfiguratsioonimuudatust käivituma,&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
 * Restarting TACACS+ authentication daemon tacacs+                                     [fail]&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
siis tuleb viga otsida tac_plus.conf failist.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Kasutatud allikad==&lt;br /&gt;
&lt;br /&gt;
http://en.gentoo-wiki.com/wiki/TACACS_Server_using_tac_plus&lt;br /&gt;
http://www.stben.net/tacacs/users_guide.html&lt;br /&gt;
http://www.debianhelp.co.uk/tacas.htm&lt;br /&gt;
http://www.cisco.com/en/US/docs/switches/datacenter/nexus1000/sw/4_0/security/configuration/guide/security_4tacacs.html&lt;br /&gt;
http://www.cisco.com/en/US/docs/ios/12_1/security/command/reference/srdathen.html&lt;/div&gt;</summary>
		<author><name>Mkurniko</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=TACACS%2B&amp;diff=59535</id>
		<title>TACACS+</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=TACACS%2B&amp;diff=59535"/>
		<updated>2012-12-15T21:56:42Z</updated>

		<summary type="html">&lt;p&gt;Mkurniko: /* Tõrkeotsing */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Autor==&lt;br /&gt;
Margus Kurnikov AK21&lt;br /&gt;
&lt;br /&gt;
==Sissejuhatus==&lt;br /&gt;
&lt;br /&gt;
TACACS+ (Terminal Access Controller Access-Control System Plus) on võrguseadmete ligipääsukontrolli protokoll, mis hõlmab endas nii autentimise, autoriseerimise kui ka aruandluse teenuseid. Andmevahetuseks kasutatakse TCP porti 49.&amp;lt;br&amp;gt;&lt;br /&gt;
Erinevalt RADIUS&#039;st, mis on TACACS+ alternatiiv, eristab viimast autoriseerimise funktsionaalsuse lahutamine, mis võimaldab paindlikumat ligipääsukontrolli - kes võib käivitada käske, milliseid käske, millises seadmes. Iga kasutaja poolt sisestatud käsk saadetakse kesksesse TACACS+ serverisse autoriseerimiseks, kus kontrollitakse, kas vastavat käsku on lubatud käivitada konkreetsel kasutajal või grupil. TACACS+ on võimalik luua käskude käivitamisele näiteks kasutaja-, seadme-, või ajapõhiseid reegleid.&amp;lt;br&amp;gt;&lt;br /&gt;
TACACS+ protokolli tugi on olemas levinud suuremate tootjate võrguseadmetes - Cisco, Juniper/Netscreen, HP, Alcatel/Lucent, Ericsson jt.&lt;br /&gt;
&lt;br /&gt;
Antud kirjutises käsitlen lihtsaid TACACS+ seadistamisvõimalusi.&lt;br /&gt;
&lt;br /&gt;
==Paigaldamine==&lt;br /&gt;
&lt;br /&gt;
TACACS+ teenus paigaldatud Ubuntu 12.04-le.&amp;lt;br&amp;gt;&lt;br /&gt;
Testitava ruuterina kasutusel Cisco 1812.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
TACACS+ teenuse paigaldus:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;apt-get install tacacs+&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Teenuse seadistamine==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Konfiguratsioonifaili manual:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;man tac_plus.conf&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Aruandluse logifail:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;/var/log/tac_plus.acct&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
TACACS+ konfiguratsioonifaili asukoht:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;/etc/tacacs+/tac_plus.conf&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Algupärane konfiguratsioonifail: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
# Created by Henry-Nicolas Tourneur(henry.nicolas@tourneur.be)&lt;br /&gt;
# See man(5) tac_plus.conf for more details&lt;br /&gt;
&lt;br /&gt;
# Define where to log accounting data, this is the default.&lt;br /&gt;
&lt;br /&gt;
accounting file = /var/log/tac_plus.acct&lt;br /&gt;
&lt;br /&gt;
# This is the key that clients have to use to access Tacacs+&lt;br /&gt;
&lt;br /&gt;
key = testing123&lt;br /&gt;
&lt;br /&gt;
# Use /etc/passwd file to do authentication&lt;br /&gt;
    &lt;br /&gt;
#default authentication = file /etc/passwd&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
# You can use feature like per host key with different enable passwords&lt;br /&gt;
#host = 127.0.0.1 {&lt;br /&gt;
#        key = test &lt;br /&gt;
#        type = cisco&lt;br /&gt;
#        enable = &amp;lt;des|cleartext&amp;gt; enablepass&lt;br /&gt;
#        prompt = &amp;quot;Welcome XXX ISP Access Router \n\nUsername:&amp;quot;&lt;br /&gt;
#}&lt;br /&gt;
&lt;br /&gt;
# We also can define local users and specify a file where data is stored.&lt;br /&gt;
# That file may be filled using tac_pwd&lt;br /&gt;
#user = test1 {&lt;br /&gt;
#    name = &amp;quot;Test User&amp;quot;&lt;br /&gt;
#    member = staff&lt;br /&gt;
#    login = file /etc/tacacs/tacacs_passwords&lt;br /&gt;
#}&lt;br /&gt;
&lt;br /&gt;
# We can also specify rules valid per group of users.&lt;br /&gt;
#group = group1 {&lt;br /&gt;
#       cmd = conf {&lt;br /&gt;
#               deny&lt;br /&gt;
#       }&lt;br /&gt;
#}&lt;br /&gt;
&lt;br /&gt;
# Another example : forbid configure command for some hosts&lt;br /&gt;
# for a define range of clients&lt;br /&gt;
#group = group1 {&lt;br /&gt;
#       login = PAM&lt;br /&gt;
#       service = ppp&lt;br /&gt;
#       protocol = ip {&lt;br /&gt;
#               addr = 10.10.0.0/24&lt;br /&gt;
#       }&lt;br /&gt;
#       cmd = conf {&lt;br /&gt;
#               deny .*&lt;br /&gt;
#       }&lt;br /&gt;
#}&lt;br /&gt;
&lt;br /&gt;
user = DEFAULT {&lt;br /&gt;
        login = PAM&lt;br /&gt;
        service = ppp protocol = ip {}&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
# Much more features are availables, like ACL, more service compatibilities,&lt;br /&gt;
# commands authorization, scripting authorization.&lt;br /&gt;
# See the man page for those features.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Kasutajate autentimist on võimalik tac_plus&#039;s seadistada kolmel moel:&lt;br /&gt;
&lt;br /&gt;
* Autentimine lokaalse passwd faili alusel - /etc/passwd&lt;br /&gt;
* Autentimine /etc/tac_plus/tac_plus.conf faili lisatud DES salajaste võtmetega&lt;br /&gt;
* Autentimine PAM-ga LDAP serveri pihta&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Käsitlen kahte esimest varianti:&lt;br /&gt;
&lt;br /&gt;
===Autentimine passwd faili põhjal===&lt;br /&gt;
&lt;br /&gt;
Lisan TACACS+ võtme , mis tuleb ka hallatava(te)sse ruuteri(te)sse seadistada (sellest juttu edaspidi), kommenteerin välja rea, kus määratakse autentimisandmete allikaks /etc/passwd fail.&lt;br /&gt;
&lt;br /&gt;
Loon grupi &amp;quot;net_admins&amp;quot;, omistan Cisco kõrgeim ligipääsutaseme - privilege level 15. Kasutaja &amp;quot;margus&amp;quot; määran grupi &amp;quot;net_admins&amp;quot; liikmeks.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
key = y97A14T2#741zQ+&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
default authentication = file /etc/passwd&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
group = net_admins {&lt;br /&gt;
        default service = permit&lt;br /&gt;
        login = file /etc/passwd&lt;br /&gt;
        enable = file /etc/passwd&lt;br /&gt;
        service = exec {&lt;br /&gt;
                priv-lvl = 15&lt;br /&gt;
                }&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
user = margus {&lt;br /&gt;
        member = net_admins&lt;br /&gt;
}&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Autentimine DES salajase võtmega===&lt;br /&gt;
&lt;br /&gt;
Loon grupi &amp;quot;uusgrupp&amp;quot;, madalaima ligipääsutasemega - privilege level 0.&lt;br /&gt;
&lt;br /&gt;
Kasutaja &amp;quot;jaan&amp;quot; lisan loodud gruppi ja defineerin krüpteeritud parooli.&lt;br /&gt;
&lt;br /&gt;
Parooli krüpteerimiseks kasutan käsku &amp;lt;code&amp;gt;tac_pwd&amp;lt;/code&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
key = y97A14T2#741zQ+&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
group = uusgrupp {&lt;br /&gt;
        default service = permit &lt;br /&gt;
        service = exec {&lt;br /&gt;
                priv-lvl = 0&lt;br /&gt;
                }&lt;br /&gt;
}&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
user = jaan {&lt;br /&gt;
        login = des UT.e3EErKERm2&lt;br /&gt;
        member = uusgrupp&lt;br /&gt;
}&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Autoriseermine===&lt;br /&gt;
&lt;br /&gt;
Autoriseerimine võimaldab keelata hallatavas võrguseadmes teatud käskude käivitamist. Need reeglid on omistatavad nii kasutajatele kui gruppidele. Reeglid on keelavad või lubavad.&lt;br /&gt;
&lt;br /&gt;
Lihtne näide, kus on loodud grupp &amp;quot;piiratud_ligip22s&amp;quot;, mille liikmetele on lubatud ligipääs vaid ruuterile IP-ga 172.16.1.103.&lt;br /&gt;
&lt;br /&gt;
Grupi liikmetel on keelatud käivitada käske &amp;quot;configure&amp;quot; ega &amp;quot;debug&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
acl = ruuter1_acl {&lt;br /&gt;
        permit = 172.16.1.103&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
group = piiratud_ligip22s {&lt;br /&gt;
        default service = permit&lt;br /&gt;
        login = file /etc/passwd&lt;br /&gt;
        enable = file /etc/passwd&lt;br /&gt;
        service = exec {&lt;br /&gt;
                priv-lvl = 15&lt;br /&gt;
                }&lt;br /&gt;
        cmd = configure {&lt;br /&gt;
                deny &amp;quot;.&amp;quot;&lt;br /&gt;
                }&lt;br /&gt;
        cmd = debug {&lt;br /&gt;
                deny &amp;quot;.&amp;quot;&lt;br /&gt;
                }&lt;br /&gt;
&lt;br /&gt;
        acl = ruuter1_acl&lt;br /&gt;
&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
user = uno {&lt;br /&gt;
        member = piiratud_ligip22s&lt;br /&gt;
}&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Cisco AAA seadistamine==&lt;br /&gt;
&lt;br /&gt;
Lihtsustatud AAA konfiguratsioon Cisco ruuteris&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
! luuakse uus AAA skeem, millega lubatakse sisestada allolevad käsud&lt;br /&gt;
aaa new-model&lt;br /&gt;
!&lt;br /&gt;
! Käsib seadmel iga sisse logiva kasutaja nime ja parooli valideerida TACACS+ serveri pihta&lt;br /&gt;
aaa authentication login default group tacacs+ enable&lt;br /&gt;
!&lt;br /&gt;
! Kui kasutaja on autoriseeritud, siis sisselogimisel viiakse ta kohe exec (enable) režiimi&lt;br /&gt;
aaa authorization exec default group tacacs+ if-authenticated&lt;br /&gt;
!&lt;br /&gt;
! Autoriseeritakse privilege level 15 kasutajaid ja kui TACACS+ server pole kättesaadav, siis kasutatakse lokaalset kasutajakontot&lt;br /&gt;
aaa authorization commands 15 default group tacacs+&lt;br /&gt;
!&lt;br /&gt;
! Salvestab aruandlust privilege level 15 kasutajate kohta:&lt;br /&gt;
aaa accounting commands 15 default start-stop group tacacs+&lt;br /&gt;
!&lt;br /&gt;
! TACACS+ serveri IP&lt;br /&gt;
tacacs-server host 172.16.1.100&lt;br /&gt;
!&lt;br /&gt;
! TACACS+ serveri võti&lt;br /&gt;
tacacs-server key y97A14T2#741zQ+&lt;br /&gt;
!&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Tõrkeotsing==&lt;br /&gt;
&lt;br /&gt;
Kontrollime, kas TACACS+ protsess jookseb:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
ps -ef | grep tac_plus&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Peale igat tac_plus.conf konfiguratsioonimuudatust, tuleb taaskäivitada TACACS+ teenus:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
/etc/init.d/tacacs_plus restart&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Kui teenus ei peaks pärast konfiguratsioonimuudatust käivituma,&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
 * Restarting TACACS+ authentication daemon tacacs+                                     [fail]&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
siis tuleb viga otsida tac_plus.conf failist.&lt;/div&gt;</summary>
		<author><name>Mkurniko</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=TACACS%2B&amp;diff=59534</id>
		<title>TACACS+</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=TACACS%2B&amp;diff=59534"/>
		<updated>2012-12-15T21:56:27Z</updated>

		<summary type="html">&lt;p&gt;Mkurniko: /* Tõrkeotsing */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Autor==&lt;br /&gt;
Margus Kurnikov AK21&lt;br /&gt;
&lt;br /&gt;
==Sissejuhatus==&lt;br /&gt;
&lt;br /&gt;
TACACS+ (Terminal Access Controller Access-Control System Plus) on võrguseadmete ligipääsukontrolli protokoll, mis hõlmab endas nii autentimise, autoriseerimise kui ka aruandluse teenuseid. Andmevahetuseks kasutatakse TCP porti 49.&amp;lt;br&amp;gt;&lt;br /&gt;
Erinevalt RADIUS&#039;st, mis on TACACS+ alternatiiv, eristab viimast autoriseerimise funktsionaalsuse lahutamine, mis võimaldab paindlikumat ligipääsukontrolli - kes võib käivitada käske, milliseid käske, millises seadmes. Iga kasutaja poolt sisestatud käsk saadetakse kesksesse TACACS+ serverisse autoriseerimiseks, kus kontrollitakse, kas vastavat käsku on lubatud käivitada konkreetsel kasutajal või grupil. TACACS+ on võimalik luua käskude käivitamisele näiteks kasutaja-, seadme-, või ajapõhiseid reegleid.&amp;lt;br&amp;gt;&lt;br /&gt;
TACACS+ protokolli tugi on olemas levinud suuremate tootjate võrguseadmetes - Cisco, Juniper/Netscreen, HP, Alcatel/Lucent, Ericsson jt.&lt;br /&gt;
&lt;br /&gt;
Antud kirjutises käsitlen lihtsaid TACACS+ seadistamisvõimalusi.&lt;br /&gt;
&lt;br /&gt;
==Paigaldamine==&lt;br /&gt;
&lt;br /&gt;
TACACS+ teenus paigaldatud Ubuntu 12.04-le.&amp;lt;br&amp;gt;&lt;br /&gt;
Testitava ruuterina kasutusel Cisco 1812.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
TACACS+ teenuse paigaldus:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;apt-get install tacacs+&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Teenuse seadistamine==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Konfiguratsioonifaili manual:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;man tac_plus.conf&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Aruandluse logifail:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;/var/log/tac_plus.acct&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
TACACS+ konfiguratsioonifaili asukoht:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;/etc/tacacs+/tac_plus.conf&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Algupärane konfiguratsioonifail: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
# Created by Henry-Nicolas Tourneur(henry.nicolas@tourneur.be)&lt;br /&gt;
# See man(5) tac_plus.conf for more details&lt;br /&gt;
&lt;br /&gt;
# Define where to log accounting data, this is the default.&lt;br /&gt;
&lt;br /&gt;
accounting file = /var/log/tac_plus.acct&lt;br /&gt;
&lt;br /&gt;
# This is the key that clients have to use to access Tacacs+&lt;br /&gt;
&lt;br /&gt;
key = testing123&lt;br /&gt;
&lt;br /&gt;
# Use /etc/passwd file to do authentication&lt;br /&gt;
    &lt;br /&gt;
#default authentication = file /etc/passwd&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
# You can use feature like per host key with different enable passwords&lt;br /&gt;
#host = 127.0.0.1 {&lt;br /&gt;
#        key = test &lt;br /&gt;
#        type = cisco&lt;br /&gt;
#        enable = &amp;lt;des|cleartext&amp;gt; enablepass&lt;br /&gt;
#        prompt = &amp;quot;Welcome XXX ISP Access Router \n\nUsername:&amp;quot;&lt;br /&gt;
#}&lt;br /&gt;
&lt;br /&gt;
# We also can define local users and specify a file where data is stored.&lt;br /&gt;
# That file may be filled using tac_pwd&lt;br /&gt;
#user = test1 {&lt;br /&gt;
#    name = &amp;quot;Test User&amp;quot;&lt;br /&gt;
#    member = staff&lt;br /&gt;
#    login = file /etc/tacacs/tacacs_passwords&lt;br /&gt;
#}&lt;br /&gt;
&lt;br /&gt;
# We can also specify rules valid per group of users.&lt;br /&gt;
#group = group1 {&lt;br /&gt;
#       cmd = conf {&lt;br /&gt;
#               deny&lt;br /&gt;
#       }&lt;br /&gt;
#}&lt;br /&gt;
&lt;br /&gt;
# Another example : forbid configure command for some hosts&lt;br /&gt;
# for a define range of clients&lt;br /&gt;
#group = group1 {&lt;br /&gt;
#       login = PAM&lt;br /&gt;
#       service = ppp&lt;br /&gt;
#       protocol = ip {&lt;br /&gt;
#               addr = 10.10.0.0/24&lt;br /&gt;
#       }&lt;br /&gt;
#       cmd = conf {&lt;br /&gt;
#               deny .*&lt;br /&gt;
#       }&lt;br /&gt;
#}&lt;br /&gt;
&lt;br /&gt;
user = DEFAULT {&lt;br /&gt;
        login = PAM&lt;br /&gt;
        service = ppp protocol = ip {}&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
# Much more features are availables, like ACL, more service compatibilities,&lt;br /&gt;
# commands authorization, scripting authorization.&lt;br /&gt;
# See the man page for those features.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Kasutajate autentimist on võimalik tac_plus&#039;s seadistada kolmel moel:&lt;br /&gt;
&lt;br /&gt;
* Autentimine lokaalse passwd faili alusel - /etc/passwd&lt;br /&gt;
* Autentimine /etc/tac_plus/tac_plus.conf faili lisatud DES salajaste võtmetega&lt;br /&gt;
* Autentimine PAM-ga LDAP serveri pihta&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Käsitlen kahte esimest varianti:&lt;br /&gt;
&lt;br /&gt;
===Autentimine passwd faili põhjal===&lt;br /&gt;
&lt;br /&gt;
Lisan TACACS+ võtme , mis tuleb ka hallatava(te)sse ruuteri(te)sse seadistada (sellest juttu edaspidi), kommenteerin välja rea, kus määratakse autentimisandmete allikaks /etc/passwd fail.&lt;br /&gt;
&lt;br /&gt;
Loon grupi &amp;quot;net_admins&amp;quot;, omistan Cisco kõrgeim ligipääsutaseme - privilege level 15. Kasutaja &amp;quot;margus&amp;quot; määran grupi &amp;quot;net_admins&amp;quot; liikmeks.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
key = y97A14T2#741zQ+&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
default authentication = file /etc/passwd&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
group = net_admins {&lt;br /&gt;
        default service = permit&lt;br /&gt;
        login = file /etc/passwd&lt;br /&gt;
        enable = file /etc/passwd&lt;br /&gt;
        service = exec {&lt;br /&gt;
                priv-lvl = 15&lt;br /&gt;
                }&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
user = margus {&lt;br /&gt;
        member = net_admins&lt;br /&gt;
}&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Autentimine DES salajase võtmega===&lt;br /&gt;
&lt;br /&gt;
Loon grupi &amp;quot;uusgrupp&amp;quot;, madalaima ligipääsutasemega - privilege level 0.&lt;br /&gt;
&lt;br /&gt;
Kasutaja &amp;quot;jaan&amp;quot; lisan loodud gruppi ja defineerin krüpteeritud parooli.&lt;br /&gt;
&lt;br /&gt;
Parooli krüpteerimiseks kasutan käsku &amp;lt;code&amp;gt;tac_pwd&amp;lt;/code&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
key = y97A14T2#741zQ+&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
group = uusgrupp {&lt;br /&gt;
        default service = permit &lt;br /&gt;
        service = exec {&lt;br /&gt;
                priv-lvl = 0&lt;br /&gt;
                }&lt;br /&gt;
}&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
user = jaan {&lt;br /&gt;
        login = des UT.e3EErKERm2&lt;br /&gt;
        member = uusgrupp&lt;br /&gt;
}&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Autoriseermine===&lt;br /&gt;
&lt;br /&gt;
Autoriseerimine võimaldab keelata hallatavas võrguseadmes teatud käskude käivitamist. Need reeglid on omistatavad nii kasutajatele kui gruppidele. Reeglid on keelavad või lubavad.&lt;br /&gt;
&lt;br /&gt;
Lihtne näide, kus on loodud grupp &amp;quot;piiratud_ligip22s&amp;quot;, mille liikmetele on lubatud ligipääs vaid ruuterile IP-ga 172.16.1.103.&lt;br /&gt;
&lt;br /&gt;
Grupi liikmetel on keelatud käivitada käske &amp;quot;configure&amp;quot; ega &amp;quot;debug&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
acl = ruuter1_acl {&lt;br /&gt;
        permit = 172.16.1.103&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
group = piiratud_ligip22s {&lt;br /&gt;
        default service = permit&lt;br /&gt;
        login = file /etc/passwd&lt;br /&gt;
        enable = file /etc/passwd&lt;br /&gt;
        service = exec {&lt;br /&gt;
                priv-lvl = 15&lt;br /&gt;
                }&lt;br /&gt;
        cmd = configure {&lt;br /&gt;
                deny &amp;quot;.&amp;quot;&lt;br /&gt;
                }&lt;br /&gt;
        cmd = debug {&lt;br /&gt;
                deny &amp;quot;.&amp;quot;&lt;br /&gt;
                }&lt;br /&gt;
&lt;br /&gt;
        acl = ruuter1_acl&lt;br /&gt;
&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
user = uno {&lt;br /&gt;
        member = piiratud_ligip22s&lt;br /&gt;
}&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Cisco AAA seadistamine==&lt;br /&gt;
&lt;br /&gt;
Lihtsustatud AAA konfiguratsioon Cisco ruuteris&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
! luuakse uus AAA skeem, millega lubatakse sisestada allolevad käsud&lt;br /&gt;
aaa new-model&lt;br /&gt;
!&lt;br /&gt;
! Käsib seadmel iga sisse logiva kasutaja nime ja parooli valideerida TACACS+ serveri pihta&lt;br /&gt;
aaa authentication login default group tacacs+ enable&lt;br /&gt;
!&lt;br /&gt;
! Kui kasutaja on autoriseeritud, siis sisselogimisel viiakse ta kohe exec (enable) režiimi&lt;br /&gt;
aaa authorization exec default group tacacs+ if-authenticated&lt;br /&gt;
!&lt;br /&gt;
! Autoriseeritakse privilege level 15 kasutajaid ja kui TACACS+ server pole kättesaadav, siis kasutatakse lokaalset kasutajakontot&lt;br /&gt;
aaa authorization commands 15 default group tacacs+&lt;br /&gt;
!&lt;br /&gt;
! Salvestab aruandlust privilege level 15 kasutajate kohta:&lt;br /&gt;
aaa accounting commands 15 default start-stop group tacacs+&lt;br /&gt;
!&lt;br /&gt;
! TACACS+ serveri IP&lt;br /&gt;
tacacs-server host 172.16.1.100&lt;br /&gt;
!&lt;br /&gt;
! TACACS+ serveri võti&lt;br /&gt;
tacacs-server key y97A14T2#741zQ+&lt;br /&gt;
!&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Tõrkeotsing==&lt;br /&gt;
&lt;br /&gt;
Kontrollime, kas TACACS+ protsess jookseb:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
ps -ef | grep tac_plus&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Peale igat tac_plus.conf konfiguratsioonimuudatust, tuleb taaskäivitada TACACS+ teenus:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
/etc/init.d/tacacs_plus restart&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Kui teenus ei peaks pärast konfiguratsioonimuudatust käivituma,&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
 * Restarting TACACS+ authentication daemon tacacs+                                     [fail]&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
siis tuleb viga otsida tac_plus.conf failist.&lt;/div&gt;</summary>
		<author><name>Mkurniko</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=TACACS%2B&amp;diff=59532</id>
		<title>TACACS+</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=TACACS%2B&amp;diff=59532"/>
		<updated>2012-12-15T21:54:48Z</updated>

		<summary type="html">&lt;p&gt;Mkurniko: /* Cisco AAA seadistamine */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Autor==&lt;br /&gt;
Margus Kurnikov AK21&lt;br /&gt;
&lt;br /&gt;
==Sissejuhatus==&lt;br /&gt;
&lt;br /&gt;
TACACS+ (Terminal Access Controller Access-Control System Plus) on võrguseadmete ligipääsukontrolli protokoll, mis hõlmab endas nii autentimise, autoriseerimise kui ka aruandluse teenuseid. Andmevahetuseks kasutatakse TCP porti 49.&amp;lt;br&amp;gt;&lt;br /&gt;
Erinevalt RADIUS&#039;st, mis on TACACS+ alternatiiv, eristab viimast autoriseerimise funktsionaalsuse lahutamine, mis võimaldab paindlikumat ligipääsukontrolli - kes võib käivitada käske, milliseid käske, millises seadmes. Iga kasutaja poolt sisestatud käsk saadetakse kesksesse TACACS+ serverisse autoriseerimiseks, kus kontrollitakse, kas vastavat käsku on lubatud käivitada konkreetsel kasutajal või grupil. TACACS+ on võimalik luua käskude käivitamisele näiteks kasutaja-, seadme-, või ajapõhiseid reegleid.&amp;lt;br&amp;gt;&lt;br /&gt;
TACACS+ protokolli tugi on olemas levinud suuremate tootjate võrguseadmetes - Cisco, Juniper/Netscreen, HP, Alcatel/Lucent, Ericsson jt.&lt;br /&gt;
&lt;br /&gt;
Antud kirjutises käsitlen lihtsaid TACACS+ seadistamisvõimalusi.&lt;br /&gt;
&lt;br /&gt;
==Paigaldamine==&lt;br /&gt;
&lt;br /&gt;
TACACS+ teenus paigaldatud Ubuntu 12.04-le.&amp;lt;br&amp;gt;&lt;br /&gt;
Testitava ruuterina kasutusel Cisco 1812.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
TACACS+ teenuse paigaldus:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;apt-get install tacacs+&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Teenuse seadistamine==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Konfiguratsioonifaili manual:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;man tac_plus.conf&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Aruandluse logifail:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;/var/log/tac_plus.acct&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
TACACS+ konfiguratsioonifaili asukoht:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;/etc/tacacs+/tac_plus.conf&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Algupärane konfiguratsioonifail: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
# Created by Henry-Nicolas Tourneur(henry.nicolas@tourneur.be)&lt;br /&gt;
# See man(5) tac_plus.conf for more details&lt;br /&gt;
&lt;br /&gt;
# Define where to log accounting data, this is the default.&lt;br /&gt;
&lt;br /&gt;
accounting file = /var/log/tac_plus.acct&lt;br /&gt;
&lt;br /&gt;
# This is the key that clients have to use to access Tacacs+&lt;br /&gt;
&lt;br /&gt;
key = testing123&lt;br /&gt;
&lt;br /&gt;
# Use /etc/passwd file to do authentication&lt;br /&gt;
    &lt;br /&gt;
#default authentication = file /etc/passwd&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
# You can use feature like per host key with different enable passwords&lt;br /&gt;
#host = 127.0.0.1 {&lt;br /&gt;
#        key = test &lt;br /&gt;
#        type = cisco&lt;br /&gt;
#        enable = &amp;lt;des|cleartext&amp;gt; enablepass&lt;br /&gt;
#        prompt = &amp;quot;Welcome XXX ISP Access Router \n\nUsername:&amp;quot;&lt;br /&gt;
#}&lt;br /&gt;
&lt;br /&gt;
# We also can define local users and specify a file where data is stored.&lt;br /&gt;
# That file may be filled using tac_pwd&lt;br /&gt;
#user = test1 {&lt;br /&gt;
#    name = &amp;quot;Test User&amp;quot;&lt;br /&gt;
#    member = staff&lt;br /&gt;
#    login = file /etc/tacacs/tacacs_passwords&lt;br /&gt;
#}&lt;br /&gt;
&lt;br /&gt;
# We can also specify rules valid per group of users.&lt;br /&gt;
#group = group1 {&lt;br /&gt;
#       cmd = conf {&lt;br /&gt;
#               deny&lt;br /&gt;
#       }&lt;br /&gt;
#}&lt;br /&gt;
&lt;br /&gt;
# Another example : forbid configure command for some hosts&lt;br /&gt;
# for a define range of clients&lt;br /&gt;
#group = group1 {&lt;br /&gt;
#       login = PAM&lt;br /&gt;
#       service = ppp&lt;br /&gt;
#       protocol = ip {&lt;br /&gt;
#               addr = 10.10.0.0/24&lt;br /&gt;
#       }&lt;br /&gt;
#       cmd = conf {&lt;br /&gt;
#               deny .*&lt;br /&gt;
#       }&lt;br /&gt;
#}&lt;br /&gt;
&lt;br /&gt;
user = DEFAULT {&lt;br /&gt;
        login = PAM&lt;br /&gt;
        service = ppp protocol = ip {}&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
# Much more features are availables, like ACL, more service compatibilities,&lt;br /&gt;
# commands authorization, scripting authorization.&lt;br /&gt;
# See the man page for those features.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Kasutajate autentimist on võimalik tac_plus&#039;s seadistada kolmel moel:&lt;br /&gt;
&lt;br /&gt;
* Autentimine lokaalse passwd faili alusel - /etc/passwd&lt;br /&gt;
* Autentimine /etc/tac_plus/tac_plus.conf faili lisatud DES salajaste võtmetega&lt;br /&gt;
* Autentimine PAM-ga LDAP serveri pihta&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Käsitlen kahte esimest varianti:&lt;br /&gt;
&lt;br /&gt;
===Autentimine passwd faili põhjal===&lt;br /&gt;
&lt;br /&gt;
Lisan TACACS+ võtme , mis tuleb ka hallatava(te)sse ruuteri(te)sse seadistada (sellest juttu edaspidi), kommenteerin välja rea, kus määratakse autentimisandmete allikaks /etc/passwd fail.&lt;br /&gt;
&lt;br /&gt;
Loon grupi &amp;quot;net_admins&amp;quot;, omistan Cisco kõrgeim ligipääsutaseme - privilege level 15. Kasutaja &amp;quot;margus&amp;quot; määran grupi &amp;quot;net_admins&amp;quot; liikmeks.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
key = y97A14T2#741zQ+&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
default authentication = file /etc/passwd&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
group = net_admins {&lt;br /&gt;
        default service = permit&lt;br /&gt;
        login = file /etc/passwd&lt;br /&gt;
        enable = file /etc/passwd&lt;br /&gt;
        service = exec {&lt;br /&gt;
                priv-lvl = 15&lt;br /&gt;
                }&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
user = margus {&lt;br /&gt;
        member = net_admins&lt;br /&gt;
}&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Autentimine DES salajase võtmega===&lt;br /&gt;
&lt;br /&gt;
Loon grupi &amp;quot;uusgrupp&amp;quot;, madalaima ligipääsutasemega - privilege level 0.&lt;br /&gt;
&lt;br /&gt;
Kasutaja &amp;quot;jaan&amp;quot; lisan loodud gruppi ja defineerin krüpteeritud parooli.&lt;br /&gt;
&lt;br /&gt;
Parooli krüpteerimiseks kasutan käsku &amp;lt;code&amp;gt;tac_pwd&amp;lt;/code&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
key = y97A14T2#741zQ+&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
group = uusgrupp {&lt;br /&gt;
        default service = permit &lt;br /&gt;
        service = exec {&lt;br /&gt;
                priv-lvl = 0&lt;br /&gt;
                }&lt;br /&gt;
}&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
user = jaan {&lt;br /&gt;
        login = des UT.e3EErKERm2&lt;br /&gt;
        member = uusgrupp&lt;br /&gt;
}&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Autoriseermine===&lt;br /&gt;
&lt;br /&gt;
Autoriseerimine võimaldab keelata hallatavas võrguseadmes teatud käskude käivitamist. Need reeglid on omistatavad nii kasutajatele kui gruppidele. Reeglid on keelavad või lubavad.&lt;br /&gt;
&lt;br /&gt;
Lihtne näide, kus on loodud grupp &amp;quot;piiratud_ligip22s&amp;quot;, mille liikmetele on lubatud ligipääs vaid ruuterile IP-ga 172.16.1.103.&lt;br /&gt;
&lt;br /&gt;
Grupi liikmetel on keelatud käivitada käske &amp;quot;configure&amp;quot; ega &amp;quot;debug&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
acl = ruuter1_acl {&lt;br /&gt;
        permit = 172.16.1.103&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
group = piiratud_ligip22s {&lt;br /&gt;
        default service = permit&lt;br /&gt;
        login = file /etc/passwd&lt;br /&gt;
        enable = file /etc/passwd&lt;br /&gt;
        service = exec {&lt;br /&gt;
                priv-lvl = 15&lt;br /&gt;
                }&lt;br /&gt;
        cmd = configure {&lt;br /&gt;
                deny &amp;quot;.&amp;quot;&lt;br /&gt;
                }&lt;br /&gt;
        cmd = debug {&lt;br /&gt;
                deny &amp;quot;.&amp;quot;&lt;br /&gt;
                }&lt;br /&gt;
&lt;br /&gt;
        acl = ruuter1_acl&lt;br /&gt;
&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
user = uno {&lt;br /&gt;
        member = piiratud_ligip22s&lt;br /&gt;
}&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Cisco AAA seadistamine==&lt;br /&gt;
&lt;br /&gt;
Lihtsustatud AAA konfiguratsioon Cisco ruuteris&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
! luuakse uus AAA skeem, millega lubatakse sisestada allolevad käsud&lt;br /&gt;
aaa new-model&lt;br /&gt;
!&lt;br /&gt;
! Käsib seadmel iga sisse logiva kasutaja nime ja parooli valideerida TACACS+ serveri pihta&lt;br /&gt;
aaa authentication login default group tacacs+ enable&lt;br /&gt;
!&lt;br /&gt;
! Kui kasutaja on autoriseeritud, siis sisselogimisel viiakse ta kohe exec (enable) režiimi&lt;br /&gt;
aaa authorization exec default group tacacs+ if-authenticated&lt;br /&gt;
!&lt;br /&gt;
! Autoriseeritakse privilege level 15 kasutajaid ja kui TACACS+ server pole kättesaadav, siis kasutatakse lokaalset kasutajakontot&lt;br /&gt;
aaa authorization commands 15 default group tacacs+&lt;br /&gt;
!&lt;br /&gt;
! Salvestab aruandlust privilege level 15 kasutajate kohta:&lt;br /&gt;
aaa accounting commands 15 default start-stop group tacacs+&lt;br /&gt;
!&lt;br /&gt;
! TACACS+ serveri IP&lt;br /&gt;
tacacs-server host 172.16.1.100&lt;br /&gt;
!&lt;br /&gt;
! TACACS+ serveri võti&lt;br /&gt;
tacacs-server key y97A14T2#741zQ+&lt;br /&gt;
!&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Tõrkeotsing==&lt;br /&gt;
&lt;br /&gt;
Peale igat tac_plus.conf konfiguratsioonimuudatust, tuleb taaskäivitada TACACS+ teenus:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
/etc/init.d/tacacs_plus restart&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Kui teenus ei peaks pärast konfiguratsioonimuudatust käivituma,&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
 * Restarting TACACS+ authentication daemon tacacs+                                     [fail]&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
siis tuleb viga otsida tac_plus.conf failist.&lt;/div&gt;</summary>
		<author><name>Mkurniko</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=TACACS%2B&amp;diff=59530</id>
		<title>TACACS+</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=TACACS%2B&amp;diff=59530"/>
		<updated>2012-12-15T21:54:17Z</updated>

