Community discussions

 
grigoryx
just joined
Topic Author
Posts: 1
Joined: Mon Dec 05, 2016 9:39 am

Feature Request: TACACS/TACACS+

Tue Dec 20, 2016 9:05 am

I would be cool if TACACS/TACACS+ would be supported in next ROS version. Is it planned in ROSv6/ROSv7 or not?
 
User avatar
janisk
MikroTik Support
MikroTik Support
Posts: 6283
Joined: Tue Feb 14, 2006 9:46 am
Location: Riga, Latvia

Re: Feature Request: TACACS/TACACS+

Tue Dec 20, 2016 11:15 am

Isn't that a protocol that RADIUS was/is based on?
 
User avatar
paoloaga
Member Candidate
Member Candidate
Posts: 219
Joined: Tue Mar 08, 2011 2:52 am
Location: Vaprio d'Agogna (NO) - Italy
Contact:

Re: Feature Request: TACACS/TACACS+

Tue Dec 20, 2016 12:46 pm

I would be cool if TACACS/TACACS+ would be supported in next ROS version. Is it planned in ROSv6/ROSv7 or not?
Why don't you just use RADIUS? I wrote a TACACS server for dial-up connections early in 1996 ... switched to RADIUS around year 2000.
 
agfjpcs
newbie
Posts: 27
Joined: Mon Jul 04, 2016 6:36 am

Re: Feature Request: TACACS/TACACS+

Fri Dec 23, 2016 7:25 am

Isn't that a protocol that RADIUS was/is based on?

Wow.... Bit surprised to see a MikroTik employee asking this sort of question

Snip from http://www.tacacs.net/docs/TACACS_Advantages.pdf


The primary functional difference between RADIUS and
TACACS+ is that TACACS+ separates out the Authorization
functionality, where RADIUS combines both Authentication and
Authorization. Though this may seem like a small detail, it makes
a world of difference when implementing administrator AAA in a
network environment.

RADIUS doesn’t log the
commands used by the
administrator. It will only log
the start, stop, and interim
records of that session. This
means that if there are two or
more administrators logged at
any one time, there is no way
of telling which administrator
entered which commands.
RADIUS can include privilege information in the authentication reply; however, it can only provide the
privilege level, which means different things to different vendors. Because there is no standard between
vendor implementations of RADIUS authorization, each vendor’s attributes often conflict, resulting in
inconsistent results. Even if this information were consistent, the administrator would still need to manage the
privilege level for commands on each device. This will quickly become unmanageable.
RADIUS doesn’t log the commands used by the administrator. It will only log the start, stop, and interim
records of that session. This means that if there are two or more administrators logged at any one time, there
is no way to tell from the RADIUS logs which administrator entered which commands.



TACACS+ is far better than RADIUS if you need more than a simple 'Oh yep, that user account is allowed'
 
barkas
Member Candidate
Member Candidate
Posts: 260
Joined: Sun Sep 25, 2011 10:51 pm

Re: Feature Request: TACACS/TACACS+

Fri Dec 23, 2016 10:51 am

Tacacs is the proper solution for network device user management.

I would very much like to have that, too.
 
User avatar
janisk
MikroTik Support
MikroTik Support
Posts: 6283
Joined: Tue Feb 14, 2006 9:46 am
Location: Riga, Latvia

Re: Feature Request: TACACS/TACACS+

Wed Dec 28, 2016 10:01 am

Isn't that a protocol that RADIUS was/is based on?

Wow.... Bit surprised to see a MikroTik employee asking this sort of question

Snip from http://www.tacacs.net/docs/TACACS_Advantages.pdf


The primary functional difference between RADIUS and
TACACS+ is that TACACS+ separates out the Authorization
functionality, where RADIUS combines both Authentication and
Authorization. Though this may seem like a small detail, it makes
a world of difference when implementing administrator AAA in a
network environment.

