TACACS+ Configuration Guide: Americas Headquarters
TACACS+ Configuration Guide: Americas Headquarters
Americas Headquarters
Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134-1706
USA
http://www.cisco.com
Tel: 408 526-4000
800 553-NETS (6387)
Fax: 408 527-0883
THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS,
INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND,
EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS.
THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH
THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY,
CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY.
The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB's public domain version
of the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California.
NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS" WITH ALL FAULTS.
CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE.
IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT
LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS
HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and phone numbers. Any examples, command display output, network
topology diagrams, and other figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses or phone numbers in illustrative content is unintentional
and coincidental.
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: http://
www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership
relationship between Cisco and any other company. (1110R)
Note The Feature Information table in the technology configuration guide mentions when a feature was
introduced. It might or might not mention when other platforms were supported for that feature. To
determine if a particular feature is supported on your platform, look at the technology configuration guides
posted on your product landing page. When a technology configuration guide is displayed on your product
landing page, it indicates that the feature is supported on that platform.
The goal of TACACS+ is to provide a methodology for managing multiple network access points from a
single management service. The Cisco family of access servers and routers and the Cisco IOS and Cisco IOS
XE user interface (for both routers and access servers) can be network access servers.
Network access points enable traditional “dumb” terminals, terminal emulators, workstations, personal computers
(PCs), and routers in conjunction with suitable adapters (for example, modems or ISDN adapters) to
communicate using protocols such as Point-to-Point Protocol (PPP), Serial Line Internet Protocol (SLIP),
Compressed SLIP (CSLIP), or AppleTalk Remote Access (ARA) protocol. In other words, a network access
server provides connections to a single user, to a network or subnetwork, and to interconnected networks.
The entities connected to the network through a network access server are called network access clients ; for
example, a PC running PPP over a voice-grade circuit is a network access client. TACACS+, administered
through the AAA security services, can provide the following services:
• Authentication--Provides complete control of authentication through login and password dialog, challenge
and response, messaging support.
The authentication facility provides the ability to conduct an arbitrary dialog with the user (for example, after
a login and password are provided, to challenge a user with a number of questions, like home address, mother’s
maiden name, service type, and social security number). In addition, the TACACS+ authentication service
supports sending messages to user screens. For example, a message could notify users that their passwords
must be changed because of the company’s password aging policy.
• Authorization--Provides fine-grained control over user capabilities for the duration of the user’s session,
including but not limited to setting autocommands, access control, session duration, or protocol support.
You can also enforce restrictions on what commands a user may execute with the TACACS+ authorization
feature.
• Accounting--Collects and sends information used for billing, auditing, and reporting to the TACACS+
daemon. Network managers can use the accounting facility to track user activity for a security audit or
to provide information for user billing. Accounting records include user identities, start and stop times,
executed commands (such as PPP), number of packets, and number of bytes.
The TACACS+ protocol provides authentication between the network access server and the TACACS+
daemon, and it ensures confidentiality because all protocol exchanges between a network access server and
a TACACS+ daemon are encrypted.
You need a system running TACACS+ daemon software to use the TACACS+ functionality on your network
access server.
Cisco makes the TACACS+ protocol specification available as a draft RFC for those customers interested in
developing their own TACACS+ software.
TACACS Operation
When a user attempts a simple ASCII login by authenticating to a network access server using TACACS+,
the following process typically occurs:
1 When the connection is established, the network access server will contact the TACACS+ daemon to
obtain a username prompt, which is then displayed to the user. The user enters a username and the network
access server then contacts the TACACS+ daemon to obtain a password prompt. The network access
server displays the password prompt to the user, the user enters a password, and the password is then sent
to the TACACS+ daemon.
Note TACACS+ allows an arbitrary conversation to be held between the daemon and the user until the daemon
receives enough information to authenticate the user. This is usually done by prompting for a username
and password combination, but may include other items, such as mother’s maiden name, all under the
control of the TACACS+ daemon.
1 The network access server will eventually receive one of the following responses from the TACACS+
daemon:
1 ACCEPT--The user is authenticated and service may begin. If the network access server is configured
to requite authorization, authorization will begin at this time.
2 REJECT--The user has failed to authenticate. The user may be denied further access, or will be prompted
to retry the login sequence depending on the TACACS+ daemon.
3 ERROR--An error occurred at some time during authentication. This can be either at the daemon or
in the network connection between the daemon and the network access server. If an ERROR response
is received, the network access server will typically try to use an alternative method for authenticating
the user.