		<summary type="html">&lt;p&gt;Mkurniko: /* Cisco AAA seadistamine */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Autor==&lt;br /&gt;
Margus Kurnikov AK21&lt;br /&gt;
&lt;br /&gt;
==Sissejuhatus==&lt;br /&gt;
&lt;br /&gt;
TACACS+ (Terminal Access Controller Access-Control System Plus) on võrguseadmete ligipääsukontrolli protokoll, mis hõlmab endas nii autentimise, autoriseerimise kui ka aruandluse teenuseid. Andmevahetuseks kasutatakse TCP porti 49.&amp;lt;br&amp;gt;&lt;br /&gt;
Erinevalt RADIUS&#039;st, mis on TACACS+ alternatiiv, eristab viimast autoriseerimise funktsionaalsuse lahutamine, mis võimaldab paindlikumat ligipääsukontrolli - kes võib käivitada käske, milliseid käske, millises seadmes. Iga kasutaja poolt sisestatud käsk saadetakse kesksesse TACACS+ serverisse autoriseerimiseks, kus kontrollitakse, kas vastavat käsku on lubatud käivitada konkreetsel kasutajal või grupil. TACACS+ on võimalik luua käskude käivitamisele näiteks kasutaja-, seadme-, või ajapõhiseid reegleid.&amp;lt;br&amp;gt;&lt;br /&gt;
TACACS+ protokolli tugi on olemas levinud suuremate tootjate võrguseadmetes - Cisco, Juniper/Netscreen, HP, Alcatel/Lucent, Ericsson jt.&lt;br /&gt;
&lt;br /&gt;
Antud kirjutises käsitlen lihtsaid TACACS+ seadistamisvõimalusi.&lt;br /&gt;
&lt;br /&gt;
==Paigaldamine==&lt;br /&gt;
&lt;br /&gt;
TACACS+ teenus paigaldatud Ubuntu 12.04-le.&amp;lt;br&amp;gt;&lt;br /&gt;
Testitava ruuterina kasutusel Cisco 1812.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
TACACS+ teenuse paigaldus:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;apt-get install tacacs+&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Teenuse seadistamine==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Konfiguratsioonifaili manual:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;man tac_plus.conf&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Aruandluse logifail:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;/var/log/tac_plus.acct&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
TACACS+ konfiguratsioonifaili asukoht:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;/etc/tacacs+/tac_plus.conf&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Algupärane konfiguratsioonifail: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
# Created by Henry-Nicolas Tourneur(henry.nicolas@tourneur.be)&lt;br /&gt;
# See man(5) tac_plus.conf for more details&lt;br /&gt;
&lt;br /&gt;
# Define where to log accounting data, this is the default.&lt;br /&gt;
&lt;br /&gt;
accounting file = /var/log/tac_plus.acct&lt;br /&gt;
&lt;br /&gt;
# This is the key that clients have to use to access Tacacs+&lt;br /&gt;
&lt;br /&gt;
key = testing123&lt;br /&gt;
&lt;br /&gt;
# Use /etc/passwd file to do authentication&lt;br /&gt;
    &lt;br /&gt;
#default authentication = file /etc/passwd&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
# You can use feature like per host key with different enable passwords&lt;br /&gt;
#host = 127.0.0.1 {&lt;br /&gt;
#        key = test &lt;br /&gt;
#        type = cisco&lt;br /&gt;
#        enable = &amp;lt;des|cleartext&amp;gt; enablepass&lt;br /&gt;
#        prompt = &amp;quot;Welcome XXX ISP Access Router \n\nUsername:&amp;quot;&lt;br /&gt;
#}&lt;br /&gt;
&lt;br /&gt;
# We also can define local users and specify a file where data is stored.&lt;br /&gt;
# That file may be filled using tac_pwd&lt;br /&gt;
#user = test1 {&lt;br /&gt;
#    name = &amp;quot;Test User&amp;quot;&lt;br /&gt;
#    member = staff&lt;br /&gt;
#    login = file /etc/tacacs/tacacs_passwords&lt;br /&gt;
#}&lt;br /&gt;
&lt;br /&gt;
# We can also specify rules valid per group of users.&lt;br /&gt;
#group = group1 {&lt;br /&gt;
#       cmd = conf {&lt;br /&gt;
#               deny&lt;br /&gt;
#       }&lt;br /&gt;
#}&lt;br /&gt;
&lt;br /&gt;
# Another example : forbid configure command for some hosts&lt;br /&gt;
# for a define range of clients&lt;br /&gt;
#group = group1 {&lt;br /&gt;
#       login = PAM&lt;br /&gt;
#       service = ppp&lt;br /&gt;
#       protocol = ip {&lt;br /&gt;
#               addr = 10.10.0.0/24&lt;br /&gt;
#       }&lt;br /&gt;
#       cmd = conf {&lt;br /&gt;
#               deny .*&lt;br /&gt;
#       }&lt;br /&gt;
#}&lt;br /&gt;
&lt;br /&gt;
user = DEFAULT {&lt;br /&gt;
        login = PAM&lt;br /&gt;
        service = ppp protocol = ip {}&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
# Much more features are availables, like ACL, more service compatibilities,&lt;br /&gt;
# commands authorization, scripting authorization.&lt;br /&gt;
# See the man page for those features.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Kasutajate autentimist on võimalik tac_plus&#039;s seadistada kolmel moel:&lt;br /&gt;
&lt;br /&gt;
* Autentimine lokaalse passwd faili alusel - /etc/passwd&lt;br /&gt;
* Autentimine /etc/tac_plus/tac_plus.conf faili lisatud DES salajaste võtmetega&lt;br /&gt;
* Autentimine PAM-ga LDAP serveri pihta&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Käsitlen kahte esimest varianti:&lt;br /&gt;
&lt;br /&gt;
===Autentimine passwd faili põhjal===&lt;br /&gt;
&lt;br /&gt;
Lisan TACACS+ võtme , mis tuleb ka hallatava(te)sse ruuteri(te)sse seadistada (sellest juttu edaspidi), kommenteerin välja rea, kus määratakse autentimisandmete allikaks /etc/passwd fail.&lt;br /&gt;
&lt;br /&gt;
Loon grupi &amp;quot;net_admins&amp;quot;, omistan Cisco kõrgeim ligipääsutaseme - privilege level 15. Kasutaja &amp;quot;margus&amp;quot; määran grupi &amp;quot;net_admins&amp;quot; liikmeks.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
key = y97A14T2#741zQ+&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
default authentication = file /etc/passwd&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
group = net_admins {&lt;br /&gt;
        default service = permit&lt;br /&gt;
        login = file /etc/passwd&lt;br /&gt;
        enable = file /etc/passwd&lt;br /&gt;
        service = exec {&lt;br /&gt;
                priv-lvl = 15&lt;br /&gt;
                }&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
user = margus {&lt;br /&gt;
        member = net_admins&lt;br /&gt;
}&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Autentimine DES salajase võtmega===&lt;br /&gt;
&lt;br /&gt;
Loon grupi &amp;quot;uusgrupp&amp;quot;, madalaima ligipääsutasemega - privilege level 0.&lt;br /&gt;
&lt;br /&gt;
Kasutaja &amp;quot;jaan&amp;quot; lisan loodud gruppi ja defineerin krüpteeritud parooli.&lt;br /&gt;
&lt;br /&gt;
Parooli krüpteerimiseks kasutan käsku &amp;lt;code&amp;gt;tac_pwd&amp;lt;/code&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
key = y97A14T2#741zQ+&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
group = uusgrupp {&lt;br /&gt;
        default service = permit &lt;br /&gt;
        service = exec {&lt;br /&gt;
                priv-lvl = 0&lt;br /&gt;
                }&lt;br /&gt;
}&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
user = jaan {&lt;br /&gt;
        login = des UT.e3EErKERm2&lt;br /&gt;
        member = uusgrupp&lt;br /&gt;
}&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Autoriseermine===&lt;br /&gt;
&lt;br /&gt;
Autoriseerimine võimaldab keelata hallatavas võrguseadmes teatud käskude käivitamist. Need reeglid on omistatavad nii kasutajatele kui gruppidele. Reeglid on keelavad või lubavad.&lt;br /&gt;
&lt;br /&gt;
Lihtne näide, kus on loodud grupp &amp;quot;piiratud_ligip22s&amp;quot;, mille liikmetele on lubatud ligipääs vaid ruuterile IP-ga 172.16.1.103.&lt;br /&gt;
&lt;br /&gt;
Grupi liikmetel on keelatud käivitada käske &amp;quot;configure&amp;quot; ega &amp;quot;debug&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
acl = ruuter1_acl {&lt;br /&gt;
        permit = 172.16.1.103&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
group = piiratud_ligip22s {&lt;br /&gt;
        default service = permit&lt;br /&gt;
        login = file /etc/passwd&lt;br /&gt;
        enable = file /etc/passwd&lt;br /&gt;
        service = exec {&lt;br /&gt;
                priv-lvl = 15&lt;br /&gt;
                }&lt;br /&gt;
        cmd = configure {&lt;br /&gt;
                deny &amp;quot;.&amp;quot;&lt;br /&gt;
                }&lt;br /&gt;
        cmd = debug {&lt;br /&gt;
                deny &amp;quot;.&amp;quot;&lt;br /&gt;
                }&lt;br /&gt;
&lt;br /&gt;
        acl = ruuter1_acl&lt;br /&gt;
&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
user = uno {&lt;br /&gt;
        member = piiratud_ligip22s&lt;br /&gt;
}&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Cisco AAA seadistamine==&lt;br /&gt;
&lt;br /&gt;
Lihtsustatud AAA konfiguratsioon Cisco ruuteris&lt;br /&gt;
&lt;br /&gt;
! luuakse uus AAA skeem, millega lubatakse sisestada allolevad käsud&lt;br /&gt;
aaa new-model&lt;br /&gt;
!&lt;br /&gt;
! Käsib seadmel iga sisse logiva kasutaja nime ja parooli valideerida TACACS+ serveri pihta&lt;br /&gt;
aaa authentication login default group tacacs+ enable&lt;br /&gt;
!&lt;br /&gt;
! Kui kasutaja on autoriseeritud, siis sisselogimisel viiakse ta kohe exec (enable) režiimi&lt;br /&gt;
aaa authorization exec default group tacacs+ if-authenticated&lt;br /&gt;
!&lt;br /&gt;
! Autoriseeritakse privilege level 15 kasutajaid ja kui TACACS+ server pole kättesaadav, siis kasutatakse lokaalset kasutajakontot&lt;br /&gt;
aaa authorization commands 15 default group tacacs+&lt;br /&gt;
!&lt;br /&gt;
! Salvestab aruandlust privilege level 15 kasutajate kohta:&lt;br /&gt;
aaa accounting commands 15 default start-stop group tacacs+&lt;br /&gt;
!&lt;br /&gt;
! TACACS+ serveri IP&lt;br /&gt;
tacacs-server host 172.16.1.100&lt;br /&gt;
!&lt;br /&gt;
! TACACS+ serveri võti&lt;br /&gt;
tacacs-server key y97A14T2#741zQ+&lt;br /&gt;
!&lt;br /&gt;
&lt;br /&gt;
==Tõrkeotsing==&lt;br /&gt;
&lt;br /&gt;
Peale igat tac_plus.conf konfiguratsioonimuudatust, tuleb taaskäivitada TACACS+ teenus:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
/etc/init.d/tacacs_plus restart&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Kui teenus ei peaks pärast konfiguratsioonimuudatust käivituma,&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
 * Restarting TACACS+ authentication daemon tacacs+                                     [fail]&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
siis tuleb viga otsida tac_plus.conf failist.&lt;/div&gt;</summary>
		<author><name>Mkurniko</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=TACACS%2B&amp;diff=59528</id>
		<title>TACACS+</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=TACACS%2B&amp;diff=59528"/>
		<updated>2012-12-15T21:35:23Z</updated>

		<summary type="html">&lt;p&gt;Mkurniko: /* Sissejuhatus */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Autor==&lt;br /&gt;
Margus Kurnikov AK21&lt;br /&gt;
&lt;br /&gt;
==Sissejuhatus==&lt;br /&gt;
&lt;br /&gt;
TACACS+ (Terminal Access Controller Access-Control System Plus) on võrguseadmete ligipääsukontrolli protokoll, mis hõlmab endas nii autentimise, autoriseerimise kui ka aruandluse teenuseid. Andmevahetuseks kasutatakse TCP porti 49.&amp;lt;br&amp;gt;&lt;br /&gt;
Erinevalt RADIUS&#039;st, mis on TACACS+ alternatiiv, eristab viimast autoriseerimise funktsionaalsuse lahutamine, mis võimaldab paindlikumat ligipääsukontrolli - kes võib käivitada käske, milliseid käske, millises seadmes. Iga kasutaja poolt sisestatud käsk saadetakse kesksesse TACACS+ serverisse autoriseerimiseks, kus kontrollitakse, kas vastavat käsku on lubatud käivitada konkreetsel kasutajal või grupil. TACACS+ on võimalik luua käskude käivitamisele näiteks kasutaja-, seadme-, või ajapõhiseid reegleid.&amp;lt;br&amp;gt;&lt;br /&gt;
TACACS+ protokolli tugi on olemas levinud suuremate tootjate võrguseadmetes - Cisco, Juniper/Netscreen, HP, Alcatel/Lucent, Ericsson jt.&lt;br /&gt;
&lt;br /&gt;
Antud kirjutises käsitlen lihtsaid TACACS+ seadistamisvõimalusi.&lt;br /&gt;
&lt;br /&gt;
==Paigaldamine==&lt;br /&gt;
&lt;br /&gt;
TACACS+ teenus paigaldatud Ubuntu 12.04-le.&amp;lt;br&amp;gt;&lt;br /&gt;
Testitava ruuterina kasutusel Cisco 1812.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
TACACS+ teenuse paigaldus:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;apt-get install tacacs+&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Teenuse seadistamine==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Konfiguratsioonifaili manual:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;man tac_plus.conf&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Aruandluse logifail:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;/var/log/tac_plus.acct&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
TACACS+ konfiguratsioonifaili asukoht:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;/etc/tacacs+/tac_plus.conf&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Algupärane konfiguratsioonifail: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
# Created by Henry-Nicolas Tourneur(henry.nicolas@tourneur.be)&lt;br /&gt;
# See man(5) tac_plus.conf for more details&lt;br /&gt;
&lt;br /&gt;
# Define where to log accounting data, this is the default.&lt;br /&gt;
&lt;br /&gt;
accounting file = /var/log/tac_plus.acct&lt;br /&gt;
&lt;br /&gt;
# This is the key that clients have to use to access Tacacs+&lt;br /&gt;
&lt;br /&gt;
key = testing123&lt;br /&gt;
&lt;br /&gt;
# Use /etc/passwd file to do authentication&lt;br /&gt;
    &lt;br /&gt;
#default authentication = file /etc/passwd&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
# You can use feature like per host key with different enable passwords&lt;br /&gt;
#host = 127.0.0.1 {&lt;br /&gt;
#        key = test &lt;br /&gt;
#        type = cisco&lt;br /&gt;
#        enable = &amp;lt;des|cleartext&amp;gt; enablepass&lt;br /&gt;
#        prompt = &amp;quot;Welcome XXX ISP Access Router \n\nUsername:&amp;quot;&lt;br /&gt;
#}&lt;br /&gt;
&lt;br /&gt;
# We also can define local users and specify a file where data is stored.&lt;br /&gt;
# That file may be filled using tac_pwd&lt;br /&gt;
#user = test1 {&lt;br /&gt;
#    name = &amp;quot;Test User&amp;quot;&lt;br /&gt;
#    member = staff&lt;br /&gt;
#    login = file /etc/tacacs/tacacs_passwords&lt;br /&gt;
#}&lt;br /&gt;
&lt;br /&gt;
# We can also specify rules valid per group of users.&lt;br /&gt;
#group = group1 {&lt;br /&gt;
#       cmd = conf {&lt;br /&gt;
#               deny&lt;br /&gt;
#       }&lt;br /&gt;
#}&lt;br /&gt;
&lt;br /&gt;
# Another example : forbid configure command for some hosts&lt;br /&gt;
# for a define range of clients&lt;br /&gt;
#group = group1 {&lt;br /&gt;
#       login = PAM&lt;br /&gt;
#       service = ppp&lt;br /&gt;
#       protocol = ip {&lt;br /&gt;
#               addr = 10.10.0.0/24&lt;br /&gt;
#       }&lt;br /&gt;
#       cmd = conf {&lt;br /&gt;
#               deny .*&lt;br /&gt;
#       }&lt;br /&gt;
#}&lt;br /&gt;
&lt;br /&gt;
user = DEFAULT {&lt;br /&gt;
        login = PAM&lt;br /&gt;
        service = ppp protocol = ip {}&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
# Much more features are availables, like ACL, more service compatibilities,&lt;br /&gt;
# commands authorization, scripting authorization.&lt;br /&gt;
# See the man page for those features.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Kasutajate autentimist on võimalik tac_plus&#039;s seadistada kolmel moel:&lt;br /&gt;
&lt;br /&gt;
* Autentimine lokaalse passwd faili alusel - /etc/passwd&lt;br /&gt;
* Autentimine /etc/tac_plus/tac_plus.conf faili lisatud DES salajaste võtmetega&lt;br /&gt;
* Autentimine PAM-ga LDAP serveri pihta&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Käsitlen kahte esimest varianti:&lt;br /&gt;
&lt;br /&gt;
===Autentimine passwd faili põhjal===&lt;br /&gt;
&lt;br /&gt;
Lisan TACACS+ võtme , mis tuleb ka hallatava(te)sse ruuteri(te)sse seadistada (sellest juttu edaspidi), kommenteerin välja rea, kus määratakse autentimisandmete allikaks /etc/passwd fail.&lt;br /&gt;
&lt;br /&gt;
Loon grupi &amp;quot;net_admins&amp;quot;, omistan Cisco kõrgeim ligipääsutaseme - privilege level 15. Kasutaja &amp;quot;margus&amp;quot; määran grupi &amp;quot;net_admins&amp;quot; liikmeks.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
key = y97A14T2#741zQ+&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
default authentication = file /etc/passwd&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
group = net_admins {&lt;br /&gt;
        default service = permit&lt;br /&gt;
        login = file /etc/passwd&lt;br /&gt;
        enable = file /etc/passwd&lt;br /&gt;
        service = exec {&lt;br /&gt;
                priv-lvl = 15&lt;br /&gt;
                }&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
user = margus {&lt;br /&gt;
        member = net_admins&lt;br /&gt;
}&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Autentimine DES salajase võtmega===&lt;br /&gt;
&lt;br /&gt;
Loon grupi &amp;quot;uusgrupp&amp;quot;, madalaima ligipääsutasemega - privilege level 0.&lt;br /&gt;
&lt;br /&gt;
Kasutaja &amp;quot;jaan&amp;quot; lisan loodud gruppi ja defineerin krüpteeritud parooli.&lt;br /&gt;
&lt;br /&gt;
Parooli krüpteerimiseks kasutan käsku &amp;lt;code&amp;gt;tac_pwd&amp;lt;/code&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
key = y97A14T2#741zQ+&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
group = uusgrupp {&lt;br /&gt;
        default service = permit &lt;br /&gt;
        service = exec {&lt;br /&gt;
                priv-lvl = 0&lt;br /&gt;
                }&lt;br /&gt;
}&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
user = jaan {&lt;br /&gt;
        login = des UT.e3EErKERm2&lt;br /&gt;
        member = uusgrupp&lt;br /&gt;
}&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Autoriseermine===&lt;br /&gt;
&lt;br /&gt;
Autoriseerimine võimaldab keelata hallatavas võrguseadmes teatud käskude käivitamist. Need reeglid on omistatavad nii kasutajatele kui gruppidele. Reeglid on keelavad või lubavad.&lt;br /&gt;
&lt;br /&gt;
Lihtne näide, kus on loodud grupp &amp;quot;piiratud_ligip22s&amp;quot;, mille liikmetele on lubatud ligipääs vaid ruuterile IP-ga 172.16.1.103.&lt;br /&gt;
&lt;br /&gt;
Grupi liikmetel on keelatud käivitada käske &amp;quot;configure&amp;quot; ega &amp;quot;debug&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
acl = ruuter1_acl {&lt;br /&gt;
        permit = 172.16.1.103&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
group = piiratud_ligip22s {&lt;br /&gt;
        default service = permit&lt;br /&gt;
        login = file /etc/passwd&lt;br /&gt;
        enable = file /etc/passwd&lt;br /&gt;
        service = exec {&lt;br /&gt;
                priv-lvl = 15&lt;br /&gt;
                }&lt;br /&gt;
        cmd = configure {&lt;br /&gt;
                deny &amp;quot;.&amp;quot;&lt;br /&gt;
                }&lt;br /&gt;
        cmd = debug {&lt;br /&gt;
                deny &amp;quot;.&amp;quot;&lt;br /&gt;
                }&lt;br /&gt;
&lt;br /&gt;
        acl = ruuter1_acl&lt;br /&gt;
&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
user = uno {&lt;br /&gt;
        member = piiratud_ligip22s&lt;br /&gt;
}&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Cisco AAA seadistamine==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Tõrkeotsing==&lt;br /&gt;
&lt;br /&gt;
Peale igat tac_plus.conf konfiguratsioonimuudatust, tuleb taaskäivitada TACACS+ teenus:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
/etc/init.d/tacacs_plus restart&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Kui teenus ei peaks pärast konfiguratsioonimuudatust käivituma,&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
 * Restarting TACACS+ authentication daemon tacacs+                                     [fail]&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
siis tuleb viga otsida tac_plus.conf failist.&lt;/div&gt;</summary>
		<author><name>Mkurniko</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=TACACS%2B&amp;diff=59525</id>
		<title>TACACS+</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=TACACS%2B&amp;diff=59525"/>
		<updated>2012-12-15T21:33:05Z</updated>

		<summary type="html">&lt;p&gt;Mkurniko: /* Tõrkeotsing */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Autor==&lt;br /&gt;
Margus Kurnikov AK21&lt;br /&gt;
&lt;br /&gt;
==Sissejuhatus==&lt;br /&gt;
&lt;br /&gt;
TACACS+ (Terminal Access Controller Access-Control System Plus) on võrguseadmete ligipääsukontrolli protokoll, mis hõlmab endas nii autentimise, autoriseerimise kui ka aruandluse teenuseid. Andmevahetuseks kasutatakse TCP porti 49.&amp;lt;br&amp;gt;&lt;br /&gt;
Erinevalt RADIUS&#039;st, mis on TACACS+ alternatiiv, eristab viimast autoriseerimise funktsionaalsuse lahutamine, mis võimaldab paindlikumat ligipääsukontrolli - kes võib käivitada käske, milliseid käske, millises seadmes. Iga kasutaja poolt sisestatud käsk saadetakse kesksesse TACACS+ serverisse autoriseerimiseks, kus kontrollitakse, kas vastavat käsku on lubatud käivitada konkreetsel kasutajal või grupil. TACACS+ on võimalik luua käskude käivitamisele näiteks kasutaja-, seadme-, või ajapõhiseid reegleid.&amp;lt;br&amp;gt;&lt;br /&gt;
TACACS+ protokolli tugi on olemas levinud suuremate tootjate võrguseadmetes - Cisco, Juniper/Netscreen, HP, Alcatel/Lucent, Ericsson jt.&lt;br /&gt;
&lt;br /&gt;
==Paigaldamine==&lt;br /&gt;
&lt;br /&gt;
TACACS+ teenus paigaldatud Ubuntu 12.04-le.&amp;lt;br&amp;gt;&lt;br /&gt;
Testitava ruuterina kasutusel Cisco 1812.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
TACACS+ teenuse paigaldus:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;apt-get install tacacs+&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Teenuse seadistamine==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Konfiguratsioonifaili manual:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;man tac_plus.conf&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Aruandluse logifail:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;/var/log/tac_plus.acct&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
TACACS+ konfiguratsioonifaili asukoht:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;/etc/tacacs+/tac_plus.conf&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Algupärane konfiguratsioonifail: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
# Created by Henry-Nicolas Tourneur(henry.nicolas@tourneur.be)&lt;br /&gt;
# See man(5) tac_plus.conf for more details&lt;br /&gt;
&lt;br /&gt;
# Define where to log accounting data, this is the default.&lt;br /&gt;
&lt;br /&gt;
accounting file = /var/log/tac_plus.acct&lt;br /&gt;
&lt;br /&gt;
# This is the key that clients have to use to access Tacacs+&lt;br /&gt;
&lt;br /&gt;
key = testing123&lt;br /&gt;
&lt;br /&gt;
# Use /etc/passwd file to do authentication&lt;br /&gt;
    &lt;br /&gt;
#default authentication = file /etc/passwd&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
# You can use feature like per host key with different enable passwords&lt;br /&gt;
#host = 127.0.0.1 {&lt;br /&gt;
#        key = test &lt;br /&gt;
#        type = cisco&lt;br /&gt;
#        enable = &amp;lt;des|cleartext&amp;gt; enablepass&lt;br /&gt;
#        prompt = &amp;quot;Welcome XXX ISP Access Router \n\nUsername:&amp;quot;&lt;br /&gt;
#}&lt;br /&gt;
&lt;br /&gt;
# We also can define local users and specify a file where data is stored.&lt;br /&gt;
# That file may be filled using tac_pwd&lt;br /&gt;
#user = test1 {&lt;br /&gt;
#    name = &amp;quot;Test User&amp;quot;&lt;br /&gt;
#    member = staff&lt;br /&gt;
#    login = file /etc/tacacs/tacacs_passwords&lt;br /&gt;
#}&lt;br /&gt;
&lt;br /&gt;
# We can also specify rules valid per group of users.&lt;br /&gt;
#group = group1 {&lt;br /&gt;
#       cmd = conf {&lt;br /&gt;
#               deny&lt;br /&gt;
#       }&lt;br /&gt;
#}&lt;br /&gt;
&lt;br /&gt;
# Another example : forbid configure command for some hosts&lt;br /&gt;
# for a define range of clients&lt;br /&gt;
#group = group1 {&lt;br /&gt;
#       login = PAM&lt;br /&gt;
#       service = ppp&lt;br /&gt;
#       protocol = ip {&lt;br /&gt;
#               addr = 10.10.0.0/24&lt;br /&gt;
#       }&lt;br /&gt;
#       cmd = conf {&lt;br /&gt;
#               deny .*&lt;br /&gt;
#       }&lt;br /&gt;
#}&lt;br /&gt;
&lt;br /&gt;
user = DEFAULT {&lt;br /&gt;
        login = PAM&lt;br /&gt;
        service = ppp protocol = ip {}&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
# Much more features are availables, like ACL, more service compatibilities,&lt;br /&gt;
# commands authorization, scripting authorization.&lt;br /&gt;
# See the man page for those features.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Kasutajate autentimist on võimalik tac_plus&#039;s seadistada kolmel moel:&lt;br /&gt;
&lt;br /&gt;
* Autentimine lokaalse passwd faili alusel - /etc/passwd&lt;br /&gt;
* Autentimine /etc/tac_plus/tac_plus.conf faili lisatud DES salajaste võtmetega&lt;br /&gt;
* Autentimine PAM-ga LDAP serveri pihta&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Käsitlen kahte esimest varianti:&lt;br /&gt;
&lt;br /&gt;
===Autentimine passwd faili põhjal===&lt;br /&gt;
&lt;br /&gt;
Lisan TACACS+ võtme , mis tuleb ka hallatava(te)sse ruuteri(te)sse seadistada (sellest juttu edaspidi), kommenteerin välja rea, kus määratakse autentimisandmete allikaks /etc/passwd fail.&lt;br /&gt;
&lt;br /&gt;
Loon grupi &amp;quot;net_admins&amp;quot;, omistan Cisco kõrgeim ligipääsutaseme - privilege level 15. Kasutaja &amp;quot;margus&amp;quot; määran grupi &amp;quot;net_admins&amp;quot; liikmeks.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
key = y97A14T2#741zQ+&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
default authentication = file /etc/passwd&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
group = net_admins {&lt;br /&gt;
        default service = permit&lt;br /&gt;
        login = file /etc/passwd&lt;br /&gt;
        enable = file /etc/passwd&lt;br /&gt;
        service = exec {&lt;br /&gt;
                priv-lvl = 15&lt;br /&gt;
                }&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
user = margus {&lt;br /&gt;
        member = net_admins&lt;br /&gt;
}&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Autentimine DES salajase võtmega===&lt;br /&gt;
&lt;br /&gt;
Loon grupi &amp;quot;uusgrupp&amp;quot;, madalaima ligipääsutasemega - privilege level 0.&lt;br /&gt;
&lt;br /&gt;
Kasutaja &amp;quot;jaan&amp;quot; lisan loodud gruppi ja defineerin krüpteeritud parooli.&lt;br /&gt;
&lt;br /&gt;
Parooli krüpteerimiseks kasutan käsku &amp;lt;code&amp;gt;tac_pwd&amp;lt;/code&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
key = y97A14T2#741zQ+&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
group = uusgrupp {&lt;br /&gt;
        default service = permit &lt;br /&gt;
        service = exec {&lt;br /&gt;
                priv-lvl = 0&lt;br /&gt;
                }&lt;br /&gt;
}&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
user = jaan {&lt;br /&gt;
        login = des UT.e3EErKERm2&lt;br /&gt;
        member = uusgrupp&lt;br /&gt;
}&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Autoriseermine===&lt;br /&gt;
&lt;br /&gt;
Autoriseerimine võimaldab keelata hallatavas võrguseadmes teatud käskude käivitamist. Need reeglid on omistatavad nii kasutajatele kui gruppidele. Reeglid on keelavad või lubavad.&lt;br /&gt;
&lt;br /&gt;
Lihtne näide, kus on loodud grupp &amp;quot;piiratud_ligip22s&amp;quot;, mille liikmetele on lubatud ligipääs vaid ruuterile IP-ga 172.16.1.103.&lt;br /&gt;
&lt;br /&gt;
Grupi liikmetel on keelatud käivitada käske &amp;quot;configure&amp;quot; ega &amp;quot;debug&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
acl = ruuter1_acl {&lt;br /&gt;
        permit = 172.16.1.103&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
group = piiratud_ligip22s {&lt;br /&gt;
        default service = permit&lt;br /&gt;
        login = file /etc/passwd&lt;br /&gt;
        enable = file /etc/passwd&lt;br /&gt;
        service = exec {&lt;br /&gt;
                priv-lvl = 15&lt;br /&gt;
                }&lt;br /&gt;
        cmd = configure {&lt;br /&gt;
                deny &amp;quot;.&amp;quot;&lt;br /&gt;
                }&lt;br /&gt;
        cmd = debug {&lt;br /&gt;
                deny &amp;quot;.&amp;quot;&lt;br /&gt;
                }&lt;br /&gt;
&lt;br /&gt;
        acl = ruuter1_acl&lt;br /&gt;
&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
user = uno {&lt;br /&gt;
        member = piiratud_ligip22s&lt;br /&gt;
}&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Cisco AAA seadistamine==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Tõrkeotsing==&lt;br /&gt;
&lt;br /&gt;
Peale igat tac_plus.conf konfiguratsioonimuudatust, tuleb taaskäivitada TACACS+ teenus:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
/etc/init.d/tacacs_plus restart&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Kui teenus ei peaks pärast konfiguratsioonimuudatust käivituma,&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
 * Restarting TACACS+ authentication daemon tacacs+                                     [fail]&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
siis tuleb viga otsida tac_plus.conf failist.&lt;/div&gt;</summary>
		<author><name>Mkurniko</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=TACACS%2B&amp;diff=59524</id>
		<title>TACACS+</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=TACACS%2B&amp;diff=59524"/>
		<updated>2012-12-15T21:32:48Z</updated>

