{"id":2591,"date":"2019-06-01T07:00:41","date_gmt":"2019-05-31T22:00:41","guid":{"rendered":"https:\/\/blog.boxcorea.com\/wp\/?p=2591"},"modified":"2019-06-13T22:03:39","modified_gmt":"2019-06-13T13:03:39","slug":"ubuntu-%eb%a6%ac%eb%88%85%ec%8a%a4%ec%97%90-tacacs-%ec%9d%b8%ec%a6%9d%ec%84%9c%eb%b2%84-%ec%84%a4%ec%b9%98%ed%95%98%ea%b3%a0-%ec%8b%9c%ec%8a%a4%ec%bd%94-%ec%8a%a4%ec%9c%84%ec%b9%98%ec%97%90-%ec%a0%81","status":"publish","type":"post","link":"https:\/\/blog.boxcorea.com\/wp\/archives\/2591","title":{"rendered":"Ubuntu \ub9ac\ub205\uc2a4\uc5d0 TACACS+ \uc778\uc99d\uc11c\ubc84 \uc124\uce58\ud558\uace0 \uc2dc\uc2a4\ucf54 \uc2a4\uc704\uce58\uc5d0 \uc801\uc6a9\ud558\uae30"},"content":{"rendered":"<p>\uc6b0\ubd84\ud22c \ub9ac\ub205\uc2a4\uc5d0 TACACS+ \uc778\uc99d\uc11c\ubc84 \uc124\uce58\ud558\uae30<\/p>\n<p>\uc124\uce58\ud658\uacbd:<br \/>\nTACACS+ \uc124\uce58 : ubuntu 18.04, ip address: 192.168.0.6<br \/>\nCisco switch: C3550, ip address: 192.168.0.200<\/p>\n<p>1. \uc791\uc5c5 \ud658\uacbd \ud655\uc778 \ubc0f tacacs plus \uc124\uce58<\/p>\n<p>\ub9ac\ub205\uc2a4 \ubc84\uc804 \ud655\uc778 <\/p>\n<pre class=\"lang:sh highlight:0 decode:true \" >$ lsb_release -a\r\nNo LSB modules are available.\r\nDistributor ID: Ubuntu\r\nDescription:    Ubuntu 18.04.1 LTS\r\nRelease:        18.04\r\nCodename:       bionic<\/pre>\n<p>TACACS+ \uc124\uce58<\/p>\n<pre class=\"lang:sh highlight:0 decode:true \" >$ sudo apt-get install tacacs+<\/pre>\n<p><!--more--><\/p>\n<p>2. \uc124\uc815(\/etc\/tacacs+\/tac_plus.conf) \ud654\uc77c<\/p>\n<p>2.1. tacacs+ \uc11c\ubc84\uc640 \ud074\ub77c\uc774\uc5b8\ud2b8\uac04\uc758 \ud328\ud0b7 \uc554\ud638\ud654\uc5d0 \uc0ac\uc6a9\ud558\ub294 \ud0a4\uc124\uc815.<\/p>\n<pre class=\"lang:sh highlight:0 decode:true \" >$ sudo vi \/etc\/tacacs+\/tac_plus.conf\r\nkey = snowfox_tacacs\t<\/pre>\n<p>2.2. ACL(Access Control List) \uc124\uc815<br \/>\nACL\uc740 \ud074\ub77c\uc774\uc5b8\ud2b8 IP \uc8fc\uc18c\ub098 \ud638\uc2a4\ud2b8\ub124\uc784\ubcc4\ub85c \uc0ac\uc6a9\uc790 \ub610\ub294 \uadf8\ub8f9\uc758 \ub85c\uadf8\uc778 \ub610\ub294 \uc811\uadfc\uc744 \uc81c\ud55c\ud558\ub3c4\ub85d \uc815\uc758\ud560 \uc218 \uc788\ub2e4.<br \/>\nACL\uc740 \uc544\ub798\uc640 \uac19\uc740 \ud615\uc2dd\uc73c\ub85c \uc9c0\uc815\ud560 \uc218 \uc788\ub2e4.<\/p>\n<pre class=\"lang:sh highlight:0 decode:true \" >acl = rule_name {\r\n    permission = regular_expression\r\n    # implicit deny (ie: anythong else)\r\n}<\/pre>\n<p>\uc544\ub798 \uc608\ub294, net_admin \uadf8\ub8f9\uc740 \ubaa8\ub4e0 IP \uc8fc\uc18c\uc5d0\uc11c, sys_admin \uadf8\ub8f9\uc740 10.10.10.2 \uc5d0\uc11c\ub9cc \uc811\uc18d\uac00\ub2a5\ud558\ub3c4\ub85d \uc124\uc815\ud55c\ub2e4.