Three attack methods bypass Cisco TACACS +
Original article: 3 attacks on cisco tacacs bypassing
In this article, the author introduces three methods to bypass TACACS on Cisco devices.No.1 DoS attacks bypass Cisco TACACS + No. 2 Local cracking PSK bypass Cisco TACACS + No. 3
1. Tacacs + Overview 1.1 What is TACACS +TACACS + (terminalaccess Controller access control system, Terminal Access Controller Control Protocol) is a feature-enhanced security protocol based on the TACACS protocol. The protocol is similar to the RADIUS protocol and uses client/server mode for communication between NAS
Catalyst 4000 and Catalyst 5000 of the Catalyst Switch series (Catalyst 6000, running CatcOs) support some form of authentication, starting with code 2.2. Added the latest version. TACACS + (TCP port 49, not xtacacs udp port 49), remote access dial-in user service (RADIUS), or Kerberos server users set to authentication, authorization, and accounting (AAA) is the same as a router user. This article contains examples of the smallest commands that must
Cisco NX-OS software TACACS + Server Local Privilege Escalation Vulnerability
Cisco NX-OS software TACACS + Server Local Privilege Escalation Vulnerability
Release date:Updated on:
Affected Systems:Cisco NX-OSDescription:--------------------------------------------------------------------------------Bugtraq id: 65083CVE (CAN) ID: CVE-2014-0676
Cisco NX-OS is a data center-level operating system that rep
Tacacs + server deployment
1. Install the development environment
# Yum-y install gcc make flex bison libwrap0-dev
2. download and install the tacacs + Software Package
# Wget ftp://ftp.shrubbery.net/pub/tac_plus/tacacs+-F4.0.4.26.tar.gz
# Tar-zxvf tacacs0000-f4.0.4.26.tar.gz
# Cd tacacs +-F4.0.4.26
# Less INSTA
Download the TACACS package first
650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M01/6F/1B/wKioL1WSPPLCxvD5AABtHQmgkSg746.jpg "title=" 1.png " alt= "Wkiol1wspplcxvd5aabthqmgksg746.jpg"/>2. Install this package650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M01/6F/1B/wKioL1WSPRmSjqKhAAA68en2J9s782.jpg "style=" float: none; "title=" 2.png "alt=" Wkiol1wsprmsjqkhaaa68en2j9s782.jpg "/>3. Make sure that the logged-on user is available i
Introduction to CISCO router AAA and related routing configuration cisco aaa www.2cto.com 3A concept: authentication authorization Accounting accountingcisco provides a variety of 3A services for routers and switches: 1. Self-contained AAA router/NAS self-contained AAA service NAS (Network Access Server) 2. Contact the AAA service on the cisco secure acs router/NAS with the external cisco secure acs system 3. Contact the AAA service on the cisco secure acs solution engine router/NAS with the ext
on to the server to achieve billing.
1. xtacacsd package acquisition
Xtacacsd can be downloaded from Ftp: // ftp.navya.com/pub/vikas. The downloaded file is often compressed format (such as: xtacacsd-4_1_2_tar.gz), save the downloaded file to a specific directory, such as/usr, and then decompress.
# Gunzip xtacacsd-4_1_2_tar.gz
# Tar xvf xtacacsd-4_1_2_tar
2. xtacacsd compilation and Installation
First go to the/usr/xtacacsd-4.1.2 directory,
Then, modify the statements in the
1. Building a tacacs + server TACACS + (Terminal Access Controller access control system, terminal Access Controllers Control Protocol)is a function-enhanced security protocol based on the TACACS protocol. Similar to the capabilities of the RADIUS protocol, the protocol uses client/server mode to communicate between NAS and T
. TACACS + provides independent authentication, authorization, and accounting services. Although RADIUS integrates authentication and authorization in the user configuration file, TACACS + separates these two operations, the difference is that TACACS + uses the Transmission Control Protocol (TCP) while RADIUS uses the user Message Protocol (UDP ). most administra
There are two methods for the AAA Server; one is the RADIUS server, and the other is the Terminal Access Controller Access Control System TACACS +
1. radius Configuration
AAA New-model startup
AAA authentication login default radius local use the default method list to set the authentication method for login (if you cannot connect to the radius, use the local authentication method)
AAA authentication PPP default local group radius (use the default met
chosen. Authorization-a way to provide remote access control includes one-time authorization or individual service licensing, each user account list and profile, user package support, and Ip,ipx,arp and Telnet support. Accounting-a way to collect and send information to a secure server, which is used to list bills, to audit and form reports, such as user identification, start and stop times, commands to execute, number of packages, and number of bytes.
4. RADIUS?
RADIUS is a distributed client/
This document provides a way to set up a AAA service for VPN3000 using the Cisco Secure ACS Server:
Overview: Cisco Secure ACS is a AAA server. The so-called AAA, refers to:
Authentication (authentication): When NAS (Network access server network access servers) receives a user-authenticated request, it sends the information over UDP 1645 to the RADIUS server, and the server checks the user database to determine whether it is an authorized user. If so, the information is returned to the NAS fo
Parameter settings
The following assumes that the route name is nb-r-01
Log on to the route
Nb-r-01> enable
Password: "Enter enable secrect password
Nb-r-01 # conf ter
Enter configuration commands, one per line. End with CN
Network ID
Nb-r-01 # conf ter
Nb-r-01 (config) # router rip
Nb-r-01 (config-router) # network 202.96.102.0
Nb-r-01 (config-router) # network 202.96.100.0
Nb-r-01 (config-router) # network 202.96.101.0
The preceding command is used to let the route know all the networks
AAA billing supported by Cisco routers Step 1: configure the basic interface Router (config) # host Rack244R1Rack244R1 (config) # int e0/0Rack244R1 (config-if) # ip add 12.0.0.1 255.255.255.0Rack244R1 (config-if) # no shRack244R1 (config-if) # int e1/0Rack244R1 (config-if) # ip add 172.16.18.11 then (config-if) # no shRouter (config) # host Routing (config) # int e0/0Rack244R2 (config-if) # ip add 12.0.0.2 255.255.255.0cRack244R2 (config-if) # no sh www.2cto.com Step 2: configure AAA billing for
192.168.0.8 netmask 255.255.255.255 0 0Conduit permit ICMP any anyConduit permit TCP host 61.144.51.43 eq www anyConduit permit UDP host 61.144.51.43 eq domain any------provide domain-name service with 61.144.51.43 This IP address, and only allow external users to access the UDP port of domainRoute outside 0.0.0.0 0.0.0.0 61.144.51.61 1------External Gateway 61.144.51.61Timeout xlate------After an internal device has been translated (global) to an external IP packet, after the default of 3 hour
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.