		<summary type="html">&lt;p&gt;Mkurniko: /* Cisco AAA seadistamine */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Autor==&lt;br /&gt;
Margus Kurnikov AK21&lt;br /&gt;
&lt;br /&gt;
==Sissejuhatus==&lt;br /&gt;
&lt;br /&gt;
TACACS+ (Terminal Access Controller Access-Control System Plus) on võrguseadmete ligipääsukontrolli protokoll, mis hõlmab endas nii autentimise, autoriseerimise kui ka aruandluse teenuseid. Andmevahetuseks kasutatakse TCP porti 49.&amp;lt;br&amp;gt;&lt;br /&gt;
Erinevalt RADIUS&#039;st, mis on TACACS+ alternatiiv, eristab viimast autoriseerimise funktsionaalsuse lahutamine, mis võimaldab paindlikumat ligipääsukontrolli - kes võib käivitada käske, milliseid käske, millises seadmes. Iga kasutaja poolt sisestatud käsk saadetakse kesksesse TACACS+ serverisse autoriseerimiseks, kus kontrollitakse, kas vastavat käsku on lubatud käivitada konkreetsel kasutajal või grupil. TACACS+ on võimalik luua käskude käivitamisele näiteks kasutaja-, seadme-, või ajapõhiseid reegleid.&amp;lt;br&amp;gt;&lt;br /&gt;
TACACS+ protokolli tugi on olemas levinud suuremate tootjate võrguseadmetes - Cisco, Juniper/Netscreen, HP, Alcatel/Lucent, Ericsson jt.&lt;br /&gt;
&lt;br /&gt;
==Paigaldamine==&lt;br /&gt;
&lt;br /&gt;
TACACS+ teenus paigaldatud Ubuntu 12.04-le.&amp;lt;br&amp;gt;&lt;br /&gt;
Testitava ruuterina kasutusel Cisco 1812.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
TACACS+ teenuse paigaldus:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;apt-get install tacacs+&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Teenuse seadistamine==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Konfiguratsioonifaili manual:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;man tac_plus.conf&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Aruandluse logifail:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;/var/log/tac_plus.acct&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
TACACS+ konfiguratsioonifaili asukoht:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;/etc/tacacs+/tac_plus.conf&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Algupärane konfiguratsioonifail: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
# Created by Henry-Nicolas Tourneur(henry.nicolas@tourneur.be)&lt;br /&gt;
# See man(5) tac_plus.conf for more details&lt;br /&gt;
&lt;br /&gt;
# Define where to log accounting data, this is the default.&lt;br /&gt;
&lt;br /&gt;
accounting file = /var/log/tac_plus.acct&lt;br /&gt;
&lt;br /&gt;
# This is the key that clients have to use to access Tacacs+&lt;br /&gt;
&lt;br /&gt;
key = testing123&lt;br /&gt;
&lt;br /&gt;
# Use /etc/passwd file to do authentication&lt;br /&gt;
    &lt;br /&gt;
#default authentication = file /etc/passwd&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
# You can use feature like per host key with different enable passwords&lt;br /&gt;
#host = 127.0.0.1 {&lt;br /&gt;
#        key = test &lt;br /&gt;
#        type = cisco&lt;br /&gt;
#        enable = &amp;lt;des|cleartext&amp;gt; enablepass&lt;br /&gt;
#        prompt = &amp;quot;Welcome XXX ISP Access Router \n\nUsername:&amp;quot;&lt;br /&gt;
#}&lt;br /&gt;
&lt;br /&gt;
# We also can define local users and specify a file where data is stored.&lt;br /&gt;
# That file may be filled using tac_pwd&lt;br /&gt;
#user = test1 {&lt;br /&gt;
#    name = &amp;quot;Test User&amp;quot;&lt;br /&gt;
#    member = staff&lt;br /&gt;
#    login = file /etc/tacacs/tacacs_passwords&lt;br /&gt;
#}&lt;br /&gt;
&lt;br /&gt;
# We can also specify rules valid per group of users.&lt;br /&gt;
#group = group1 {&lt;br /&gt;
#       cmd = conf {&lt;br /&gt;
#               deny&lt;br /&gt;
#       }&lt;br /&gt;
#}&lt;br /&gt;
&lt;br /&gt;
# Another example : forbid configure command for some hosts&lt;br /&gt;
# for a define range of clients&lt;br /&gt;
#group = group1 {&lt;br /&gt;
#       login = PAM&lt;br /&gt;
#       service = ppp&lt;br /&gt;
#       protocol = ip {&lt;br /&gt;
#               addr = 10.10.0.0/24&lt;br /&gt;
#       }&lt;br /&gt;
#       cmd = conf {&lt;br /&gt;
#               deny .*&lt;br /&gt;
#       }&lt;br /&gt;
#}&lt;br /&gt;
&lt;br /&gt;
user = DEFAULT {&lt;br /&gt;
        login = PAM&lt;br /&gt;
        service = ppp protocol = ip {}&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
# Much more features are availables, like ACL, more service compatibilities,&lt;br /&gt;
# commands authorization, scripting authorization.&lt;br /&gt;
# See the man page for those features.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Kasutajate autentimist on võimalik tac_plus&#039;s seadistada kolmel moel:&lt;br /&gt;
&lt;br /&gt;
* Autentimine lokaalse passwd faili alusel - /etc/passwd&lt;br /&gt;
* Autentimine /etc/tac_plus/tac_plus.conf faili lisatud DES salajaste võtmetega&lt;br /&gt;
* Autentimine PAM-ga LDAP serveri pihta&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Käsitlen kahte esimest varianti:&lt;br /&gt;
&lt;br /&gt;
===Autentimine passwd faili põhjal===&lt;br /&gt;
&lt;br /&gt;
Lisan TACACS+ võtme , mis tuleb ka hallatava(te)sse ruuteri(te)sse seadistada (sellest juttu edaspidi), kommenteerin välja rea, kus määratakse autentimisandmete allikaks /etc/passwd fail.&lt;br /&gt;
&lt;br /&gt;
Loon grupi &amp;quot;net_admins&amp;quot;, omistan Cisco kõrgeim ligipääsutaseme - privilege level 15. Kasutaja &amp;quot;margus&amp;quot; määran grupi &amp;quot;net_admins&amp;quot; liikmeks.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
key = y97A14T2#741zQ+&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
default authentication = file /etc/passwd&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
group = net_admins {&lt;br /&gt;
        default service = permit&lt;br /&gt;
        login = file /etc/passwd&lt;br /&gt;
        enable = file /etc/passwd&lt;br /&gt;
        service = exec {&lt;br /&gt;
                priv-lvl = 15&lt;br /&gt;
                }&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
user = margus {&lt;br /&gt;
        member = net_admins&lt;br /&gt;
}&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Autentimine DES salajase võtmega===&lt;br /&gt;
&lt;br /&gt;
Loon grupi &amp;quot;uusgrupp&amp;quot;, madalaima ligipääsutasemega - privilege level 0.&lt;br /&gt;
&lt;br /&gt;
Kasutaja &amp;quot;jaan&amp;quot; lisan loodud gruppi ja defineerin krüpteeritud parooli.&lt;br /&gt;
&lt;br /&gt;
Parooli krüpteerimiseks kasutan käsku &amp;lt;code&amp;gt;tac_pwd&amp;lt;/code&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
key = y97A14T2#741zQ+&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
group = uusgrupp {&lt;br /&gt;
        default service = permit &lt;br /&gt;
        service = exec {&lt;br /&gt;
                priv-lvl = 0&lt;br /&gt;
                }&lt;br /&gt;
}&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
user = jaan {&lt;br /&gt;
        login = des UT.e3EErKERm2&lt;br /&gt;
        member = uusgrupp&lt;br /&gt;
}&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Autoriseermine===&lt;br /&gt;
&lt;br /&gt;
Autoriseerimine võimaldab keelata hallatavas võrguseadmes teatud käskude käivitamist. Need reeglid on omistatavad nii kasutajatele kui gruppidele. Reeglid on keelavad või lubavad.&lt;br /&gt;
&lt;br /&gt;
Lihtne näide, kus on loodud grupp &amp;quot;piiratud_ligip22s&amp;quot;, mille liikmetele on lubatud ligipääs vaid ruuterile IP-ga 172.16.1.103.&lt;br /&gt;
&lt;br /&gt;
Grupi liikmetel on keelatud käivitada käske &amp;quot;configure&amp;quot; ega &amp;quot;debug&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
acl = ruuter1_acl {&lt;br /&gt;
        permit = 172.16.1.103&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
group = piiratud_ligip22s {&lt;br /&gt;
        default service = permit&lt;br /&gt;
        login = file /etc/passwd&lt;br /&gt;
        enable = file /etc/passwd&lt;br /&gt;
        service = exec {&lt;br /&gt;
                priv-lvl = 15&lt;br /&gt;
                }&lt;br /&gt;
        cmd = configure {&lt;br /&gt;
                deny &amp;quot;.&amp;quot;&lt;br /&gt;
                }&lt;br /&gt;
        cmd = debug {&lt;br /&gt;
                deny &amp;quot;.&amp;quot;&lt;br /&gt;
                }&lt;br /&gt;
&lt;br /&gt;
        acl = ruuter1_acl&lt;br /&gt;
&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
user = uno {&lt;br /&gt;
        member = piiratud_ligip22s&lt;br /&gt;
}&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Cisco AAA seadistamine==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Tõrkeotsing==&lt;br /&gt;
&lt;br /&gt;
Peale igat tac_plus.conf konfiguratsioonimuudatust, tuleb taaskäivitada TACACS+ teenus:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
/etc/init.d/tacacs_plus restart&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Kui teenus ei peaks pärast konfiguratsioonimuudatust käivituma,&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
 * Restarting TACACS+ authentication daemon tacacs+                                     [fail]&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
siis tuleb viga otsida tac_plus.conf failist.&lt;/div&gt;</summary>
		<author><name>Mkurniko</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=TACACS%2B&amp;diff=59519</id>
		<title>TACACS+</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=TACACS%2B&amp;diff=59519"/>
		<updated>2012-12-15T21:27:16Z</updated>

		<summary type="html">&lt;p&gt;Mkurniko: /* Autoriseermine */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Autor==&lt;br /&gt;
Margus Kurnikov AK21&lt;br /&gt;
&lt;br /&gt;
==Sissejuhatus==&lt;br /&gt;
&lt;br /&gt;
TACACS+ (Terminal Access Controller Access-Control System Plus) on võrguseadmete ligipääsukontrolli protokoll, mis hõlmab endas nii autentimise, autoriseerimise kui ka aruandluse teenuseid. Andmevahetuseks kasutatakse TCP porti 49.&amp;lt;br&amp;gt;&lt;br /&gt;
Erinevalt RADIUS&#039;st, mis on TACACS+ alternatiiv, eristab viimast autoriseerimise funktsionaalsuse lahutamine, mis võimaldab paindlikumat ligipääsukontrolli - kes võib käivitada käske, milliseid käske, millises seadmes. Iga kasutaja poolt sisestatud käsk saadetakse kesksesse TACACS+ serverisse autoriseerimiseks, kus kontrollitakse, kas vastavat käsku on lubatud käivitada konkreetsel kasutajal või grupil. TACACS+ on võimalik luua käskude käivitamisele näiteks kasutaja-, seadme-, või ajapõhiseid reegleid.&amp;lt;br&amp;gt;&lt;br /&gt;
TACACS+ protokolli tugi on olemas levinud suuremate tootjate võrguseadmetes - Cisco, Juniper/Netscreen, HP, Alcatel/Lucent, Ericsson jt.&lt;br /&gt;
&lt;br /&gt;
==Paigaldamine==&lt;br /&gt;
&lt;br /&gt;
TACACS+ teenus paigaldatud Ubuntu 12.04-le.&amp;lt;br&amp;gt;&lt;br /&gt;
Testitava ruuterina kasutusel Cisco 1812.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
TACACS+ teenuse paigaldus:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;apt-get install tacacs+&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Teenuse seadistamine==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Konfiguratsioonifaili manual:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;man tac_plus.conf&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Aruandluse logifail:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;/var/log/tac_plus.acct&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
TACACS+ konfiguratsioonifaili asukoht:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;/etc/tacacs+/tac_plus.conf&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Algupärane konfiguratsioonifail: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
# Created by Henry-Nicolas Tourneur(henry.nicolas@tourneur.be)&lt;br /&gt;
# See man(5) tac_plus.conf for more details&lt;br /&gt;
&lt;br /&gt;
# Define where to log accounting data, this is the default.&lt;br /&gt;
&lt;br /&gt;
accounting file = /var/log/tac_plus.acct&lt;br /&gt;
&lt;br /&gt;
# This is the key that clients have to use to access Tacacs+&lt;br /&gt;
&lt;br /&gt;
key = testing123&lt;br /&gt;
&lt;br /&gt;
# Use /etc/passwd file to do authentication&lt;br /&gt;
    &lt;br /&gt;
#default authentication = file /etc/passwd&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
# You can use feature like per host key with different enable passwords&lt;br /&gt;
#host = 127.0.0.1 {&lt;br /&gt;
#        key = test &lt;br /&gt;
#        type = cisco&lt;br /&gt;
#        enable = &amp;lt;des|cleartext&amp;gt; enablepass&lt;br /&gt;
#        prompt = &amp;quot;Welcome XXX ISP Access Router \n\nUsername:&amp;quot;&lt;br /&gt;
#}&lt;br /&gt;
&lt;br /&gt;
# We also can define local users and specify a file where data is stored.&lt;br /&gt;
# That file may be filled using tac_pwd&lt;br /&gt;
#user = test1 {&lt;br /&gt;
#    name = &amp;quot;Test User&amp;quot;&lt;br /&gt;
#    member = staff&lt;br /&gt;
#    login = file /etc/tacacs/tacacs_passwords&lt;br /&gt;
#}&lt;br /&gt;
&lt;br /&gt;
# We can also specify rules valid per group of users.&lt;br /&gt;
#group = group1 {&lt;br /&gt;
#       cmd = conf {&lt;br /&gt;
#               deny&lt;br /&gt;
#       }&lt;br /&gt;
#}&lt;br /&gt;
&lt;br /&gt;
# Another example : forbid configure command for some hosts&lt;br /&gt;
# for a define range of clients&lt;br /&gt;
#group = group1 {&lt;br /&gt;
#       login = PAM&lt;br /&gt;
#       service = ppp&lt;br /&gt;
#       protocol = ip {&lt;br /&gt;
#               addr = 10.10.0.0/24&lt;br /&gt;
#       }&lt;br /&gt;
#       cmd = conf {&lt;br /&gt;
#               deny .*&lt;br /&gt;
#       }&lt;br /&gt;
#}&lt;br /&gt;
&lt;br /&gt;
user = DEFAULT {&lt;br /&gt;
        login = PAM&lt;br /&gt;
        service = ppp protocol = ip {}&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
# Much more features are availables, like ACL, more service compatibilities,&lt;br /&gt;
# commands authorization, scripting authorization.&lt;br /&gt;
# See the man page for those features.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Kasutajate autentimist on võimalik tac_plus&#039;s seadistada kolmel moel:&lt;br /&gt;
&lt;br /&gt;
* Autentimine lokaalse passwd faili alusel - /etc/passwd&lt;br /&gt;
* Autentimine /etc/tac_plus/tac_plus.conf faili lisatud DES salajaste võtmetega&lt;br /&gt;
* Autentimine PAM-ga LDAP serveri pihta&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Käsitlen kahte esimest varianti:&lt;br /&gt;
&lt;br /&gt;
===Autentimine passwd faili põhjal===&lt;br /&gt;
&lt;br /&gt;
Lisan TACACS+ võtme , mis tuleb ka hallatava(te)sse ruuteri(te)sse seadistada (sellest juttu edaspidi), kommenteerin välja rea, kus määratakse autentimisandmete allikaks /etc/passwd fail.&lt;br /&gt;
&lt;br /&gt;
Loon grupi &amp;quot;net_admins&amp;quot;, omistan Cisco kõrgeim ligipääsutaseme - privilege level 15. Kasutaja &amp;quot;margus&amp;quot; määran grupi &amp;quot;net_admins&amp;quot; liikmeks.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
key = y97A14T2#741zQ+&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
default authentication = file /etc/passwd&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
group = net_admins {&lt;br /&gt;
        default service = permit&lt;br /&gt;
        login = file /etc/passwd&lt;br /&gt;
        enable = file /etc/passwd&lt;br /&gt;
        service = exec {&lt;br /&gt;
                priv-lvl = 15&lt;br /&gt;
                }&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
user = margus {&lt;br /&gt;
        member = net_admins&lt;br /&gt;
}&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Autentimine DES salajase võtmega===&lt;br /&gt;
&lt;br /&gt;
Loon grupi &amp;quot;uusgrupp&amp;quot;, madalaima ligipääsutasemega - privilege level 0.&lt;br /&gt;
&lt;br /&gt;
Kasutaja &amp;quot;jaan&amp;quot; lisan loodud gruppi ja defineerin krüpteeritud parooli.&lt;br /&gt;
&lt;br /&gt;
Parooli krüpteerimiseks kasutan käsku &amp;lt;code&amp;gt;tac_pwd&amp;lt;/code&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
key = y97A14T2#741zQ+&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
group = uusgrupp {&lt;br /&gt;
        default service = permit &lt;br /&gt;
        service = exec {&lt;br /&gt;
                priv-lvl = 0&lt;br /&gt;
                }&lt;br /&gt;
}&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
user = jaan {&lt;br /&gt;
        login = des UT.e3EErKERm2&lt;br /&gt;
        member = uusgrupp&lt;br /&gt;
}&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Autoriseermine===&lt;br /&gt;
&lt;br /&gt;
Autoriseerimine võimaldab keelata hallatavas võrguseadmes teatud käskude käivitamist. Need reeglid on omistatavad nii kasutajatele kui gruppidele. Reeglid on keelavad või lubavad.&lt;br /&gt;
&lt;br /&gt;
Lihtne näide, kus on loodud grupp &amp;quot;piiratud_ligip22s&amp;quot;, mille liikmetele on lubatud ligipääs vaid ruuterile IP-ga 172.16.1.103.&lt;br /&gt;
&lt;br /&gt;
Grupi liikmetel on keelatud käivitada käske &amp;quot;configure&amp;quot; ega &amp;quot;debug&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
acl = ruuter1_acl {&lt;br /&gt;
        permit = 172.16.1.103&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
group = piiratud_ligip22s {&lt;br /&gt;
        default service = permit&lt;br /&gt;
        login = file /etc/passwd&lt;br /&gt;
        enable = file /etc/passwd&lt;br /&gt;
        service = exec {&lt;br /&gt;
                priv-lvl = 15&lt;br /&gt;
                }&lt;br /&gt;
        cmd = configure {&lt;br /&gt;
                deny &amp;quot;.&amp;quot;&lt;br /&gt;
                }&lt;br /&gt;
        cmd = debug {&lt;br /&gt;
                deny &amp;quot;.&amp;quot;&lt;br /&gt;
                }&lt;br /&gt;
&lt;br /&gt;
        acl = ruuter1_acl&lt;br /&gt;
&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
user = uno {&lt;br /&gt;
        member = piiratud_ligip22s&lt;br /&gt;
}&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Cisco AAA seadistamine==&lt;/div&gt;</summary>
		<author><name>Mkurniko</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=TACACS%2B&amp;diff=59518</id>
		<title>TACACS+</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=TACACS%2B&amp;diff=59518"/>
		<updated>2012-12-15T21:26:21Z</updated>

		<summary type="html">&lt;p&gt;Mkurniko: /* Autoriseermine */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Autor==&lt;br /&gt;
Margus Kurnikov AK21&lt;br /&gt;
&lt;br /&gt;
==Sissejuhatus==&lt;br /&gt;
&lt;br /&gt;
TACACS+ (Terminal Access Controller Access-Control System Plus) on võrguseadmete ligipääsukontrolli protokoll, mis hõlmab endas nii autentimise, autoriseerimise kui ka aruandluse teenuseid. Andmevahetuseks kasutatakse TCP porti 49.&amp;lt;br&amp;gt;&lt;br /&gt;
Erinevalt RADIUS&#039;st, mis on TACACS+ alternatiiv, eristab viimast autoriseerimise funktsionaalsuse lahutamine, mis võimaldab paindlikumat ligipääsukontrolli - kes võib käivitada käske, milliseid käske, millises seadmes. Iga kasutaja poolt sisestatud käsk saadetakse kesksesse TACACS+ serverisse autoriseerimiseks, kus kontrollitakse, kas vastavat käsku on lubatud käivitada konkreetsel kasutajal või grupil. TACACS+ on võimalik luua käskude käivitamisele näiteks kasutaja-, seadme-, või ajapõhiseid reegleid.&amp;lt;br&amp;gt;&lt;br /&gt;
TACACS+ protokolli tugi on olemas levinud suuremate tootjate võrguseadmetes - Cisco, Juniper/Netscreen, HP, Alcatel/Lucent, Ericsson jt.&lt;br /&gt;
&lt;br /&gt;
==Paigaldamine==&lt;br /&gt;
&lt;br /&gt;
TACACS+ teenus paigaldatud Ubuntu 12.04-le.&amp;lt;br&amp;gt;&lt;br /&gt;
Testitava ruuterina kasutusel Cisco 1812.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
TACACS+ teenuse paigaldus:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;apt-get install tacacs+&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Teenuse seadistamine==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Konfiguratsioonifaili manual:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;man tac_plus.conf&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Aruandluse logifail:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;/var/log/tac_plus.acct&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
TACACS+ konfiguratsioonifaili asukoht:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;/etc/tacacs+/tac_plus.conf&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Algupärane konfiguratsioonifail: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
# Created by Henry-Nicolas Tourneur(henry.nicolas@tourneur.be)&lt;br /&gt;
# See man(5) tac_plus.conf for more details&lt;br /&gt;
&lt;br /&gt;
# Define where to log accounting data, this is the default.&lt;br /&gt;
&lt;br /&gt;
accounting file = /var/log/tac_plus.acct&lt;br /&gt;
&lt;br /&gt;
# This is the key that clients have to use to access Tacacs+&lt;br /&gt;
&lt;br /&gt;
key = testing123&lt;br /&gt;
&lt;br /&gt;
# Use /etc/passwd file to do authentication&lt;br /&gt;
    &lt;br /&gt;
#default authentication = file /etc/passwd&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
# You can use feature like per host key with different enable passwords&lt;br /&gt;
#host = 127.0.0.1 {&lt;br /&gt;
#        key = test &lt;br /&gt;
#        type = cisco&lt;br /&gt;
#        enable = &amp;lt;des|cleartext&amp;gt; enablepass&lt;br /&gt;
#        prompt = &amp;quot;Welcome XXX ISP Access Router \n\nUsername:&amp;quot;&lt;br /&gt;
#}&lt;br /&gt;
&lt;br /&gt;
# We also can define local users and specify a file where data is stored.&lt;br /&gt;
# That file may be filled using tac_pwd&lt;br /&gt;
#user = test1 {&lt;br /&gt;
#    name = &amp;quot;Test User&amp;quot;&lt;br /&gt;
#    member = staff&lt;br /&gt;
#    login = file /etc/tacacs/tacacs_passwords&lt;br /&gt;
#}&lt;br /&gt;
&lt;br /&gt;
# We can also specify rules valid per group of users.&lt;br /&gt;
#group = group1 {&lt;br /&gt;
#       cmd = conf {&lt;br /&gt;
#               deny&lt;br /&gt;
#       }&lt;br /&gt;
#}&lt;br /&gt;
&lt;br /&gt;
# Another example : forbid configure command for some hosts&lt;br /&gt;
# for a define range of clients&lt;br /&gt;
#group = group1 {&lt;br /&gt;
#       login = PAM&lt;br /&gt;
#       service = ppp&lt;br /&gt;
#       protocol = ip {&lt;br /&gt;
#               addr = 10.10.0.0/24&lt;br /&gt;
#       }&lt;br /&gt;
#       cmd = conf {&lt;br /&gt;
#               deny .*&lt;br /&gt;
#       }&lt;br /&gt;
#}&lt;br /&gt;
&lt;br /&gt;
user = DEFAULT {&lt;br /&gt;
        login = PAM&lt;br /&gt;
        service = ppp protocol = ip {}&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
# Much more features are availables, like ACL, more service compatibilities,&lt;br /&gt;
# commands authorization, scripting authorization.&lt;br /&gt;
# See the man page for those features.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Kasutajate autentimist on võimalik tac_plus&#039;s seadistada kolmel moel:&lt;br /&gt;
&lt;br /&gt;
* Autentimine lokaalse passwd faili alusel - /etc/passwd&lt;br /&gt;
* Autentimine /etc/tac_plus/tac_plus.conf faili lisatud DES salajaste võtmetega&lt;br /&gt;
* Autentimine PAM-ga LDAP serveri pihta&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Käsitlen kahte esimest varianti:&lt;br /&gt;
&lt;br /&gt;
===Autentimine passwd faili põhjal===&lt;br /&gt;
&lt;br /&gt;
Lisan TACACS+ võtme , mis tuleb ka hallatava(te)sse ruuteri(te)sse seadistada (sellest juttu edaspidi), kommenteerin välja rea, kus määratakse autentimisandmete allikaks /etc/passwd fail.&lt;br /&gt;
&lt;br /&gt;
Loon grupi &amp;quot;net_admins&amp;quot;, omistan Cisco kõrgeim ligipääsutaseme - privilege level 15. Kasutaja &amp;quot;margus&amp;quot; määran grupi &amp;quot;net_admins&amp;quot; liikmeks.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
key = y97A14T2#741zQ+&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
default authentication = file /etc/passwd&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
group = net_admins {&lt;br /&gt;
        default service = permit&lt;br /&gt;
        login = file /etc/passwd&lt;br /&gt;
        enable = file /etc/passwd&lt;br /&gt;
        service = exec {&lt;br /&gt;
                priv-lvl = 15&lt;br /&gt;
                }&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
user = margus {&lt;br /&gt;
        member = net_admins&lt;br /&gt;
}&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Autentimine DES salajase võtmega===&lt;br /&gt;
&lt;br /&gt;
Loon grupi &amp;quot;uusgrupp&amp;quot;, madalaima ligipääsutasemega - privilege level 0.&lt;br /&gt;
&lt;br /&gt;
Kasutaja &amp;quot;jaan&amp;quot; lisan loodud gruppi ja defineerin krüpteeritud parooli.&lt;br /&gt;
&lt;br /&gt;
Parooli krüpteerimiseks kasutan käsku &amp;lt;code&amp;gt;tac_pwd&amp;lt;/code&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
key = y97A14T2#741zQ+&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
group = uusgrupp {&lt;br /&gt;
        default service = permit &lt;br /&gt;
        service = exec {&lt;br /&gt;
                priv-lvl = 0&lt;br /&gt;
                }&lt;br /&gt;
}&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
user = jaan {&lt;br /&gt;
        login = des UT.e3EErKERm2&lt;br /&gt;
        member = uusgrupp&lt;br /&gt;
}&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Autoriseermine===&lt;br /&gt;
&lt;br /&gt;
Autoriseerimine võimaldab keelata hallatavas võrguseadmes teatud käskude käivitamist. Need reeglid on omistatavad nii kasutajatele kui gruppidele. Reeglid on keelavad või lubavad.&lt;br /&gt;
&lt;br /&gt;
Lihtne näide, kus on loodud grupp &amp;quot;piiratud_ligip22s&amp;quot;, mille liikmetele on lubatud ligipääs vaid ruuterile IP-ga 172.16.1.103.&lt;br /&gt;
&lt;br /&gt;
Grupi liikmetel on keelatud käivitada käske &amp;quot;configure&amp;quot; ega &amp;quot;debug&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
acl = ruuter1_acl {&lt;br /&gt;
        permit = 172.16.1.103&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
group = piiratud_ligip22s {&lt;br /&gt;
        default service = permit&lt;br /&gt;
        login = file /etc/passwd&lt;br /&gt;
        enable = file /etc/passwd&lt;br /&gt;
        service = exec {&lt;br /&gt;
                priv-lvl = 15&lt;br /&gt;
                }&lt;br /&gt;
        cmd = configure {&lt;br /&gt;
                deny &amp;quot;.&amp;quot;&lt;br /&gt;
                }&lt;br /&gt;
        cmd = debug {&lt;br /&gt;
                deny &amp;quot;.&amp;quot;&lt;br /&gt;
                }&lt;br /&gt;
&lt;br /&gt;
        acl = ruuter1_acl&lt;br /&gt;
&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
user = uno {&lt;br /&gt;
        member = piiratud_ligip22s&lt;br /&gt;
}&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;/div&gt;</summary>
		<author><name>Mkurniko</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=TACACS%2B&amp;diff=59517</id>
		<title>TACACS+</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=TACACS%2B&amp;diff=59517"/>
		<updated>2012-12-15T21:25:38Z</updated>

