Solved

PIX - aaa accounting for config changes

Posted on 2004-09-08
5
693 Views
Last Modified: 2013-11-16
How do I enable TACACS+ accounting for PIX enable-level config changes?

I know how to do this for a router:
aaa accounting exec default start-stop group tacacs+
aaa accounting commands 15 default start-stop group tacacs+

But how do I do this for the PIX?

thanks,
-aprilmj
0
Comment
Question by:aprilmj
  • 3
  • 2
5 Comments
 
LVL 23

Expert Comment

by:Tim Holman
ID: 12027879
Have you looked through this ?

http://www.cisco.com/warp/public/110/atp52.html
0
 
LVL 3

Author Comment

by:aprilmj
ID: 12029292
I couldn't make it work, so I called the TAC.

Bad news.

"The PIX firewall only supports accounting for sessions going through the PIX, or "through traffic".  It does not support accounting for admin sessions directly to the PIX.  If you want this ability, I recommend submitting a feature request with your account team.  Please let me know if you have any further questions, otherwise I will close out this case by close of business today."
0
 
LVL 23

Expert Comment

by:Tim Holman
ID: 12039320
Not natively, but you can enable accounting with external RADIUS and TACACS+ servers, so not sure what they're on about ?

0
 
LVL 3

Author Comment

by:aprilmj
ID: 12040773
Accounting *only* works for traffic passing through the pix...
you can't do management accounting according to Cisco  =(
0
 
LVL 23

Accepted Solution

by:
Tim Holman earned 500 total points
ID: 12042292
With a PIX, you can enable full authentication and command authorization, using TACACS+, as follows:

http://www.cisco.com/univercd/cc/td/doc/product/iaabu/pix/pix_sw/v_63/config/sysmgmt.htm#wp1031817

This lets you assign 16 different privilieges of command use for the PIX, using an external TACACS+ server.  Every time one of these priviliges is checked, the command goes up to the TACACS+ server for authorization, then the TACACS+ server says yes/no, this user can or cannot use this command.  The TACACS+ server then logs this, so you have a full aaa report !

Using a standalone PIX, the best you can get is use of SYSLOG (shows you what user did what and when):

http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_tech_note09186a00800949d6.shtml#accounting

So sorry to say, but Cisco TAC are misinformed, and I hope you're not paying them for this level of support !! ;)
0

Featured Post

PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

I recently updated from an old PIX platform to the new ASA platform.  While upgrading, I was tremendously confused about how the VPN and AnyConnect licensing works.  It turns out that the ASA has 3 different VPN licensing schemes. "site-to-site" …
This article will cover setting up redundant ISPs for outbound connectivity on an ASA 5510 (although the same should work on the 5520s and up as well).  It’s important to note that this covers outbound connectivity only.  The ASA does not have built…
Both in life and business – not all partnerships are created equal. As the demand for cloud services increases, so do the number of self-proclaimed cloud partners. Asking the right questions up front in the partnership, will enable both parties …
As a trusted technology advisor to your customers you are likely getting the daily question of, ‘should I put this in the cloud?’ As customer demands for cloud services increases, companies will see a shift from traditional buying patterns to new…

831 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question