<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic RE: Radius vs TACACS - CLI Authorization in ExtremeWireless (General)</title>
    <link>https://community.extremenetworks.com/t5/extremewireless-general/radius-vs-tacacs-cli-authorization/m-p/32652#M967</link>
    <description>Hi Kunlin,&lt;BR /&gt;
I don't recall how EXOS will handle that since that command requires an admin-level account.  If you're able to do some testing, I'd be curious to see what you find out.&lt;BR /&gt;</description>
    <pubDate>Wed, 22 Jun 2016 16:08:00 GMT</pubDate>
    <dc:creator>Drew_C</dc:creator>
    <dc:date>2016-06-22T16:08:00Z</dc:date>
    <item>
      <title>Radius vs TACACS - CLI Authorization</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-general/radius-vs-tacacs-cli-authorization/m-p/32645#M960</link>
      <description>I'm looking to setup authorization based on CLI command with either TACACS or RADIUS.&lt;BR /&gt;
Apparently RADIUS seems to be a no-go according to this post: &lt;A href="https://community.extremenetworks.com/extreme/topics/configuring-command-authorization-using-windows-radius" target="_blank" rel="nofollow noreferrer noopener"&gt;https://community.extremenetworks.com/extreme/topics/configuring-command-authorization-using-windows...&lt;/A&gt;&lt;BR /&gt;
&lt;BR /&gt;
TACACS on the other hand has the option in XOS&lt;BR /&gt;
#enable tacacs-authorizationCan someone confirm this is currently only possible with TACACS and explain why such support is missing from RADIUS with XOS 15.1 onwards?&lt;BR /&gt;
Afterall, TACACS is Cisco while RADIUS should be open and the preferred way.&lt;BR /&gt;</description>
      <pubDate>Sat, 10 Oct 2015 05:07:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-general/radius-vs-tacacs-cli-authorization/m-p/32645#M960</guid>
      <dc:creator>vobelic</dc:creator>
      <dc:date>2015-10-10T05:07:00Z</dc:date>
    </item>
    <item>
      <title>RE: Radius vs TACACS - CLI Authorization</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-general/radius-vs-tacacs-cli-authorization/m-p/32646#M961</link>
      <description>&lt;A href="https://en.wikipedia.org/wiki/TACACS" target="_blank" rel="nofollow noreferrer noopener"&gt;https://en.wikipedia.org/wiki/TACACS&lt;/A&gt;&lt;BR /&gt;
&lt;BR /&gt;
&lt;A href="https://community.extremenetworks.com/extreme/topics/configuring-command-authorization-using-windows-radius" target="_blank" rel="nofollow noreferrer noopener"&gt;https://community.extremenetworks.com/extreme/topics/configuring-command-authorization-using-windows...&lt;/A&gt;&lt;BR /&gt;
&lt;BR /&gt;
From the above post...&lt;BR /&gt;
"These VSA's were used and supporting in older firmware (with limited commands) in FreeRadius server &amp;amp; Merit Radius servers. &lt;BR /&gt;
&lt;BR /&gt;
As this was supported with limited commands and only with few Radius servers, we have removed this from EXOS 15.1.3.1 onwards."&lt;BR /&gt;
&lt;BR /&gt;
-Ron</description>
      <pubDate>Sat, 10 Oct 2015 14:11:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-general/radius-vs-tacacs-cli-authorization/m-p/32646#M961</guid>
      <dc:creator>Ronald_Dvorak</dc:creator>
      <dc:date>2015-10-10T14:11:00Z</dc:date>
    </item>
    <item>
      <title>RE: Radius vs TACACS - CLI Authorization</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-general/radius-vs-tacacs-cli-authorization/m-p/32647#M962</link>
      <description>Yes, thank you for quoting what I already know about RADIUS.&lt;BR /&gt;
&lt;BR /&gt;
What about TACACS, does CLI authorization actually work?&lt;BR /&gt;</description>
      <pubDate>Sat, 10 Oct 2015 17:26:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-general/radius-vs-tacacs-cli-authorization/m-p/32647#M962</guid>
      <dc:creator>vobelic</dc:creator>
      <dc:date>2015-10-10T17:26:00Z</dc:date>
    </item>
    <item>
      <title>RE: Radius vs TACACS - CLI Authorization</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-general/radius-vs-tacacs-cli-authorization/m-p/32648#M963</link>
      <description>Hi,&lt;BR /&gt;
&lt;BR /&gt;
yes, you can deny some commands with TACACS+ on EXOS.&lt;BR /&gt;
It was possible with Radius using the old VSA and some tweaking. Apparently, the VSA has been removed.&lt;BR /&gt;</description>
      <pubDate>Sat, 10 Oct 2015 23:19:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-general/radius-vs-tacacs-cli-authorization/m-p/32648#M963</guid>
      <dc:creator>Stephane_Grosj1</dc:creator>
      <dc:date>2015-10-10T23:19:00Z</dc:date>
    </item>
    <item>
      <title>RE: Radius vs TACACS - CLI Authorization</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-general/radius-vs-tacacs-cli-authorization/m-p/32649#M964</link>
