Authorization
This scenario shows how to set up per-command authorization.
Tacacs Method Privileged User
Description
A TACACS+ server configured to deny the show date
command and allow everything else is added to a TACACS+ group, which
is added to an AAA list. This list is assigned to CLI’s command
authorization. Whenever a user attempts to run a command, this is sent
to the server and is only executed when authorized to do so.
Scenario
Step 1: Set the following configuration in DUT0
:
set interfaces ethernet eth0 address 10.215.168.64/24 set system aaa group tacacs tacgroup1 server serv1 set system aaa list list1 method 1 group tacacs tacgroup1 set system aaa server tacacs serv1 address 10.215.168.1 set system aaa server tacacs serv1 encrypted-key U2FsdGVkX1991JYZENh0/55Zqrwhn7uyxBmqrUdSBeU= set system cli aaa authorization list1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0' set system login user testadmin authentication encrypted-password '$6$SZ/gKUKOrVKD2kCm$nZG.7IuYIZlz0kG0J6DHqvXL6J14x5dP2BhoUcvo9HJd7B0eWnRYecU7HqNK45wiLD.mNaC1M55eEpAy3Bvl3.' set system login user testadmin role admin
Step 2: Ping IP address 10.215.168.1
from DUT0
:
admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data. 64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.154 ms --- 10.215.168.1 ping statistics --- 1 packets transmitted, 1 received, 0% packet loss, time 0ms rtt min/avg/max/mdev = 0.154/0.154/0.154/0.000 ms
Step 3: Run command show version
at DUT0
and expect this output:
Show output
OS vendor: Teldat OS name: OSDx OS version: v4.2.2.3 OS Linux kernel: 6.1.119 OS built by: jenkins@daphne OS build date: Thu Mar 13 10:57:50 UTC 2025 OS installation: physical OS boot mode: user License: VM_BASE Firewall eth-Rate-Permit-Full Hardware vendor: QEMU Hardware model: VM Hardware OEM model: Standard PC (i440FX + PIIX, 1996) Hardware version: pc-i440fx-5.2 Hardware UUID: 3250dd5d-2e62-5f5c-8f74-9901036be81c Hardware architecture: amd64 Hardware fwid: iso Hardware base MAC: de:ad:be:ef:6c:00 Hardware cpu: 4 x QEMU Virtual CPU version 2.5+ (4 cores) Last reboot reason: Panic Date: Tue 18 Mar 2025 13:45:05 +00:00 Uptime: 0:01:49 CPU load (1m, 5m, 15m): 0.49 0.23 0.09 CPU usage % (1m): 4.84 Storage usage (kB): 368348/8144384 Memory usage (kB): 367136/1570512 Users logged in: 1 Mode (current/next boot): user/user Hostname: osdx
Step 4: Run command show date
at DUT0
and expect this output:
Show output
CLI Error: Unauthorized
Note
Commands are expanded before being sent to the authorization server
Step 5: Run command sh da
at DUT0
and expect this output:
Show output
CLI Error: Unauthorized
Step 6: Run command show running
at DUT0
and expect this output:
Show output
# Teldat OSDx VM version v4.2.2.3 # Tue 18 Mar 2025 13:45:06 +00:00 # Warning: Configuration has not been saved set interfaces ethernet eth0 address 10.215.168.64/24 set system aaa group tacacs tacgroup1 server serv1 set system aaa list list1 method 1 group tacacs tacgroup1 set system aaa server tacacs serv1 address 10.215.168.1 set system aaa server tacacs serv1 encrypted-key U2FsdGVkX1991JYZENh0/55Zqrwhn7uyxBmqrUdSBeU= set system cli aaa authorization list1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0' set system login user testadmin authentication encrypted-password '$6$SZ/gKUKOrVKD2kCm$nZG.7IuYIZlz0kG0J6DHqvXL6J14x5dP2BhoUcvo9HJd7B0eWnRYecU7HqNK45wiLD.mNaC1M55eEpAy3Bvl3.' set system login user testadmin role admin
Tacacs Method Non-Privileged User
Description
In this case, the same scenario is tested but with a non-privileged user called testmonitor
.
Scenario
Step 1: Set the following configuration in DUT0
:
set interfaces ethernet eth0 address 10.215.168.64/24 set system aaa group tacacs tacgroup1 server serv1 set system aaa list list1 method 1 group tacacs tacgroup1 set system aaa server tacacs serv1 address 10.215.168.1 set system aaa server tacacs serv1 encrypted-key U2FsdGVkX1/m/8EJH2Uh+AUFl41kWPCoUQ3Dy0XNObU= set system cli aaa authorization list1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0' set system login user testmonitor authentication encrypted-password '$6$7SSNOQb/eNvVUw1W$Yd6JEZipGIZFRBw3xVa/IWV0rQ7BhBJXnqSNbV3RT7lM8uwYkqciNSaULOL3nE9qV6CNRIVU5CQihmS5O6oq20' set system login user testmonitor role monitor
Step 2: Ping IP address 10.215.168.1
from DUT0
:
admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data. 64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.193 ms --- 10.215.168.1 ping statistics --- 1 packets transmitted, 1 received, 0% packet loss, time 0ms rtt min/avg/max/mdev = 0.193/0.193/0.193/0.000 ms
Step 3: Run command show version
at DUT0
and expect this output:
Show output
OS vendor: Teldat OS name: OSDx OS version: v4.2.2.3 OS Linux kernel: 6.1.119 OS built by: jenkins@daphne OS build date: Thu Mar 13 10:57:50 UTC 2025 OS installation: physical OS boot mode: user License: VM_BASE Firewall eth-Rate-Permit-Full Hardware vendor: QEMU Hardware model: VM Hardware OEM model: Standard PC (i440FX + PIIX, 1996) Hardware version: pc-i440fx-5.2 Hardware UUID: 3250dd5d-2e62-5f5c-8f74-9901036be81c Hardware architecture: amd64 Hardware fwid: iso Hardware base MAC: de:ad:be:ef:6c:00 Hardware cpu: 4 x QEMU Virtual CPU version 2.5+ (4 cores) Last reboot reason: Panic Date: Tue 18 Mar 2025 13:45:18 +00:00 Uptime: 0:02:02 CPU load (1m, 5m, 15m): 0.38 0.22 0.09 CPU usage % (1m): 4.84 Storage usage (kB): 368348/8144384 Memory usage (kB): 343844/1570512 Users logged in: 1 Mode (current/next boot): user/user Hostname: osdx
Step 4: Run command show date
at DUT0
and expect this output:
Show output
CLI Error: Unauthorized
Step 5: Run command show running
at DUT0
and expect this output:
Show output
CLI Error: Insufficient privileges