_______________________________________________________________________________________________________
_____________________________________________________________________________________________________
© Virtual Access 2017
GW7304 Series User Manual
Issue: 1.9
Page 33 of 336
UCI/Package Option
Description
UCI: system.@pam_auth[0].enabled=yes
Opt: enabled
Enables and disables TACACS configuration sections.
yes
Enables following TACACS
configuration section.
no
Disables following TACACS
configuration section.
UCI: system.@pam_auth[0].pamservice
Opt: pamservice
Selects the method which users should be authenticated by.
login
User connecting over console cable.
sshd
User connecting over SSH.
luci
User connecting over web.
UCI: system.@pam_auth[0].pamcontrol
Opt: pamcontrol
Specifies authentication behaviour after authentication fails or
connection to TACACS server is broken.
Sufficient
First authenticates against
remote TACACS if password
authentication fails then it
tries local database (user
defined in package
management_users)
Required
If either authentication fails
or TACACS server is not
reachable then user is not
allowed to access the router.
[success=done
new_authtok_reqd=done
authinfo_unavail=ignore
default=die]
Local database is only
checked if TACACS server is
not reachable.
UCI:
system.@pam_auth[0].pammodule.auth
Opt: pammodule
Selects which TACACS module this part of configuration relates
to.
auth
auth module provides the actual
authentication and sets credentials
account
account module checks to make sure
that access is allowed for the user
session
session module performs additional
tasks which are needed to allow
access
system.@pam_auth[0].type=tacplus
Opt: type
Specifies the authentication method.
UCI: system.@pam_auth[0].servers
Opt: servers
Specifies the TACACS servers along with port number and
password. The example below explains the syntax.
192.168.0.1:49|secret '
UCI:
system.@pam_auth[1].args=service=ppp
Opt: args
Additional arguments to pass to TACACS serer.
Table7: Information table for TACACS authentication
6.11
SSH
SSH allows you to access remote machines over text based shell sessions. SSH uses
public key cryptography to create a secure connection. These connections allow you to
issue commands remotely via a command line.