		<summary type="html">&lt;p&gt;Mkurniko: /* Autoriseermine */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Autor==&lt;br /&gt;
Margus Kurnikov AK21&lt;br /&gt;
&lt;br /&gt;
==Sissejuhatus==&lt;br /&gt;
&lt;br /&gt;
TACACS+ (Terminal Access Controller Access-Control System Plus) on võrguseadmete ligipääsukontrolli protokoll, mis hõlmab endas nii autentimise, autoriseerimise kui ka aruandluse teenuseid. Andmevahetuseks kasutatakse TCP porti 49.&amp;lt;br&amp;gt;&lt;br /&gt;
Erinevalt RADIUS&#039;st, mis on TACACS+ alternatiiv, eristab viimast autoriseerimise funktsionaalsuse lahutamine, mis võimaldab paindlikumat ligipääsukontrolli - kes võib käivitada käske, milliseid käske, millises seadmes. Iga kasutaja poolt sisestatud käsk saadetakse kesksesse TACACS+ serverisse autoriseerimiseks, kus kontrollitakse, kas vastavat käsku on lubatud käivitada konkreetsel kasutajal või grupil. TACACS+ on võimalik luua käskude käivitamisele näiteks kasutaja-, seadme-, või ajapõhiseid reegleid.&amp;lt;br&amp;gt;&lt;br /&gt;
TACACS+ protokolli tugi on olemas levinud suuremate tootjate võrguseadmetes - Cisco, Juniper/Netscreen, HP, Alcatel/Lucent, Ericsson jt.&lt;br /&gt;
&lt;br /&gt;
==Paigaldamine==&lt;br /&gt;
&lt;br /&gt;
TACACS+ teenus paigaldatud Ubuntu 12.04-le.&amp;lt;br&amp;gt;&lt;br /&gt;
Testitava ruuterina kasutusel Cisco 1812.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
TACACS+ teenuse paigaldus:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;apt-get install tacacs+&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Teenuse seadistamine==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Konfiguratsioonifaili manual:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;man tac_plus.conf&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Aruandluse logifail:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;/var/log/tac_plus.acct&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
TACACS+ konfiguratsioonifaili asukoht:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;/etc/tacacs+/tac_plus.conf&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Algupärane konfiguratsioonifail: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
# Created by Henry-Nicolas Tourneur(henry.nicolas@tourneur.be)&lt;br /&gt;
# See man(5) tac_plus.conf for more details&lt;br /&gt;
&lt;br /&gt;
# Define where to log accounting data, this is the default.&lt;br /&gt;
&lt;br /&gt;
accounting file = /var/log/tac_plus.acct&lt;br /&gt;
&lt;br /&gt;
# This is the key that clients have to use to access Tacacs+&lt;br /&gt;
&lt;br /&gt;
key = testing123&lt;br /&gt;
&lt;br /&gt;
# Use /etc/passwd file to do authentication&lt;br /&gt;
    &lt;br /&gt;
#default authentication = file /etc/passwd&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
# You can use feature like per host key with different enable passwords&lt;br /&gt;
#host = 127.0.0.1 {&lt;br /&gt;
#        key = test &lt;br /&gt;
#        type = cisco&lt;br /&gt;
#        enable = &amp;lt;des|cleartext&amp;gt; enablepass&lt;br /&gt;
#        prompt = &amp;quot;Welcome XXX ISP Access Router \n\nUsername:&amp;quot;&lt;br /&gt;
#}&lt;br /&gt;
&lt;br /&gt;
# We also can define local users and specify a file where data is stored.&lt;br /&gt;
# That file may be filled using tac_pwd&lt;br /&gt;
#user = test1 {&lt;br /&gt;
#    name = &amp;quot;Test User&amp;quot;&lt;br /&gt;
#    member = staff&lt;br /&gt;
#    login = file /etc/tacacs/tacacs_passwords&lt;br /&gt;
#}&lt;br /&gt;
&lt;br /&gt;
# We can also specify rules valid per group of users.&lt;br /&gt;
#group = group1 {&lt;br /&gt;
#       cmd = conf {&lt;br /&gt;
#               deny&lt;br /&gt;
#       }&lt;br /&gt;
#}&lt;br /&gt;
&lt;br /&gt;
# Another example : forbid configure command for some hosts&lt;br /&gt;
# for a define range of clients&lt;br /&gt;
#group = group1 {&lt;br /&gt;
#       login = PAM&lt;br /&gt;
#       service = ppp&lt;br /&gt;
#       protocol = ip {&lt;br /&gt;
#               addr = 10.10.0.0/24&lt;br /&gt;
#       }&lt;br /&gt;
#       cmd = conf {&lt;br /&gt;
#               deny .*&lt;br /&gt;
#       }&lt;br /&gt;
#}&lt;br /&gt;
&lt;br /&gt;
user = DEFAULT {&lt;br /&gt;
        login = PAM&lt;br /&gt;
        service = ppp protocol = ip {}&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
# Much more features are availables, like ACL, more service compatibilities,&lt;br /&gt;
# commands authorization, scripting authorization.&lt;br /&gt;
# See the man page for those features.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Kasutajate autentimist on võimalik tac_plus&#039;s seadistada kolmel moel:&lt;br /&gt;
&lt;br /&gt;
* Autentimine lokaalse passwd faili alusel - /etc/passwd&lt;br /&gt;
* Autentimine /etc/tac_plus/tac_plus.conf faili lisatud DES salajaste võtmetega&lt;br /&gt;
* Autentimine PAM-ga LDAP serveri pihta&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Käsitlen kahte esimest varianti:&lt;br /&gt;
&lt;br /&gt;
===Autentimine passwd faili põhjal===&lt;br /&gt;
&lt;br /&gt;
Lisan TACACS+ võtme , mis tuleb ka hallatava(te)sse ruuteri(te)sse seadistada (sellest juttu edaspidi), kommenteerin välja rea, kus määratakse autentimisandmete allikaks /etc/passwd fail.&lt;br /&gt;
&lt;br /&gt;
Loon grupi &amp;quot;net_admins&amp;quot;, omistan Cisco kõrgeim ligipääsutaseme - privilege level 15. Kasutaja &amp;quot;margus&amp;quot; määran grupi &amp;quot;net_admins&amp;quot; liikmeks.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
key = y97A14T2#741zQ+&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
default authentication = file /etc/passwd&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
group = net_admins {&lt;br /&gt;
        default service = permit&lt;br /&gt;
        login = file /etc/passwd&lt;br /&gt;
        enable = file /etc/passwd&lt;br /&gt;
        service = exec {&lt;br /&gt;
                priv-lvl = 15&lt;br /&gt;
                }&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
user = margus {&lt;br /&gt;
        member = net_admins&lt;br /&gt;
}&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Autentimine DES salajase võtmega===&lt;br /&gt;
&lt;br /&gt;
Loon grupi &amp;quot;uusgrupp&amp;quot;, madalaima ligipääsutasemega - privilege level 0.&lt;br /&gt;
&lt;br /&gt;
Kasutaja &amp;quot;jaan&amp;quot; lisan loodud gruppi ja defineerin krüpteeritud parooli.&lt;br /&gt;
&lt;br /&gt;
Parooli krüpteerimiseks kasutan käsku &amp;lt;code&amp;gt;tac_pwd&amp;lt;/code&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
key = y97A14T2#741zQ+&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
group = uusgrupp {&lt;br /&gt;
        default service = permit &lt;br /&gt;
        service = exec {&lt;br /&gt;
                priv-lvl = 0&lt;br /&gt;
                }&lt;br /&gt;
}&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
user = jaan {&lt;br /&gt;
        login = des UT.e3EErKERm2&lt;br /&gt;
        member = uusgrupp&lt;br /&gt;
}&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Autoriseermine===&lt;br /&gt;
&lt;br /&gt;
Autoriseerimine võimaldab keelata hallatavas võrguseadmes teatud käskude käivitamist. Need reeglid on omistatavad nii kasutajatele kui gruppidele. Reeglid on keelavad või lubavad.&lt;br /&gt;
&lt;br /&gt;
Lihtne näide, kus on loodud grupp &amp;quot;piiratud_ligip22s&amp;quot;, mille liikmetele on lubatud ligipääs vaid ruuterile IP-ga 172.16.1.103.&lt;br /&gt;
&lt;br /&gt;
Grupi liikmetel pole luba käivitada käske &amp;quot;configure&amp;quot; ega &amp;quot;debug&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
acl = ruuter1_acl {&lt;br /&gt;
        permit = 172.16.1.103&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
group = piiratud_ligip22s {&lt;br /&gt;
        default service = permit&lt;br /&gt;
        login = file /etc/passwd&lt;br /&gt;
        enable = file /etc/passwd&lt;br /&gt;
        service = exec {&lt;br /&gt;
                priv-lvl = 15&lt;br /&gt;
                }&lt;br /&gt;
        cmd = configure {&lt;br /&gt;
                deny &amp;quot;.&amp;quot;&lt;br /&gt;
                }&lt;br /&gt;
        cmd = debug {&lt;br /&gt;
                deny &amp;quot;.&amp;quot;&lt;br /&gt;
                }&lt;br /&gt;
&lt;br /&gt;
        acl = ruuter1_acl&lt;br /&gt;
&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
user = uno {&lt;br /&gt;
        member = piiratud_ligip22s&lt;br /&gt;
}&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;/div&gt;</summary>
		<author><name>Mkurniko</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=TACACS%2B&amp;diff=59453</id>
		<title>TACACS+</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=TACACS%2B&amp;diff=59453"/>
		<updated>2012-12-15T19:33:06Z</updated>

		<summary type="html">&lt;p&gt;Mkurniko: /* Autentimine DES salajase võtmega */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Autor==&lt;br /&gt;
Margus Kurnikov AK21&lt;br /&gt;
&lt;br /&gt;
==Sissejuhatus==&lt;br /&gt;
&lt;br /&gt;
TACACS+ (Terminal Access Controller Access-Control System Plus) on võrguseadmete ligipääsukontrolli protokoll, mis hõlmab endas nii autentimise, autoriseerimise kui ka aruandluse teenuseid. Andmevahetuseks kasutatakse TCP porti 49.&amp;lt;br&amp;gt;&lt;br /&gt;
Erinevalt RADIUS&#039;st, mis on TACACS+ alternatiiv, eristab viimast autoriseerimise funktsionaalsuse lahutamine, mis võimaldab paindlikumat ligipääsukontrolli - kes võib käivitada käske, milliseid käske, millises seadmes. Iga kasutaja poolt sisestatud käsk saadetakse kesksesse TACACS+ serverisse autoriseerimiseks, kus kontrollitakse, kas vastavat käsku on lubatud käivitada konkreetsel kasutajal või grupil. TACACS+ on võimalik luua käskude käivitamisele näiteks kasutaja-, seadme-, või ajapõhiseid reegleid.&amp;lt;br&amp;gt;&lt;br /&gt;
TACACS+ protokolli tugi on olemas levinud suuremate tootjate võrguseadmetes - Cisco, Juniper/Netscreen, HP, Alcatel/Lucent, Ericsson jt.&lt;br /&gt;
&lt;br /&gt;
==Paigaldamine==&lt;br /&gt;
&lt;br /&gt;
TACACS+ teenus paigaldatud Ubuntu 12.04-le.&amp;lt;br&amp;gt;&lt;br /&gt;
Testitava ruuterina kasutusel Cisco 1812.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
TACACS+ teenuse paigaldus:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;apt-get install tacacs+&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Teenuse seadistamine==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Konfiguratsioonifaili manual:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;man tac_plus.conf&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Aruandluse logifail:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;/var/log/tac_plus.acct&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
TACACS+ konfiguratsioonifaili asukoht:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;/etc/tacacs+/tac_plus.conf&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Algupärane konfiguratsioonifail: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
# Created by Henry-Nicolas Tourneur(henry.nicolas@tourneur.be)&lt;br /&gt;
# See man(5) tac_plus.conf for more details&lt;br /&gt;
&lt;br /&gt;
# Define where to log accounting data, this is the default.&lt;br /&gt;
&lt;br /&gt;
accounting file = /var/log/tac_plus.acct&lt;br /&gt;
&lt;br /&gt;
# This is the key that clients have to use to access Tacacs+&lt;br /&gt;
&lt;br /&gt;
key = testing123&lt;br /&gt;
&lt;br /&gt;
# Use /etc/passwd file to do authentication&lt;br /&gt;
    &lt;br /&gt;
#default authentication = file /etc/passwd&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
# You can use feature like per host key with different enable passwords&lt;br /&gt;
#host = 127.0.0.1 {&lt;br /&gt;
#        key = test &lt;br /&gt;
#        type = cisco&lt;br /&gt;
#        enable = &amp;lt;des|cleartext&amp;gt; enablepass&lt;br /&gt;
#        prompt = &amp;quot;Welcome XXX ISP Access Router \n\nUsername:&amp;quot;&lt;br /&gt;
#}&lt;br /&gt;
&lt;br /&gt;
# We also can define local users and specify a file where data is stored.&lt;br /&gt;
# That file may be filled using tac_pwd&lt;br /&gt;
#user = test1 {&lt;br /&gt;
#    name = &amp;quot;Test User&amp;quot;&lt;br /&gt;
#    member = staff&lt;br /&gt;
#    login = file /etc/tacacs/tacacs_passwords&lt;br /&gt;
#}&lt;br /&gt;
&lt;br /&gt;
# We can also specify rules valid per group of users.&lt;br /&gt;
#group = group1 {&lt;br /&gt;
#       cmd = conf {&lt;br /&gt;
#               deny&lt;br /&gt;
#       }&lt;br /&gt;
#}&lt;br /&gt;
&lt;br /&gt;
# Another example : forbid configure command for some hosts&lt;br /&gt;
# for a define range of clients&lt;br /&gt;
#group = group1 {&lt;br /&gt;
#       login = PAM&lt;br /&gt;
#       service = ppp&lt;br /&gt;
#       protocol = ip {&lt;br /&gt;
#               addr = 10.10.0.0/24&lt;br /&gt;
#       }&lt;br /&gt;
#       cmd = conf {&lt;br /&gt;
#               deny .*&lt;br /&gt;
#       }&lt;br /&gt;
#}&lt;br /&gt;
&lt;br /&gt;
user = DEFAULT {&lt;br /&gt;
        login = PAM&lt;br /&gt;
        service = ppp protocol = ip {}&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
# Much more features are availables, like ACL, more service compatibilities,&lt;br /&gt;
# commands authorization, scripting authorization.&lt;br /&gt;
# See the man page for those features.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Kasutajate autentimist on võimalik tac_plus&#039;s seadistada kolmel moel:&lt;br /&gt;
&lt;br /&gt;
* Autentimine lokaalse passwd faili alusel - /etc/passwd&lt;br /&gt;
* Autentimine /etc/tac_plus/tac_plus.conf faili lisatud DES salajaste võtmetega&lt;br /&gt;
* Autentimine PAM-ga LDAP serveri pihta&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Käsitlen kahte esimest varianti:&lt;br /&gt;
&lt;br /&gt;
===Autentimine passwd faili põhjal===&lt;br /&gt;
&lt;br /&gt;
Lisan TACACS+ võtme , mis tuleb ka hallatava(te)sse ruuteri(te)sse seadistada (sellest juttu edaspidi), kommenteerin välja rea, kus määratakse autentimisandmete allikaks /etc/passwd fail.&lt;br /&gt;
&lt;br /&gt;
Loon grupi &amp;quot;net_admins&amp;quot;, omistan Cisco kõrgeim ligipääsutaseme - privilege level 15. Kasutaja &amp;quot;margus&amp;quot; määran grupi &amp;quot;net_admins&amp;quot; liikmeks.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
key = y97A14T2#741zQ+&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
default authentication = file /etc/passwd&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
group = net_admins {&lt;br /&gt;
        default service = permit&lt;br /&gt;
        login = file /etc/passwd&lt;br /&gt;
        enable = file /etc/passwd&lt;br /&gt;
        service = exec {&lt;br /&gt;
                priv-lvl = 15&lt;br /&gt;
                }&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
user = margus {&lt;br /&gt;
        member = net_admins&lt;br /&gt;
}&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Autentimine DES salajase võtmega===&lt;br /&gt;
&lt;br /&gt;
Loon grupi &amp;quot;uusgrupp&amp;quot;, madalaima ligipääsutasemega - privilege level 0.&lt;br /&gt;
&lt;br /&gt;
Kasutaja &amp;quot;jaan&amp;quot; lisan loodud gruppi ja defineerin krüpteeritud parooli.&lt;br /&gt;
&lt;br /&gt;
Parooli krüpteerimiseks kasutan käsku &amp;lt;code&amp;gt;tac_pwd&amp;lt;/code&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
key = y97A14T2#741zQ+&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
group = uusgrupp {&lt;br /&gt;
        default service = permit &lt;br /&gt;
        service = exec {&lt;br /&gt;
                priv-lvl = 0&lt;br /&gt;
                }&lt;br /&gt;
}&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
user = jaan {&lt;br /&gt;
        login = des UT.e3EErKERm2&lt;br /&gt;
        member = uusgrupp&lt;br /&gt;
}&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Autoriseermine===&lt;/div&gt;</summary>
		<author><name>Mkurniko</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=TACACS%2B&amp;diff=59452</id>
		<title>TACACS+</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=TACACS%2B&amp;diff=59452"/>
		<updated>2012-12-15T19:32:50Z</updated>

		<summary type="html">&lt;p&gt;Mkurniko: /* Autentimine DES salajase võtmega */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Autor==&lt;br /&gt;
Margus Kurnikov AK21&lt;br /&gt;
&lt;br /&gt;
==Sissejuhatus==&lt;br /&gt;
&lt;br /&gt;
TACACS+ (Terminal Access Controller Access-Control System Plus) on võrguseadmete ligipääsukontrolli protokoll, mis hõlmab endas nii autentimise, autoriseerimise kui ka aruandluse teenuseid. Andmevahetuseks kasutatakse TCP porti 49.&amp;lt;br&amp;gt;&lt;br /&gt;
Erinevalt RADIUS&#039;st, mis on TACACS+ alternatiiv, eristab viimast autoriseerimise funktsionaalsuse lahutamine, mis võimaldab paindlikumat ligipääsukontrolli - kes võib käivitada käske, milliseid käske, millises seadmes. Iga kasutaja poolt sisestatud käsk saadetakse kesksesse TACACS+ serverisse autoriseerimiseks, kus kontrollitakse, kas vastavat käsku on lubatud käivitada konkreetsel kasutajal või grupil. TACACS+ on võimalik luua käskude käivitamisele näiteks kasutaja-, seadme-, või ajapõhiseid reegleid.&amp;lt;br&amp;gt;&lt;br /&gt;
TACACS+ protokolli tugi on olemas levinud suuremate tootjate võrguseadmetes - Cisco, Juniper/Netscreen, HP, Alcatel/Lucent, Ericsson jt.&lt;br /&gt;
&lt;br /&gt;
==Paigaldamine==&lt;br /&gt;
&lt;br /&gt;
TACACS+ teenus paigaldatud Ubuntu 12.04-le.&amp;lt;br&amp;gt;&lt;br /&gt;
Testitava ruuterina kasutusel Cisco 1812.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
TACACS+ teenuse paigaldus:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;apt-get install tacacs+&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Teenuse seadistamine==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Konfiguratsioonifaili manual:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;man tac_plus.conf&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Aruandluse logifail:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;/var/log/tac_plus.acct&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
TACACS+ konfiguratsioonifaili asukoht:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;/etc/tacacs+/tac_plus.conf&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Algupärane konfiguratsioonifail: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
# Created by Henry-Nicolas Tourneur(henry.nicolas@tourneur.be)&lt;br /&gt;
# See man(5) tac_plus.conf for more details&lt;br /&gt;
&lt;br /&gt;
# Define where to log accounting data, this is the default.&lt;br /&gt;
&lt;br /&gt;
accounting file = /var/log/tac_plus.acct&lt;br /&gt;
&lt;br /&gt;
# This is the key that clients have to use to access Tacacs+&lt;br /&gt;
&lt;br /&gt;
key = testing123&lt;br /&gt;
&lt;br /&gt;
# Use /etc/passwd file to do authentication&lt;br /&gt;
    &lt;br /&gt;
#default authentication = file /etc/passwd&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
# You can use feature like per host key with different enable passwords&lt;br /&gt;
#host = 127.0.0.1 {&lt;br /&gt;
#        key = test &lt;br /&gt;
#        type = cisco&lt;br /&gt;
#        enable = &amp;lt;des|cleartext&amp;gt; enablepass&lt;br /&gt;
#        prompt = &amp;quot;Welcome XXX ISP Access Router \n\nUsername:&amp;quot;&lt;br /&gt;
#}&lt;br /&gt;
&lt;br /&gt;
# We also can define local users and specify a file where data is stored.&lt;br /&gt;
# That file may be filled using tac_pwd&lt;br /&gt;
#user = test1 {&lt;br /&gt;
#    name = &amp;quot;Test User&amp;quot;&lt;br /&gt;
#    member = staff&lt;br /&gt;
#    login = file /etc/tacacs/tacacs_passwords&lt;br /&gt;
#}&lt;br /&gt;
&lt;br /&gt;
# We can also specify rules valid per group of users.&lt;br /&gt;
#group = group1 {&lt;br /&gt;
#       cmd = conf {&lt;br /&gt;
#               deny&lt;br /&gt;
#       }&lt;br /&gt;
#}&lt;br /&gt;
&lt;br /&gt;
# Another example : forbid configure command for some hosts&lt;br /&gt;
# for a define range of clients&lt;br /&gt;
#group = group1 {&lt;br /&gt;
#       login = PAM&lt;br /&gt;
#       service = ppp&lt;br /&gt;
#       protocol = ip {&lt;br /&gt;
#               addr = 10.10.0.0/24&lt;br /&gt;
#       }&lt;br /&gt;
#       cmd = conf {&lt;br /&gt;
#               deny .*&lt;br /&gt;
#       }&lt;br /&gt;
#}&lt;br /&gt;
&lt;br /&gt;
user = DEFAULT {&lt;br /&gt;
        login = PAM&lt;br /&gt;
        service = ppp protocol = ip {}&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
# Much more features are availables, like ACL, more service compatibilities,&lt;br /&gt;
# commands authorization, scripting authorization.&lt;br /&gt;
# See the man page for those features.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Kasutajate autentimist on võimalik tac_plus&#039;s seadistada kolmel moel:&lt;br /&gt;
&lt;br /&gt;
* Autentimine lokaalse passwd faili alusel - /etc/passwd&lt;br /&gt;
* Autentimine /etc/tac_plus/tac_plus.conf faili lisatud DES salajaste võtmetega&lt;br /&gt;
* Autentimine PAM-ga LDAP serveri pihta&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Käsitlen kahte esimest varianti:&lt;br /&gt;
&lt;br /&gt;
===Autentimine passwd faili põhjal===&lt;br /&gt;
&lt;br /&gt;
Lisan TACACS+ võtme , mis tuleb ka hallatava(te)sse ruuteri(te)sse seadistada (sellest juttu edaspidi), kommenteerin välja rea, kus määratakse autentimisandmete allikaks /etc/passwd fail.&lt;br /&gt;
&lt;br /&gt;
Loon grupi &amp;quot;net_admins&amp;quot;, omistan Cisco kõrgeim ligipääsutaseme - privilege level 15. Kasutaja &amp;quot;margus&amp;quot; määran grupi &amp;quot;net_admins&amp;quot; liikmeks.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
key = y97A14T2#741zQ+&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
default authentication = file /etc/passwd&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
group = net_admins {&lt;br /&gt;
        default service = permit&lt;br /&gt;
        login = file /etc/passwd&lt;br /&gt;
        enable = file /etc/passwd&lt;br /&gt;
        service = exec {&lt;br /&gt;
                priv-lvl = 15&lt;br /&gt;
                }&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
user = margus {&lt;br /&gt;
        member = net_admins&lt;br /&gt;
}&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Autentimine DES salajase võtmega===&lt;br /&gt;
&lt;br /&gt;
Loon grupi &amp;quot;uusgrupp&amp;quot;, madalaima ligipääsutasemega - privilege level 0.&lt;br /&gt;
&lt;br /&gt;
Kasutaja &amp;quot;jaan&amp;quot; lisan loodud gruppi ja defineerin krüpteeritud parooli.&lt;br /&gt;
&lt;br /&gt;
Parooli krüpteerimiseks kasutan käsku &amp;lt;code&amp;gt;tac_pwd&amp;lt;/code&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
key = y97A14T2#741zQ+&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
group = uusgrupp {&lt;br /&gt;
        default service = perit &lt;br /&gt;
        service = exec {&lt;br /&gt;
                priv-lvl = 0&lt;br /&gt;
                }&lt;br /&gt;
}&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
user = jaan {&lt;br /&gt;
        login = des UT.e3EErKERm2&lt;br /&gt;
        member = uusgrupp&lt;br /&gt;
}&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Autoriseermine===&lt;/div&gt;</summary>
		<author><name>Mkurniko</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=TACACS%2B&amp;diff=59451</id>
		<title>TACACS+</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=TACACS%2B&amp;diff=59451"/>
		<updated>2012-12-15T19:31:39Z</updated>

		<summary type="html">&lt;p&gt;Mkurniko: /* Autoriseermine */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Autor==&lt;br /&gt;
Margus Kurnikov AK21&lt;br /&gt;
&lt;br /&gt;
==Sissejuhatus==&lt;br /&gt;
&lt;br /&gt;
TACACS+ (Terminal Access Controller Access-Control System Plus) on võrguseadmete ligipääsukontrolli protokoll, mis hõlmab endas nii autentimise, autoriseerimise kui ka aruandluse teenuseid. Andmevahetuseks kasutatakse TCP porti 49.&amp;lt;br&amp;gt;&lt;br /&gt;
Erinevalt RADIUS&#039;st, mis on TACACS+ alternatiiv, eristab viimast autoriseerimise funktsionaalsuse lahutamine, mis võimaldab paindlikumat ligipääsukontrolli - kes võib käivitada käske, milliseid käske, millises seadmes. Iga kasutaja poolt sisestatud käsk saadetakse kesksesse TACACS+ serverisse autoriseerimiseks, kus kontrollitakse, kas vastavat käsku on lubatud käivitada konkreetsel kasutajal või grupil. TACACS+ on võimalik luua käskude käivitamisele näiteks kasutaja-, seadme-, või ajapõhiseid reegleid.&amp;lt;br&amp;gt;&lt;br /&gt;
TACACS+ protokolli tugi on olemas levinud suuremate tootjate võrguseadmetes - Cisco, Juniper/Netscreen, HP, Alcatel/Lucent, Ericsson jt.&lt;br /&gt;
&lt;br /&gt;
==Paigaldamine==&lt;br /&gt;
&lt;br /&gt;
TACACS+ teenus paigaldatud Ubuntu 12.04-le.&amp;lt;br&amp;gt;&lt;br /&gt;
Testitava ruuterina kasutusel Cisco 1812.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
TACACS+ teenuse paigaldus:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;apt-get install tacacs+&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Teenuse seadistamine==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Konfiguratsioonifaili manual:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;man tac_plus.conf&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Aruandluse logifail:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;/var/log/tac_plus.acct&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
TACACS+ konfiguratsioonifaili asukoht:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;/etc/tacacs+/tac_plus.conf&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Algupärane konfiguratsioonifail: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
# Created by Henry-Nicolas Tourneur(henry.nicolas@tourneur.be)&lt;br /&gt;
# See man(5) tac_plus.conf for more details&lt;br /&gt;
&lt;br /&gt;
# Define where to log accounting data, this is the default.&lt;br /&gt;
&lt;br /&gt;
accounting file = /var/log/tac_plus.acct&lt;br /&gt;
&lt;br /&gt;
# This is the key that clients have to use to access Tacacs+&lt;br /&gt;
&lt;br /&gt;
key = testing123&lt;br /&gt;
&lt;br /&gt;
# Use /etc/passwd file to do authentication&lt;br /&gt;
    &lt;br /&gt;
#default authentication = file /etc/passwd&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
# You can use feature like per host key with different enable passwords&lt;br /&gt;
#host = 127.0.0.1 {&lt;br /&gt;
#        key = test &lt;br /&gt;
#        type = cisco&lt;br /&gt;
#        enable = &amp;lt;des|cleartext&amp;gt; enablepass&lt;br /&gt;
#        prompt = &amp;quot;Welcome XXX ISP Access Router \n\nUsername:&amp;quot;&lt;br /&gt;
#}&lt;br /&gt;
&lt;br /&gt;
# We also can define local users and specify a file where data is stored.&lt;br /&gt;
# That file may be filled using tac_pwd&lt;br /&gt;
#user = test1 {&lt;br /&gt;
#    name = &amp;quot;Test User&amp;quot;&lt;br /&gt;
#    member = staff&lt;br /&gt;
#    login = file /etc/tacacs/tacacs_passwords&lt;br /&gt;
#}&lt;br /&gt;
&lt;br /&gt;
# We can also specify rules valid per group of users.&lt;br /&gt;
#group = group1 {&lt;br /&gt;
#       cmd = conf {&lt;br /&gt;
#               deny&lt;br /&gt;
#       }&lt;br /&gt;
#}&lt;br /&gt;
&lt;br /&gt;
# Another example : forbid configure command for some hosts&lt;br /&gt;
# for a define range of clients&lt;br /&gt;
#group = group1 {&lt;br /&gt;
#       login = PAM&lt;br /&gt;
#       service = ppp&lt;br /&gt;
#       protocol = ip {&lt;br /&gt;
#               addr = 10.10.0.0/24&lt;br /&gt;
#       }&lt;br /&gt;
#       cmd = conf {&lt;br /&gt;
#               deny .*&lt;br /&gt;
#       }&lt;br /&gt;
#}&lt;br /&gt;
&lt;br /&gt;
user = DEFAULT {&lt;br /&gt;
        login = PAM&lt;br /&gt;
        service = ppp protocol = ip {}&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
# Much more features are availables, like ACL, more service compatibilities,&lt;br /&gt;
# commands authorization, scripting authorization.&lt;br /&gt;
# See the man page for those features.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Kasutajate autentimist on võimalik tac_plus&#039;s seadistada kolmel moel:&lt;br /&gt;
&lt;br /&gt;
* Autentimine lokaalse passwd faili alusel - /etc/passwd&lt;br /&gt;
* Autentimine /etc/tac_plus/tac_plus.conf faili lisatud DES salajaste võtmetega&lt;br /&gt;
* Autentimine PAM-ga LDAP serveri pihta&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Käsitlen kahte esimest varianti:&lt;br /&gt;
&lt;br /&gt;
===Autentimine passwd faili põhjal===&lt;br /&gt;
&lt;br /&gt;
Lisan TACACS+ võtme , mis tuleb ka hallatava(te)sse ruuteri(te)sse seadistada (sellest juttu edaspidi), kommenteerin välja rea, kus määratakse autentimisandmete allikaks /etc/passwd fail.&lt;br /&gt;
&lt;br /&gt;
Loon grupi &amp;quot;net_admins&amp;quot;, omistan Cisco kõrgeim ligipääsutaseme - privilege level 15. Kasutaja &amp;quot;margus&amp;quot; määran grupi &amp;quot;net_admins&amp;quot; liikmeks.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
key = y97A14T2#741zQ+&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
default authentication = file /etc/passwd&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
group = net_admins {&lt;br /&gt;
        default service = permit&lt;br /&gt;
        login = file /etc/passwd&lt;br /&gt;
        enable = file /etc/passwd&lt;br /&gt;
        service = exec {&lt;br /&gt;
                priv-lvl = 15&lt;br /&gt;
                }&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
user = margus {&lt;br /&gt;
        member = net_admins&lt;br /&gt;
}&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Autentimine DES salajase võtmega===&lt;br /&gt;
&lt;br /&gt;
Loon grupi &amp;quot;uusgrupp&amp;quot;, madalaima ligipääsutasemega - privilege level 0.&lt;br /&gt;
&lt;br /&gt;
Kasutaja &amp;quot;jaan&amp;quot; lisan loodud gruppi ja defineerin krüpteeritud parooli.&lt;br /&gt;
&lt;br /&gt;
Parooli krüpteerimiseks kasutan käsku &amp;lt;code&amp;gt;tac_pwd&amp;lt;/code&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
group = uusgrupp {&lt;br /&gt;
        default service = perit &lt;br /&gt;
        service = exec {&lt;br /&gt;
                priv-lvl = 0&lt;br /&gt;
                }&lt;br /&gt;
}&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
user = jaan {&lt;br /&gt;
        login = des UT.e3EErKERm2&lt;br /&gt;
        member = uusgrupp&lt;br /&gt;
}&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Autoriseermine===&lt;/div&gt;</summary>
		<author><name>Mkurniko</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=TACACS%2B&amp;diff=59450</id>
		<title>TACACS+</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=TACACS%2B&amp;diff=59450"/>
		<updated>2012-12-15T19:31:17Z</updated>