RADIUS doesn’t log the
commands used by the
administrator. It will only log
the start, stop, and interim
records of that session. This
means that if there are two or
more administrators logged at
any one time, there is no way
of telling which administrator
entered which commands.
RADIUS can include privilege information in the authentication reply; however, it can only provide the
privilege level, which means different things to different vendors. Because there is no standard between
vendor implementations of RADIUS authorization, each vendor’s attributes often conflict, resulting in
inconsistent results. Even if this information were consistent, the administrator would still need to manage the
privilege level for commands on each device. This will quickly become unmanageable.
RADIUS doesn’t log the commands used by the administrator. It will only log the start, stop, and interim
records of that session. This means that if there are two or more administrators logged at any one time, there
is no way to tell from the RADIUS logs which administrator entered which commands.



TACACS+ is far better than RADIUS if you need more than a simple 'Oh yep, that user account is allowed'
while your whole answer is based on TACACS+ that is later creation than RADIUS. However, DIAMETER is even newer and addresses many drawbacks of RADIUS and is compatible with the RADIUS.

and on the off-note, I am sure you know what sarcasm is.
 
TheIPGuy
just joined
Posts: 4
Joined: Fri Apr 21, 2017 4:33 pm

Re: Feature Request: TACACS/TACACS+

Mon Apr 24, 2017 11:53 pm

RADIUS has it's place, however, I think we can agree from a network administration perspective TACACS+ does have some nice features. One such feature is extremely granular centralized command authorization based on user permissions assigned by the server. Also, Tacacs was ported to linux, all though a bit roughly, via tac_plus. RADIUS user authentication for management purposes is nice if you want a read only or read/write access only, but is lacking when more granular control is required. Let's please keep a constructive dialog going on this issue as RADIUS and TACACS were intended for different purposes fundamentally. Sarcasm from a Mikrotik employee to mock a contributor on a valid point is childish.


+1 for TACACS support
 
bruins0437
just joined
Posts: 10
Joined: Thu Jul 13, 2017 4:30 am

Re: Feature Request: TACACS/TACACS+

Thu Jul 20, 2017 3:05 pm

+1 for TACACS/TACACS+ support
 
tricksol
newbie
Posts: 25
Joined: Thu Sep 03, 2015 3:55 pm

Re: Feature Request: TACACS/TACACS+

Mon Jul 31, 2017 3:11 am

+1 for TACACS/TACACS+ support
 
eric101
just joined
Posts: 3
Joined: Thu Jul 28, 2016 3:31 pm

Re: Feature Request: TACACS/TACACS+

Mon Aug 07, 2017 3:54 pm

+1 for tacacs+ support, I think this would make a lot of people happy.
 
gidoos
just joined
Posts: 1
Joined: Wed Aug 23, 2017 10:54 am

Re: Feature Request: TACACS/TACACS+

Wed Aug 23, 2017 10:57 am

+1 for this. Will defnitely be a big plus point for big networks.
 
User avatar
YourWordIsTruth
just joined
Posts: 12
Joined: Mon Mar 04, 2013 5:50 pm

Re: Feature Request: TACACS/TACACS+

Mon Sep 18, 2017 5:48 pm

+1 for TACACS+ support, many companies don't consider your product, if you will, "Enterprise Grade", without TACACS+ support and frankly with security being the #1 issue in the enterprise TACACS+ is needed to not only secure a multitude of devices in complex networks, but also to provide auditing trails of admin usage when those pesky auditors come around yearly/quarterly :-)
 
branto
just joined
Posts: 8
Joined: Mon Aug 21, 2017 2:03 am

Re: Feature Request: TACACS/TACACS+

Sun Oct 22, 2017 1:06 am

+1 for this this request. TACACS+ also encrypts the communications channel between client and server; RADIUS does not.
 
idlemind
Forum Guru
Forum Guru
Posts: 1101
Joined: Fri Mar 24, 2017 11:15 pm
Location: USA

