#
#
# tacacs-server key 7 0756741E435D180E1D035F5555217E75
key = "952m4akjq491k51"
prompt = "Authorized Access Only\nTACACS+ Authentication & Authorization for Cisco Switch Configuration\n"
accounting file = /var/log/tac_acc.log
user = $enable$ {
member = admin
login = des xxxx
}
user = user1 {
service = rbt-exec {
local-user-name = "admin" }
member = admin
login = des ddmR3rcCk8p1g
pap = des ddmR3rcCk8p1g
}
user = user2 {
service = rbt-exec {
local-user-name = "admin" }
member = admin
login = des F1V73FwAlCfKc
pap = des F1V73FwAlCfKc
}
user = user3 {
service = rbt-exec {
local-user-name = "admin" }
member = admin
login = des ULYXA4lWkzDRs
pap = des ULYXA4lWkzDRs
}
user = user4 {
service = rbt-exec {
local-user-name = "admin" }
member = admin-nochanges
login = des qhbRlgJq8ijBw
pap = des qhbRlgJq8ijBw
}
user = user5 {
service = rbt-exec {
local-user-name = "monitor" }
member = admin-nochanges
login = des MsMsU59VCLOs2
pap = des MsMsU59VCLOs2
}
user = user6 {
service = rbt-exec {
local-user-name = "monitor" }
member = admin-nochanges
login = des 84IZy/q33SaDo
pap = des 84IZy/q33SaDo
}
user = test {
member = admin-nol3
login = cleartext adm1ntest
}
group = admin {
# Permit all undefined services
default service = permit
# Top-Level root password:
login = des NC9gT/7SdJ8Vw
cmd = debug {
# deny the command "debug all", permit everything else
deny all
permit .*
}
# Default access to enable mode
service = exec {
priv-lvl = 15
}
}
group = staff {
# Default password NOS level password
login = des NC9gT/7SdJ8Vw
cmd = telnet {
# permit specified telnets to 168.98.x.x
permit 168\.98\.[0-9]+\.[0-9]+
deny .*
}
cmd = enable {
deny .*
}
service = exec {
priv-lvl = 1
}
}
group = nos {
# Default password NOS level password
login = cleartext c1sc0nos
cmd = telnet {
# permit specified telnets to 168.98.x.x
permit 168\.98\.[0-9]+\.[0-9]+
deny .*
}
cmd = enable {
deny .*
}
cmd = show {
# permit specified sho commands
permit .*
}
cmd = connect {
# permit specified sho commands
permit .*
}
cmd = traceroute {
# permit specified sho commands
permit .*
}
cmd = ping {
# permit specified sho commands
permit .*
}
service = exec {
priv-lvl = 1
}
}
group = admin-nochanges {
default service = permit
login = cleartext 1pr0uter
cmd = configure {
deny .*
}
cmd = copy {
deny .*
}
cmd = erase {
deny .*
}
cmd = format {
deny .*
}
cmd = debug {
# deny the command "debug all", permit everything else
deny all
permit .*
}
cmd = write {
# permits write term and write network
deny erase
deny core
deny memory
deny mib-data
permit .*
}
# Default access to enable mode
service = exec {
priv-lvl = 15
}
}
group = admin-nol3 {
default service = deny
login = cleartext 1pr0uter
cmd = configure {
permit .*
}
cmd = interface {
deny .*
}
cmd = spanning-tree {
deny .*
}
cmd = snmp-server {
deny host
permit .*
}
cmd = ip {
permit address
deny .*
}
cmd = switchport {
permit .*
}
cmd = channel-group {
permit .*
}
cmd = copy {
permit running-config
deny .*
}
cmd = debug {
# deny the command "debug all", permit everything else
deny all
permit .*
}
cmd = write {
# permits write term and write network
permit memory
permit network
deny .*
}
cmd = show {
permit .*
}
cmd = reload {
permit .*
}
cmd = no {
permit .*
}
cmd = delete {
deny .*
}
# Default access to enable mode
service = exec {
priv-lvl = 15
}
}