		<summary type="html">&lt;p&gt;Mkurniko: /* Autentimine DES salajase võtmega */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Autor==&lt;br /&gt;
Margus Kurnikov AK21&lt;br /&gt;
&lt;br /&gt;
==Sissejuhatus==&lt;br /&gt;
&lt;br /&gt;
TACACS+ (Terminal Access Controller Access-Control System Plus) on võrguseadmete ligipääsukontrolli protokoll, mis hõlmab endas nii autentimise, autoriseerimise kui ka aruandluse teenuseid. Andmevahetuseks kasutatakse TCP porti 49.&amp;lt;br&amp;gt;&lt;br /&gt;
Erinevalt RADIUS&#039;st, mis on TACACS+ alternatiiv, eristab viimast autoriseerimise funktsionaalsuse lahutamine, mis võimaldab paindlikumat ligipääsukontrolli - kes võib käivitada käske, milliseid käske, millises seadmes. Iga kasutaja poolt sisestatud käsk saadetakse kesksesse TACACS+ serverisse autoriseerimiseks, kus kontrollitakse, kas vastavat käsku on lubatud käivitada konkreetsel kasutajal või grupil. TACACS+ on võimalik luua käskude käivitamisele näiteks kasutaja-, seadme-, või ajapõhiseid reegleid.&amp;lt;br&amp;gt;&lt;br /&gt;
TACACS+ protokolli tugi on olemas levinud suuremate tootjate võrguseadmetes - Cisco, Juniper/Netscreen, HP, Alcatel/Lucent, Ericsson jt.&lt;br /&gt;
&lt;br /&gt;
==Paigaldamine==&lt;br /&gt;
&lt;br /&gt;
TACACS+ teenus paigaldatud Ubuntu 12.04-le.&amp;lt;br&amp;gt;&lt;br /&gt;
Testitava ruuterina kasutusel Cisco 1812.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
TACACS+ teenuse paigaldus:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;apt-get install tacacs+&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Teenuse seadistamine==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Konfiguratsioonifaili manual:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;man tac_plus.conf&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Aruandluse logifail:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;/var/log/tac_plus.acct&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
TACACS+ konfiguratsioonifaili asukoht:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;/etc/tacacs+/tac_plus.conf&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Algupärane konfiguratsioonifail: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
# Created by Henry-Nicolas Tourneur(henry.nicolas@tourneur.be)&lt;br /&gt;
# See man(5) tac_plus.conf for more details&lt;br /&gt;
&lt;br /&gt;
# Define where to log accounting data, this is the default.&lt;br /&gt;
&lt;br /&gt;
accounting file = /var/log/tac_plus.acct&lt;br /&gt;
&lt;br /&gt;
# This is the key that clients have to use to access Tacacs+&lt;br /&gt;
&lt;br /&gt;
key = testing123&lt;br /&gt;
&lt;br /&gt;
# Use /etc/passwd file to do authentication&lt;br /&gt;
    &lt;br /&gt;
#default authentication = file /etc/passwd&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
# You can use feature like per host key with different enable passwords&lt;br /&gt;
#host = 127.0.0.1 {&lt;br /&gt;
#        key = test &lt;br /&gt;
#        type = cisco&lt;br /&gt;
#        enable = &amp;lt;des|cleartext&amp;gt; enablepass&lt;br /&gt;
#        prompt = &amp;quot;Welcome XXX ISP Access Router \n\nUsername:&amp;quot;&lt;br /&gt;
#}&lt;br /&gt;
&lt;br /&gt;
# We also can define local users and specify a file where data is stored.&lt;br /&gt;
# That file may be filled using tac_pwd&lt;br /&gt;
#user = test1 {&lt;br /&gt;
#    name = &amp;quot;Test User&amp;quot;&lt;br /&gt;
#    member = staff&lt;br /&gt;
#    login = file /etc/tacacs/tacacs_passwords&lt;br /&gt;
#}&lt;br /&gt;
&lt;br /&gt;
# We can also specify rules valid per group of users.&lt;br /&gt;
#group = group1 {&lt;br /&gt;
#       cmd = conf {&lt;br /&gt;
#               deny&lt;br /&gt;
#       }&lt;br /&gt;
#}&lt;br /&gt;
&lt;br /&gt;
# Another example : forbid configure command for some hosts&lt;br /&gt;
# for a define range of clients&lt;br /&gt;
#group = group1 {&lt;br /&gt;
#       login = PAM&lt;br /&gt;
#       service = ppp&lt;br /&gt;
#       protocol = ip {&lt;br /&gt;
#               addr = 10.10.0.0/24&lt;br /&gt;
#       }&lt;br /&gt;
#       cmd = conf {&lt;br /&gt;
#               deny .*&lt;br /&gt;
#       }&lt;br /&gt;
#}&lt;br /&gt;
&lt;br /&gt;
user = DEFAULT {&lt;br /&gt;
        login = PAM&lt;br /&gt;
        service = ppp protocol = ip {}&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
# Much more features are availables, like ACL, more service compatibilities,&lt;br /&gt;
# commands authorization, scripting authorization.&lt;br /&gt;
# See the man page for those features.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Kasutajate autentimist on võimalik tac_plus&#039;s seadistada kolmel moel:&lt;br /&gt;
&lt;br /&gt;
* Autentimine lokaalse passwd faili alusel - /etc/passwd&lt;br /&gt;
* Autentimine /etc/tac_plus/tac_plus.conf faili lisatud DES salajaste võtmetega&lt;br /&gt;
* Autentimine PAM-ga LDAP serveri pihta&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Käsitlen kahte esimest varianti:&lt;br /&gt;
&lt;br /&gt;
===Autentimine passwd faili põhjal===&lt;br /&gt;
&lt;br /&gt;
Lisan TACACS+ võtme , mis tuleb ka hallatava(te)sse ruuteri(te)sse seadistada (sellest juttu edaspidi), kommenteerin välja rea, kus määratakse autentimisandmete allikaks /etc/passwd fail.&lt;br /&gt;
&lt;br /&gt;
Loon grupi &amp;quot;net_admins&amp;quot;, omistan Cisco kõrgeim ligipääsutaseme - privilege level 15. Kasutaja &amp;quot;margus&amp;quot; määran grupi &amp;quot;net_admins&amp;quot; liikmeks.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
key = y97A14T2#741zQ+&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
default authentication = file /etc/passwd&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
group = net_admins {&lt;br /&gt;
        default service = permit&lt;br /&gt;
        login = file /etc/passwd&lt;br /&gt;
        enable = file /etc/passwd&lt;br /&gt;
        service = exec {&lt;br /&gt;
                priv-lvl = 15&lt;br /&gt;
                }&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
user = margus {&lt;br /&gt;
        member = net_admins&lt;br /&gt;
}&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Autentimine DES salajase võtmega===&lt;br /&gt;
&lt;br /&gt;
Loon grupi &amp;quot;uusgrupp&amp;quot;, madalaima ligipääsutasemega - privilege level 0.&lt;br /&gt;
&lt;br /&gt;
Kasutaja &amp;quot;jaan&amp;quot; lisan loodud gruppi ja defineerin krüpteeritud parooli.&lt;br /&gt;
&lt;br /&gt;
Parooli krüpteerimiseks kasutan käsku &amp;lt;code&amp;gt;tac_pwd&amp;lt;/code&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
group = uusgrupp {&lt;br /&gt;
        default service = perit &lt;br /&gt;
        service = exec {&lt;br /&gt;
                priv-lvl = 0&lt;br /&gt;
                }&lt;br /&gt;
}&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
user = jaan {&lt;br /&gt;
        login = des UT.e3EErKERm2&lt;br /&gt;
        member = uusgrupp&lt;br /&gt;
}&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Autoriseermine==&lt;/div&gt;</summary>
		<author><name>Mkurniko</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=TACACS%2B&amp;diff=59449</id>
		<title>TACACS+</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=TACACS%2B&amp;diff=59449"/>
		<updated>2012-12-15T19:26:29Z</updated>

		<summary type="html">&lt;p&gt;Mkurniko: /* Autentimine DES salajase võtmega */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Autor==&lt;br /&gt;
Margus Kurnikov AK21&lt;br /&gt;
&lt;br /&gt;
==Sissejuhatus==&lt;br /&gt;
&lt;br /&gt;
TACACS+ (Terminal Access Controller Access-Control System Plus) on võrguseadmete ligipääsukontrolli protokoll, mis hõlmab endas nii autentimise, autoriseerimise kui ka aruandluse teenuseid. Andmevahetuseks kasutatakse TCP porti 49.&amp;lt;br&amp;gt;&lt;br /&gt;
Erinevalt RADIUS&#039;st, mis on TACACS+ alternatiiv, eristab viimast autoriseerimise funktsionaalsuse lahutamine, mis võimaldab paindlikumat ligipääsukontrolli - kes võib käivitada käske, milliseid käske, millises seadmes. Iga kasutaja poolt sisestatud käsk saadetakse kesksesse TACACS+ serverisse autoriseerimiseks, kus kontrollitakse, kas vastavat käsku on lubatud käivitada konkreetsel kasutajal või grupil. TACACS+ on võimalik luua käskude käivitamisele näiteks kasutaja-, seadme-, või ajapõhiseid reegleid.&amp;lt;br&amp;gt;&lt;br /&gt;
TACACS+ protokolli tugi on olemas levinud suuremate tootjate võrguseadmetes - Cisco, Juniper/Netscreen, HP, Alcatel/Lucent, Ericsson jt.&lt;br /&gt;
&lt;br /&gt;
==Paigaldamine==&lt;br /&gt;
&lt;br /&gt;
TACACS+ teenus paigaldatud Ubuntu 12.04-le.&amp;lt;br&amp;gt;&lt;br /&gt;
Testitava ruuterina kasutusel Cisco 1812.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
TACACS+ teenuse paigaldus:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;apt-get install tacacs+&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Teenuse seadistamine==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Konfiguratsioonifaili manual:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;man tac_plus.conf&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Aruandluse logifail:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;/var/log/tac_plus.acct&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
TACACS+ konfiguratsioonifaili asukoht:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;/etc/tacacs+/tac_plus.conf&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Algupärane konfiguratsioonifail: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
# Created by Henry-Nicolas Tourneur(henry.nicolas@tourneur.be)&lt;br /&gt;
# See man(5) tac_plus.conf for more details&lt;br /&gt;
&lt;br /&gt;
# Define where to log accounting data, this is the default.&lt;br /&gt;
&lt;br /&gt;
accounting file = /var/log/tac_plus.acct&lt;br /&gt;
&lt;br /&gt;
# This is the key that clients have to use to access Tacacs+&lt;br /&gt;
&lt;br /&gt;
key = testing123&lt;br /&gt;
&lt;br /&gt;
# Use /etc/passwd file to do authentication&lt;br /&gt;
    &lt;br /&gt;
#default authentication = file /etc/passwd&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
# You can use feature like per host key with different enable passwords&lt;br /&gt;
#host = 127.0.0.1 {&lt;br /&gt;
#        key = test &lt;br /&gt;
#        type = cisco&lt;br /&gt;
#        enable = &amp;lt;des|cleartext&amp;gt; enablepass&lt;br /&gt;
#        prompt = &amp;quot;Welcome XXX ISP Access Router \n\nUsername:&amp;quot;&lt;br /&gt;
#}&lt;br /&gt;
&lt;br /&gt;
# We also can define local users and specify a file where data is stored.&lt;br /&gt;
# That file may be filled using tac_pwd&lt;br /&gt;
#user = test1 {&lt;br /&gt;
#    name = &amp;quot;Test User&amp;quot;&lt;br /&gt;
#    member = staff&lt;br /&gt;
#    login = file /etc/tacacs/tacacs_passwords&lt;br /&gt;
#}&lt;br /&gt;
&lt;br /&gt;
# We can also specify rules valid per group of users.&lt;br /&gt;
#group = group1 {&lt;br /&gt;
#       cmd = conf {&lt;br /&gt;
#               deny&lt;br /&gt;
#       }&lt;br /&gt;
#}&lt;br /&gt;
&lt;br /&gt;
# Another example : forbid configure command for some hosts&lt;br /&gt;
# for a define range of clients&lt;br /&gt;
#group = group1 {&lt;br /&gt;
#       login = PAM&lt;br /&gt;
#       service = ppp&lt;br /&gt;
#       protocol = ip {&lt;br /&gt;
#               addr = 10.10.0.0/24&lt;br /&gt;
#       }&lt;br /&gt;
#       cmd = conf {&lt;br /&gt;
#               deny .*&lt;br /&gt;
#       }&lt;br /&gt;
#}&lt;br /&gt;
&lt;br /&gt;
user = DEFAULT {&lt;br /&gt;
        login = PAM&lt;br /&gt;
        service = ppp protocol = ip {}&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
# Much more features are availables, like ACL, more service compatibilities,&lt;br /&gt;
# commands authorization, scripting authorization.&lt;br /&gt;
# See the man page for those features.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Kasutajate autentimist on võimalik tac_plus&#039;s seadistada kolmel moel:&lt;br /&gt;
&lt;br /&gt;
* Autentimine lokaalse passwd faili alusel - /etc/passwd&lt;br /&gt;
* Autentimine /etc/tac_plus/tac_plus.conf faili lisatud DES salajaste võtmetega&lt;br /&gt;
* Autentimine PAM-ga LDAP serveri pihta&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Käsitlen kahte esimest varianti:&lt;br /&gt;
&lt;br /&gt;
===Autentimine passwd faili põhjal===&lt;br /&gt;
&lt;br /&gt;
Lisan TACACS+ võtme , mis tuleb ka hallatava(te)sse ruuteri(te)sse seadistada (sellest juttu edaspidi), kommenteerin välja rea, kus määratakse autentimisandmete allikaks /etc/passwd fail.&lt;br /&gt;
&lt;br /&gt;
Loon grupi &amp;quot;net_admins&amp;quot;, omistan Cisco kõrgeim ligipääsutaseme - privilege level 15. Kasutaja &amp;quot;margus&amp;quot; määran grupi &amp;quot;net_admins&amp;quot; liikmeks.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
key = y97A14T2#741zQ+&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
default authentication = file /etc/passwd&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
group = net_admins {&lt;br /&gt;
        default service = permit&lt;br /&gt;
        login = file /etc/passwd&lt;br /&gt;
        enable = file /etc/passwd&lt;br /&gt;
        service = exec {&lt;br /&gt;
                priv-lvl = 15&lt;br /&gt;
                }&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
user = margus {&lt;br /&gt;
        member = net_admins&lt;br /&gt;
}&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Autentimine DES salajase võtmega===&lt;br /&gt;
&lt;br /&gt;
Loon grupi &amp;quot;uusgrupp&amp;quot;, madalaima ligipääsutasemega - privilege level 0.&lt;br /&gt;
&lt;br /&gt;
Kasutaja &amp;quot;jaan&amp;quot; lisan loodud gruppi ja defineerin krüpteeritud parooli.&lt;br /&gt;
&lt;br /&gt;
Parooli krüpteerimiseks kasutan käsku &amp;lt;code&amp;gt;tac_pwd&amp;lt;/code&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
group = uusgrupp {&lt;br /&gt;
        default service = perit &lt;br /&gt;
        service = exec {&lt;br /&gt;
                priv-lvl = 0&lt;br /&gt;
                }&lt;br /&gt;
}&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
user = jaan {&lt;br /&gt;
        login = des UT.e3EErKERm2&lt;br /&gt;
        member = uusgrupp&lt;br /&gt;
}&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;/div&gt;</summary>
		<author><name>Mkurniko</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=TACACS%2B&amp;diff=59448</id>
		<title>TACACS+</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=TACACS%2B&amp;diff=59448"/>
		<updated>2012-12-15T19:09:01Z</updated>

		<summary type="html">&lt;p&gt;Mkurniko: /* Autentimine passwd faili põhjal */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Autor==&lt;br /&gt;
Margus Kurnikov AK21&lt;br /&gt;
&lt;br /&gt;
==Sissejuhatus==&lt;br /&gt;
&lt;br /&gt;
TACACS+ (Terminal Access Controller Access-Control System Plus) on võrguseadmete ligipääsukontrolli protokoll, mis hõlmab endas nii autentimise, autoriseerimise kui ka aruandluse teenuseid. Andmevahetuseks kasutatakse TCP porti 49.&amp;lt;br&amp;gt;&lt;br /&gt;
Erinevalt RADIUS&#039;st, mis on TACACS+ alternatiiv, eristab viimast autoriseerimise funktsionaalsuse lahutamine, mis võimaldab paindlikumat ligipääsukontrolli - kes võib käivitada käske, milliseid käske, millises seadmes. Iga kasutaja poolt sisestatud käsk saadetakse kesksesse TACACS+ serverisse autoriseerimiseks, kus kontrollitakse, kas vastavat käsku on lubatud käivitada konkreetsel kasutajal või grupil. TACACS+ on võimalik luua käskude käivitamisele näiteks kasutaja-, seadme-, või ajapõhiseid reegleid.&amp;lt;br&amp;gt;&lt;br /&gt;
TACACS+ protokolli tugi on olemas levinud suuremate tootjate võrguseadmetes - Cisco, Juniper/Netscreen, HP, Alcatel/Lucent, Ericsson jt.&lt;br /&gt;
&lt;br /&gt;
==Paigaldamine==&lt;br /&gt;
&lt;br /&gt;
TACACS+ teenus paigaldatud Ubuntu 12.04-le.&amp;lt;br&amp;gt;&lt;br /&gt;
Testitava ruuterina kasutusel Cisco 1812.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
TACACS+ teenuse paigaldus:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;apt-get install tacacs+&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Teenuse seadistamine==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Konfiguratsioonifaili manual:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;man tac_plus.conf&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Aruandluse logifail:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;/var/log/tac_plus.acct&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
TACACS+ konfiguratsioonifaili asukoht:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;/etc/tacacs+/tac_plus.conf&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Algupärane konfiguratsioonifail: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
# Created by Henry-Nicolas Tourneur(henry.nicolas@tourneur.be)&lt;br /&gt;
# See man(5) tac_plus.conf for more details&lt;br /&gt;
&lt;br /&gt;
# Define where to log accounting data, this is the default.&lt;br /&gt;
&lt;br /&gt;
accounting file = /var/log/tac_plus.acct&lt;br /&gt;
&lt;br /&gt;
# This is the key that clients have to use to access Tacacs+&lt;br /&gt;
&lt;br /&gt;
key = testing123&lt;br /&gt;
&lt;br /&gt;
# Use /etc/passwd file to do authentication&lt;br /&gt;
    &lt;br /&gt;
#default authentication = file /etc/passwd&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
# You can use feature like per host key with different enable passwords&lt;br /&gt;
#host = 127.0.0.1 {&lt;br /&gt;
#        key = test &lt;br /&gt;
#        type = cisco&lt;br /&gt;
#        enable = &amp;lt;des|cleartext&amp;gt; enablepass&lt;br /&gt;
#        prompt = &amp;quot;Welcome XXX ISP Access Router \n\nUsername:&amp;quot;&lt;br /&gt;
#}&lt;br /&gt;
&lt;br /&gt;
# We also can define local users and specify a file where data is stored.&lt;br /&gt;
# That file may be filled using tac_pwd&lt;br /&gt;
#user = test1 {&lt;br /&gt;
#    name = &amp;quot;Test User&amp;quot;&lt;br /&gt;
#    member = staff&lt;br /&gt;
#    login = file /etc/tacacs/tacacs_passwords&lt;br /&gt;
#}&lt;br /&gt;
&lt;br /&gt;
# We can also specify rules valid per group of users.&lt;br /&gt;
#group = group1 {&lt;br /&gt;
#       cmd = conf {&lt;br /&gt;
#               deny&lt;br /&gt;
#       }&lt;br /&gt;
#}&lt;br /&gt;
&lt;br /&gt;
# Another example : forbid configure command for some hosts&lt;br /&gt;
# for a define range of clients&lt;br /&gt;
#group = group1 {&lt;br /&gt;
#       login = PAM&lt;br /&gt;
#       service = ppp&lt;br /&gt;
#       protocol = ip {&lt;br /&gt;
#               addr = 10.10.0.0/24&lt;br /&gt;
#       }&lt;br /&gt;
#       cmd = conf {&lt;br /&gt;
#               deny .*&lt;br /&gt;
#       }&lt;br /&gt;
#}&lt;br /&gt;
&lt;br /&gt;
user = DEFAULT {&lt;br /&gt;
        login = PAM&lt;br /&gt;
        service = ppp protocol = ip {}&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
# Much more features are availables, like ACL, more service compatibilities,&lt;br /&gt;
# commands authorization, scripting authorization.&lt;br /&gt;
# See the man page for those features.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Kasutajate autentimist on võimalik tac_plus&#039;s seadistada kolmel moel:&lt;br /&gt;
&lt;br /&gt;
* Autentimine lokaalse passwd faili alusel - /etc/passwd&lt;br /&gt;
* Autentimine /etc/tac_plus/tac_plus.conf faili lisatud DES salajaste võtmetega&lt;br /&gt;
* Autentimine PAM-ga LDAP serveri pihta&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Käsitlen kahte esimest varianti:&lt;br /&gt;
&lt;br /&gt;
===Autentimine passwd faili põhjal===&lt;br /&gt;
&lt;br /&gt;
Lisan TACACS+ võtme , mis tuleb ka hallatava(te)sse ruuteri(te)sse seadistada (sellest juttu edaspidi), kommenteerin välja rea, kus määratakse autentimisandmete allikaks /etc/passwd fail.&lt;br /&gt;
&lt;br /&gt;
Loon grupi &amp;quot;net_admins&amp;quot;, omistan Cisco kõrgeim ligipääsutaseme - privilege level 15. Kasutaja &amp;quot;margus&amp;quot; määran grupi &amp;quot;net_admins&amp;quot; liikmeks.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
key = y97A14T2#741zQ+&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
default authentication = file /etc/passwd&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
group = net_admins {&lt;br /&gt;
        default service = permit&lt;br /&gt;
        login = file /etc/passwd&lt;br /&gt;
        enable = file /etc/passwd&lt;br /&gt;
        service = exec {&lt;br /&gt;
                priv-lvl = 15&lt;br /&gt;
                }&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
user = margus {&lt;br /&gt;
        member = net_admins&lt;br /&gt;
}&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Autentimine DES salajase võtmega===&lt;/div&gt;</summary>
		<author><name>Mkurniko</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=TACACS%2B&amp;diff=59447</id>
		<title>TACACS+</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=TACACS%2B&amp;diff=59447"/>
		<updated>2012-12-15T19:08:22Z</updated>

		<summary type="html">&lt;p&gt;Mkurniko: /* Autentimine passwd faili põhjal */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Autor==&lt;br /&gt;
Margus Kurnikov AK21&lt;br /&gt;
&lt;br /&gt;
==Sissejuhatus==&lt;br /&gt;
&lt;br /&gt;
TACACS+ (Terminal Access Controller Access-Control System Plus) on võrguseadmete ligipääsukontrolli protokoll, mis hõlmab endas nii autentimise, autoriseerimise kui ka aruandluse teenuseid. Andmevahetuseks kasutatakse TCP porti 49.&amp;lt;br&amp;gt;&lt;br /&gt;
Erinevalt RADIUS&#039;st, mis on TACACS+ alternatiiv, eristab viimast autoriseerimise funktsionaalsuse lahutamine, mis võimaldab paindlikumat ligipääsukontrolli - kes võib käivitada käske, milliseid käske, millises seadmes. Iga kasutaja poolt sisestatud käsk saadetakse kesksesse TACACS+ serverisse autoriseerimiseks, kus kontrollitakse, kas vastavat käsku on lubatud käivitada konkreetsel kasutajal või grupil. TACACS+ on võimalik luua käskude käivitamisele näiteks kasutaja-, seadme-, või ajapõhiseid reegleid.&amp;lt;br&amp;gt;&lt;br /&gt;
TACACS+ protokolli tugi on olemas levinud suuremate tootjate võrguseadmetes - Cisco, Juniper/Netscreen, HP, Alcatel/Lucent, Ericsson jt.&lt;br /&gt;
&lt;br /&gt;
==Paigaldamine==&lt;br /&gt;
&lt;br /&gt;
TACACS+ teenus paigaldatud Ubuntu 12.04-le.&amp;lt;br&amp;gt;&lt;br /&gt;
Testitava ruuterina kasutusel Cisco 1812.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
TACACS+ teenuse paigaldus:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;apt-get install tacacs+&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Teenuse seadistamine==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Konfiguratsioonifaili manual:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;man tac_plus.conf&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Aruandluse logifail:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;/var/log/tac_plus.acct&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
TACACS+ konfiguratsioonifaili asukoht:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;/etc/tacacs+/tac_plus.conf&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Algupärane konfiguratsioonifail: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
# Created by Henry-Nicolas Tourneur(henry.nicolas@tourneur.be)&lt;br /&gt;
# See man(5) tac_plus.conf for more details&lt;br /&gt;
&lt;br /&gt;
# Define where to log accounting data, this is the default.&lt;br /&gt;
&lt;br /&gt;
accounting file = /var/log/tac_plus.acct&lt;br /&gt;
&lt;br /&gt;
# This is the key that clients have to use to access Tacacs+&lt;br /&gt;
&lt;br /&gt;
key = testing123&lt;br /&gt;
&lt;br /&gt;
# Use /etc/passwd file to do authentication&lt;br /&gt;
    &lt;br /&gt;
#default authentication = file /etc/passwd&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
# You can use feature like per host key with different enable passwords&lt;br /&gt;
#host = 127.0.0.1 {&lt;br /&gt;
#        key = test &lt;br /&gt;
#        type = cisco&lt;br /&gt;
#        enable = &amp;lt;des|cleartext&amp;gt; enablepass&lt;br /&gt;
#        prompt = &amp;quot;Welcome XXX ISP Access Router \n\nUsername:&amp;quot;&lt;br /&gt;
#}&lt;br /&gt;
&lt;br /&gt;
# We also can define local users and specify a file where data is stored.&lt;br /&gt;
# That file may be filled using tac_pwd&lt;br /&gt;
#user = test1 {&lt;br /&gt;
#    name = &amp;quot;Test User&amp;quot;&lt;br /&gt;
#    member = staff&lt;br /&gt;
#    login = file /etc/tacacs/tacacs_passwords&lt;br /&gt;
#}&lt;br /&gt;
&lt;br /&gt;
# We can also specify rules valid per group of users.&lt;br /&gt;
#group = group1 {&lt;br /&gt;
#       cmd = conf {&lt;br /&gt;
#               deny&lt;br /&gt;
#       }&lt;br /&gt;
#}&lt;br /&gt;
&lt;br /&gt;
# Another example : forbid configure command for some hosts&lt;br /&gt;
# for a define range of clients&lt;br /&gt;
#group = group1 {&lt;br /&gt;
#       login = PAM&lt;br /&gt;
#       service = ppp&lt;br /&gt;
#       protocol = ip {&lt;br /&gt;
#               addr = 10.10.0.0/24&lt;br /&gt;
#       }&lt;br /&gt;
#       cmd = conf {&lt;br /&gt;
#               deny .*&lt;br /&gt;
#       }&lt;br /&gt;
#}&lt;br /&gt;
&lt;br /&gt;
user = DEFAULT {&lt;br /&gt;
        login = PAM&lt;br /&gt;
        service = ppp protocol = ip {}&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
# Much more features are availables, like ACL, more service compatibilities,&lt;br /&gt;
# commands authorization, scripting authorization.&lt;br /&gt;
# See the man page for those features.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Kasutajate autentimist on võimalik tac_plus&#039;s seadistada kolmel moel:&lt;br /&gt;
&lt;br /&gt;
* Autentimine lokaalse passwd faili alusel - /etc/passwd&lt;br /&gt;
* Autentimine /etc/tac_plus/tac_plus.conf faili lisatud DES salajaste võtmetega&lt;br /&gt;
* Autentimine PAM-ga LDAP serveri pihta&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Käsitlen kahte esimest varianti:&lt;br /&gt;
&lt;br /&gt;
===Autentimine passwd faili põhjal===&lt;br /&gt;
&lt;br /&gt;
Lisan TACACS+ võtme , mis tuleb ka hallatava(te)sse ruuteri(te)sse seadistada (sellest juttu edaspidi), kommenteerin välja rea, kus määratakse autentimisandmete allikaks /etc/passwd fail.&lt;br /&gt;
Loon grupi &amp;quot;net_admins&amp;quot;, omistan Cisco kõrgeim ligipääsutaseme - privilege level 15. Kasutaja &amp;quot;margus&amp;quot; määran grupi &amp;quot;net_admins&amp;quot; liikmeks.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
key = y97A14T2#741zQ+&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
default authentication = file /etc/passwd&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
group = net_admins {&lt;br /&gt;
        default service = permit&lt;br /&gt;
        login = file /etc/passwd&lt;br /&gt;
        enable = file /etc/passwd&lt;br /&gt;
        service = exec {&lt;br /&gt;
                priv-lvl = 15&lt;br /&gt;
                }&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
user = margus {&lt;br /&gt;
        member = net_admins&lt;br /&gt;
}&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Autentimine DES salajase võtmega===&lt;/div&gt;</summary>
		<author><name>Mkurniko</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=TACACS%2B&amp;diff=59446</id>
		<title>TACACS+</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=TACACS%2B&amp;diff=59446"/>
		<updated>2012-12-15T19:07:32Z</updated>