<\/p>\n<pre class=\"lang:sh highlight:0 decode:true \" >acl = net_admin {\r\n    permit = .*\r\n}\r\n\r\nacl = sys_admin {\r\n    permit = ^10\\.\\.10\\.2$\r\n}<\/pre>\n<p>2.3. \uadf8\ub8f9<br \/>\n\uadf8\ub8f9\uc744 \ub9cc\ub4e4\uace0 \uac01\uac01\uc758 \uadf8\ub8f9\uc774 \ub124\ud2b8\uc6cc\ud06c \uc7a5\ube44\uc5d0\uc11c \uc218\ud589\ud560 \uc218 \uc788\ub294 \uad8c\ud55c\uc744 \uc815\uc758\ud55c\ub2e4. \uadf8\ub8f9\uc740 \uc544\ub798\uc640 \uac19\uc740 \ud615\uc2dd\uc73c\ub85c \uc815\uc758\ud55c\ub2e4.<\/p>\n<pre class=\"lang:sh highlight:0 decode:true \" >group = group_name {\r\n    [ default service ]\r\n    group_attr\r\n    svc\r\n}\r\n<\/pre>\n<p>default service\ub97c \ud5c8\uc6a9\ud558\uae30\uc704\ud574\uc11c \uc544\ub798\uc640 \uac19\uc774 \uba85\uc2dc\ud55c\ub2e4.<br \/>\ndefault service = permission<br \/>\n\ub9cc\uc57d \uc0dd\ub7b5\ud558\uba74 \uae30\ubcf8\uac12\uc740 deny\uac00\ub41c\ub2e4.<\/p>\n<p>\uadf8\ub8f9 \uc18d\uc131(group_attr)\uc740 \uadf8\ub8f9 \uc0ac\uc6a9\uc790\uac00 \uc0c1\uc18d\ud558\ub294 \uc18d\uc131\uc774\uba70 ACL \uc774\ub098 \uc720\ud6a8\uae30\uac04 \uac19\uc740 \uc18d\uc131\uc744 \ud3ec\ud568\ud55c\ub2e4.<br \/>\n\uc11c\ube44\uc2a4(svc)\ub294 \uadf8\ub8f9\uc774 \uc2e4\ud589\ud560 \uad8c\ud55c\uc774 \uc788\ub294 \uc11c\ube44\uc2a4\ub97c \uc815\uc758\ud55c\ub2e4. \uc11c\ubc84\uc640 \ud074\ub77c\uc774\uc5b8\ud2b8 \ubaa8\ub450\uc5d0 \uad8c\ud55c\uc744 \ubd80\uc5ec\ud574 \uad6c\uc131\ud574\uc57c \uc62c\ubc14\ub85c \uc791\ub3d9\ud55c\ub2e4.<\/p>\n<p>command \uad8c\ud55c\uc740 \uc544\ub798\uc640\uac19\uc774 \uc815\uc758\ud55c\ub2e4.<\/p>\n<pre class=\"lang:sh highlight:0 decode:true \" >cmd = string {\r\n    permission regex\r\n    permission regex\r\n    ...\r\n    permission\r\n}\r\n<\/pre>\n<p>\uc704\uc758 2.2\uc5d0\uc11c \ub9cc\ub4e0 \ub450 \uadf8\ub8f9\uc774 \uc2e4\ud589\ud560 \uc218 \uc788\ub294 \uba85\ub839\uc5b4\ub97c \uc81c\ud55c \ud558\ub824\uba74, \uc544\ub798\uc640 \uac19\uc774 \uc124\uc815\ud55c\ub2e4.<br \/>\n\uc544\ub798\uc608\uc5d0\uc11c, net_admin \uadf8\ub8f9\uc740 \ubaa8\ub4e0 \uba85\ub839\uc5b4\ub97c \uc2e4\ud589\ud560 \uc218 \uc788\uc9c0\ub9cc, sys_admin \uadf8\ub8f9\uc740 \uc2e4\ud589\ud560 \uc218 \uc788\ub294 \uba85\ub839\uc5b4\uc758 \uc81c\ud55c\uc744 \ubc1b\ub294\ub2e4.<\/p>\n<pre class=\"lang:sh highlight:0 decode:true \" >group = net_admin {\r\n        default service = permit\r\n        acl = net_admin\r\n        service = exec {\r\n                priv-lvl = 15\r\n        }\r\n}\r\n\r\ngroup = sys_admin {\r\n        default service = deny\r\n        acl = sys_admin\r\n        service = exec {\r\n                priv-lvl = 0\r\n        }\r\n        cmd = enable {\r\n                permit .