Accounting

This scenario shows how to set up AAA accounting for SSH using different AAA methods.

Radius Method

Description

A RADIUS server is added to a RADIUS group, which is added to an AAA list. This list is assigned to SSH’s service accounting. Whenever a user logs into the system, accounting packets are sent to the RADIUS server.

Scenario

Step 1: Set the following configuration in DUT0:

set interfaces ethernet eth0 address 10.215.168.64/24
set service ssh aaa accounting list1
set system aaa group radius radgroup1 server serv1
set system aaa list list1 method 1 group radius radgroup1
set system aaa server radius serv1 address 10.215.168.1
set system aaa server radius serv1 encrypted-key U2FsdGVkX1+jf9wuR7Y6CjQfJL1oguehonkuplSqXMnba1nzd43GQYAEKEitc0NhBZKwVXV9CQyuXg1l8t/L5Q==
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'

Step 2: Ping IP address 10.215.168.1 from DUT0:

admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1
Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data.
64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.281 ms

--- 10.215.168.1 ping statistics ---
1 packets transmitted, 1 received, 0% packet loss, time 0ms
rtt min/avg/max/mdev = 0.281/0.281/0.281/0.000 ms

Step 3: Init an SSH connection from DUT0 to IP address 127.0.0.1 with the user admin:

admin@DUT0$ ssh admin@127.0.0.1 option StrictHostKeyChecking=no option UserKnownHostsFile=/dev/null
Show output
Warning: Permanently added '127.0.0.1' (ED25519) to the list of known hosts.
admin@127.0.0.1's password:Last login: Wed Jul  3 16:32:51 2024 from 10.215.168.21
admin@osdx$

Tacacs Method

Description

A TACACS+ server is added to a TACACS+ group, which is added to an AAA list. This list is assigned to SSH’s service accounting. Whenever a user logs into the system, accounting packets are sent to the TACACS+ server.

Scenario

Step 1: Set the following configuration in DUT0:

set interfaces ethernet eth0 address 10.215.168.64/24
set service ssh aaa accounting list1
set system aaa group tacacs tacgroup1 server serv1
set system aaa list list1 method 1 group tacacs tacgroup1
set system aaa server tacacs serv1 address 10.215.168.1
set system aaa server tacacs serv1 encrypted-key U2FsdGVkX19YVduFRNKzceAkiE1wyFh8F8GhU37p9K0=
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'

Step 2: Ping IP address 10.215.168.1 from DUT0:

admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1
Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data.
64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.177 ms

--- 10.215.168.1 ping statistics ---
1 packets transmitted, 1 received, 0% packet loss, time 0ms
rtt min/avg/max/mdev = 0.177/0.177/0.177/0.000 ms

Step 3: Init an SSH connection from DUT0 to IP address 127.0.0.1 with the user admin:

admin@DUT0$ ssh admin@127.0.0.1 option StrictHostKeyChecking=no option UserKnownHostsFile=/dev/null
Show output
Warning: Permanently added '127.0.0.1' (ED25519) to the list of known hosts.
admin@127.0.0.1's password:Last login: Wed Jul  3 16:33:05 2024 from 127.0.0.1
admin@osdx$