		<summary type="html">&lt;p&gt;Mkurniko: /* Autentimine passwd faili põhjal */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Autor==&lt;br /&gt;
Margus Kurnikov AK21&lt;br /&gt;
&lt;br /&gt;
==Sissejuhatus==&lt;br /&gt;
&lt;br /&gt;
TACACS+ (Terminal Access Controller Access-Control System Plus) on võrguseadmete ligipääsukontrolli protokoll, mis hõlmab endas nii autentimise, autoriseerimise kui ka aruandluse teenuseid. Andmevahetuseks kasutatakse TCP porti 49.&amp;lt;br&amp;gt;&lt;br /&gt;
Erinevalt RADIUS&#039;st, mis on TACACS+ alternatiiv, eristab viimast autoriseerimise funktsionaalsuse lahutamine, mis võimaldab paindlikumat ligipääsukontrolli - kes võib käivitada käske, milliseid käske, millises seadmes. Iga kasutaja poolt sisestatud käsk saadetakse kesksesse TACACS+ serverisse autoriseerimiseks, kus kontrollitakse, kas vastavat käsku on lubatud käivitada konkreetsel kasutajal või grupil. TACACS+ on võimalik luua käskude käivitamisele näiteks kasutaja-, seadme-, või ajapõhiseid reegleid.&amp;lt;br&amp;gt;&lt;br /&gt;
TACACS+ protokolli tugi on olemas levinud suuremate tootjate võrguseadmetes - Cisco, Juniper/Netscreen, HP, Alcatel/Lucent, Ericsson jt.&lt;br /&gt;
&lt;br /&gt;
==Paigaldamine==&lt;br /&gt;
&lt;br /&gt;
TACACS+ teenus paigaldatud Ubuntu 12.04-le.&amp;lt;br&amp;gt;&lt;br /&gt;
Testitava ruuterina kasutusel Cisco 1812.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
TACACS+ teenuse paigaldus:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;apt-get install tacacs+&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Teenuse seadistamine==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Konfiguratsioonifaili manual:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;man tac_plus.conf&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Aruandluse logifail:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;/var/log/tac_plus.acct&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
TACACS+ konfiguratsioonifaili asukoht:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;/etc/tacacs+/tac_plus.conf&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Algupärane konfiguratsioonifail: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
# Created by Henry-Nicolas Tourneur(henry.nicolas@tourneur.be)&lt;br /&gt;
# See man(5) tac_plus.conf for more details&lt;br /&gt;
&lt;br /&gt;
# Define where to log accounting data, this is the default.&lt;br /&gt;
&lt;br /&gt;
accounting file = /var/log/tac_plus.acct&lt;br /&gt;
&lt;br /&gt;
# This is the key that clients have to use to access Tacacs+&lt;br /&gt;
&lt;br /&gt;
key = testing123&lt;br /&gt;
&lt;br /&gt;
# Use /etc/passwd file to do authentication&lt;br /&gt;
    &lt;br /&gt;
#default authentication = file /etc/passwd&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
# You can use feature like per host key with different enable passwords&lt;br /&gt;
#host = 127.0.0.1 {&lt;br /&gt;
#        key = test &lt;br /&gt;
#        type = cisco&lt;br /&gt;
#        enable = &amp;lt;des|cleartext&amp;gt; enablepass&lt;br /&gt;
#        prompt = &amp;quot;Welcome XXX ISP Access Router \n\nUsername:&amp;quot;&lt;br /&gt;
#}&lt;br /&gt;
&lt;br /&gt;
# We also can define local users and specify a file where data is stored.&lt;br /&gt;
# That file may be filled using tac_pwd&lt;br /&gt;
#user = test1 {&lt;br /&gt;
#    name = &amp;quot;Test User&amp;quot;&lt;br /&gt;
#    member = staff&lt;br /&gt;
#    login = file /etc/tacacs/tacacs_passwords&lt;br /&gt;
#}&lt;br /&gt;
&lt;br /&gt;
# We can also specify rules valid per group of users.&lt;br /&gt;
#group = group1 {&lt;br /&gt;
#       cmd = conf {&lt;br /&gt;
#               deny&lt;br /&gt;
#       }&lt;br /&gt;
#}&lt;br /&gt;
&lt;br /&gt;
# Another example : forbid configure command for some hosts&lt;br /&gt;
# for a define range of clients&lt;br /&gt;
#group = group1 {&lt;br /&gt;
#       login = PAM&lt;br /&gt;
#       service = ppp&lt;br /&gt;
#       protocol = ip {&lt;br /&gt;
#               addr = 10.10.0.0/24&lt;br /&gt;
#       }&lt;br /&gt;
#       cmd = conf {&lt;br /&gt;
#               deny .*&lt;br /&gt;
#       }&lt;br /&gt;
#}&lt;br /&gt;
&lt;br /&gt;
user = DEFAULT {&lt;br /&gt;
        login = PAM&lt;br /&gt;
        service = ppp protocol = ip {}&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
# Much more features are availables, like ACL, more service compatibilities,&lt;br /&gt;
# commands authorization, scripting authorization.&lt;br /&gt;
# See the man page for those features.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Kasutajate autentimist on võimalik tac_plus&#039;s seadistada kolmel moel:&lt;br /&gt;
&lt;br /&gt;
* Autentimine lokaalse passwd faili alusel - /etc/passwd&lt;br /&gt;
* Autentimine /etc/tac_plus/tac_plus.conf faili lisatud DES salajaste võtmetega&lt;br /&gt;
* Autentimine PAM-ga LDAP serveri pihta&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Käsitlen kahte esimest varianti:&lt;br /&gt;
&lt;br /&gt;
===Autentimine passwd faili põhjal===&lt;br /&gt;
&lt;br /&gt;
Lisan TACACS+ võtme , mis tuleb ka hallatava(te)sse ruuteri(te)sse seadistada (sellest juttu edaspidi), kommenteerin välja rea, kus määratakse autentimisandmete allikaks /etc/passwd fail.&lt;br /&gt;
Loon grupi &amp;quot;net_admins&amp;quot;, omistan Cisco kõrgeim ligipääsutaseme - privilege level 15. Kasutaja &amp;quot;margus&amp;quot; määran grupi &amp;quot;net_admins&amp;quot; liikmeks.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
...&lt;br /&gt;
key = y97A14T2#741zQ+&lt;br /&gt;
...&lt;br /&gt;
default authentication = file /etc/passwd&lt;br /&gt;
...&lt;br /&gt;
group = net_admins {&lt;br /&gt;
        default service = permit&lt;br /&gt;
        login = file /etc/passwd&lt;br /&gt;
        enable = file /etc/passwd&lt;br /&gt;
        service = exec {&lt;br /&gt;
                priv-lvl = 15&lt;br /&gt;
                }&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
user = margus {&lt;br /&gt;
        member = net_admins&lt;br /&gt;
}&lt;br /&gt;
...&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Autentimine DES salajase võtmega===&lt;/div&gt;</summary>
		<author><name>Mkurniko</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=TACACS%2B&amp;diff=59445</id>
		<title>TACACS+</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=TACACS%2B&amp;diff=59445"/>
		<updated>2012-12-15T19:05:52Z</updated>

		<summary type="html">&lt;p&gt;Mkurniko: /* Autentimine passwd faili põhjal */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Autor==&lt;br /&gt;
Margus Kurnikov AK21&lt;br /&gt;
&lt;br /&gt;
==Sissejuhatus==&lt;br /&gt;
&lt;br /&gt;
TACACS+ (Terminal Access Controller Access-Control System Plus) on võrguseadmete ligipääsukontrolli protokoll, mis hõlmab endas nii autentimise, autoriseerimise kui ka aruandluse teenuseid. Andmevahetuseks kasutatakse TCP porti 49.&amp;lt;br&amp;gt;&lt;br /&gt;
Erinevalt RADIUS&#039;st, mis on TACACS+ alternatiiv, eristab viimast autoriseerimise funktsionaalsuse lahutamine, mis võimaldab paindlikumat ligipääsukontrolli - kes võib käivitada käske, milliseid käske, millises seadmes. Iga kasutaja poolt sisestatud käsk saadetakse kesksesse TACACS+ serverisse autoriseerimiseks, kus kontrollitakse, kas vastavat käsku on lubatud käivitada konkreetsel kasutajal või grupil. TACACS+ on võimalik luua käskude käivitamisele näiteks kasutaja-, seadme-, või ajapõhiseid reegleid.&amp;lt;br&amp;gt;&lt;br /&gt;
TACACS+ protokolli tugi on olemas levinud suuremate tootjate võrguseadmetes - Cisco, Juniper/Netscreen, HP, Alcatel/Lucent, Ericsson jt.&lt;br /&gt;
&lt;br /&gt;
==Paigaldamine==&lt;br /&gt;
&lt;br /&gt;
TACACS+ teenus paigaldatud Ubuntu 12.04-le.&amp;lt;br&amp;gt;&lt;br /&gt;
Testitava ruuterina kasutusel Cisco 1812.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
TACACS+ teenuse paigaldus:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;apt-get install tacacs+&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Teenuse seadistamine==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Konfiguratsioonifaili manual:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;man tac_plus.conf&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Aruandluse logifail:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;/var/log/tac_plus.acct&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
TACACS+ konfiguratsioonifaili asukoht:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;/etc/tacacs+/tac_plus.conf&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Algupärane konfiguratsioonifail: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
# Created by Henry-Nicolas Tourneur(henry.nicolas@tourneur.be)&lt;br /&gt;
# See man(5) tac_plus.conf for more details&lt;br /&gt;
&lt;br /&gt;
# Define where to log accounting data, this is the default.&lt;br /&gt;
&lt;br /&gt;
accounting file = /var/log/tac_plus.acct&lt;br /&gt;
&lt;br /&gt;
# This is the key that clients have to use to access Tacacs+&lt;br /&gt;
&lt;br /&gt;
key = testing123&lt;br /&gt;
&lt;br /&gt;
# Use /etc/passwd file to do authentication&lt;br /&gt;
    &lt;br /&gt;
#default authentication = file /etc/passwd&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
# You can use feature like per host key with different enable passwords&lt;br /&gt;
#host = 127.0.0.1 {&lt;br /&gt;
#        key = test &lt;br /&gt;
#        type = cisco&lt;br /&gt;
#        enable = &amp;lt;des|cleartext&amp;gt; enablepass&lt;br /&gt;
#        prompt = &amp;quot;Welcome XXX ISP Access Router \n\nUsername:&amp;quot;&lt;br /&gt;
#}&lt;br /&gt;
&lt;br /&gt;
# We also can define local users and specify a file where data is stored.&lt;br /&gt;
# That file may be filled using tac_pwd&lt;br /&gt;
#user = test1 {&lt;br /&gt;
#    name = &amp;quot;Test User&amp;quot;&lt;br /&gt;
#    member = staff&lt;br /&gt;
#    login = file /etc/tacacs/tacacs_passwords&lt;br /&gt;
#}&lt;br /&gt;
&lt;br /&gt;
# We can also specify rules valid per group of users.&lt;br /&gt;
#group = group1 {&lt;br /&gt;
#       cmd = conf {&lt;br /&gt;
#               deny&lt;br /&gt;
#       }&lt;br /&gt;
#}&lt;br /&gt;
&lt;br /&gt;
# Another example : forbid configure command for some hosts&lt;br /&gt;
# for a define range of clients&lt;br /&gt;
#group = group1 {&lt;br /&gt;
#       login = PAM&lt;br /&gt;
#       service = ppp&lt;br /&gt;
#       protocol = ip {&lt;br /&gt;
#               addr = 10.10.0.0/24&lt;br /&gt;
#       }&lt;br /&gt;
#       cmd = conf {&lt;br /&gt;
#               deny .*&lt;br /&gt;
#       }&lt;br /&gt;
#}&lt;br /&gt;
&lt;br /&gt;
user = DEFAULT {&lt;br /&gt;
        login = PAM&lt;br /&gt;
        service = ppp protocol = ip {}&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
# Much more features are availables, like ACL, more service compatibilities,&lt;br /&gt;
# commands authorization, scripting authorization.&lt;br /&gt;
# See the man page for those features.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Kasutajate autentimist on võimalik tac_plus&#039;s seadistada kolmel moel:&lt;br /&gt;
&lt;br /&gt;
* Autentimine lokaalse passwd faili alusel - /etc/passwd&lt;br /&gt;
* Autentimine /etc/tac_plus/tac_plus.conf faili lisatud DES salajaste võtmetega&lt;br /&gt;
* Autentimine PAM-ga LDAP serveri pihta&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Käsitlen kahte esimest varianti:&lt;br /&gt;
&lt;br /&gt;
===Autentimine passwd faili põhjal===&lt;br /&gt;
&lt;br /&gt;
Lisame TACACS+ võtme , mis tuleb ka hallatava(te)sse ruuteri(te)sse seadistada (sellest juttu edaspidi), kommenteerime välja rea, kus määratakse autentimisandmete allikaks /etc/passwd fail.&lt;br /&gt;
Luuakse grupp &amp;quot;net_admins&amp;quot;, omistatkse Cisco kõrgeim ligipääsutase - privilege level 15. Kasutaja &amp;quot;margus&amp;quot; määratakse grupi &amp;quot;net_admins&amp;quot; liikmeks.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
...&lt;br /&gt;
key = y97A14T2#741zQ+&lt;br /&gt;
...&lt;br /&gt;
default authentication = file /etc/passwd&lt;br /&gt;
...&lt;br /&gt;
group = net_admins {&lt;br /&gt;
        default service = permit&lt;br /&gt;
        login = file /etc/passwd&lt;br /&gt;
        enable = file /etc/passwd&lt;br /&gt;
        service = exec {&lt;br /&gt;
                priv-lvl = 15&lt;br /&gt;
                }&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
user = margus {&lt;br /&gt;
        member = net_admins&lt;br /&gt;
}&lt;br /&gt;
...&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Autentimine DES salajase võtmega===&lt;/div&gt;</summary>
		<author><name>Mkurniko</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=TACACS%2B&amp;diff=59444</id>
		<title>TACACS+</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=TACACS%2B&amp;diff=59444"/>
		<updated>2012-12-15T19:02:40Z</updated>

		<summary type="html">&lt;p&gt;Mkurniko: /* Autentimine passwd faili põhjal */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Autor==&lt;br /&gt;
Margus Kurnikov AK21&lt;br /&gt;
&lt;br /&gt;
==Sissejuhatus==&lt;br /&gt;
&lt;br /&gt;
TACACS+ (Terminal Access Controller Access-Control System Plus) on võrguseadmete ligipääsukontrolli protokoll, mis hõlmab endas nii autentimise, autoriseerimise kui ka aruandluse teenuseid. Andmevahetuseks kasutatakse TCP porti 49.&amp;lt;br&amp;gt;&lt;br /&gt;
Erinevalt RADIUS&#039;st, mis on TACACS+ alternatiiv, eristab viimast autoriseerimise funktsionaalsuse lahutamine, mis võimaldab paindlikumat ligipääsukontrolli - kes võib käivitada käske, milliseid käske, millises seadmes. Iga kasutaja poolt sisestatud käsk saadetakse kesksesse TACACS+ serverisse autoriseerimiseks, kus kontrollitakse, kas vastavat käsku on lubatud käivitada konkreetsel kasutajal või grupil. TACACS+ on võimalik luua käskude käivitamisele näiteks kasutaja-, seadme-, või ajapõhiseid reegleid.&amp;lt;br&amp;gt;&lt;br /&gt;
TACACS+ protokolli tugi on olemas levinud suuremate tootjate võrguseadmetes - Cisco, Juniper/Netscreen, HP, Alcatel/Lucent, Ericsson jt.&lt;br /&gt;
&lt;br /&gt;
==Paigaldamine==&lt;br /&gt;
&lt;br /&gt;
TACACS+ teenus paigaldatud Ubuntu 12.04-le.&amp;lt;br&amp;gt;&lt;br /&gt;
Testitava ruuterina kasutusel Cisco 1812.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
TACACS+ teenuse paigaldus:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;apt-get install tacacs+&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Teenuse seadistamine==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Konfiguratsioonifaili manual:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;man tac_plus.conf&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Aruandluse logifail:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;/var/log/tac_plus.acct&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
TACACS+ konfiguratsioonifaili asukoht:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;/etc/tacacs+/tac_plus.conf&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Algupärane konfiguratsioonifail: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
# Created by Henry-Nicolas Tourneur(henry.nicolas@tourneur.be)&lt;br /&gt;
# See man(5) tac_plus.conf for more details&lt;br /&gt;
&lt;br /&gt;
# Define where to log accounting data, this is the default.&lt;br /&gt;
&lt;br /&gt;
accounting file = /var/log/tac_plus.acct&lt;br /&gt;
&lt;br /&gt;
# This is the key that clients have to use to access Tacacs+&lt;br /&gt;
&lt;br /&gt;
key = testing123&lt;br /&gt;
&lt;br /&gt;
# Use /etc/passwd file to do authentication&lt;br /&gt;
    &lt;br /&gt;
#default authentication = file /etc/passwd&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
# You can use feature like per host key with different enable passwords&lt;br /&gt;
#host = 127.0.0.1 {&lt;br /&gt;
#        key = test &lt;br /&gt;
#        type = cisco&lt;br /&gt;
#        enable = &amp;lt;des|cleartext&amp;gt; enablepass&lt;br /&gt;
#        prompt = &amp;quot;Welcome XXX ISP Access Router \n\nUsername:&amp;quot;&lt;br /&gt;
#}&lt;br /&gt;
&lt;br /&gt;
# We also can define local users and specify a file where data is stored.&lt;br /&gt;
# That file may be filled using tac_pwd&lt;br /&gt;
#user = test1 {&lt;br /&gt;
#    name = &amp;quot;Test User&amp;quot;&lt;br /&gt;
#    member = staff&lt;br /&gt;
#    login = file /etc/tacacs/tacacs_passwords&lt;br /&gt;
#}&lt;br /&gt;
&lt;br /&gt;
# We can also specify rules valid per group of users.&lt;br /&gt;
#group = group1 {&lt;br /&gt;
#       cmd = conf {&lt;br /&gt;
#               deny&lt;br /&gt;
#       }&lt;br /&gt;
#}&lt;br /&gt;
&lt;br /&gt;
# Another example : forbid configure command for some hosts&lt;br /&gt;
# for a define range of clients&lt;br /&gt;
#group = group1 {&lt;br /&gt;
#       login = PAM&lt;br /&gt;
#       service = ppp&lt;br /&gt;
#       protocol = ip {&lt;br /&gt;
#               addr = 10.10.0.0/24&lt;br /&gt;
#       }&lt;br /&gt;
#       cmd = conf {&lt;br /&gt;
#               deny .*&lt;br /&gt;
#       }&lt;br /&gt;
#}&lt;br /&gt;
&lt;br /&gt;
user = DEFAULT {&lt;br /&gt;
        login = PAM&lt;br /&gt;
        service = ppp protocol = ip {}&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
# Much more features are availables, like ACL, more service compatibilities,&lt;br /&gt;
# commands authorization, scripting authorization.&lt;br /&gt;
# See the man page for those features.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Kasutajate autentimist on võimalik tac_plus&#039;s seadistada kolmel moel:&lt;br /&gt;
&lt;br /&gt;
* Autentimine lokaalse passwd faili alusel - /etc/passwd&lt;br /&gt;
* Autentimine /etc/tac_plus/tac_plus.conf faili lisatud DES salajaste võtmetega&lt;br /&gt;
* Autentimine PAM-ga LDAP serveri pihta&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Käsitlen kahte esimest varianti:&lt;br /&gt;
&lt;br /&gt;
===Autentimine passwd faili põhjal===&lt;br /&gt;
&lt;br /&gt;
Luuakse grupp &amp;quot;net_admins&amp;quot;, omistatkse Cisco kõrgeim ligipääsutase - privilege level 15. Kasutaja &amp;quot;margus&amp;quot; määratakse grupi &amp;quot;net_admins&amp;quot; liikmeks.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
...&lt;br /&gt;
key = y97A14T2#741zQ+&lt;br /&gt;
...&lt;br /&gt;
default authentication = file /etc/passwd&lt;br /&gt;
...&lt;br /&gt;
group = net_admins {&lt;br /&gt;
        default service = permit&lt;br /&gt;
        login = file /etc/passwd&lt;br /&gt;
        enable = file /etc/passwd&lt;br /&gt;
        service = exec {&lt;br /&gt;
                priv-lvl = 15&lt;br /&gt;
                }&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
user = margus {&lt;br /&gt;
        member = net_admins&lt;br /&gt;
}&lt;br /&gt;
...&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Autentimine DES salajase võtmega===&lt;/div&gt;</summary>
		<author><name>Mkurniko</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=TACACS%2B&amp;diff=59443</id>
		<title>TACACS+</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=TACACS%2B&amp;diff=59443"/>
		<updated>2012-12-15T19:00:14Z</updated>

		<summary type="html">&lt;p&gt;Mkurniko: /* Autentimine passwd faili põhjal */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Autor==&lt;br /&gt;
Margus Kurnikov AK21&lt;br /&gt;
&lt;br /&gt;
==Sissejuhatus==&lt;br /&gt;
&lt;br /&gt;
TACACS+ (Terminal Access Controller Access-Control System Plus) on võrguseadmete ligipääsukontrolli protokoll, mis hõlmab endas nii autentimise, autoriseerimise kui ka aruandluse teenuseid. Andmevahetuseks kasutatakse TCP porti 49.&amp;lt;br&amp;gt;&lt;br /&gt;
Erinevalt RADIUS&#039;st, mis on TACACS+ alternatiiv, eristab viimast autoriseerimise funktsionaalsuse lahutamine, mis võimaldab paindlikumat ligipääsukontrolli - kes võib käivitada käske, milliseid käske, millises seadmes. Iga kasutaja poolt sisestatud käsk saadetakse kesksesse TACACS+ serverisse autoriseerimiseks, kus kontrollitakse, kas vastavat käsku on lubatud käivitada konkreetsel kasutajal või grupil. TACACS+ on võimalik luua käskude käivitamisele näiteks kasutaja-, seadme-, või ajapõhiseid reegleid.&amp;lt;br&amp;gt;&lt;br /&gt;
TACACS+ protokolli tugi on olemas levinud suuremate tootjate võrguseadmetes - Cisco, Juniper/Netscreen, HP, Alcatel/Lucent, Ericsson jt.&lt;br /&gt;
&lt;br /&gt;
==Paigaldamine==&lt;br /&gt;
&lt;br /&gt;
TACACS+ teenus paigaldatud Ubuntu 12.04-le.&amp;lt;br&amp;gt;&lt;br /&gt;
Testitava ruuterina kasutusel Cisco 1812.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
TACACS+ teenuse paigaldus:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;apt-get install tacacs+&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Teenuse seadistamine==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Konfiguratsioonifaili manual:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;man tac_plus.conf&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Aruandluse logifail:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;/var/log/tac_plus.acct&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
TACACS+ konfiguratsioonifaili asukoht:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;/etc/tacacs+/tac_plus.conf&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Algupärane konfiguratsioonifail: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
# Created by Henry-Nicolas Tourneur(henry.nicolas@tourneur.be)&lt;br /&gt;
# See man(5) tac_plus.conf for more details&lt;br /&gt;
&lt;br /&gt;
# Define where to log accounting data, this is the default.&lt;br /&gt;
&lt;br /&gt;
accounting file = /var/log/tac_plus.acct&lt;br /&gt;
&lt;br /&gt;
# This is the key that clients have to use to access Tacacs+&lt;br /&gt;
&lt;br /&gt;
key = testing123&lt;br /&gt;
&lt;br /&gt;
# Use /etc/passwd file to do authentication&lt;br /&gt;
    &lt;br /&gt;
#default authentication = file /etc/passwd&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
# You can use feature like per host key with different enable passwords&lt;br /&gt;
#host = 127.0.0.1 {&lt;br /&gt;
#        key = test &lt;br /&gt;
#        type = cisco&lt;br /&gt;
#        enable = &amp;lt;des|cleartext&amp;gt; enablepass&lt;br /&gt;
#        prompt = &amp;quot;Welcome XXX ISP Access Router \n\nUsername:&amp;quot;&lt;br /&gt;
#}&lt;br /&gt;
&lt;br /&gt;
# We also can define local users and specify a file where data is stored.&lt;br /&gt;
# That file may be filled using tac_pwd&lt;br /&gt;
#user = test1 {&lt;br /&gt;
#    name = &amp;quot;Test User&amp;quot;&lt;br /&gt;
#    member = staff&lt;br /&gt;
#    login = file /etc/tacacs/tacacs_passwords&lt;br /&gt;
#}&lt;br /&gt;
&lt;br /&gt;
# We can also specify rules valid per group of users.&lt;br /&gt;
#group = group1 {&lt;br /&gt;
#       cmd = conf {&lt;br /&gt;
#               deny&lt;br /&gt;
#       }&lt;br /&gt;
#}&lt;br /&gt;
&lt;br /&gt;
# Another example : forbid configure command for some hosts&lt;br /&gt;
# for a define range of clients&lt;br /&gt;
#group = group1 {&lt;br /&gt;
#       login = PAM&lt;br /&gt;
#       service = ppp&lt;br /&gt;
#       protocol = ip {&lt;br /&gt;
#               addr = 10.10.0.0/24&lt;br /&gt;
#       }&lt;br /&gt;
#       cmd = conf {&lt;br /&gt;
#               deny .*&lt;br /&gt;
#       }&lt;br /&gt;
#}&lt;br /&gt;
&lt;br /&gt;
user = DEFAULT {&lt;br /&gt;
        login = PAM&lt;br /&gt;
        service = ppp protocol = ip {}&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
# Much more features are availables, like ACL, more service compatibilities,&lt;br /&gt;
# commands authorization, scripting authorization.&lt;br /&gt;
# See the man page for those features.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Kasutajate autentimist on võimalik tac_plus&#039;s seadistada kolmel moel:&lt;br /&gt;
&lt;br /&gt;
* Autentimine lokaalse passwd faili alusel - /etc/passwd&lt;br /&gt;
* Autentimine /etc/tac_plus/tac_plus.conf faili lisatud DES salajaste võtmetega&lt;br /&gt;
* Autentimine PAM-ga LDAP serveri pihta&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Käsitlen kahte esimest varianti:&lt;br /&gt;
&lt;br /&gt;
===Autentimine passwd faili põhjal===&lt;br /&gt;
&lt;br /&gt;
Luuakse grupp &amp;quot;net_admins&amp;quot;, omistatkse Cisco kõrgeim ligipääsutase - privilege level 15. Kasutaja &amp;quot;margus&amp;quot; määratakse grupi &amp;quot;net_admins&amp;quot; liikmeks.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
...&lt;br /&gt;
group = net_admins {&lt;br /&gt;
        default service = permit&lt;br /&gt;
        login = file /etc/passwd&lt;br /&gt;
        enable = file /etc/passwd&lt;br /&gt;
        service = exec {&lt;br /&gt;
                priv-lvl = 15&lt;br /&gt;
                }&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
user = margus {&lt;br /&gt;
        member = net_admins&lt;br /&gt;
}&lt;br /&gt;
...&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Autentimine DES salajase võtmega===&lt;/div&gt;</summary>
		<author><name>Mkurniko</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=TACACS%2B&amp;diff=59442</id>
		<title>TACACS+</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=TACACS%2B&amp;diff=59442"/>
		<updated>2012-12-15T18:58:47Z</updated>