4 CONTINUE--The user is prompted for additional authentication information.
2 A PAP login is similar to an ASCII login, except that the username and password arrive at the network
access server in a PAP protocol packet instead of being typed in by the user, so the user is not prompted.
PPP CHAP logins are also similar in principle.
Following authentication, the user will also be required to undergo an additional authorization phase, if
authorization has been enabled on the network access server. Users must first successfully complete TACACS+
authentication before proceeding to TACACS+ authorization.
1 If TACACS+ authorization is required, the TACACS+ daemon is again contacted and it returns an ACCEPT
or REJECT authorization response. If an ACCEPT response is returned, the response will contain data in
the form of attributes that are used to direct the EXEC or NETWORK session for that user, determining
services that the user can access. Services include the following:
1 Telnet, rlogin, Point-to-Point Protocol (PPP), Serial Line Internet Protocol (SLIP), or EXEC services
2 Connection parameters, including the host or client IP address, access list, and user timeouts
Note Effective with Cisco IOS XE Release 3.2S, the tacacs-server host command has been replaced by the
tacacs server command. For more information about the tacacs server command, refer to the Security
Command Reference.
To configure your router to support TACACS+, you must perform the following tasks:
• Use the aaa new-model global configuration command to enable AAA. AAA must be configured if
you plan to use TACACS+. For more information about using the aaa new-model command, refer to
the chapter “AAA Overview.”
• Use the tacacs-server host command to specify the IP address of one or more TACACS+ daemons.
Use the tacacs-server key command to specify an encryption key that will be used to encrypt all
exchanges between the network access server and the TACACS+ daemon. This same key must also be
configured on the TACACS+ daemon.
• Use the aaa authentication global configuration command to define method lists that use TACACS+
for authentication. For more information about using the aaa authentication command, refer to the
chapter “Configuring Authentication.”
• Use line and interface commands to apply the defined method lists to various interfaces. For more
information, refer to the chapter “Configuring Authentication.”
• If needed, use the aaa authorization global command to configure authorization for the network access
server. Unlike authentication, which can be configured per line or per interface, authorization is configured
globally for the entire network access server. For more information about using the aaa authorization
command, refer to the “Configuring Authorization” chapter.
• If needed, use the aaa accounting command to enable accounting for TACACS+ connections. For more
information about using the aaa accounting command, refer to the “Configuring Accounting” chapter.
Note The tacacs-server host command will be deprecated soon. You can use the server command instead of
the tacacs-server host command.
To specify a TACACS+ host, use the following command in global configuration mode:
Command Purpose
Specifies a TACACS+ host.
Router(config)# tacacs-server host hostname
[single-connection] [port integer] [timeout
integer] [key string]
Using the tacacs-server host command, you can also configure the following options:
• Use the single-connection keyword to specify single-connection. Rather than have the router open and
close a TCP connection to the daemon each time it must communicate, the single-connection option
maintains a single open connection between the router and the daemon. This is more efficient because
it allows the daemon to handle a higher number of TACACS operations.
Note The daemon must support single-connection mode for this to be effective, otherwise the connection
between the network access server and the daemon will lock up or you will receive spurious errors.
• Use the port integer argument to specify the TCP port number to be used when making connections to
the TACACS+ daemon. The default port number is 49.
• Use the timeout integer argument to specify the period of time (in seconds) the router will wait for a
response from the daemon before it times out and declares an error.
Note Specifying the timeout value with the tacacs-server host command overrides the default timeout value
set with the tacacs-server timeout command for this server only.
• Use the key string argument to specify an encryption key for encrypting and decrypting all traffic between
the network access server and the TACACS+ daemon.
Note Specifying the encryption key with the tacacs-server host command overrides the default key set by the
global configuration tacacs-server key command for this server only.
Because some of the parameters of the tacacs-server host command override global settings made by the
tacacs-server timeout and tacacs-server key commands, you can use this command to enhance security on
your network by uniquely configuring individual TACACS+ connections.
Command Purpose
Sets the encryption key to match that used on the
Router(config)# tacacs-server key key TACACS+ daemon.
Note You must configure the same key on the TACACS+ daemon for encryption to be successful.
provide accounting services, the network access server will try the second host entry for accounting services.
(The TACACS+ host entries will be tried in the order in which they are configured.)