*\r\n        }\r\n        cmd = show {\r\n                permit .*\r\n        }\r\n        cmd = exit {\r\n                permit .*\r\n        }\r\n        cmd = interface {\r\n                permit Ethernet.*\r\n                permit FastEthernet.*\r\n                permit GigabitEthernet.*\r\n        }\r\n        cmd = switchport {\r\n                permit \"access vlan.*\"\r\n                permit \"trunk encapsulation.*\"\r\n                permit \"mode.*\"\r\n                permit \"trunk allowed vlan.*\"\r\n                permit \"trunk allowed vlan.*\"\r\n        }\r\n        cmd = description {\r\n                permit .*\r\n        }\r\n        cmd = no {\r\n                permit shutdown\r\n        }\r\n}\r\n<\/pre>\n<p>2.4. \uc0ac\uc6a9\uc790(Users)<br \/>\n\uadf8\ub8f9\uc744 \uc124\uc815\ud55c \ub2e4\uc74c\uc5d0\ub294 \uc0ac\uc6a9\uc790\ub97c \uc815\uc758\ud558\uace0 \uadf8\ub8f9\uc5d0 \uc18d\ud558\ub3c4\ub85d \ud560 \uc218 \uc788\ub2e4.<br \/>\n\uc0ac\uc6a9\uc790 \uc124\uc815\uc740 \uadf8\ub8f9\uacfc \uc720\uc0ac\ud558\uba70, \uc544\ub798\uc640 \uac19\ub2e4.<\/p>\n<pre class=\"lang:sh highlight:0 decode:true \" >user = user_name {\r\n    [ default service ]\r\n    user_attr\r\n    svc\r\n}\r\n<\/pre>\n<p>\uc774\uc81c, \uc704\uc758 \ub450 \uadf8\ub8f9\uc5d0 \uc18d\ud560 \uc0ac\uc6a9\uc790\ub97c \ud558\ub098\uc529 \ub9cc\ub4e0\ub2e4.<br \/>\nnet_admin \uadf8\ub8f9\uc5d0 \uc18d\ud558\ub294 nadmin \uc0ac\uc6a9\uc790\ub294 \ubbf8\ub9ac \uc815\uc758\ub41c DES\ub85c \uc554\ud638\ud654\ub41c \ube44\ubc00\ubc88\ud638\ub85c \uc778\uc99d\ud55c\ub2e4.<br \/>\nsys_admin \uadf8\ub8f9\uc5d0 \uc18d\ud558\ub294 fox \uc0ac\uc6a9\uc790\ub294 \/etc\/passwd\uc5d0\uc11c \uc778\uc99d\ud55c\ub2e4.  \uc774\ub97c \uc704\ud574\uc11c\ub294 TACACS+ \uc11c\ubc84\uc5d0\uc11c\ub3c4 \uc0ac\uc6a9\uc790\ub97c \uc124\uc815\ud574\uc57c\ud55c\ub2e4.<\/p>\n<p>nadmin \uc0ac\uc6a9\uc790\uc758 \ube44\ubc00\ubc88\ud638\ub97c \ub9cc\ub4e4\uae30\uc704\ud574 tac_pwd \uba85\ub839\uc5b4\ub97c \uc0ac\uc6a9\ud558\uba70 tac_plus.conf\uc5d0 DES\ub85c \uc554\ud638\ud654\ub41c \ube44\ubc00\ubc88\ud638\ub97c \uc124\uc815\ud574\uc57c\ud55c\ub2e4.<\/p>\n<pre class=\"lang:sh highlight:0 decode:true \" ># tac_pwd\r\nPassword to be encrypted: abc123\r\nIZHuieAMcFwuU<\/pre>\n<p>\uc0ac\uc6a9\uc790 fox\uacc4\uc815\uc744 \ub9cc\ub4e4\uace0(\ub9ac\ub205\uc2a4 \uacc4\uc815),  passwd \uba85\ub839\uc5b4\ub97c \uc0ac\uc6a9\ud558\uc5ec \ube44\ubc00\ubc88\ud638\ub97c \uc0dd\uc131\ud55c\ub2e4. <\/p>\n<pre class=\"lang:sh highlight:0 decode:true \" ># useradd fox\r\n# passwd fox\r\nEnter new UNIX password:\r\nRetype new UNIX password:\r\npasswd: password updated successfully<\/pre>\n<p>\ub2e4\uc74c\uc73c\ub85c enable \ube44\ubc00\ubc88\ud638\ub97c \uc0dd\uc131\ud55c\ub2e4.