Authorization

This scenario shows how to set up per-command authorization.

Tacacs Method Privileged User

Description

A TACACS+ server configured to deny the show date command and allow everything else is added to a TACACS+ group which is added to an AAA list. This list is assigned to the CLI’s command authorization. Whenever a user attempts to run a command, it is sent to the server and it is only executed if it is authorized to do so.

Scenario

Step 1: Set the following configuration in DUT0:

set interfaces ethernet eth0 address 10.215.168.64/24
set system aaa server tacacs serv1 address 10.215.168.1
set system aaa server tacacs serv1 key 1234
set system aaa group tacacs tacgroup1 server serv1
set system aaa list list1 method 1 group tacacs tacgroup1
set system cli aaa authorization list1
set system login user testadmin authentication plaintext-password admin
set system login user testadmin role admin

Step 2: Ping IP address 10.215.168.1 from DUT0:

admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1
Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data.
64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.206 ms

--- 10.215.168.1 ping statistics ---
1 packets transmitted, 1 received, 0% packet loss, time 0ms
rtt min/avg/max/mdev = 0.206/0.206/0.206/0.000 ms

Step 3: Run command show version at DUT0 and expect this output:

Show output
OS vendor:                 Teldat
OS name:                   OSDx
OS version:                v3.10.1.1
OS Linux kernel:           5.10.127
OS built by:               jenkins@daphne
OS build date:             Mon Feb 26 12:57:23 UTC 2024
OS installation:           physical
OS boot mode:              user
License:                   VM_BASE Firewall eth-Rate-Permit-Full

Hardware vendor:           QEMU
Hardware model:            VM
Hardware OEM model:        Standard PC (i440FX + PIIX, 1996)
Hardware version:          pc-i440fx-5.2
Hardware UUID:             4fe1e4b2-6ec5-5dbc-81ac-1f6dcb10873c
Hardware architecture:     amd64
Hardware fwid:             iso
Hardware base MAC:         de:ad:be:ef:6c:10
Hardware cpu:              1 x QEMU Virtual CPU version 2.5+ (1 cores)

Last reboot reason:        Updated license

Date:                      Mon 26 Feb 2024 20:13:51 UTC +00:00
Uptime:                    1:40:13
CPU load (1m, 5m, 15m):    0.10 0.21 0.22
CPU usage % (1m):          10.40
Storage usage (kB):        293264/8144384
Memory usage (kB):         357804/1639432
Users logged in:           1
Mode (current/next boot):  user/user

Hostname:                  osdx

Step 4: Run command show date at DUT0 and expect this output:

Show output
CLI Error: Unauthorized

Note

Commands are expanded before being sent to the authorization server

Step 5: Run command sh da at DUT0 and expect this output:

Show output
CLI Error: Unauthorized

Step 6: Run command show running at DUT0 and expect this output:

Show output
# Teldat OSDx VM version v3.10.1.1
# Mon 26 Feb 2024 20:13:52 UTC +00:00
# Warning: Configuration has not been saved
set interfaces ethernet eth0 address 10.215.168.64/24
set system aaa group tacacs tacgroup1 server serv1
set system aaa list list1 method 1 group tacacs tacgroup1
set system aaa server tacacs serv1 address 10.215.168.1
set system aaa server tacacs serv1 encrypted-key U2FsdGVkX1/QfLi2MYVykcffibmoWozYjtRBQoVXvKA=
set system cli aaa authorization list1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system login user testadmin authentication encrypted-password '$6$9nZbmMxczItxst$Xkoi76WJYIL9mF1NsYdy9syFPmaMPu2m9DP5ldXmT7FPMHzgbwzjWidvQl19Omg9Ko70J4Uqn1BZd3meWjxdI1'
set system login user testadmin role admin

Tacacs Method Non-Privileged User

Description

In this case, the same scenario is tested but with a non privileged user called testmonitor.

Scenario

Step 1: Set the following configuration in DUT0:

set interfaces ethernet eth0 address 10.215.168.64/24
set system aaa server tacacs serv1 address 10.215.168.1
set system aaa server tacacs serv1 key 1234
set system aaa group tacacs tacgroup1 server serv1
set system aaa list list1 method 1 group tacacs tacgroup1
set system cli aaa authorization list1
set system login user testmonitor authentication plaintext-password admin
set system login user testmonitor role monitor

Step 2: Ping IP address 10.215.168.1 from DUT0:

admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1
Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data.
64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.213 ms

--- 10.215.168.1 ping statistics ---
1 packets transmitted, 1 received, 0% packet loss, time 0ms
rtt min/avg/max/mdev = 0.213/0.213/0.213/0.000 ms

Step 3: Run command show version at DUT0 and expect this output:

Show output
OS vendor:                 Teldat
OS name:                   OSDx
OS version:                v3.10.1.1
OS Linux kernel:           5.10.127
OS built by:               jenkins@daphne
OS build date:             Mon Feb 26 12:57:23 UTC 2024
OS installation:           physical
OS boot mode:              user
License:                   VM_BASE Firewall eth-Rate-Permit-Full

Hardware vendor:           QEMU
Hardware model:            VM
Hardware OEM model:        Standard PC (i440FX + PIIX, 1996)
Hardware version:          pc-i440fx-5.2
Hardware UUID:             4fe1e4b2-6ec5-5dbc-81ac-1f6dcb10873c
Hardware architecture:     amd64
Hardware fwid:             iso
Hardware base MAC:         de:ad:be:ef:6c:10
Hardware cpu:              1 x QEMU Virtual CPU version 2.5+ (1 cores)

Last reboot reason:        Updated license

Date:                      Mon 26 Feb 2024 20:14:05 UTC +00:00
Uptime:                    1:40:27
CPU load (1m, 5m, 15m):    0.07 0.20 0.21
CPU usage % (1m):          12.30
Storage usage (kB):        293264/8144384
Memory usage (kB):         357748/1639432
Users logged in:           1
Mode (current/next boot):  user/user

Hostname:                  osdx

Step 4: Run command show date at DUT0 and expect this output:

Show output
CLI Error: Unauthorized

Step 5: Run command show running at DUT0 and expect this output:

Show output
CLI Error: Insufficient privileges