To define a server host with a server group name, enter the following commands starting in global configuration
mode. The listed server must exist in global configuration mode:
SUMMARY STEPS
1. Router(config)# tacacs-server host name [single-connection] [port integer] [timeout integer] [key
string]
2. Router(config-if)# aaa group server{radius | tacacs+} group-name
3. Router(config-sg)# server ip-address [auth-port port-number] [acct-port port-number]
DETAILED STEPS
Step 2 Router(config-if)# aaa group Defines the AAA server-group with a group name. All members of a group
server{radius | tacacs+} group-name must be the same type; that is, RADIUS or TACACS+. This command puts
the router in server group subconfiguration mode.
Step 3 Router(config-sg)# server ip-address Associates a particular TACACS+ server with the defined server group. Use
[auth-port port-number] [acct-port the auth-port port-number option to configure a specific UDP port solely
port-number] for authentication. Use the acct-port port-number option to configure a
specific UDP port solely for accounting.
Repeat this step for each TACACS+ server in the AAA server group.
Note Each server in the group must be defined previously using the
tacacs-server host command.
Cisco IOS XE software provides the flexibility to implement authentication and accounting services in several
ways:
• Globally--AAA services are defined using global configuration access list commands and applied in
general to all interfaces on a specific network access server.
• Per interface--AAA services are defined using interface configuration commands and applied specifically
to the interface being configured on a specific network access server.
• DNIS mapping--You can use DNIS to specify an AAA server to supply AAA services.
Because AAA configuration methods can be configured simultaneously, Cisco has established an order of
precedence to determine which server or groups of servers provide AAA services. The order of precedence
is as follows:
• Per DNIS--If you configure the network access server to use DNIS to identify which server group
provides AAA services, then this method takes precedence over any additional AAA selection method.
• Per interface--If you configure the network access server per interface to use access lists to determine
how a server provides AAA services, this method takes precedence over any global configuration AAA
access lists.
• Globally--If you configure the network access server by using global AAA access lists to determine
how the security server provides AAA services, this method has the lowest precedence.
Note Prior to configuring AAA Server Group Selection Based on DNIS, you must configure the remote security
servers associated with each AAA server group. See the Identifying the TACACS Server Host and
Configuring AAA Server Groups.
To configure the router to select a particular AAA server group based on the DNIS of the server group,
configure DNIS mapping. To map a server group with a group name with DNIS number, use the following
commands in global configuration mode:
SUMMARY STEPS
DETAILED STEPS
Step 2 Router(config)# aaa dnis map dnis-number Maps a DNIS number to a defined AAA server group; the
authentication ppp group server-group-name servers in this server group are being used for
authentication.
TACACS AV Pairs
The network access server implements TACACS+ authorization and accounting functions by transmitting
and receiving TACACS+ attribute-value (AV) pairs for each user session. For a list of supported TACACS+
AV pairs, refer to the TACACS Attribute-Value Pairs chapter.
aaa new-model
aaa authentication ppp test group tacacs+ local
The following example shows how to configure TACACS+ as the security protocol for PPP authentication,
but instead of the “test” method list, the “default” method list is used.
aaa new-model
aaa authentication ppp default if-needed group tacacs+ local
tacacs-server host 10.1.2.3
tacacs-server key goaway
interface serial 0
ppp authentication chap default
The lines in the preceding sample configuration are defined as follows:
• The aaa new-model command enables the AAA security services.
• The aaa authentication command defines a method list, “default,” to be used on serial interfaces running
PPP. The keyword default means that PPP authentication is applied by default to all interfaces. The
if-needed keyword means that if the user has already authenticated by going through the ASCII login
procedure, then PPP authentication is not necessary and can be skipped. If authentication is needed, the
keyword group tacacs+ means that authentication will be done through TACACS+. If TACACS+
returns an ERROR of some sort during authentication, the keyword local indicates that authentication
will be attempted using the local database on the network access server.
• The tacacs-server host command identifies the TACACS+ daemon as having an IP address of 10.1.2.3.
The tacacs-server key command defines the shared encryption key to be “goaway.”
• The interface command selects the line, and the ppp authentication command applies the default
method list to this line.
The following example shows how to create the same authentication algorithm for PAP, but it calls the method
list “MIS-access” instead of “default”:
aaa new-model
aaa authentication pap MIS-access if-needed group tacacs+ local
tacacs-server host 10.1.2.3
tacacs-server key goaway
interface serial 0
ppp authentication pap MIS-access
The lines in the preceding sample configuration are defined as follows:
• The aaa new-model command enables the AAA security services.
• The aaa authentication command defines a method list, “MIS-access,” to be used on serial interfaces
running PPP. The method list, “MIS-access,” means that PPP authentication is applied to all interfaces.
