Linux Client To Authenticate using TACACS


 
Thread Tools Search this Thread
Special Forums IP Networking Linux Client To Authenticate using TACACS
# 1  
Old 09-18-2013
TACAS appears to be a Cisco thing these days, but there's software implementations too, some commercial, some not, see TACAS+ on Wikipedia
Login or Register to Ask a Question

Previous Thread | Next Thread

8 More Discussions You Might Find Interesting

1. UNIX for Advanced & Expert Users

Windows AD users authenticate to Linux

Hello folks, Please advise me what is the best way to authenticate Windows AD users against Linux machines. Currently I am going to take a look of Vintela Authentication Services and please let me know if you have experience with VIntela. Thanks in advance (1 Reply)
Discussion started by: Vit0_Corleone
1 Replies

2. AIX

AIX LDAP client authenticate against Linux Openldap server over TLS/SSL

Hi folks, How can i configure an AIX LDAP client to authenticate against an Linux Openldap server over TLS/SSL? It works like a charm without TLS/SSL. i would like to have SSL encrypted communication for ldap (secldapclntd) and ldapsearch etc. while accepting every kind of certificate/CA.... (6 Replies)
Discussion started by: paco699
6 Replies

3. Linux

MS Exchange from linux client

I haven't seen many updates so im here to ask my fellow *nix users if they have found a way or have atleast heard anything about GUI Mail Client that can access mail from a MS Exchange server. I know that Evolution stopped worked up until Exchange 2003 but not for 2007 or 2010. It doesn't seem... (4 Replies)
Discussion started by: binary-ninja
4 Replies

4. Cybersecurity

Configuring Unix(FreeSBD) to authenticate to TACACS

Can someone please posts the steps needed to configure a UNIX server to authenticate with a TACACS+ server or point me in the right direction been googling for 2 days now. Thanks (1 Reply)
Discussion started by: supadee718
1 Replies

5. BSD

Configuring Unix(FreeSBD) to authenticate to TACACS

Can someone please posts the steps needed to configure a UNIX server to authenticate with a TACACS+ server or point me in the right direction been googling for 2 days now. Thanks (0 Replies)
Discussion started by: supadee718
0 Replies

6. UNIX for Advanced & Expert Users

Configuring Unix(FreeSBD) to authenticate to TACACS

Can someone please posts the steps needed to configure a UNIX server to authenticate with a TACACS+ server or point me in the right direction been googling for 2 days now. Thanks (0 Replies)
Discussion started by: supadee718
0 Replies

7. Shell Programming and Scripting

Expect/telnet/testing tacacs on a cisco

At times I find the need to test that the tacacs port 49 is open. The code below works but is painfully slow because I have to wait on the timeouts. Examples of possible responds router1#telnet 10.11.20.14 49 Trying 206.112.204.140, 49 ... Open route1#telnet 10.11.19.14 49 Trying... (1 Reply)
Discussion started by: popeye
1 Replies

8. Cybersecurity

VPN client for linux?...

I'm looking for an open source VPN client that I can set up on RedHat 7.1. Any suggestion? Thanks in advance. VJ :) (3 Replies)
Discussion started by: vancouver_joe
3 Replies
Login or Register to Ask a Question
FIAIF(8)					      Administration and Privileged Commands						  FIAIF(8)

NAME
fiaif - FIAIF is an Intelligent Firewall. SYNOPSIS
fiaif <start|stop|restart|force-reload|status|panic|tc-start|tc-stop|tc-status> DESCRIPTION
Fiaif deploys a packet-filtering firewall by reading configuration files and setting up IP packet filtering rules using iptables. The firewall is "zone" based, meaning that each network interface is associated with a defined piece of the "IP universe" on the other side of that interface from the host. A zone is defined in a text file (the zone configuration file) listing rules for the handling of IP traffic into, out of, and through the associated interface. The rules spell out which connections to accept, which to reject, which to ignore, and which to forward through the firewall. It is also possible to setup source and destination NAT for altering the source and/or destination addresses of packets as they pass through. All non-accepted packets are logged to the system log. It should be noted that any packet related to an already accepted connection is allowed though the firewall. OPTIONS
start This will save the current state of netfilter, and apply the new firewall as described in the configuration files. stop Restores the state saved when FIAIF was started. restart Same as stop,start force-reload This option is the same as start, although it does not use any previously saved rules, and can be used even if fiaif has already been started. start-tc Start/restart only traffic shaping. Useful if you are playing arround with that part of the fiaf subsystem. panic Shut off all IP traffic - don't accept any packets from anywhere for any reason. This can be used, for example, if uninvited guests are discovered on the system to quickly close the firewall and start analyzing log files. status Lists all rules in the firewall. test Instead of deploying the firewall, all rules are written to the file specified in the "TEST_FILE" parameter in the global configura- tion file. This command also runs a sanity check on the networking configuration. Any problems or warnings arising from this check are printed to STDERR. Refer to http://www.linuxhq.com/kernel/v2.4/doc/networking/ip-sysctl.txt.html for details on settings tested. When deployed, FIAIF can automatically fix the warnings and/or errors displayed. Please see fiaif.conf(8) for more informa- tion. tc-start Start only traffic shaping. This option ignores the "ENABLE_TC" parameter in the global configuration file. tc-stop Stops the traffic shaping. This option ignores the "ENABLE_TC" parameter in the global configuration file. tc-status Lists packet counters for all traffic classes. FILES
/etc/fiaif/fiaif.conf The global configuration file. See fiaif.conf(8) for further details. /var/lib/fiaif/fiaif file containing rules generated by fiaif. /var/lib/fiaif/iptables previous netfilter state /var/lib/fiaif/sysctl previous state of /proc before fiaif was started. /var/log/messages All illegal packets are logged to this file though syslog(3) DIAGNOSTICS
Errors are logged to STDOUT. If any errors is printed, then please recheck your configuration files. ENVIRONMENT
If the NO_CLEANUP variable is set to a non-empty value, then rules are not cleaned up after FIAIF is started. This will speed up FIAIF startup time, but at the cost of having lots of rules and performance may (on small systems with many zones) be affected. On a three zone system FIAIF generated in total 310 rules. After cleaning up the rules, the number of rules was down to 241. A reduction of 22%. The FIAIF_CONF can be used to specify an anternative global configurationfile, rather than using the default /etc/fiaif/fiaif.conf. This can be used to ease switching between two different firewall configurations. BUGS
The test command line option is no guarantee that the firewall will perform as expected, only that the syntax is correct. Only limited semantic checks of rulesis performed. REPORTING BUGS
Report bugs to <fiaif@fiaif.net>. AUTHOR
Anders Fugmann <anders(at)fugmann.net> SEE ALSO
fiaif.conf(8), zone.conf(8), iptables(8), syslog(3) Linux Dec 2003 FIAIF(8)