Created on
07-27-2023
10:54 PM
Edited on
10-13-2025
11:57 PM
By
Jean-Philippe_P
This article describes how to use FortiAuthenticator as a TACACS+ server for Cisco and clear pass remote user authorization.
FortiAuthenticator can perform central authentication as a TACACS+ Server and authorize which commands are allowed or not on Cisco Switches.
Specific remote users on FortiAuthenticator should be able to authenticate and access the switch by matching the different authorization rules.
The full configuration on the Cisco Switch side is not covered in this article. For more information, consult Cisco support.
FortiAuthenticator Configuration example for Cisco Switch:
Create a new service with:
Add the following:
Create New TACACS+ Shell Command.
Create a TACACS+ Authorization rule.
Go to TACACS+ Service - > Authorization and select Rules on the Top Right.
In the shell services, allow the 'Cisco_Service_avp' service created previously.
In the shell commands, allow the deny command created earlier.
Authorization rule for Clear Pass.
Configure service: login with the attribute as shown in the image:
TACACS+ Service - > Authorization and select Services on the Top Right, add the service configured for ClearPass in the allowed
service with privilege level 15.
Add the authorization Rule either to the Remote User or to the User group.
b. Logs for successful authorization from TACACS Authorization debugs:
Note: If all the configuration above is done and authentication logs are still not seen showing in the debug, make sure the 'TACACS+ Auth (TCP/49)' service is enabled on the listening port.
Apart from these configuration steps, additional configuration needs to be implemented on Cisco-Switches. Based on the Cisco-IOS version, these configurations can change and are imported to be cross-checked with Cisco's Official product support guidance.
Below is a sample for a configuration applied in a WS-C2960 IOS: 15.0.
tacacs server <Name of Server>
address ipv4 <Server-IP>
key <Secret with Server>
aaa authentication login default group tacacs+ local
aaa authentication enable default group tacacs+ enable
aaa authorization exec default group tacacs+ local
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.