      <description>How to deny some commands with TACACS+ on EXOS ?&lt;BR /&gt;
How to assign admin right to account with TACACS+ ?&lt;BR /&gt;</description>
      <pubDate>Wed, 22 Jun 2016 16:08:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-general/radius-vs-tacacs-cli-authorization/m-p/32649#M964</guid>
      <dc:creator>Kunlin_Lu</dc:creator>
      <dc:date>2016-06-22T16:08:00Z</dc:date>
    </item>
    <item>
      <title>RE: Radius vs TACACS - CLI Authorization</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-general/radius-vs-tacacs-cli-authorization/m-p/32650#M965</link>
      <description>What TACACS+ server are you using?&lt;BR /&gt;
&lt;BR /&gt;
If it helps, one of the labs I built some time back used a variation of Cisco's TACACS+ server.  The user config looked like this:&lt;BR /&gt;
# Configure User&lt;BR /&gt;
user = drew {&lt;BR /&gt;
 login = cleartext "mypassword"&lt;BR /&gt;
 service = exec {&lt;BR /&gt;
 priv-lvl = 15&lt;BR /&gt;
 }&lt;BR /&gt;
 cmd = show {&lt;BR /&gt;
  permit .*&lt;BR /&gt;
 }&lt;BR /&gt;
 cmd = download {&lt;BR /&gt;
  permit .*&lt;BR /&gt;
 }&lt;BR /&gt;
}&lt;BR /&gt;
user = admin {&lt;BR /&gt;
 default service = permit&lt;BR /&gt;
 login = cleartext ""&lt;BR /&gt;
}This gave "drew" an admin level account that could only run show and download commands, and denied everything else.  You can also explicitly deny certain commands.  The admin account was configured as it normally is on the switch by default.</description>
      <pubDate>Wed, 22 Jun 2016 16:08:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-general/radius-vs-tacacs-cli-authorization/m-p/32650#M965</guid>
      <dc:creator>Drew_C</dc:creator>
      <dc:date>2016-06-22T16:08:00Z</dc:date>
    </item>
    <item>
      <title>RE: Radius vs TACACS - CLI Authorization</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-general/radius-vs-tacacs-cli-authorization/m-p/32651#M966</link>
      <description>Hi Drew&lt;BR /&gt;
&lt;BR /&gt;
It is work, thanks a lot.&lt;BR /&gt;
&lt;BR /&gt;
I have one more question&lt;BR /&gt;
If priv-lvl is not 15 and the user need to exec "show configuration"&lt;BR /&gt;
How to ?&lt;BR /&gt;
&lt;BR /&gt;</description>
      <pubDate>Wed, 22 Jun 2016 16:08:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-general/radius-vs-tacacs-cli-authorization/m-p/32651#M966</guid>
      <dc:creator>Kunlin_Lu</dc:creator>
      <dc:date>2016-06-22T16:08:00Z</dc:date>
    </item>
    <item>
      <title>RE: Radius vs TACACS - CLI Authorization</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-general/radius-vs-tacacs-cli-authorization/m-p/32652#M967</link>
      <description>Hi Kunlin,&lt;BR /&gt;
I don't recall how EXOS will handle that since that command requires an admin-level account.  If you're able to do some testing, I'd be curious to see what you find out.&lt;BR /&gt;</description>
      <pubDate>Wed, 22 Jun 2016 16:08:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-general/radius-vs-tacacs-cli-authorization/m-p/32652#M967</guid>
      <dc:creator>Drew_C</dc:creator>
      <dc:date>2016-06-22T16:08:00Z</dc:date>
    </item>
    <item>
      <title>RE: Radius vs TACACS - CLI Authorization</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-general/radius-vs-tacacs-cli-authorization/m-p/32653#M968</link>
      <description>EXOS per-command authorization works OK if you're willing to use and modify FreeRADIUS.&lt;BR /&gt;
&lt;BR /&gt;
I did some investigations on a personal basis some time ago. This is very informally documented in this file:&lt;BR /&gt;
&lt;A href="https://www.dropbox.com/s/m4ukvkrl3wyt2qq/EXOS%20Per-Command%20Authentication.docx?dl=0" target="_blank" rel="nofollow noreferrer noopener"&gt;https://www.dropbox.com/s/m4ukvkrl3wyt2qq/EXOS%20Per-Command%20Authentication.docx?dl=0&lt;/A&gt;&lt;BR /&gt;
&lt;BR /&gt;
The document mentions several files that have to be installed in FreeRADIUS and that can be found here:&lt;BR /&gt;
&lt;A href="https://www.dropbox.com/s/e944v2o73404f57/EXOS_PCA_files.zip?dl=0" target="_blank" rel="nofollow noreferrer noopener"&gt;https://www.dropbox.com/s/e944v2o73404f57/EXOS_PCA_files.zip?dl=0&lt;/A&gt;&lt;BR /&gt;
&lt;BR /&gt;
Be warned, this will work but with no guarantee. Also, Extreme Networks is not involved in any way in this development.&lt;BR /&gt;
&lt;BR /&gt;
Haven't played with it in a long time, so no guarantees it will work with the latest FreeRADIUS releases. &lt;BR /&gt;
&lt;BR /&gt;
Feel free to experiment.</description>
      <pubDate>Thu, 23 Jun 2016 03:19:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-general/radius-vs-tacacs-cli-authorization/m-p/32653#M968</guid>
      <dc:creator>dflouret</dc:creator>
      <dc:date>2016-06-23T03:19:00Z</dc:date>
    </item>
  </channel>
</rss>