The if-needed keyword means that if the user has already authenticated by going through the ASCII
login procedure, then PPP authentication is not necessary and can be skipped. If authentication is needed,
the keyword group tacacs+ means that authentication will be done through TACACS+. If TACACS+
returns an ERROR of some sort during authentication, the keyword local indicates that authentication
will be attempted using the local database on the network access server.
• The tacacs-server host command identifies the TACACS+ daemon as having an IP address of 10.1.2.3.
The tacacs-server key command defines the shared encryption key to be “goaway.”
• The interface command selects the line, and the ppp authentication command applies the default
method list to this line.
The following example shows the configuration for a TACACS+ daemon with an IP address of 10.2.3.4 and
an encryption key of “apple”:
aaa new-model
aaa authentication login default group tacacs+ local
tacacs-server host 10.2.3.4
tacacs-server key apple
The lines in the preceding sample configuration are defined as follows:
• The aaa new-model command enables the AAA security services.
• The aaa authentication command defines the default method list. Incoming ASCII logins on all interfaces
(by default) will use TACACS+ for authentication. If no TACACS+ server responds, then the network
access server will use the information contained in the local username database for authentication.
• The tacacs-server host command identifies the TACACS+ daemon as having an IP address of 10.2.3.4.
The tacacs-server key command defines the shared encryption key to be “apple.”
aaa new-model
aaa authentication ppp default if-needed group tacacs+ local
aaa authorization network default group tacacs+
tacacs-server host 10.1.2.3
tacacs-server key goaway
interface serial 0
ppp authentication chap default
The lines in the preceding sample configuration are defined as follows:
• The aaa new-model command enables the AAA security services.
• The aaa authentication command defines a method list, “default,” to be used on serial interfaces running
PPP. The keyword default means that PPP authentication is applied by default to all interfaces. The
if-needed keyword means that if the user has already authenticated by going through the ASCII login
procedure, then PPP authentication is not necessary and can be skipped. If authentication is needed, the
keyword group tacacs+ means that authentication will be done through TACACS+. If TACACS+
returns an ERROR of some sort during authentication, the keyword local indicates that authentication
will be attempted using the local database on the network access server.
• The aaa authorization command configures network authorization via TACACS+. Unlike authentication
lists, this authorization list always applies to all incoming network connections made to the network
access server.
• The tacacs-server host command identifies the TACACS+ daemon as having an IP address of 10.1.2.3.
The tacacs-server key command defines the shared encryption key to be “goaway.”
• The interface command selects the line, and the ppp authentication command applies the default
method list to this line.
aaa new-model
aaa authentication ppp default if-needed group tacacs+ local
aaa accounting network default stop-only group tacacs+
tacacs-server host 10.1.2.3
tacacs-server key goaway
interface serial 0
ppp authentication chap default
The lines in the preceding sample configuration are defined as follows:
• The aaa new-model command enables the AAA security services.
• The aaa authentication command defines a method list, “default,” to be used on serial interfaces running
PPP. The keyword default means that PPP authentication is applied by default to all interfaces. The
if-needed keyword means that if the user has already authenticated by going through the ASCII login
procedure, then PPP authentication is not necessary and can be skipped. If authentication is needed, the
keyword group tacacs+ means that authentication will be done through TACACS+. If TACACS+
returns an ERROR of some sort during authentication, the keyword local indicates that authentication
will be attempted using the local database on the network access server.
• The aaa accounting command configures network accounting via TACACS+. In this example, accounting
records describing the session that just terminated will be sent to the TACACS+ daemon whenever a
network connection terminates.
• The tacacs-server host command identifies the TACACS+ daemon as having an IP address of 10.1.2.3.
The tacacs-server key command defines the shared encryption key to be “goaway.”
• The interface command selects the line, and the ppp authentication command applies the default
method list to this line.
user = mci_customer1 {
chap = cleartext “some chap password”
service = ppp protocol = ip {
inacl#1=”permit ip any any precedence immediate”
inacl#2=”deny igrp 0.0.1.2 255.255.0.0 any”
}
Additional References
The following sections provide references related to the Configuring TACACS+ feature.
Related Documents
Standards
Standard Title
No new or modified standards are supported by this --
feature, and support for existing standards has not
been modified by this feature.
MIBs
RFCs
RFC Title
No new or modified RFCs are supported by this --
feature, and support for existing RFCs has not been
modified by this feature.
