Skip to content

AAA, TACACS+, and RADIUS

AAA controls who can log in and what privilege they receive. netverdict models local users and external TACACS+/RADIUS-style services so management and security labs can reason about access outcomes.

AreaLevelNotes
Local usersSupportedUsername, password/secret, privilege.
AAA method listsBehaviour modelLogin/enable authorization through configured methods.
TACACS+Behaviour modelExternal service outcome, not full wire protocol.
RADIUSBehaviour modelExternal auth outcome, not full packet exchange.
Command authorizationPartialSupported where executor paths expose it.
StandardCoverageNotes
RADIUS RFC 2865PartialAuthentication concept only.
TACACS+Behaviour modelCisco-style AAA service semantics.
FeatureStatusNotes
usernameSupportedLocal credential.
aaa new-modelSupportedEnables AAA mode.
Login method listSupportedLocal/group fallback.
Enable authenticationPartialSupported subset.
TACACS serverBehaviour modelServer config and result.
RADIUS serverBehaviour modelServer config and result.
Privilege levelSupportedAffects CLI authorization where modelled.
CommandIOS-styleJunos-styleVyOS-styleNotes
aaa new-modelSupportedn/an/aAAA enable.
username admin privilege 15 secret ...SupportedPartialPartialLocal user.
aaa authentication login default group tacacs+ localSupportedn/aPartialMethod list.
tacacs server TAC1Supportedn/aPartialTACACS service.
radius server RAD1Supportedn/aPartialRADIUS service.
show aaa serversSupportedn/aPartialServer state.

AAA decisions are deterministic service outcomes, which makes login and authorization labs reproducible without running real TACACS+ or RADIUS daemons.

Canonical example
configure terminal
aaa new-model
username admin privilege 15 secret lab
aaa authentication login default local
line vty 0 4
login authentication default
end

Vendor styles

IOS-style
aaa new-model
username admin privilege 15 secret lab
aaa authentication login default group tacacs+ local
tacacs server TAC1
address ipv4 192.0.2.20
key lab
Junos-style
set system login user admin class super-user authentication plain-text-password
set system tacplus-server 192.0.2.20 secret lab
set system authentication-order tacplus
VyOS-style
set system login user admin authentication plaintext-password lab
set system tacplus-server 192.0.2.20 secret lab

Real RADIUS/TACACS+ packet exchange, accounting records, downloadable ACLs, per-command authorization parity, and encryption details are not fully modelled.