		<summary type="html">&lt;p&gt;Mkurniko: /* Teenuse seadistamine */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Autor==&lt;br /&gt;
Margus Kurnikov AK21&lt;br /&gt;
&lt;br /&gt;
==Sissejuhatus==&lt;br /&gt;
&lt;br /&gt;
TACACS+ (Terminal Access Controller Access-Control System Plus) on võrguseadmete ligipääsukontrolli protokoll, mis hõlmab endas nii autentimise, autoriseerimise kui ka aruandluse teenuseid. Andmevahetuseks kasutatakse TCP porti 49.&amp;lt;br&amp;gt;&lt;br /&gt;
Erinevalt RADIUS&#039;st, mis on TACACS+ alternatiiv, eristab viimast autoriseerimise funktsionaalsuse lahutamine, mis võimaldab paindlikumat ligipääsukontrolli - kes võib käivitada käske, milliseid käske, millises seadmes. Iga kasutaja poolt sisestatud käsk saadetakse kesksesse TACACS+ serverisse autoriseerimiseks, kus kontrollitakse, kas vastavat käsku on lubatud käivitada konkreetsel kasutajal või grupil. TACACS+ on võimalik luua käskude käivitamisele näiteks kasutaja-, seadme-, või ajapõhiseid reegleid.&amp;lt;br&amp;gt;&lt;br /&gt;
TACACS+ protokolli tugi on olemas levinud suuremate tootjate võrguseadmetes - Cisco, Juniper/Netscreen, HP, Alcatel/Lucent, Ericsson jt.&lt;br /&gt;
&lt;br /&gt;
==Paigaldamine==&lt;br /&gt;
&lt;br /&gt;
TACACS+ teenus paigaldatud Ubuntu 12.04-le.&amp;lt;br&amp;gt;&lt;br /&gt;
Testitava ruuterina kasutusel Cisco 1812.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
TACACS+ teenuse paigaldus:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;apt-get install tacacs+&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Teenuse seadistamine==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Konfiguratsioonifaili manual:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;man tac_plus.conf&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Aruandluse logifail:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;/var/log/tac_plus.acct&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
TACACS+ konfiguratsioonifaili asukoht:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;/etc/tacacs+/tac_plus.conf&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Algupärane konfiguratsioonifail: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
# Created by Henry-Nicolas Tourneur(henry.nicolas@tourneur.be)&lt;br /&gt;
# See man(5) tac_plus.conf for more details&lt;br /&gt;
&lt;br /&gt;
# Define where to log accounting data, this is the default.&lt;br /&gt;
&lt;br /&gt;
accounting file = /var/log/tac_plus.acct&lt;br /&gt;
&lt;br /&gt;
# This is the key that clients have to use to access Tacacs+&lt;br /&gt;
&lt;br /&gt;
key = testing123&lt;br /&gt;
&lt;br /&gt;
# Use /etc/passwd file to do authentication&lt;br /&gt;
    &lt;br /&gt;
#default authentication = file /etc/passwd&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
# You can use feature like per host key with different enable passwords&lt;br /&gt;
#host = 127.0.0.1 {&lt;br /&gt;
#        key = test &lt;br /&gt;
#        type = cisco&lt;br /&gt;
#        enable = &amp;lt;des|cleartext&amp;gt; enablepass&lt;br /&gt;
#        prompt = &amp;quot;Welcome XXX ISP Access Router \n\nUsername:&amp;quot;&lt;br /&gt;
#}&lt;br /&gt;
&lt;br /&gt;
# We also can define local users and specify a file where data is stored.&lt;br /&gt;
# That file may be filled using tac_pwd&lt;br /&gt;
#user = test1 {&lt;br /&gt;
#    name = &amp;quot;Test User&amp;quot;&lt;br /&gt;
#    member = staff&lt;br /&gt;
#    login = file /etc/tacacs/tacacs_passwords&lt;br /&gt;
#}&lt;br /&gt;
&lt;br /&gt;
# We can also specify rules valid per group of users.&lt;br /&gt;
#group = group1 {&lt;br /&gt;
#       cmd = conf {&lt;br /&gt;
#               deny&lt;br /&gt;
#       }&lt;br /&gt;
#}&lt;br /&gt;
&lt;br /&gt;
# Another example : forbid configure command for some hosts&lt;br /&gt;
# for a define range of clients&lt;br /&gt;
#group = group1 {&lt;br /&gt;
#       login = PAM&lt;br /&gt;
#       service = ppp&lt;br /&gt;
#       protocol = ip {&lt;br /&gt;
#               addr = 10.10.0.0/24&lt;br /&gt;
#       }&lt;br /&gt;
#       cmd = conf {&lt;br /&gt;
#               deny .*&lt;br /&gt;
#       }&lt;br /&gt;
#}&lt;br /&gt;
&lt;br /&gt;
user = DEFAULT {&lt;br /&gt;
        login = PAM&lt;br /&gt;
        service = ppp protocol = ip {}&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
# Much more features are availables, like ACL, more service compatibilities,&lt;br /&gt;
# commands authorization, scripting authorization.&lt;br /&gt;
# See the man page for those features.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Kasutajate autentimist on võimalik tac_plus&#039;s seadistada kolmel moel:&lt;br /&gt;
&lt;br /&gt;
* Autentimine lokaalse passwd faili alusel - /etc/passwd&lt;br /&gt;
* Autentimine /etc/tac_plus/tac_plus.conf faili lisatud DES salajaste võtmetega&lt;br /&gt;
* Autentimine PAM-ga LDAP serveri pihta&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Käsitlen kahte esimest varianti:&lt;br /&gt;
&lt;br /&gt;
===Autentimine passwd faili põhjal===&lt;br /&gt;
&lt;br /&gt;
Luuakse grupp &amp;quot;net_admins&amp;quot;, Cisco kõrgeima võimaliku ligipääsutasemega (privilege level 15). Kasutaja &amp;quot;margus&amp;quot; määratakse grupi &amp;quot;net_admins&amp;quot; liikmeks.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
...&lt;br /&gt;
group = net_admins {&lt;br /&gt;
        default service = permit&lt;br /&gt;
        login = file /etc/passwd&lt;br /&gt;
        enable = file /etc/passwd&lt;br /&gt;
        service = exec {&lt;br /&gt;
                priv-lvl = 15&lt;br /&gt;
                }&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
user = margus {&lt;br /&gt;
        member = net_admins&lt;br /&gt;
}&lt;br /&gt;
...&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Autentimine DES salajase võtmega===&lt;/div&gt;</summary>
		<author><name>Mkurniko</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=TACACS%2B&amp;diff=59441</id>
		<title>TACACS+</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=TACACS%2B&amp;diff=59441"/>
		<updated>2012-12-15T18:57:55Z</updated>

		<summary type="html">&lt;p&gt;Mkurniko: /* Autentimine passwd faili põhjal */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Autor==&lt;br /&gt;
Margus Kurnikov AK21&lt;br /&gt;
&lt;br /&gt;
==Sissejuhatus==&lt;br /&gt;
&lt;br /&gt;
TACACS+ (Terminal Access Controller Access-Control System Plus) on võrguseadmete ligipääsukontrolli protokoll, mis hõlmab endas nii autentimise, autoriseerimise kui ka aruandluse teenuseid. Andmevahetuseks kasutatakse TCP porti 49.&amp;lt;br&amp;gt;&lt;br /&gt;
Erinevalt RADIUS&#039;st, mis on TACACS+ alternatiiv, eristab viimast autoriseerimise funktsionaalsuse lahutamine, mis võimaldab paindlikumat ligipääsukontrolli - kes võib käivitada käske, milliseid käske, millises seadmes. Iga kasutaja poolt sisestatud käsk saadetakse kesksesse TACACS+ serverisse autoriseerimiseks, kus kontrollitakse, kas vastavat käsku on lubatud käivitada konkreetsel kasutajal või grupil. TACACS+ on võimalik luua käskude käivitamisele näiteks kasutaja-, seadme-, või ajapõhiseid reegleid.&amp;lt;br&amp;gt;&lt;br /&gt;
TACACS+ protokolli tugi on olemas levinud suuremate tootjate võrguseadmetes - Cisco, Juniper/Netscreen, HP, Alcatel/Lucent, Ericsson jt.&lt;br /&gt;
&lt;br /&gt;
==Paigaldamine==&lt;br /&gt;
&lt;br /&gt;
TACACS+ teenus paigaldatud Ubuntu 12.04-le.&amp;lt;br&amp;gt;&lt;br /&gt;
Testitava ruuterina kasutusel Cisco 1812.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
TACACS+ teenuse paigaldus:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;apt-get install tacacs+&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Teenuse seadistamine==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Konfiguratsioonifaili manual:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;man tac_plus.conf&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Aruandluse logifail:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;/var/log/tac_plus.acct&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
TACACS+ konfiguratsioonifaili asukoht:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;/etc/tacacs+/tac_plus.conf&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Algupärane konfiguratsioonifail: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
# Created by Henry-Nicolas Tourneur(henry.nicolas@tourneur.be)&lt;br /&gt;
# See man(5) tac_plus.conf for more details&lt;br /&gt;
&lt;br /&gt;
# Define where to log accounting data, this is the default.&lt;br /&gt;
&lt;br /&gt;
accounting file = /var/log/tac_plus.acct&lt;br /&gt;
&lt;br /&gt;
# This is the key that clients have to use to access Tacacs+&lt;br /&gt;
&lt;br /&gt;
key = testing123&lt;br /&gt;
&lt;br /&gt;
# Use /etc/passwd file to do authentication&lt;br /&gt;
    &lt;br /&gt;
#default authentication = file /etc/passwd&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
# You can use feature like per host key with different enable passwords&lt;br /&gt;
#host = 127.0.0.1 {&lt;br /&gt;
#        key = test &lt;br /&gt;
#        type = cisco&lt;br /&gt;
#        enable = &amp;lt;des|cleartext&amp;gt; enablepass&lt;br /&gt;
#        prompt = &amp;quot;Welcome XXX ISP Access Router \n\nUsername:&amp;quot;&lt;br /&gt;
#}&lt;br /&gt;
&lt;br /&gt;
# We also can define local users and specify a file where data is stored.&lt;br /&gt;
# That file may be filled using tac_pwd&lt;br /&gt;
#user = test1 {&lt;br /&gt;
#    name = &amp;quot;Test User&amp;quot;&lt;br /&gt;
#    member = staff&lt;br /&gt;
#    login = file /etc/tacacs/tacacs_passwords&lt;br /&gt;
#}&lt;br /&gt;
&lt;br /&gt;
# We can also specify rules valid per group of users.&lt;br /&gt;
#group = group1 {&lt;br /&gt;
#       cmd = conf {&lt;br /&gt;
#               deny&lt;br /&gt;
#       }&lt;br /&gt;
#}&lt;br /&gt;
&lt;br /&gt;
# Another example : forbid configure command for some hosts&lt;br /&gt;
# for a define range of clients&lt;br /&gt;
#group = group1 {&lt;br /&gt;
#       login = PAM&lt;br /&gt;
#       service = ppp&lt;br /&gt;
#       protocol = ip {&lt;br /&gt;
#               addr = 10.10.0.0/24&lt;br /&gt;
#       }&lt;br /&gt;
#       cmd = conf {&lt;br /&gt;
#               deny .*&lt;br /&gt;
#       }&lt;br /&gt;
#}&lt;br /&gt;
&lt;br /&gt;
user = DEFAULT {&lt;br /&gt;
        login = PAM&lt;br /&gt;
        service = ppp protocol = ip {}&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
# Much more features are availables, like ACL, more service compatibilities,&lt;br /&gt;
# commands authorization, scripting authorization.&lt;br /&gt;
# See the man page for those features.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Kasutajate autentimist on võimalik tac_plus&#039;s seadistada kolmel moel:&lt;br /&gt;
&lt;br /&gt;
* Autentimine lokaalse passwd faili alusel - /etc/passwd&lt;br /&gt;
* Autentimine /etc/tac_plus/tac_plus.conf faili konfigureeritud paroolidega&lt;br /&gt;
* Autentimine PAM-ga LDAP serveri pihta&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Käsitlen kahte esimest varianti:&lt;br /&gt;
&lt;br /&gt;
===Autentimine passwd faili põhjal===&lt;br /&gt;
&lt;br /&gt;
Luuakse grupp &amp;quot;net_admins&amp;quot;, Cisco kõrgeima võimaliku ligipääsutasemega (privilege level 15). Kasutaja &amp;quot;margus&amp;quot; määratakse grupi &amp;quot;net_admins&amp;quot; liikmeks.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
...&lt;br /&gt;
group = net_admins {&lt;br /&gt;
        default service = permit&lt;br /&gt;
        login = file /etc/passwd&lt;br /&gt;
        enable = file /etc/passwd&lt;br /&gt;
        service = exec {&lt;br /&gt;
                priv-lvl = 15&lt;br /&gt;
                }&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
user = margus {&lt;br /&gt;
        member = net_admins&lt;br /&gt;
}&lt;br /&gt;
...&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Autentimine DES salajase võtmega===&lt;/div&gt;</summary>
		<author><name>Mkurniko</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=TACACS%2B&amp;diff=59440</id>
		<title>TACACS+</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=TACACS%2B&amp;diff=59440"/>
		<updated>2012-12-15T18:53:06Z</updated>

		<summary type="html">&lt;p&gt;Mkurniko: /* Autentimine passwd failiga */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Autor==&lt;br /&gt;
Margus Kurnikov AK21&lt;br /&gt;
&lt;br /&gt;
==Sissejuhatus==&lt;br /&gt;
&lt;br /&gt;
TACACS+ (Terminal Access Controller Access-Control System Plus) on võrguseadmete ligipääsukontrolli protokoll, mis hõlmab endas nii autentimise, autoriseerimise kui ka aruandluse teenuseid. Andmevahetuseks kasutatakse TCP porti 49.&amp;lt;br&amp;gt;&lt;br /&gt;
Erinevalt RADIUS&#039;st, mis on TACACS+ alternatiiv, eristab viimast autoriseerimise funktsionaalsuse lahutamine, mis võimaldab paindlikumat ligipääsukontrolli - kes võib käivitada käske, milliseid käske, millises seadmes. Iga kasutaja poolt sisestatud käsk saadetakse kesksesse TACACS+ serverisse autoriseerimiseks, kus kontrollitakse, kas vastavat käsku on lubatud käivitada konkreetsel kasutajal või grupil. TACACS+ on võimalik luua käskude käivitamisele näiteks kasutaja-, seadme-, või ajapõhiseid reegleid.&amp;lt;br&amp;gt;&lt;br /&gt;
TACACS+ protokolli tugi on olemas levinud suuremate tootjate võrguseadmetes - Cisco, Juniper/Netscreen, HP, Alcatel/Lucent, Ericsson jt.&lt;br /&gt;
&lt;br /&gt;
==Paigaldamine==&lt;br /&gt;
&lt;br /&gt;
TACACS+ teenus paigaldatud Ubuntu 12.04-le.&amp;lt;br&amp;gt;&lt;br /&gt;
Testitava ruuterina kasutusel Cisco 1812.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
TACACS+ teenuse paigaldus:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;apt-get install tacacs+&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Teenuse seadistamine==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Konfiguratsioonifaili manual:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;man tac_plus.conf&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Aruandluse logifail:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;/var/log/tac_plus.acct&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
TACACS+ konfiguratsioonifaili asukoht:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;/etc/tacacs+/tac_plus.conf&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Algupärane konfiguratsioonifail: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
# Created by Henry-Nicolas Tourneur(henry.nicolas@tourneur.be)&lt;br /&gt;
# See man(5) tac_plus.conf for more details&lt;br /&gt;
&lt;br /&gt;
# Define where to log accounting data, this is the default.&lt;br /&gt;
&lt;br /&gt;
accounting file = /var/log/tac_plus.acct&lt;br /&gt;
&lt;br /&gt;
# This is the key that clients have to use to access Tacacs+&lt;br /&gt;
&lt;br /&gt;
key = testing123&lt;br /&gt;
&lt;br /&gt;
# Use /etc/passwd file to do authentication&lt;br /&gt;
    &lt;br /&gt;
#default authentication = file /etc/passwd&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
# You can use feature like per host key with different enable passwords&lt;br /&gt;
#host = 127.0.0.1 {&lt;br /&gt;
#        key = test &lt;br /&gt;
#        type = cisco&lt;br /&gt;
#        enable = &amp;lt;des|cleartext&amp;gt; enablepass&lt;br /&gt;
#        prompt = &amp;quot;Welcome XXX ISP Access Router \n\nUsername:&amp;quot;&lt;br /&gt;
#}&lt;br /&gt;
&lt;br /&gt;
# We also can define local users and specify a file where data is stored.&lt;br /&gt;
# That file may be filled using tac_pwd&lt;br /&gt;
#user = test1 {&lt;br /&gt;
#    name = &amp;quot;Test User&amp;quot;&lt;br /&gt;
#    member = staff&lt;br /&gt;
#    login = file /etc/tacacs/tacacs_passwords&lt;br /&gt;
#}&lt;br /&gt;
&lt;br /&gt;
# We can also specify rules valid per group of users.&lt;br /&gt;
#group = group1 {&lt;br /&gt;
#       cmd = conf {&lt;br /&gt;
#               deny&lt;br /&gt;
#       }&lt;br /&gt;
#}&lt;br /&gt;
&lt;br /&gt;
# Another example : forbid configure command for some hosts&lt;br /&gt;
# for a define range of clients&lt;br /&gt;
#group = group1 {&lt;br /&gt;
#       login = PAM&lt;br /&gt;
#       service = ppp&lt;br /&gt;
#       protocol = ip {&lt;br /&gt;
#               addr = 10.10.0.0/24&lt;br /&gt;
#       }&lt;br /&gt;
#       cmd = conf {&lt;br /&gt;
#               deny .*&lt;br /&gt;
#       }&lt;br /&gt;
#}&lt;br /&gt;
&lt;br /&gt;
user = DEFAULT {&lt;br /&gt;
        login = PAM&lt;br /&gt;
        service = ppp protocol = ip {}&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
# Much more features are availables, like ACL, more service compatibilities,&lt;br /&gt;
# commands authorization, scripting authorization.&lt;br /&gt;
# See the man page for those features.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Kasutajate autentimist on võimalik tac_plus&#039;s seadistada kolmel moel:&lt;br /&gt;
&lt;br /&gt;
* Autentimine lokaalse passwd faili alusel - /etc/passwd&lt;br /&gt;
* Autentimine /etc/tac_plus/tac_plus.conf faili konfigureeritud paroolidega&lt;br /&gt;
* Autentimine PAM-ga LDAP serveri pihta&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Käsitlen kahte esimest varianti:&lt;br /&gt;
&lt;br /&gt;
===Autentimine passwd faili põhjal===&lt;br /&gt;
&lt;br /&gt;
Luuakse grupp &amp;quot;net_admins&amp;quot;, Cisco kõrgeima võimaliku ligipääsutasemega (privilege level 15). Kasutaja &amp;quot;margus&amp;quot; määratakse gruppi &amp;quot;net_admins&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
...&lt;br /&gt;
group = net_admins {&lt;br /&gt;
        default service = permit&lt;br /&gt;
        login = file /etc/passwd&lt;br /&gt;
        enable = file /etc/passwd&lt;br /&gt;
        service = exec {&lt;br /&gt;
                priv-lvl = 15&lt;br /&gt;
                }&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
user = margus {&lt;br /&gt;
        member = net_admins&lt;br /&gt;
}&lt;br /&gt;
...&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;/div&gt;</summary>
		<author><name>Mkurniko</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=TACACS%2B&amp;diff=59439</id>
		<title>TACACS+</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=TACACS%2B&amp;diff=59439"/>
		<updated>2012-12-15T18:26:00Z</updated>

		<summary type="html">&lt;p&gt;Mkurniko: /* Teenuse seadistamine */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Autor==&lt;br /&gt;
Margus Kurnikov AK21&lt;br /&gt;
&lt;br /&gt;
==Sissejuhatus==&lt;br /&gt;
&lt;br /&gt;
TACACS+ (Terminal Access Controller Access-Control System Plus) on võrguseadmete ligipääsukontrolli protokoll, mis hõlmab endas nii autentimise, autoriseerimise kui ka aruandluse teenuseid. Andmevahetuseks kasutatakse TCP porti 49.&amp;lt;br&amp;gt;&lt;br /&gt;
Erinevalt RADIUS&#039;st, mis on TACACS+ alternatiiv, eristab viimast autoriseerimise funktsionaalsuse lahutamine, mis võimaldab paindlikumat ligipääsukontrolli - kes võib käivitada käske, milliseid käske, millises seadmes. Iga kasutaja poolt sisestatud käsk saadetakse kesksesse TACACS+ serverisse autoriseerimiseks, kus kontrollitakse, kas vastavat käsku on lubatud käivitada konkreetsel kasutajal või grupil. TACACS+ on võimalik luua käskude käivitamisele näiteks kasutaja-, seadme-, või ajapõhiseid reegleid.&amp;lt;br&amp;gt;&lt;br /&gt;
TACACS+ protokolli tugi on olemas levinud suuremate tootjate võrguseadmetes - Cisco, Juniper/Netscreen, HP, Alcatel/Lucent, Ericsson jt.&lt;br /&gt;
&lt;br /&gt;
==Paigaldamine==&lt;br /&gt;
&lt;br /&gt;
TACACS+ teenus paigaldatud Ubuntu 12.04-le.&amp;lt;br&amp;gt;&lt;br /&gt;
Testitava ruuterina kasutusel Cisco 1812.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
TACACS+ teenuse paigaldus:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;apt-get install tacacs+&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Teenuse seadistamine==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Konfiguratsioonifaili manual:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;man tac_plus.conf&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Aruandluse logifail:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;/var/log/tac_plus.acct&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
TACACS+ konfiguratsioonifaili asukoht:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;/etc/tacacs+/tac_plus.conf&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Algupärane konfiguratsioonifail: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
# Created by Henry-Nicolas Tourneur(henry.nicolas@tourneur.be)&lt;br /&gt;
# See man(5) tac_plus.conf for more details&lt;br /&gt;
&lt;br /&gt;
# Define where to log accounting data, this is the default.&lt;br /&gt;
&lt;br /&gt;
accounting file = /var/log/tac_plus.acct&lt;br /&gt;
&lt;br /&gt;
# This is the key that clients have to use to access Tacacs+&lt;br /&gt;
&lt;br /&gt;
key = testing123&lt;br /&gt;
&lt;br /&gt;
# Use /etc/passwd file to do authentication&lt;br /&gt;
    &lt;br /&gt;
#default authentication = file /etc/passwd&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
# You can use feature like per host key with different enable passwords&lt;br /&gt;
#host = 127.0.0.1 {&lt;br /&gt;
#        key = test &lt;br /&gt;
#        type = cisco&lt;br /&gt;
#        enable = &amp;lt;des|cleartext&amp;gt; enablepass&lt;br /&gt;
#        prompt = &amp;quot;Welcome XXX ISP Access Router \n\nUsername:&amp;quot;&lt;br /&gt;
#}&lt;br /&gt;
&lt;br /&gt;
# We also can define local users and specify a file where data is stored.&lt;br /&gt;
# That file may be filled using tac_pwd&lt;br /&gt;
#user = test1 {&lt;br /&gt;
#    name = &amp;quot;Test User&amp;quot;&lt;br /&gt;
#    member = staff&lt;br /&gt;
#    login = file /etc/tacacs/tacacs_passwords&lt;br /&gt;
#}&lt;br /&gt;
&lt;br /&gt;
# We can also specify rules valid per group of users.&lt;br /&gt;
#group = group1 {&lt;br /&gt;
#       cmd = conf {&lt;br /&gt;
#               deny&lt;br /&gt;
#       }&lt;br /&gt;
#}&lt;br /&gt;
&lt;br /&gt;
# Another example : forbid configure command for some hosts&lt;br /&gt;
# for a define range of clients&lt;br /&gt;
#group = group1 {&lt;br /&gt;
#       login = PAM&lt;br /&gt;
#       service = ppp&lt;br /&gt;
#       protocol = ip {&lt;br /&gt;
#               addr = 10.10.0.0/24&lt;br /&gt;
#       }&lt;br /&gt;
#       cmd = conf {&lt;br /&gt;
#               deny .*&lt;br /&gt;
#       }&lt;br /&gt;
#}&lt;br /&gt;
&lt;br /&gt;
user = DEFAULT {&lt;br /&gt;
        login = PAM&lt;br /&gt;
        service = ppp protocol = ip {}&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
# Much more features are availables, like ACL, more service compatibilities,&lt;br /&gt;
# commands authorization, scripting authorization.&lt;br /&gt;
# See the man page for those features.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Kasutajate autentimist on võimalik tac_plus&#039;s seadistada kolmel moel:&lt;br /&gt;
&lt;br /&gt;
* Autentimine lokaalse passwd faili alusel - /etc/passwd&lt;br /&gt;
* Autentimine /etc/tac_plus/tac_plus.conf faili konfigureeritud paroolidega&lt;br /&gt;
* Autentimine PAM-ga LDAP serveri pihta&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Käsitlen kahte esimest varianti:&lt;br /&gt;
&lt;br /&gt;
===Autentimine passwd failiga===&lt;/div&gt;</summary>
		<author><name>Mkurniko</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=TACACS%2B&amp;diff=59430</id>
		<title>TACACS+</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=TACACS%2B&amp;diff=59430"/>
		<updated>2012-12-15T18:00:13Z</updated>

		<summary type="html">&lt;p&gt;Mkurniko: /* Teenuse seadistamine */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Autor==&lt;br /&gt;
Margus Kurnikov AK21&lt;br /&gt;
&lt;br /&gt;
==Sissejuhatus==&lt;br /&gt;
&lt;br /&gt;
TACACS+ (Terminal Access Controller Access-Control System Plus) on võrguseadmete ligipääsukontrolli protokoll, mis hõlmab endas nii autentimise, autoriseerimise kui ka aruandluse teenuseid. Andmevahetuseks kasutatakse TCP porti 49.&amp;lt;br&amp;gt;&lt;br /&gt;
Erinevalt RADIUS&#039;st, mis on TACACS+ alternatiiv, eristab viimast autoriseerimise funktsionaalsuse lahutamine, mis võimaldab paindlikumat ligipääsukontrolli - kes võib käivitada käske, milliseid käske, millises seadmes. Iga kasutaja poolt sisestatud käsk saadetakse kesksesse TACACS+ serverisse autoriseerimiseks, kus kontrollitakse, kas vastavat käsku on lubatud käivitada konkreetsel kasutajal või grupil. TACACS+ on võimalik luua käskude käivitamisele näiteks kasutaja-, seadme-, või ajapõhiseid reegleid.&amp;lt;br&amp;gt;&lt;br /&gt;
TACACS+ protokolli tugi on olemas levinud suuremate tootjate võrguseadmetes - Cisco, Juniper/Netscreen, HP, Alcatel/Lucent, Ericsson jt.&lt;br /&gt;
&lt;br /&gt;
==Paigaldamine==&lt;br /&gt;
&lt;br /&gt;
TACACS+ teenus paigaldatud Ubuntu 12.04-le.&amp;lt;br&amp;gt;&lt;br /&gt;
Testitava ruuterina kasutusel Cisco 1812.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
TACACS+ teenuse paigaldus:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;apt-get install tacacs+&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Teenuse seadistamine==&lt;br /&gt;
&lt;br /&gt;
TACACS+ konfiguratsioonifaili asukoht:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;/etc/tacacs+/tac_plus.conf&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Konfiguratsioonifaili manual:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;man tac_plus.conf&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Aruandluse logifail:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;/var/log/tac_plus.acct&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Kasutajate autentimist on võimalik tac_plus&#039;s seadistada kolmel moel:&lt;br /&gt;
&lt;br /&gt;
* Autentimine lokaalse passwd faili alusel - /etc/passwd&lt;br /&gt;
* Autentimine /etc/tac_plus/tac_plus.conf faili konfigureeritud paroolidega&lt;br /&gt;
* Autentimine PAM-ga LDAP serveri pihta&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Käsitlen kahte esimest varianti:&lt;br /&gt;
&lt;br /&gt;
===Autentimine passwd failiga===&lt;/div&gt;</summary>
		<author><name>Mkurniko</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=TACACS%2B&amp;diff=59429</id>
		<title>TACACS+</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=TACACS%2B&amp;diff=59429"/>
		<updated>2012-12-15T18:00:02Z</updated>

		<summary type="html">&lt;p&gt;Mkurniko: /* Teenuse seadistamine */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Autor==&lt;br /&gt;
Margus Kurnikov AK21&lt;br /&gt;
&lt;br /&gt;
==Sissejuhatus==&lt;br /&gt;
&lt;br /&gt;
TACACS+ (Terminal Access Controller Access-Control System Plus) on võrguseadmete ligipääsukontrolli protokoll, mis hõlmab endas nii autentimise, autoriseerimise kui ka aruandluse teenuseid. Andmevahetuseks kasutatakse TCP porti 49.&amp;lt;br&amp;gt;&lt;br /&gt;
Erinevalt RADIUS&#039;st, mis on TACACS+ alternatiiv, eristab viimast autoriseerimise funktsionaalsuse lahutamine, mis võimaldab paindlikumat ligipääsukontrolli - kes võib käivitada käske, milliseid käske, millises seadmes. Iga kasutaja poolt sisestatud käsk saadetakse kesksesse TACACS+ serverisse autoriseerimiseks, kus kontrollitakse, kas vastavat käsku on lubatud käivitada konkreetsel kasutajal või grupil. TACACS+ on võimalik luua käskude käivitamisele näiteks kasutaja-, seadme-, või ajapõhiseid reegleid.&amp;lt;br&amp;gt;&lt;br /&gt;
TACACS+ protokolli tugi on olemas levinud suuremate tootjate võrguseadmetes - Cisco, Juniper/Netscreen, HP, Alcatel/Lucent, Ericsson jt.&lt;br /&gt;
&lt;br /&gt;
==Paigaldamine==&lt;br /&gt;
&lt;br /&gt;
TACACS+ teenus paigaldatud Ubuntu 12.04-le.&amp;lt;br&amp;gt;&lt;br /&gt;
Testitava ruuterina kasutusel Cisco 1812.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
TACACS+ teenuse paigaldus:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;apt-get install tacacs+&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Teenuse seadistamine==&lt;br /&gt;
&lt;br /&gt;
TACACS+ konfiguratsioonifaili asukoht:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;/etc/tacacs+/tac_plus.conf&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Konfiguratsioonifaili manual:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;man tac_plus.conf&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Aruandluse logifail:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;/var/log/tac_plus.acct&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Kasutajate autentimist on võimalik tac_plus&#039;s seadistada kolmel moel:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Autentimine lokaalse passwd faili alusel - /etc/passwd&lt;br /&gt;
* Autentimine /etc/tac_plus/tac_plus.conf faili konfigureeritud paroolidega&lt;br /&gt;
* Autentimine PAM-ga LDAP serveri pihta&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Käsitlen kahte esimest varianti:&lt;br /&gt;
&lt;br /&gt;
===Autentimine passwd failiga===&lt;/div&gt;</summary>
		<author><name>Mkurniko</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=TACACS%2B&amp;diff=59428</id>
		<title>TACACS+</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=TACACS%2B&amp;diff=59428"/>
		<updated>2012-12-15T17:59:48Z</updated>

		<summary type="html">&lt;p&gt;Mkurniko: /* Teenuse seadistamine */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Autor==&lt;br /&gt;
Margus Kurnikov AK21&lt;br /&gt;
&lt;br /&gt;
==Sissejuhatus==&lt;br /&gt;
&lt;br /&gt;
TACACS+ (Terminal Access Controller Access-Control System Plus) on võrguseadmete ligipääsukontrolli protokoll, mis hõlmab endas nii autentimise, autoriseerimise kui ka aruandluse teenuseid. Andmevahetuseks kasutatakse TCP porti 49.&amp;lt;br&amp;gt;&lt;br /&gt;
Erinevalt RADIUS&#039;st, mis on TACACS+ alternatiiv, eristab viimast autoriseerimise funktsionaalsuse lahutamine, mis võimaldab paindlikumat ligipääsukontrolli - kes võib käivitada käske, milliseid käske, millises seadmes. Iga kasutaja poolt sisestatud käsk saadetakse kesksesse TACACS+ serverisse autoriseerimiseks, kus kontrollitakse, kas vastavat käsku on lubatud käivitada konkreetsel kasutajal või grupil. TACACS+ on võimalik luua käskude käivitamisele näiteks kasutaja-, seadme-, või ajapõhiseid reegleid.&amp;lt;br&amp;gt;&lt;br /&gt;
TACACS+ protokolli tugi on olemas levinud suuremate tootjate võrguseadmetes - Cisco, Juniper/Netscreen, HP, Alcatel/Lucent, Ericsson jt.&lt;br /&gt;
&lt;br /&gt;
==Paigaldamine==&lt;br /&gt;
&lt;br /&gt;
TACACS+ teenus paigaldatud Ubuntu 12.04-le.&amp;lt;br&amp;gt;&lt;br /&gt;
Testitava ruuterina kasutusel Cisco 1812.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
TACACS+ teenuse paigaldus:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;apt-get install tacacs+&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Teenuse seadistamine==&lt;br /&gt;
&lt;br /&gt;
TACACS+ konfiguratsioonifaili asukoht:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;/etc/tacacs+/tac_plus.conf&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Konfiguratsioonifaili manual:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;man tac_plus.conf&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Aruandluse logifail:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;/var/log/tac_plus.acct&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Kasutajate autentimist on võimalik tac_plus&#039;s seadistada kolmel moel:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Autentimine lokaalse passwd faili alusel - /etc/passwd&lt;br /&gt;
* Autentimine /etc/tac_plus/tac_plus.conf faili konfigureeritud paroolidega&lt;br /&gt;
* Autentimine PAM-ga LDAP serveri pihta&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Käsitlen kahte esimest varianti:&lt;br /&gt;
&lt;br /&gt;
===Autentimine passwd failiga===&lt;/div&gt;</summary>
		<author><name>Mkurniko</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=TACACS%2B&amp;diff=59427</id>
		<title>TACACS+</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=TACACS%2B&amp;diff=59427"/>
		<updated>2012-12-15T17:59:29Z</updated>