Technical Assistance
Description Link
The Cisco Support website provides extensive online http://www.cisco.com/techsupport
resources, including documentation and tools for
troubleshooting and resolving technical issues with
Cisco products and technologies.
To receive security and technical information about
your products, you can subscribe to various services,
such as the Product Alert Tool (accessed from Field
Notices), the Cisco Technical Services Newsletter,
and Really Simple Syndication (RSS) Feeds.
Access to most tools on the Cisco Support website
requires a Cisco.com user ID and password.
SUMMARY STEPS
1. enable
2. configure terminal
3. ip vrf vrf-name
4. rd route-distinguisher
5. exit
6. interface interface-name
7. ip vrf forwarding vrf-name
8. ip address ip-address mask [secondary]
9. exit
10. aaa group server tacacs+ group-name
11. server-private {ip-address | name} [nat] [single-connection] [port port-number] [timeout seconds]
[key [0 | 7] string]
12. ip vrf forwarding vrf-name
13. ip tacacs source-interface subinterface-name
14. exit
DETAILED STEPS
Example:
Router# configure terminal
Step 3 ip vrf vrf-name Configures a VRF table and enters VRF configuration
mode.
Example:
Router (config)# ip vrf cisco
Example:
Router (config-vrf)# exit
Example:
Router (config-if)# ip vrf forwarding cisco
Step 8 ip address ip-address mask [secondary] Sets a primary or secondary IP address for an interface.
Example:
Router (config-if)# ip address 10.0.0.2 255.0.0.0
Example:
Router (config-if)# exit
Step 10 aaa group server tacacs+ group-name Groups different TACACS+ server hosts into distinct
lists and distinct methods and enters server-group
Example: configuration mode.
Step 11 server-private {ip-address | name} [nat] Configures the IP address of the private TACACS+
[single-connection] [port port-number] [timeout seconds] server for the group server.
[key [0 | 7] string]
Example:
Router (config-sg-tacacs+)# server-private 10.1.1.1
port 19 key cisco
Step 12 ip vrf forwarding vrf-name Configures the VRF reference of a AAA TACACS+
server group.
Example:
Router (config-sg-tacacs+)# ip vrf forwarding cisco
Step 13 ip tacacs source-interface subinterface-name Uses the IP address of a specified interface for all
outgoing TACACS+ packets.
Example:
Router (config-sg-tacacs+)# ip tacacs
source-interface Loopback0
Example:
Router (config-sg-tacacs)# exit
Caution Enabling debug CLI can cause performance degradation on the router. Use of debug commands for large
number of sessions is not recommended.
SUMMARY STEPS
1. enable
2. debug tacacs authentication
3. debug tacacs authorization
4. debug tacacs accounting
5. debug tacacs packets
DETAILED STEPS
Step 4 debug tacacs accounting Displays information about accountable events as they
occur.
Example:
Router# debug tacacs accounting
Example:
Router# debug tacacs packets
Additional References
The following sections provide references related to Per VRF for TACACS+ Servers..
Related Documents
Standards
Standard Title
No new or modified standards are supported by this --
feature, and support for existing standards has not
been modified by this feature.
MIBs
RFCs
RFC Title
No new or modified RFCs are supported by this --
feature, and support for existing RFCs has not been
modified by this feature.
Technical Assistance
Description Link
The Cisco Support website provides extensive online http://www.cisco.com/cisco/web/support/index.html
resources, including documentation and tools for
troubleshooting and resolving technical issues with
Cisco products and technologies.
To receive security and technical information about
your products, you can subscribe to various services,
such as the Product Alert Tool (accessed from Field
Notices), the Cisco Technical Services Newsletter,
and Really Simple Syndication (RSS) Feeds.
Access to most tools on the Cisco Support website
requires a Cisco.com user ID and password.
For more information about configuring TACACS+, refer to the chapter “Configuring TACACS+.” For more
information about configuring TACACS+ authentication and authorization, refer to the chapters “Configuring
Authentication” and “Configuring Authorization.”
The following table lists the cause codes and descriptions for the Disconnect Cause Extended (disc-cause-ext)
attribute.
1020 - TS User Exit The user exited normally from the yes
terminal server. This code is related
to immediate Telnet and raw TCP
disconnects during a terminal
server session.
1021 - Idle Timeout The user exited from the terminal yes
server because the idle timer
expired. This code is related to
immediate Telnet and raw TCP
disconnects during a terminal
server session.
1026 - TS No TCP Raw The raw TCP option is not enabled. yes
This code is related to immediate
Telnet and raw TCP disconnects
during a terminal server session.