Re: Feature Request: TACACS/TACACS+

Mon Oct 23, 2017 1:38 am

I wonder if IPSec could be used to secure the RADIUS traffic between endpoints and an auth server. This would only cover the encryption side of the discussion not the feature differences.
 
tonny
newbie
Posts: 29
Joined: Fri Oct 09, 2015 10:50 am

Re: Feature Request: TACACS/TACACS+

Fri May 25, 2018 12:43 pm

+1 for TACACS/TACACS+ support
 
mlenhart
Frequent Visitor
Frequent Visitor
Posts: 83
Joined: Mon Oct 30, 2017 11:30 pm

Re: Feature Request: TACACS/TACACS+

Fri May 25, 2018 1:26 pm

+1 for TACACS+ support
 
networkfudge
Trainer
Trainer
Posts: 130
Joined: Mon May 20, 2013 2:47 pm

Re: Feature Request: TACACS/TACACS+

Fri May 25, 2018 11:50 pm

+ 1
MTCNA MTCWE MTCRE MTCINE MTCTCE UWBS UWBA
 
sep
just joined
Posts: 11
Joined: Thu Nov 28, 2013 2:34 pm

Re: Feature Request: TACACS/TACACS+

Fri Aug 31, 2018 3:25 pm

+1 for TACACS+ support
 
User avatar
IPANetEngineer
Trainer
Trainer
Posts: 985
Joined: Fri Aug 10, 2012 6:46 am
Location: Jackson, MS, USA
Contact:

Re: Feature Request: TACACS/TACACS+

Fri Aug 31, 2018 3:30 pm

I would like to see TACACS+ support as well. Being able to restrict the commands that a user can execute is incredibly important.

Especially with all of the attacks against MikroTik devices - it provides another layer of protection in addition to the firewall if a lower level user account is compromised.
Global - MikroTik Support & Consulting - English | Francais | Español | Portuguese +1 855-645-7684
https://iparchitechs.com/services/mikro ... l-support/ mikrotiksupport@iparchitechs.com
 
Dude2048
Frequent Visitor
Frequent Visitor
Posts: 51
Joined: Thu Sep 01, 2016 4:04 pm

Re: Feature Request: TACACS/TACACS+

Fri Aug 31, 2018 3:56 pm

+1 Tacacs
 
TheCiscoGuy
Frequent Visitor
Frequent Visitor
Posts: 51
Joined: Fri Jun 22, 2018 8:32 am

Re: Feature Request: TACACS/TACACS+

Mon Sep 03, 2018 7:42 pm

At least disable the local users if AAA is configured and reachable. TACACS would be nice, but the current radius is functional, just doesnt disable local accounts.
Network Solutions Engineer and Trainer
Cisco | Juniper | Mikrotik | Ubiquiti
 
User avatar
maznu
Member Candidate
Member Candidate
Posts: 197
Joined: Tue May 05, 2015 11:12 am
Location: Manchester, UK
Contact:

Re: Feature Request: TACACS/TACACS+

Mon Sep 03, 2018 8:31 pm

At least disable the local users if AAA is configured and reachable. TACACS would be nice, but the current radius is functional, just doesnt disable local accounts.
Why not just set your one local admin account to have an impossible IP address restriction, and then you've still got console-level access should your connectivity to TACACS go fubar...?
Marek
 
User avatar
caiot5
just joined
Posts: 13
Joined: Wed Mar 27, 2013 5:48 pm
Location: Brazil

Re: Feature Request: TACACS/TACACS+

Tue Sep 18, 2018 4:51 pm

+1 for TACACS+ support.
 
alessio79
just joined
Posts: 4
Joined: Fri May 15, 2015 7:20 pm

Re: Feature Request: TACACS/TACACS+

Tue Sep 18, 2018 6:06 pm

+1 for TACACS+
 
mAineAc
just joined
Posts: 1
Joined: Thu May 03, 2018 1:45 pm

Re: Feature Request: TACACS/TACACS+

Mon Oct 08, 2018 9:32 pm

+1 on tacacs+ support.
 