		<summary type="html">&lt;p&gt;Mkurniko: /* Teenuse seadistamine */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Autor==&lt;br /&gt;
Margus Kurnikov AK21&lt;br /&gt;
&lt;br /&gt;
==Sissejuhatus==&lt;br /&gt;
&lt;br /&gt;
TACACS+ (Terminal Access Controller Access-Control System Plus) on võrguseadmete ligipääsukontrolli protokoll, mis hõlmab endas nii autentimise, autoriseerimise kui ka aruandluse teenuseid. Andmevahetuseks kasutatakse TCP porti 49.&amp;lt;br&amp;gt;&lt;br /&gt;
Erinevalt RADIUS&#039;st, mis on TACACS+ alternatiiv, eristab viimast autoriseerimise funktsionaalsuse lahutamine, mis võimaldab paindlikumat ligipääsukontrolli - kes võib käivitada käske, milliseid käske, millises seadmes. Iga kasutaja poolt sisestatud käsk saadetakse kesksesse TACACS+ serverisse autoriseerimiseks, kus kontrollitakse, kas vastavat käsku on lubatud käivitada konkreetsel kasutajal või grupil. TACACS+ on võimalik luua käskude käivitamisele näiteks kasutaja-, seadme-, või ajapõhiseid reegleid.&amp;lt;br&amp;gt;&lt;br /&gt;
TACACS+ protokolli tugi on olemas levinud suuremate tootjate võrguseadmetes - Cisco, Juniper/Netscreen, HP, Alcatel/Lucent, Ericsson jt.&lt;br /&gt;
&lt;br /&gt;
==Paigaldamine==&lt;br /&gt;
&lt;br /&gt;
TACACS+ teenus paigaldatud Ubuntu 12.04-le.&amp;lt;br&amp;gt;&lt;br /&gt;
Testitava ruuterina kasutusel Cisco 1812.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
TACACS+ teenuse paigaldus:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;apt-get install tacacs+&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Teenuse seadistamine==&lt;br /&gt;
&lt;br /&gt;
TACACS+ konfiguratsioonifaili asukoht:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;/etc/tacacs+/tac_plus.conf&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Konfiguratsioonifaili manual:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;man tac_plus.conf&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Aruandluse logifail:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;/var/log/tac_plus.acct&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Kasutajate autentimist on võimalik tac_plus&#039;s seadistada kolmel moel:&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Autentimine lokaalse passwd faili alusel - /etc/passwd&lt;br /&gt;
* Autentimine /etc/tac_plus/tac_plus.conf faili konfigureeritud paroolidega&lt;br /&gt;
* Autentimine PAM-ga LDAP serveri pihta&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Käsitlen kahte esimest varianti:&lt;br /&gt;
&lt;br /&gt;
===Autentimine passwd failiga===&lt;/div&gt;</summary>
		<author><name>Mkurniko</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=TACACS%2B&amp;diff=59426</id>
		<title>TACACS+</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=TACACS%2B&amp;diff=59426"/>
		<updated>2012-12-15T17:58:51Z</updated>

		<summary type="html">&lt;p&gt;Mkurniko: /* Teenuse seadistamine */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Autor==&lt;br /&gt;
Margus Kurnikov AK21&lt;br /&gt;
&lt;br /&gt;
==Sissejuhatus==&lt;br /&gt;
&lt;br /&gt;
TACACS+ (Terminal Access Controller Access-Control System Plus) on võrguseadmete ligipääsukontrolli protokoll, mis hõlmab endas nii autentimise, autoriseerimise kui ka aruandluse teenuseid. Andmevahetuseks kasutatakse TCP porti 49.&amp;lt;br&amp;gt;&lt;br /&gt;
Erinevalt RADIUS&#039;st, mis on TACACS+ alternatiiv, eristab viimast autoriseerimise funktsionaalsuse lahutamine, mis võimaldab paindlikumat ligipääsukontrolli - kes võib käivitada käske, milliseid käske, millises seadmes. Iga kasutaja poolt sisestatud käsk saadetakse kesksesse TACACS+ serverisse autoriseerimiseks, kus kontrollitakse, kas vastavat käsku on lubatud käivitada konkreetsel kasutajal või grupil. TACACS+ on võimalik luua käskude käivitamisele näiteks kasutaja-, seadme-, või ajapõhiseid reegleid.&amp;lt;br&amp;gt;&lt;br /&gt;
TACACS+ protokolli tugi on olemas levinud suuremate tootjate võrguseadmetes - Cisco, Juniper/Netscreen, HP, Alcatel/Lucent, Ericsson jt.&lt;br /&gt;
&lt;br /&gt;
==Paigaldamine==&lt;br /&gt;
&lt;br /&gt;
TACACS+ teenus paigaldatud Ubuntu 12.04-le.&amp;lt;br&amp;gt;&lt;br /&gt;
Testitava ruuterina kasutusel Cisco 1812.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
TACACS+ teenuse paigaldus:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;apt-get install tacacs+&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Teenuse seadistamine==&lt;br /&gt;
&lt;br /&gt;
TACACS+ konfiguratsioonifaili asukoht:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;/etc/tacacs+/tac_plus.conf&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Konfiguratsioonifaili manual:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;man tac_plus.conf&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Aruandluse logifail:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;/var/log/tac_plus.acct&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Kasutajate autentimist on võimalik tac_plus&#039;s seadistada kolmel moel:&lt;br /&gt;
&lt;br /&gt;
* Autentimine lokaalse passwd faili alusel - /etc/passwd&lt;br /&gt;
* Autentimine /etc/tac_plus/tac_plus.conf faili konfigureeritud paroolidega&lt;br /&gt;
* Autentimine PAM-ga LDAP serveri pihta&lt;br /&gt;
&lt;br /&gt;
Käsitlen kahte esimest varianti:&lt;br /&gt;
&lt;br /&gt;
===Autentimine passwd failiga===&lt;/div&gt;</summary>
		<author><name>Mkurniko</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=TACACS%2B&amp;diff=59425</id>
		<title>TACACS+</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=TACACS%2B&amp;diff=59425"/>
		<updated>2012-12-15T17:57:00Z</updated>

		<summary type="html">&lt;p&gt;Mkurniko: /* Teenuse seadistamine */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Autor==&lt;br /&gt;
Margus Kurnikov AK21&lt;br /&gt;
&lt;br /&gt;
==Sissejuhatus==&lt;br /&gt;
&lt;br /&gt;
TACACS+ (Terminal Access Controller Access-Control System Plus) on võrguseadmete ligipääsukontrolli protokoll, mis hõlmab endas nii autentimise, autoriseerimise kui ka aruandluse teenuseid. Andmevahetuseks kasutatakse TCP porti 49.&amp;lt;br&amp;gt;&lt;br /&gt;
Erinevalt RADIUS&#039;st, mis on TACACS+ alternatiiv, eristab viimast autoriseerimise funktsionaalsuse lahutamine, mis võimaldab paindlikumat ligipääsukontrolli - kes võib käivitada käske, milliseid käske, millises seadmes. Iga kasutaja poolt sisestatud käsk saadetakse kesksesse TACACS+ serverisse autoriseerimiseks, kus kontrollitakse, kas vastavat käsku on lubatud käivitada konkreetsel kasutajal või grupil. TACACS+ on võimalik luua käskude käivitamisele näiteks kasutaja-, seadme-, või ajapõhiseid reegleid.&amp;lt;br&amp;gt;&lt;br /&gt;
TACACS+ protokolli tugi on olemas levinud suuremate tootjate võrguseadmetes - Cisco, Juniper/Netscreen, HP, Alcatel/Lucent, Ericsson jt.&lt;br /&gt;
&lt;br /&gt;
==Paigaldamine==&lt;br /&gt;
&lt;br /&gt;
TACACS+ teenus paigaldatud Ubuntu 12.04-le.&amp;lt;br&amp;gt;&lt;br /&gt;
Testitava ruuterina kasutusel Cisco 1812.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
TACACS+ teenuse paigaldus:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;apt-get install tacacs+&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Teenuse seadistamine==&lt;br /&gt;
&lt;br /&gt;
TACACS+ konfiguratsioonifaili asukoht:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;/etc/tacacs+/tac_plus.conf&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Konfiguratsioonifaili manual:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;man tac_plus.conf&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Aruandluse logifail:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;/var/log/tac_plus.acct&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Kasutajate autentimist on võimalik tac_plus&#039;s seadistada kolmel moel:&lt;br /&gt;
&lt;br /&gt;
* Autentimine lokaalse passwd faili alusel - /etc/passwd&lt;br /&gt;
* Autentimine /etc/tac_plus/tac_plus.conf faili konfigureeritud paroolidega&lt;br /&gt;
* Autentimine PAM-ga LDAP serveri pihta&lt;/div&gt;</summary>
		<author><name>Mkurniko</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=TACACS%2B&amp;diff=59424</id>
		<title>TACACS+</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=TACACS%2B&amp;diff=59424"/>
		<updated>2012-12-15T17:56:42Z</updated>

		<summary type="html">&lt;p&gt;Mkurniko: /* Teenuse seadistamine */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Autor==&lt;br /&gt;
Margus Kurnikov AK21&lt;br /&gt;
&lt;br /&gt;
==Sissejuhatus==&lt;br /&gt;
&lt;br /&gt;
TACACS+ (Terminal Access Controller Access-Control System Plus) on võrguseadmete ligipääsukontrolli protokoll, mis hõlmab endas nii autentimise, autoriseerimise kui ka aruandluse teenuseid. Andmevahetuseks kasutatakse TCP porti 49.&amp;lt;br&amp;gt;&lt;br /&gt;
Erinevalt RADIUS&#039;st, mis on TACACS+ alternatiiv, eristab viimast autoriseerimise funktsionaalsuse lahutamine, mis võimaldab paindlikumat ligipääsukontrolli - kes võib käivitada käske, milliseid käske, millises seadmes. Iga kasutaja poolt sisestatud käsk saadetakse kesksesse TACACS+ serverisse autoriseerimiseks, kus kontrollitakse, kas vastavat käsku on lubatud käivitada konkreetsel kasutajal või grupil. TACACS+ on võimalik luua käskude käivitamisele näiteks kasutaja-, seadme-, või ajapõhiseid reegleid.&amp;lt;br&amp;gt;&lt;br /&gt;
TACACS+ protokolli tugi on olemas levinud suuremate tootjate võrguseadmetes - Cisco, Juniper/Netscreen, HP, Alcatel/Lucent, Ericsson jt.&lt;br /&gt;
&lt;br /&gt;
==Paigaldamine==&lt;br /&gt;
&lt;br /&gt;
TACACS+ teenus paigaldatud Ubuntu 12.04-le.&amp;lt;br&amp;gt;&lt;br /&gt;
Testitava ruuterina kasutusel Cisco 1812.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
TACACS+ teenuse paigaldus:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;apt-get install tacacs+&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Teenuse seadistamine==&lt;br /&gt;
&lt;br /&gt;
TACACS+ konfiguratsioonifaili asukoht:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;/etc/tacacs+/tac_plus.conf&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Konfiguratsioonifaili manual:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;man tac_plus.conf&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Aruandluse logifail:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;/var/log/tac_plus.acct&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Kasutajate autentimist on võimalik tac_plus&#039;s seadistada kolmel moel:&lt;br /&gt;
&lt;br /&gt;
* Autentimine lokaalse passwd faili alusel - /etc/passwd&lt;br /&gt;
* Autentimine /etc/tac_plus/tac_plus.conf faili konfigureeritud paroolidega&lt;br /&gt;
* Autentimine PAM-ga LDAP serveri pihta&lt;/div&gt;</summary>
		<author><name>Mkurniko</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=TACACS%2B&amp;diff=59423</id>
		<title>TACACS+</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=TACACS%2B&amp;diff=59423"/>
		<updated>2012-12-15T17:56:30Z</updated>

		<summary type="html">&lt;p&gt;Mkurniko: /* Teenuse seadistamine */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Autor==&lt;br /&gt;
Margus Kurnikov AK21&lt;br /&gt;
&lt;br /&gt;
==Sissejuhatus==&lt;br /&gt;
&lt;br /&gt;
TACACS+ (Terminal Access Controller Access-Control System Plus) on võrguseadmete ligipääsukontrolli protokoll, mis hõlmab endas nii autentimise, autoriseerimise kui ka aruandluse teenuseid. Andmevahetuseks kasutatakse TCP porti 49.&amp;lt;br&amp;gt;&lt;br /&gt;
Erinevalt RADIUS&#039;st, mis on TACACS+ alternatiiv, eristab viimast autoriseerimise funktsionaalsuse lahutamine, mis võimaldab paindlikumat ligipääsukontrolli - kes võib käivitada käske, milliseid käske, millises seadmes. Iga kasutaja poolt sisestatud käsk saadetakse kesksesse TACACS+ serverisse autoriseerimiseks, kus kontrollitakse, kas vastavat käsku on lubatud käivitada konkreetsel kasutajal või grupil. TACACS+ on võimalik luua käskude käivitamisele näiteks kasutaja-, seadme-, või ajapõhiseid reegleid.&amp;lt;br&amp;gt;&lt;br /&gt;
TACACS+ protokolli tugi on olemas levinud suuremate tootjate võrguseadmetes - Cisco, Juniper/Netscreen, HP, Alcatel/Lucent, Ericsson jt.&lt;br /&gt;
&lt;br /&gt;
==Paigaldamine==&lt;br /&gt;
&lt;br /&gt;
TACACS+ teenus paigaldatud Ubuntu 12.04-le.&amp;lt;br&amp;gt;&lt;br /&gt;
Testitava ruuterina kasutusel Cisco 1812.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
TACACS+ teenuse paigaldus:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;apt-get install tacacs+&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Teenuse seadistamine==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
TACACS+ konfiguratsioonifaili asukoht:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;/etc/tacacs+/tac_plus.conf&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Konfiguratsioonifaili manual:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;man tac_plus.conf&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Aruandluse logifail:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;/var/log/tac_plus.acct&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Kasutajate autentimist on võimalik tac_plus&#039;s seadistada kolmel moel:&lt;br /&gt;
&lt;br /&gt;
* Autentimine lokaalse passwd faili alusel - /etc/passwd&lt;br /&gt;
* Autentimine /etc/tac_plus/tac_plus.conf faili konfigureeritud paroolidega&lt;br /&gt;
* Autentimine PAM-ga LDAP serveri pihta&lt;/div&gt;</summary>
		<author><name>Mkurniko</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=TACACS%2B&amp;diff=59422</id>
		<title>TACACS+</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=TACACS%2B&amp;diff=59422"/>
		<updated>2012-12-15T17:56:03Z</updated>

		<summary type="html">&lt;p&gt;Mkurniko: /* Teenuse seadistamine */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Autor==&lt;br /&gt;
Margus Kurnikov AK21&lt;br /&gt;
&lt;br /&gt;
==Sissejuhatus==&lt;br /&gt;
&lt;br /&gt;
TACACS+ (Terminal Access Controller Access-Control System Plus) on võrguseadmete ligipääsukontrolli protokoll, mis hõlmab endas nii autentimise, autoriseerimise kui ka aruandluse teenuseid. Andmevahetuseks kasutatakse TCP porti 49.&amp;lt;br&amp;gt;&lt;br /&gt;
Erinevalt RADIUS&#039;st, mis on TACACS+ alternatiiv, eristab viimast autoriseerimise funktsionaalsuse lahutamine, mis võimaldab paindlikumat ligipääsukontrolli - kes võib käivitada käske, milliseid käske, millises seadmes. Iga kasutaja poolt sisestatud käsk saadetakse kesksesse TACACS+ serverisse autoriseerimiseks, kus kontrollitakse, kas vastavat käsku on lubatud käivitada konkreetsel kasutajal või grupil. TACACS+ on võimalik luua käskude käivitamisele näiteks kasutaja-, seadme-, või ajapõhiseid reegleid.&amp;lt;br&amp;gt;&lt;br /&gt;
TACACS+ protokolli tugi on olemas levinud suuremate tootjate võrguseadmetes - Cisco, Juniper/Netscreen, HP, Alcatel/Lucent, Ericsson jt.&lt;br /&gt;
&lt;br /&gt;
==Paigaldamine==&lt;br /&gt;
&lt;br /&gt;
TACACS+ teenus paigaldatud Ubuntu 12.04-le.&amp;lt;br&amp;gt;&lt;br /&gt;
Testitava ruuterina kasutusel Cisco 1812.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
TACACS+ teenuse paigaldus:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;apt-get install tacacs+&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Teenuse seadistamine==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
TACACS+ konfiguratsioonifaili asukoht:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;/etc/tacacs+/tac_plus.conf&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Konfiguratsioonifaili manual:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;man tac_plus.conf&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Aruandluse logifail:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;/var/log/tac_plus.acct&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Kasutajate autentimist on võimalik tac_plus&#039;s seadistada kolmel moel:&lt;br /&gt;
&lt;br /&gt;
* Autentimine lokaalse passwd faili alusel - /etc/passwd&lt;br /&gt;
* Autentimine /etc/tac_plus/tac_plus.conf faili konfigureeritud paroolidega&lt;br /&gt;
* Autentimine PAM-ga LDAP serveri pihta&lt;/div&gt;</summary>
		<author><name>Mkurniko</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=TACACS%2B&amp;diff=59421</id>
		<title>TACACS+</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=TACACS%2B&amp;diff=59421"/>
		<updated>2012-12-15T17:55:50Z</updated>

		<summary type="html">&lt;p&gt;Mkurniko: /* Paigaldamine */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Autor==&lt;br /&gt;
Margus Kurnikov AK21&lt;br /&gt;
&lt;br /&gt;
==Sissejuhatus==&lt;br /&gt;
&lt;br /&gt;
TACACS+ (Terminal Access Controller Access-Control System Plus) on võrguseadmete ligipääsukontrolli protokoll, mis hõlmab endas nii autentimise, autoriseerimise kui ka aruandluse teenuseid. Andmevahetuseks kasutatakse TCP porti 49.&amp;lt;br&amp;gt;&lt;br /&gt;
Erinevalt RADIUS&#039;st, mis on TACACS+ alternatiiv, eristab viimast autoriseerimise funktsionaalsuse lahutamine, mis võimaldab paindlikumat ligipääsukontrolli - kes võib käivitada käske, milliseid käske, millises seadmes. Iga kasutaja poolt sisestatud käsk saadetakse kesksesse TACACS+ serverisse autoriseerimiseks, kus kontrollitakse, kas vastavat käsku on lubatud käivitada konkreetsel kasutajal või grupil. TACACS+ on võimalik luua käskude käivitamisele näiteks kasutaja-, seadme-, või ajapõhiseid reegleid.&amp;lt;br&amp;gt;&lt;br /&gt;
TACACS+ protokolli tugi on olemas levinud suuremate tootjate võrguseadmetes - Cisco, Juniper/Netscreen, HP, Alcatel/Lucent, Ericsson jt.&lt;br /&gt;
&lt;br /&gt;
==Paigaldamine==&lt;br /&gt;
&lt;br /&gt;
TACACS+ teenus paigaldatud Ubuntu 12.04-le.&amp;lt;br&amp;gt;&lt;br /&gt;
Testitava ruuterina kasutusel Cisco 1812.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
TACACS+ teenuse paigaldus:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;apt-get install tacacs+&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Teenuse seadistamine==&lt;br /&gt;
&lt;br /&gt;
Konfiguratsioonifaili manual:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;man tac_plus.conf&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Aruandluse logifail:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;/var/log/tac_plus.acct&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Kasutajate autentimist on võimalik tac_plus&#039;s seadistada kolmel moel:&lt;br /&gt;
&lt;br /&gt;
* Autentimine lokaalse passwd faili alusel - /etc/passwd&lt;br /&gt;
* Autentimine /etc/tac_plus/tac_plus.conf faili konfigureeritud paroolidega&lt;br /&gt;
* Autentimine PAM-ga LDAP serveri pihta&lt;/div&gt;</summary>
		<author><name>Mkurniko</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=TACACS%2B&amp;diff=59420</id>
		<title>TACACS+</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=TACACS%2B&amp;diff=59420"/>
		<updated>2012-12-15T17:55:21Z</updated>

		<summary type="html">&lt;p&gt;Mkurniko: /* Paigaldamine */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Autor==&lt;br /&gt;
Margus Kurnikov AK21&lt;br /&gt;
&lt;br /&gt;
==Sissejuhatus==&lt;br /&gt;
&lt;br /&gt;
TACACS+ (Terminal Access Controller Access-Control System Plus) on võrguseadmete ligipääsukontrolli protokoll, mis hõlmab endas nii autentimise, autoriseerimise kui ka aruandluse teenuseid. Andmevahetuseks kasutatakse TCP porti 49.&amp;lt;br&amp;gt;&lt;br /&gt;
Erinevalt RADIUS&#039;st, mis on TACACS+ alternatiiv, eristab viimast autoriseerimise funktsionaalsuse lahutamine, mis võimaldab paindlikumat ligipääsukontrolli - kes võib käivitada käske, milliseid käske, millises seadmes. Iga kasutaja poolt sisestatud käsk saadetakse kesksesse TACACS+ serverisse autoriseerimiseks, kus kontrollitakse, kas vastavat käsku on lubatud käivitada konkreetsel kasutajal või grupil. TACACS+ on võimalik luua käskude käivitamisele näiteks kasutaja-, seadme-, või ajapõhiseid reegleid.&amp;lt;br&amp;gt;&lt;br /&gt;
TACACS+ protokolli tugi on olemas levinud suuremate tootjate võrguseadmetes - Cisco, Juniper/Netscreen, HP, Alcatel/Lucent, Ericsson jt.&lt;br /&gt;
&lt;br /&gt;
==Paigaldamine==&lt;br /&gt;
&lt;br /&gt;
TACACS+ teenus paigaldatud Ubuntu 12.04-le.&amp;lt;br&amp;gt;&lt;br /&gt;
Testitava ruuterina kasutusel Cisco 1812.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
TACACS+ teenuse paigaldus:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;apt-get install tacacs+&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
TACACS+ konfiguratsioonifaili asukoht:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;/etc/tacacs+/tac_plus.conf&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Teenuse seadistamine==&lt;br /&gt;
&lt;br /&gt;
Konfiguratsioonifaili manual:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;man tac_plus.conf&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Aruandluse logifail:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;/var/log/tac_plus.acct&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Kasutajate autentimist on võimalik tac_plus&#039;s seadistada kolmel moel:&lt;br /&gt;
&lt;br /&gt;
* Autentimine lokaalse passwd faili alusel - /etc/passwd&lt;br /&gt;
* Autentimine /etc/tac_plus/tac_plus.conf faili konfigureeritud paroolidega&lt;br /&gt;
* Autentimine PAM-ga LDAP serveri pihta&lt;/div&gt;</summary>
		<author><name>Mkurniko</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=TACACS%2B&amp;diff=59419</id>
		<title>TACACS+</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=TACACS%2B&amp;diff=59419"/>
		<updated>2012-12-15T17:54:50Z</updated>

		<summary type="html">&lt;p&gt;Mkurniko: /* Teenuse seadistamine */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Autor==&lt;br /&gt;
Margus Kurnikov AK21&lt;br /&gt;
&lt;br /&gt;
==Sissejuhatus==&lt;br /&gt;
&lt;br /&gt;
TACACS+ (Terminal Access Controller Access-Control System Plus) on võrguseadmete ligipääsukontrolli protokoll, mis hõlmab endas nii autentimise, autoriseerimise kui ka aruandluse teenuseid. Andmevahetuseks kasutatakse TCP porti 49.&amp;lt;br&amp;gt;&lt;br /&gt;
Erinevalt RADIUS&#039;st, mis on TACACS+ alternatiiv, eristab viimast autoriseerimise funktsionaalsuse lahutamine, mis võimaldab paindlikumat ligipääsukontrolli - kes võib käivitada käske, milliseid käske, millises seadmes. Iga kasutaja poolt sisestatud käsk saadetakse kesksesse TACACS+ serverisse autoriseerimiseks, kus kontrollitakse, kas vastavat käsku on lubatud käivitada konkreetsel kasutajal või grupil. TACACS+ on võimalik luua käskude käivitamisele näiteks kasutaja-, seadme-, või ajapõhiseid reegleid.&amp;lt;br&amp;gt;&lt;br /&gt;
TACACS+ protokolli tugi on olemas levinud suuremate tootjate võrguseadmetes - Cisco, Juniper/Netscreen, HP, Alcatel/Lucent, Ericsson jt.&lt;br /&gt;
&lt;br /&gt;
==Paigaldamine==&lt;br /&gt;
&lt;br /&gt;
TACACS+ teenus paigaldatud Ubuntu 12.04-le.&amp;lt;br&amp;gt;&lt;br /&gt;
Testitava ruuterina kasutusel Cisco 1812.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
TACACS+ teenuse paigaldus:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;apt-get install tacacs+&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
TACACS+ konfiguratsioonifaili asukoht:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;/etc/tacacs+/tac_plus.conf&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Teenuse seadistamine==&lt;br /&gt;
&lt;br /&gt;
Konfiguratsioonifaili manual:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;man tac_plus.conf&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Aruandluse logifail:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;/var/log/tac_plus.acct&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Kasutajate autentimist on võimalik tac_plus&#039;s seadistada kolmel moel:&lt;br /&gt;
&lt;br /&gt;
* Autentimine lokaalse passwd faili alusel - /etc/passwd&lt;br /&gt;
* Autentimine /etc/tac_plus/tac_plus.conf faili konfigureeritud paroolidega&lt;br /&gt;
* Autentimine PAM-ga LDAP serveri pihta&lt;/div&gt;</summary>
		<author><name>Mkurniko</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=TACACS%2B&amp;diff=59409</id>
		<title>TACACS+</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=TACACS%2B&amp;diff=59409"/>
		<updated>2012-12-15T17:47:40Z</updated>

		<summary type="html">&lt;p&gt;Mkurniko: /* Teenuse seadistamine */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Autor==&lt;br /&gt;
Margus Kurnikov AK21&lt;br /&gt;
&lt;br /&gt;
==Sissejuhatus==&lt;br /&gt;
&lt;br /&gt;
TACACS+ (Terminal Access Controller Access-Control System Plus) on võrguseadmete ligipääsukontrolli protokoll, mis hõlmab endas nii autentimise, autoriseerimise kui ka aruandluse teenuseid. Andmevahetuseks kasutatakse TCP porti 49.&amp;lt;br&amp;gt;&lt;br /&gt;
Erinevalt RADIUS&#039;st, mis on TACACS+ alternatiiv, eristab viimast autoriseerimise funktsionaalsuse lahutamine, mis võimaldab paindlikumat ligipääsukontrolli - kes võib käivitada käske, milliseid käske, millises seadmes. Iga kasutaja poolt sisestatud käsk saadetakse kesksesse TACACS+ serverisse autoriseerimiseks, kus kontrollitakse, kas vastavat käsku on lubatud käivitada konkreetsel kasutajal või grupil. TACACS+ on võimalik luua käskude käivitamisele näiteks kasutaja-, seadme-, või ajapõhiseid reegleid.&amp;lt;br&amp;gt;&lt;br /&gt;
TACACS+ protokolli tugi on olemas levinud suuremate tootjate võrguseadmetes - Cisco, Juniper/Netscreen, HP, Alcatel/Lucent, Ericsson jt.&lt;br /&gt;
&lt;br /&gt;
==Paigaldamine==&lt;br /&gt;
&lt;br /&gt;
TACACS+ teenus paigaldatud Ubuntu 12.04-le.&amp;lt;br&amp;gt;&lt;br /&gt;
Testitava ruuterina kasutusel Cisco 1812.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
TACACS+ teenuse paigaldus:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;apt-get install tacacs+&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
TACACS+ konfiguratsioonifaili asukoht:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;/etc/tacacs+/tac_plus.conf&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Teenuse seadistamine==&lt;br /&gt;
&lt;br /&gt;
Konfiguratsioonifaili manual:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;man tac_plus.conf&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Aruandluse logifail:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;/var/log/tac_plus.acct&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Kasutajate autentimist on võimalik tac_plus&#039;s seadistada kolmel moel:&lt;br /&gt;
&lt;br /&gt;
* Autentimine lokaalse passwd faili alusel - /etc/passwd&lt;br /&gt;
* Autentimine /etc/tac_plus/tac_plus.conf faili konfigureeritud paroolidega&lt;br /&gt;
* Autentimine PAM-ga LDAP serveri pihta&lt;/div&gt;</summary>
		<author><name>Mkurniko</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=TACACS%2B&amp;diff=59407</id>
		<title>TACACS+</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=TACACS%2B&amp;diff=59407"/>
		<updated>2012-12-15T17:47:07Z</updated>

		<summary type="html">&lt;p&gt;Mkurniko: /* Teenuse seadistamine */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Autor==&lt;br /&gt;
Margus Kurnikov AK21&lt;br /&gt;
&lt;br /&gt;
==Sissejuhatus==&lt;br /&gt;
&lt;br /&gt;
TACACS+ (Terminal Access Controller Access-Control System Plus) on võrguseadmete ligipääsukontrolli protokoll, mis hõlmab endas nii autentimise, autoriseerimise kui ka aruandluse teenuseid. Andmevahetuseks kasutatakse TCP porti 49.&amp;lt;br&amp;gt;&lt;br /&gt;
Erinevalt RADIUS&#039;st, mis on TACACS+ alternatiiv, eristab viimast autoriseerimise funktsionaalsuse lahutamine, mis võimaldab paindlikumat ligipääsukontrolli - kes võib käivitada käske, milliseid käske, millises seadmes. Iga kasutaja poolt sisestatud käsk saadetakse kesksesse TACACS+ serverisse autoriseerimiseks, kus kontrollitakse, kas vastavat käsku on lubatud käivitada konkreetsel kasutajal või grupil. TACACS+ on võimalik luua käskude käivitamisele näiteks kasutaja-, seadme-, või ajapõhiseid reegleid.&amp;lt;br&amp;gt;&lt;br /&gt;
TACACS+ protokolli tugi on olemas levinud suuremate tootjate võrguseadmetes - Cisco, Juniper/Netscreen, HP, Alcatel/Lucent, Ericsson jt.&lt;br /&gt;
&lt;br /&gt;
==Paigaldamine==&lt;br /&gt;
&lt;br /&gt;
TACACS+ teenus paigaldatud Ubuntu 12.04-le.&amp;lt;br&amp;gt;&lt;br /&gt;
Testitava ruuterina kasutusel Cisco 1812.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
TACACS+ teenuse paigaldus:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;apt-get install tacacs+&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
TACACS+ konfiguratsioonifaili asukoht:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;/etc/tacacs+/tac_plus.conf&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Teenuse seadistamine==&lt;br /&gt;
&lt;br /&gt;
Konfiguratsioonifaili manual:&lt;br /&gt;
&amp;lt;code&amp;gt;man tac_plus.conf&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Aruandluse logifail:&lt;br /&gt;
&amp;lt;code&amp;gt;/var/log/tac_plus.acct&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Kasutajate autentimist on võimalik tac_plus&#039;s seadistada kolmel moel:&lt;br /&gt;
&lt;br /&gt;
* Autentimine lokaalse passwd faili alusel - /etc/passwd&lt;br /&gt;
* Autentimine /etc/tac_plus/tac_plus.conf faili konfigureeritud paroolidega&lt;br /&gt;
* Autentimine PAM-ga LDAP serveri pihta&lt;/div&gt;</summary>
		<author><name>Mkurniko</name></author>
	</entry>
</feed>