1040 - PPP LCP Timeout PPP link control protocol (LCP) yes
negotiation timed out while waiting
for a response from a peer. This
code concerns PPP connections.
1045 - PPP Receive Term The peer sent a PPP termination yes
request. This code concerns PPP
connections.
PPP LCP Close (1046) LCP got a close request from the yes
upper layer while LCP was in an
open state. This code concerns PPP
connections.
1049 - PPP Max Channels LCP closed because the access yes
server could not add any more
channels to an MP session. This
code concerns PPP connections.
1052 - TS Invalid IP Addr The IP address for the Telnet host yes
is invalid. This code relates to
immediate Telnet and raw TCP
disconnects and contains more
specific information than the Telnet
and TCP codes listed earlier in this
table.
1053 - TS Bad Hostname The access server could not resolve yes
the host name. This code relates to
immediate Telnet and raw TCP
disconnects and contains more
specific information than the Telnet
and TCP codes listed earlier in this
table.
1061 - TCP Connection Refused The host refused the TCP yes
connection. The TCP stack can
return this disconnect code during
an immediate Telnet or raw TCP
session.
1063 - TCP Foreign Host Close A foreign host closed the TCP yes
connection. The TCP stack can
return this disconnect code during
an immediate Telnet or raw TCP
session.
1064 - TCP Net Unreachable The TCP network was unreachable. yes
The TCP stack can return this
disconnect code during an
immediate Telnet or raw TCP
session.
1065 - TCP Host Unreachable The TCP host was unreachable. yes
The TCP stack can return this
disconnect code during an
immediate Telnet or raw TCP
session.
1067 - TCP Host Admin The TCP host was administratively yes
Unreachable unreachable. The TCP stack can
return this disconnect code during
an immediate Telnet or raw TCP
session.
1600 - VPDN User Disconnect The user disconnected. This value yes
applies to virtual private dial-up
network (VPDN) sessions.
1601 - VPDN Carrier Loss Carrier loss has occurred. This yes
code applies to VPDN sessions.
1603 - VPDN Bad Control Packet The control packet is invalid. This yes
code applies to VPDN sessions.
1605 - VPDN Tunnel Down/Setup The tunnel is down or the setup yes
Fail failed. This code applies to VPDN
sessions.
1606 - VPDN Local PPP There was a local PPP disconnect. yes
Disconnect This code applies to VPDN
sessions.
1608 - VPDN Call Redirected The call was redirected. This code yes
applies to VPDN sessions.
1801 - Q850 Unassigned Number The number has not been assigned. no
This code applies to ISDN or
modem calls that came in over
ISDN.
1806 - Q850 Channel Unacceptable The channel that has been most no
recently identified is not acceptable
to the sending entity for use in this
call. This code applies to ISDN or
modem calls that came in over
ISDN.
1819 - Q850 No User Answer The called party has been alerted no
but does not respond with a
connect indication within a
prescribed period of time. This
code applies to ISDN or modem
calls that came in over ISDN.
1843 - Q850 Access Info Discarded This code indicates that the no
network could not deliver access
information to the remote user as
requested. This code applies to
ISDN or modem calls that came in
over ISDN.
1845 - Q850 Call Pre-empted The call was preempted. This code no
applies to ISDN or modem calls
that came in over ISDN.
1858 - Q850 Bearer Capability Not The user has requested a bearer no
Available capability that is implemented by
the equipment that generated this
code but that is not available at this
time. This code applies to ISDN or
modem calls that have come in
over ISDN.
1865 - Q850 Bearer Capability Not The equipment that is sending this no
Implemented code does not support the bearer
capability that was requested. This
code applies to ISDN or modem
calls that have come in over ISDN.
1897 - Q850 Non Existent Message The equipment that is sending this no
Type code has received a message with
a message type that it does not
recognize either because this is a
message that is not defined or that
is defined but not implemented by
the equipment that is sending this
code. This code applies to ISDN or
modem calls that have come in
over ISDN.
1901 - Q850 Wrong Message for The message that was received is no
State incompatible with the call state.
This code applies to ISDN or
modem calls that have come in
over ISDN.
1903 - Q850 Info Element Error The equipment that is sending this no
code has received a message that
includes information elements or
parameters that are not recognized
because the information element
identifiers or paramenter names are
not defined or are defined but not
implemented by the equipment that
is sending this code. This code
applies to ISDN or modem calls
that have come in over ISDN.
For more information about configuring TACACS+ accounting, see the Configuring TACACS+ feature
module.