Configuring AGNI Tacacs¶
Overview¶
This lab is intended to use the Campus Workshop to showcase how to configure TACACS+ with AGNI. There are many online resources available, this will only include the basics of what's required.
AGNI Configuration¶
Arista Cloud Gateway (AGNI)¶
Login into AGNI to begin this lab, you will create the Arista Cloud Gateway.
- Under the
Configurationsection, click onAccess Devices > Cloud Gateways -
Add the gateway with the settings below
ACG Settings
Setting Student 1 Name ATD-POD01Location LocationsTACACS+ Termination Enabled Shared Secret Name AccessValue Arista!123 -
Be sure to copy the generated
Tokenvalue, this will used in our EOS configurationToken Generation
The token can only be viewed this one time, if you forget to copy you must regenerate the token.
-
Verify the settings and click
Add Cloud Gatewaywhen complete - That's it, there is now a ACG instance configured for all devices
ACG Connection (CVP)¶
Configuring your switches for Tacacs is easy as applying a configlet to all or select devices. We're going to use studios to demonstrate
- Login to CloudVision
- Navigate to
Provisioning > Studios - Click on
Create Workspaceand name it whatever you'd like - Next, select
Static Configuration -
Select only your device and click
+ Configlet > Configlet Library, select thetacacsconfigurationApply to all devices
You could apply the configuration at the container
Workshop. This container has the device tagDevice: All Devices, this means all devices would inherit this configuration without the need to go to each device. You could also create your own container and leverage any tag query to target specific subset of devices.- Once the configlet is applied, click on
Review Workspace - Validate the configuration is correct and
Submit Workspace - Click on
Change ControlandApprove and Executethe change
- Once the configlet is applied, click on
ACG Connection (EOS)¶
Whil we used cloudvision to configure the device, you can also log directly into the switch
- Login to the switch
-
Cloud Gateway should have been downloaded and installed on the switch. You can verify on EOS by running the following command
POD00-LEAF1A[12:07:37]#show extensions Name Version/Release Status Extension ------------------------------------ -------------------- ------------ --------- AristaCloudGateway-1.0.2-1.swix 1.0.2/1 A, I, B 1 A: available | NA: not available | I: installed | F: forced | B: install at boot S: valid signature | NS: invalid signature The extensions are stored on internal flash (flash:) POD00-LEAF1A[12:07:38]#show boot-extensions AristaCloudGateway-1.0.2-1.swix -
Let's add the configuration to start the ACG daemon
-
You can verify the configuration works as expected
Example OutputPOD00-LEAF1A[12:23:54]#trace monitor acg --- Monitoring /var/log/agents/acg-AristCloudGateway-30753 --- 2025/02/04 12:23:58 DEBUG [swix] AGNI_API_TOKEN(md5sum) : 76938f1bb8fc5517c01c106d1febdaf0 2025/02/04 12:23:58 DEBUG [swix] ENABLE_DEBUG_LOG : false 2025/02/04 12:23:58 DEBUG [swix] AGNI_ACG_TACACS_PORT : 49 2025/02/04 12:23:58 DEBUG [swix] AGNI_ACG_ENABLE_DHCP : false 2025/02/04 12:23:58 DEBUG [swix] AGNI_ACG_VRF : default 2025/02/04 12:23:58 DEBUG [swix] acg service started 2025/02/04 12:23:58 DEBUG [swix] acg service started [pid=30809] 2025/02/04 18:24:03 INFO acg - dhcp module is disabled 2025/02/04 18:24:03 INFO tacacs - started gateway at 0.0.0.0:49 2025/02/04 18:24:03 INFO websocket - connected successfully to wss://beta.agni.arista.io/acg/connect -
You can look in AGNI under the
Access Devices > Cloud Gatewaysand now see the status is green
TACACS Configuration¶
TACACS Profile¶
- Configure a Tacacs Profile under
Device Administration > TACACS+ Profiles -
Create a new profile with the basic settings
TACACS Profile Settings
Setting Value Name network-adminDescription Network AdministratorPrivilege Level 15 Allow Enabled Enabled Action for unmatched commands Permit -
Next add a Service Attribute using these settings
TACACS Profile Settings
Setting Value Select Service shellAttribute #1 priv-lvl=15 -
Click
Add TACACS+ Profilewhen complete
Access Policy¶
- Configure a Access Policy under
Device Administration > Access Policy -
Create a new profile with the basic settings
TACACS Profile Settings
Setting Value Enable Device Administration Enabled Authorized User Groups Employees Device Login Pass Validity 30 -
Next, create a policy by selecting
Add PolicyTACACS Profile Settings
Setting Value Name network-admin Description Network Administrator Policy Type TACACS+ Status Enabled Condition User:GroupisEmployeesAction TACACSProfilenetwork-admin -
Click
Add Policy - End of this section
User Add¶
Typically this would be populated via an identity management platform, here we will add a static user.
- User > Users
- Add User
- User Groups
- Add user to Employees
- Update User Groups
EOS Tacacs Configuration¶
-
Use the following configuration
tacacs-server policy unknown-mandatory-attribute ignore ! tacacs-server host 0.0.0.0 key Arista!123 ! aaa group server tacacs+ agni-tacacs server 0.0.0.0 ! aaa authentication login default local group agni-tacacs aaa authorization exec default local group agni-tacacs aaa authorization commands all default local group agni-tacacs
2.
show users detail