New and Changed Information
The following table provides an overview of the significant changes up to this current release. The table does not provide an exhaustive list of all changes or the new features up to this release.
Cisco APIC Release |
Feature |
Description |
---|---|---|
6.0(2) |
TACACS external logging for switches |
TACACS can collect AAA data from switches. For more information, see About TACACS External Logging. |
3.2(1) |
This feature was introduced |
-- |
About TACACS External Logging
Terminal Access Controller Access Control System (TACACS) and Terminal Access Controller Access Control System Plus (TACACS+) are simple security protocols that provide centralized validation of users attempting to gain access to network devices. TACACS+ furthers this capability by separating the authentication, authorization, and accounting functions in modules, and encrypting all traffic between the network-attached storage (NAS) and the TACACS+ daemon.
TACACS external logging collects AAA data from a configured fabric-wide TACACS source and delivers it to one or more remote
destination TACACS servers, as configured in a TACACS destination group. The collected data includes AAA session logs (SessionLR
) such as log-ins, log-outs, and time ranges, for every Cisco Application Policy Infrastructure
Controller (APIC) user, as well as AAA modifications (ModLR
) such as the addition of a new user or a password change. Additionally, all configuration changes are logged and include
the user ID and time stamp.
Beginning with the Cisco APIC 6.0(2) release, you can enable TACACS external logging for switches. When enabled, the Cisco APIC collects the same types of AAA data from the switches in the chosen TACACS monitoring destination group.
![]() Note |
TACACS external logging for switches supports CLI modules such as vsh, vsh_lc, and ibash, but it does not support native Linux commands and system binaries. |
TACACS External Logging Destination Group
Creating a TACACS External Logging Destination Group and Destinations Using the GUI
A TACACS destination group is used by the Cisco ACI fabric for sending AAA log messages to configured destinations.
Procedure
Step 1 |
Choose Admin > External Data Collectors. |
Step 2 |
In the Navigation pane, right-click Monitoring Destinations and choose Create TACACS Monitoring Destination Group. Alternatively, expand Monitoring Destinations in the Navigation pane, click TACACS, and in the TACACS work pane, click theActions drop-down list, then click Create TACACS Monitoring Destination Group. |
Step 3 |
In the Create TACACS Monitoring Destination Group dialog, perform the following actions:
|
Step 4 |
In the Destinations dialog, click the + symbol above the Create Destinations table. |
Step 5 |
In the Create TACACS Destinations table editor, perform the following actions:
|
Step 6 |
Click Finish. |
Creating a TACACS External Logging Destination Group Using the NX-OS-Style CLI
![]() Note |
You must have administrator rights to access the TACACS External Logging commands in the NX-OS-style CLI. |
The following example CLI commands show how to configure a TACACS destination group and destination using the NX-OS-style CLI:
Procedure
Step 1 |
Enter the configuration mode. Example:
|
||
Step 2 |
Create a TACACS destination group. Example:In the following command, a TACACS destination group named "tacacs-dest-grp-1" is created:
|
||
Step 3 |
Create a TACACS destination in the new destination group. Example:In the following command, a remote TACSCS destination with an IP address of "1.1.1.1" is created and includes the default port number 49:
|
||
Step 4 |
Configure specific parameters for the new remote TACACS destination. Example:In the following command example, the following characteristics are configured for the new remote destination:
|
Creating a TACACS External Logging Destination Group Using the REST API
Procedure
Create a TACACS destination group. Example:
|
TACACS External Logging Source
Creating a TACACS External Logging Source Using the GUI
The TACACS source is used by the Cisco ACI Fabric for collecting logged AAA information to send in TACACS messages to TACACS accounting servers.
Procedure
Step 1 |
Choose Fabric > Fabric Policies. |
Step 2 |
In the Navigation pane, expand the following:
|
Step 3 |
Click Callhome/Smart Callhome/SNMP/Syslog/TACACS. |
Step 4 |
In the Callhome/Smart Callhome/SNMP/Syslog/TACACS work pane, click the TACACS tab. |
Step 5 |
In the TACACS work pane, click the Actions (icon) drop-down list, then click Create TACACS Source. Alternatively, right-click Callhome/Smart Callhome/SNMP/Syslog/TACACS in the Navigation pane and select Create TACACS Source. |
Step 6 |
In the Create TACACS Source dialog, perform the following actions:
|
Creating a TACACS External Logging Source Using the NX-OS-Style CLI
You can use the NX-OS-style CLI to configure TACACS sources. In this configuration, the source is associated with a TACACS destination group. Where a TACACS source is created determines which set of AAA logging data is sent. For example, if you create the TACACS source in Fabric Policies, all AAA logging data for the Cisco Application Centric Infrastructure (Cisco ACI) fabric supported by Cisco Application Policy Infrastructure Controller (Cisco APIC) is sent to the associated TACACS destinations. You can create one or more sources to support different destination groups.
The following example CLI commands show how to configure a TACACS source using the NX-OS-style CLI:
Procedure
Step 1 |
Enter the configuration mode. Example:
|
Step 2 |
Create a TACACS source. Example:In the following command, a TACSCS source named "tacacs-src-1" is created:
|
Step 3 |
Associate the TACACS source with a TACACS destination group. Example:In the following command, a TACSCS destination group named "tacacs-dest-grp-1" is associated with the new TACACS source:
|
Creating a TACACS External Logging Source Using the REST API
Procedure
Create a TACACS source. Example:
|
TACACS External Logging for Switches
Enabling TACACS External Logging for Switches Using the GUI
Beginning with the Cisco Application Policy Infrastructure Controller (APIC) 6.0(2) release, you can use this procedure to enable TACACS external logging for switches.
Procedure
Step 1 |
On the menu bar, choose . |
Step 2 |
In the Navigation pane, choose . |
Step 3 |
In the Work pane, choose . |
Step 4 |
In the Create TACACS Source dialog, change the name if desired, choose or create the destination group, and for Switch Tacacs Audit choose Enabled. |
Enabling TACACS External Logging for Switches Using the NX-OS-Style CLI
Beginning with the Cisco Application Policy Infrastructure Controller (APIC) 6.0(2) release, you can use this procedure to enable TACACS external logging for switches.
Procedure
Step 1 |
Enter the configuration mode. Example:
|
Step 2 |
Create a TACACS source. The following command creates a TACACS source named "tacacs-src-1" under the common tenant: Example:
|
Step 3 |
Enable TACACS external logging for the switches that are in the TACACS source. Example:
|