How to troubleshoot problems with TACACS+
In this topic, you will learn how to troubleshoot typical problems with the operation of the Portnox™ TACACS+ service.
| Error | Solutions |
|---|---|
|
Remove the following command from switch configuration:
If you enable the directed-request option, Cisco devices with the NX-OS operating system use only the TACACS+ method for authentication and not the default local method. For more information, see: Cisco documentation. |
|
Consider the following resolution options:
Also, check your TACACS+ license for potential expiration. |
|
The switch configuration includes an explicit definition of service-name, but this name is not configured in the Portnox TACACS+ policy. Instead, the policy only includes the default service name junos-exec. Example of an explicit definition of service-name:
Solution:
For more information, see Juniper documentation. |
|
The TACACS+ policy is incorrectly configured. Sites do not support inheritance. Only parent-child relationships between sites are supported but not parent-child-grandchild relationships. Solution:
|
|
The public IP addresses of the load balancer are unknown to Portnox Cloud. Solution:
|
|
Access Alert: TACACS+ authentication attempt due to MFA timeout No MFA request is received via AgentP. |
Configure the firewall for AgentP connections. See: How to set up the firewall for AgentP to connect to Cloud. |
|
Access Alert: TACACS+ authentication attempt due to MFA timeout The MFA request is received via AgentP but you can’t confirm fast enough before the attempt time outs. |
You need to increase the TACACS+ timeout value on the switch itself to have more time to react to the MFA prompt. Consult the documentation of your switch to learn how to change the TACACS+ timeout value for your specific make and model. In some cases, a short timeout may also cause errors in the logs such as: Invalid Client information received as input or Session closed. |
A Fortinet NAS user receives elevated privileges, even though they are assigned to a low-privilege group in Portnox Cloud. |
Fortinet doesn’t rely on standard attributes, such as priv-lvl, to control admin access. Instead, it uses specific vendor-specific attributes (VSAs) like admin_prof or memberof to map users to admin profiles, and if those attributes aren’t included in the policy, users may end up with more access than intended. Solution:
|
|
After switching Cisco ACI APICs to Portnox TACACS+ authentication, users can log in, but the ACI GUI loads with missing tabs, buttons, and features, suggesting incomplete privileges, while SSH access works normally. |
The TACACS+ authorization policy for the Cisco ACI NAS is missing a required custom attribute. Without this attribute, the ACI GUI does not grant full access even though the user authenticates successfully. Solution:
For more information, consult Cisco documentation. |
| Portnox Cloud successfully receives TACACS+ accounting logs (for example, login and logout events) from Cisco NAS devices, but it does not show any executed commands (such as show or configure) in the logs or alerts. | By default, Cisco devices only send command accounting data to the TACACS+ server for privilege levels that are specifically set. If a user logs in at a level (0, 1, or 15) that has no accounting enabled, command execution will not be recorded, even if session accounting works. To fix this, add AAA command accounting in the switch TACACS+ configuration. Example: enable command accounting for privilege level 15 (full admin) with this command: |