Faceless
just joined
Posts: 18
Joined: Sat Mar 03, 2018 4:03 pm
Location: Ukraine
Contact:

Re: Feature Request: TACACS/TACACS+

Fri Nov 02, 2018 1:27 pm

+1 for TACACS+
 
User avatar
nz_monkey
Forum Guru
Forum Guru
Posts: 1807
Joined: Mon Jan 14, 2008 1:53 pm
Location: Straya
Contact:

Re: Feature Request: TACACS/TACACS+

Mon Nov 05, 2018 12:59 pm

+1 for TACACS+ support
http://thebrotherswisp.com/ | Mikrotik MTCNA, MTCRE, MTCINE | Fortinet FTCNA, FCNSP, FCT | Extreme Networks ENA
 
around
just joined
Posts: 3
Joined: Fri Jan 11, 2019 7:53 pm

Re: Feature Request: TACACS/TACACS+

Fri Jan 11, 2019 7:54 pm

+1 for TACACS+ support
 
around
just joined
Posts: 3
Joined: Fri Jan 11, 2019 7:53 pm

Re: Feature Request: TACACS/TACACS+

Fri Jan 11, 2019 7:59 pm

+1 for TACACS+ support
Last edited by around on Tue Jan 15, 2019 12:44 pm, edited 1 time in total.
 
leoeletronics
just joined
Posts: 2
Joined: Fri Sep 23, 2016 11:17 pm

Re: Feature Request: TACACS/TACACS+

Mon Jan 14, 2019 5:00 pm

+1 TACACS
 
Kampfwurst
Frequent Visitor
Frequent Visitor
Posts: 55
Joined: Mon Mar 24, 2014 2:53 pm

Re: Feature Request: TACACS/TACACS+

Thu Jan 17, 2019 12:54 pm

+1 TACACS
 
User avatar
Cha0s
Forum Veteran
Forum Veteran
Posts: 875
Joined: Tue Oct 11, 2005 4:53 pm

Re: Feature Request: TACACS/TACACS+

Sat Mar 02, 2019 8:49 pm

+1 for TACACS+ support
 
User avatar
Jotne
Forum Guru
Forum Guru
Posts: 1137
Joined: Sat Dec 24, 2016 11:17 am
Location: Magrathean

Re: Feature Request: TACACS/TACACS+

Sun Mar 03, 2019 10:44 am

As long as Router OS does not log all commands run by who, I would also ask for TACACS support.
Last edited by Jotne on Sat Mar 09, 2019 7:45 pm, edited 1 time in total.
 
How to use Splunk to monitor your MikroTik Router

MikroTik->Splunk
 
 
nimbo78
Frequent Visitor
Frequent Visitor
Posts: 65
Joined: Tue Jan 14, 2014 9:09 pm

Re: Feature Request: TACACS/TACACS+

Sat Mar 09, 2019 3:50 pm

As long as Router OS does not log all commands run by who I would also ask for TACACS support.
that's why +1 for TACACS+
 
TaBo
just joined
Posts: 2
Joined: Tue Apr 02, 2019 8:06 am

Re: Feature Request: TACACS/TACACS+

Tue Apr 02, 2019 8:11 am

+1 for TACACS+
 
mutinsa
just joined
Posts: 21
Joined: Tue Feb 06, 2018 4:55 am
Location: Moscow, Russia
Contact:

Re: Feature Request: TACACS/TACACS+

Sun Apr 07, 2019 10:32 pm

+1.
Sergey Mutin
Certified Mikrotik Consultant
MikroTik: MTCNA, MTCRE, MTCIPv6E, MTCTCE, MTCUME, MTCINE, MTCWE | Cisco: CCNA R&S | Juniper: JNCIA-Junos | Zabbix: ZCU | Asterisk: dCAA | IPv6 Forum Certified Network Engineer (Silver) | HE.net IPv6: Sage

Who is online

Users browsing this forum: No registered users and 9 guests