<br \/>\n\uc704\uc5d0\uc11c \ucc98\ub7fc, nadmin \uc0ac\uc6a9\uc790\ub294 tac_pwd \uba85\ub839\uc5b4\ub97c \uc0ac\uc6a9\ud55c\ub2e4.(enable \ube44\ubc00\ubc88\ud638\ub294 enable \ub85c \uc124\uc815)<\/p>\n<pre class=\"lang:sh highlight:0 decode:true \" ># tac_pwd\r\nPassword to be encrypted: enable\r\nWuVeol5JWp3Nk<\/pre>\n<p>\uc0ac\uc6a9\uc790 fox\uc758 \uacbd\uc6b0\uc5d0\ub294 TACAS+ \ub370\ubaac\uc5d0\uc11c\ud2b9\ubcc4\ud788 \uc815\uc758\ub41c \uc0ac\uc6a9\uc790\uc778 &#8216;$ enable $&#8217;\ub97c \uc0ac\uc6a9\ud558\ub294\ub370, \uc774 \uac83\uc740  \uc0ac\uc6a9\uac00\ub2a5\ud55c \ube44\ubc00\ubc88\ud638\ub97c \uc124\uc815\ud558\uc9c0 \uc54a\uc740 \ubaa8\ub4e0 \uc0ac\uc6a9\uc790\ub4e4\uc774 \uae30\ubcf8\uc73c\ub85c \uc0ac\uc6a9\ud558\uac8c\ub41c\ub2e4.<br \/>\ntac_pwd \uba85\ub839\uc5b4\ub85c &#8216;$ enable $&#8217; \uc0ac\uc6a9\uc790\uc758 \ube44\ubc00\ubc88\ud638\ub97c \uc0dd\uc131\ud55c\ub2e4. \uc5ec\uae30\uc11c\ub294 \ube44\ubc00\ubc88\ud638\ub97c &#8216;default&#8217;\ub85c \uc124\uc815\ud588\ub2e4)<\/p>\n<pre class=\"lang:sh decode:true \" ># tac_pwd\r\nPassword to be encrypted: default\r\n8Kytdhagh743s<\/pre>\n<p>\uc774\uc81c, tac_plus.conf \uc5d0 \uc544\ub798 \ub0b4\uc6a9\uc744 \ucd94\uac00\ud558\uc5ec \uc0ac\uc6a9\uc790 \uc124\uc815\uc744 \ub9c8\ubb34\ub9ac\ud55c\ub2e4.<\/p>\n<pre class=\"lang:sh highlight:0 decode:true \" >## user account and passwd\r\nuser = nadmin {\r\n        member = net_admin\r\n        login = des IZHuieAMcFwuU\r\n        enable = des WuVeol5JWp3Nk\r\n}\r\n\r\nuser = fox {\r\n        login = file \/etc\/passwd\r\n        member = sys_admin\r\n}\r\n\r\nuser = $enable$ {\r\n        login = des 8Kytdhagh743s\r\n}<\/pre>\n<p>3. TACACS+ \uc11c\ube44\uc2a4 \uc2e4\ud589<\/p>\n<p>\uc774\uc81c, TACACS+ \uc11c\ube44\uc2a4\ub97c \uc2dc\uc791\ud558\uace0, \uc11c\ube44\uc2a4 \uc0c1\ud0dc\ub97c \ud655\uc778\ud574 \ubcf8\ub2e4.<\/p>\n<pre class=\"lang:sh highlight:0 decode:true \" ># systemctl start tacacs_plus\r\n\r\n# systemctl status tacacs_plus\r\n\u25cf tacacs_plus.service - LSB: TACACS+ authentication daemon\r\n   Loaded: loaded (\/etc\/init.d\/tacacs_plus; generated)\r\n   Active: active (running) since Thu 2019-05-30 15:37:16 KST; 46min ago\r\n     Docs: man:systemd-sysv-generator(8)\r\n    Tasks: 1 (limit: 1109)\r\n   CGroup: \/system.slice\/tacacs_plus.service\r\n           \u2514\u25001004 \/usr\/sbin\/tac_plus -C \/etc\/tacacs+\/tac_plus.conf\r\n\r\nMay 30 15:37:13 fox tacacs_plus[909]:  * Starting TACACS+ authentication daemon\r\nMay 30 15:37:14 fox tac_plus[941]: