How to troubleshoot problems with TACACS+
In this topic, you will learn how to troubleshoot typical problems with the operation of the Portnox™ TACACS+ service.
| Error | Solutions |
|---|---|
|
Remove the following command from switch configuration:
If you enable the directed-request option, Cisco devices with the NX-OS operating system use only the TACACS+ method for authentication and not the default local method. For more information, see: Cisco documentation. |
|
Consider the following resolution options:
Also, check your TACACS+ license for potential expiration. |
|
The switch configuration includes an explicit definition of service-name, but this name is not configured in the Portnox TACACS+ policy. Instead, the policy only includes the default service name junos-exec. Example of an explicit definition of service-name:
Solution:
For more information, see Juniper documentation. |
|
The TACACS+ policy is incorrectly configured. Sites do not support inheritance. Only parent-child relationhips between sites are supported but not parent-child-grandchild relationips. Solution:
|
|
The public IP addresses of the load balancer are unknown to Portnox Cloud. Solution:
|
|
Access Alert: TACACS+ authentication attempt due to MFA timeout No MFA request is received via AgentP. |
Configure the firewall for AgentP connections. See: How to set up the firewall for AgentP to connect to Cloud. |
|
Access Alert: TACACS+ authentication attempt due to MFA timeout The MFA request is received via AgentP but you can’t confirm fast enough before the attempt time outs. |
You need to increase the TACACS+ timeout value on the switch itself to have more time to react to the MFA prompt. Consult the documentation of your switch to learn how to change the TACACS+ timeout value for your specific make and model. |
A Fortinet NAS user receives elevated privileges, even though they are assigned to a low-privilege group in Portnox Cloud. |
Fortinet doesn’t rely on standard attributes, such as priv-lvl, to control admin access. Instead, it uses specific vendor-specific attributes (VSAs) like admin_prof or memberof to map users to admin profiles, and if those attributes aren’t included in the policy, users may end up with more access than intended. Solution:
|
|
After switching Cisco ACI APICs to Portnox TACACS+ authentication, users can log in, but the ACI GUI loads with missing tabs, buttons, and features, suggesting incomplete privileges, while SSH access works normally. |
The TACACS+ authorization policy for the Cisco ACI NAS is missing a required custom attribute. Without this attribute, the ACI GUI does not grant full access even though the user authenticates successfully. Solution:
For more information, consult Cisco documentation. |