Reading config\r\nMay 30 15:37:14 fox tac_plus[941]: Version F4.0.4.27a Initialized 1\r\nMay 30 15:37:15 fox tac_plus[989]: Reading config\r\nMay 30 15:37:15 fox tac_plus[989]: Version F4.0.4.27a Initialized 1\r\nMay 30 15:37:15 fox tac_plus[1004]: socket FD 0 AF 2\r\nMay 30 15:37:15 fox tac_plus[1004]: socket FD 2 AF 10\r\nMay 30 15:37:15 fox tac_plus[1004]: uid=0 euid=0 gid=0 egid=0 s=829941392\r\nMay 30 15:37:16 fox tacacs_plus[909]:    ...done.\r\nMay 30 15:37:16 fox systemd[1]: Started LSB: TACACS+ authentication daemon.<\/pre>\n<p>4. \uc2dc\uc2a4\ucf54 \uc2a4\uc704\uce58 \uc124\uc815 \ubc0f \ud14c\uc2a4\ud2b8<\/p>\n<p>\uc2dc\uc2a4\ucf54 \uc2a4\uc704\uce58 \uc124\uc815 \ub0b4\uc6a9\uc740 \uc544\ub798 \ubb38\uc11c\ub97c \ucc38\uace0.<\/p>\n<pre class=\"lang:sh highlight:0 decode:true \" >Switch(config)#tacacs-server host 192.168.0.6\r\nSwitch(config)#tacacs-server directed-request\r\nSwitch(config)#tacacs-server key snowfox_tacacs\r\n\r\nSwitch(config)#aaa authentication login default group tacacs+ local\r\nSwitch(config)#aaa authentication enable default group tacacs+ enable\r\nSwitch(config)#aaa authorization config-commands\r\nSwitch(config)#aaa authorization commands 0 default group tacacs+ local\r\nSwitch(config)#aaa authorization commands 1 default group tacacs+ local\r\nSwitch(config)#aaa authorization commands 7 default group tacacs+ local\r\nSwitch(config)#aaa authorization commands 15 default group tacacs+ local\r\nSwitch(config)#aaa accounting commands 0 default start-stop group tacacs+\r\nSwitch(config)#aaa accounting commands 1 default start-stop group tacacs+\r\nSwitch(config)#aaa accounting commands 7 default start-stop group tacacs+\r\nSwitch(config)#aaa accounting commands 15 default start-stop group tacacs+\r\nSwitch(config)#aaa accounting network 0 start-stop group tacacs+\r\nSwitch(config)#aaa accounting network 15 start-stop group tacacs+\r\nSwitch(config)#aaa accounting connection 0 start-stop group tacacs+\r\nSwitch(config)#aaa accounting connection 15 start-stop group tacacs+\r\nSwitch(config)#aaa session-id common\r\nSwitch(config)#end\r\n\r\nSwitch(config)#line con 0\r\nSwitch(config-line)#login authentication consol\r\nSwitch(config-line)#line vty 0 4\r\nSwitch(config-line)# access-class 99 in\r\nSwitch(config-line)# exec-timeout 15 0\r\nSwitch(config-line)# privilege level 15\r\nSwitch(config-line)# authorization exec vty\r\nSwitch(config-line)# accounting commands 1 pri1\r\nSwitch(config-line)# accounting commands 5 pri5\r\nSwitch(config-line)# accounting commands 15 pri15\r\nSwitch(config-line)# accounting exec vty\r\nSwitch(config-line)# login authentication vty\r\nSwitch(config-line)#line vty 5 15\r\nSwitch(config-line)# access-class 99 in\r\nSwitch(config-line)# exec-timeout 15 0\r\nSwitch(config-line)# privilege level 15\r\nSwitch(config-line)# authorization exec vty\r\nSwitch(config-line)# accounting commands 1 pri1\r\nSwitch(config-line)# accounting commands 5 pri5\r\nSwitch(config-line)# accounting commands 15 pri15\r\nSwitch(config-line)# accounting exec vty\r\nSwitch(config-line)# login authentication vty\r\nSwitch(config-line)#end<\/pre>\n<p>\ud14c\uc2a4\ud2b8, user fox\ub294 \uba85\ub839\uc5b4\uac00 \uc81c\ud55c\ub428\uc744 \ubcfc \uc218 \uc788\ub2e4.<\/p>\n<pre class=\"lang:sh highlight:0 decode:true \" >User Access Verification\r\n\r\nUsername: nadmin\r\nPassword:\r\n\r\nSwitch#conf t\r\nEnter configuration commands, one per line.  End with CNTL\/Z.\r\nSwitch(config)#\r\n\r\n\r\nUser Access Verification\r\n\r\nUsername: fox\r\nPassword:\r\n\r\nSwitch#conf t\r\nCommand authorization failed.<\/pre>\n<p>5. \uc124\uc815 \ub0b4\uc6a9<br \/>\n5.1. TACACS+ \uc11c\ubc84 \uc124\uc815<\/p>\n<pre class=\"lang:sh highlight:0 decode:true \" >root@fox:\/var\/log# cat \/etc\/tacacs+\/tac_plus.conf\r\n# Created by Henry-Nicolas Tourneur(henry.nicolas@tourneur.be)\r\n# See man(5) tac_plus.conf for more details\r\n\r\n# Define where to log accounting data, this is the default.\r\n\r\naccounting file = \/var\/log\/tac_plus.acct\r\n\r\n# This is the key that clients have to use to access Tacacs+\r\n\r\n#key = testing123\r\nkey = snowfox_tacacs\r\n\r\n# Use \/etc\/passwd file to do authentication\r\n\r\n#default authentication = file \/etc\/passwd\r\n\r\n\r\n# You can use feature like per host key with different enable passwords\r\n#host = 127.0.0.1 {\r\n#        key = test\r\n#        type = cisco\r\n#        enable = &lt;des|cleartext&gt; enablepass\r\n#        prompt = \"Welcome XXX ISP Access Router \\n\\nUsername:\"\r\n#}\r\n\r\n# We also can define local users and specify a file where data is stored.\r\n# That file may be filled using tac_pwd\r\n#user = test1 {\r\n#    name = \"Test User\"\r\n#    member = staff\r\n#    login = file \/etc\/tacacs\/tacacs_passwords\r\n#}\r\n\r\n# We can also specify rules valid per group of users.\r\n#group = group1 {\r\n#       cmd = conf {\r\n#               deny\r\n#       }\r\n#}\r\n\r\n# Another example : forbid configure command for some hosts\r\n# for a define range of clients\r\n#group = group1 {\r\n#       login = PAM\r\n#       service = ppp\r\n#       protocol = ip {\r\n#               addr = 10.10.0.0\/24\r\n#       }\r\n#       cmd = conf {\r\n#               deny .*\r\n#       }\r\n#}\r\n\r\nuser = DEFAULT {\r\n        login = PAM\r\n        service = ppp protocol = ip {}\r\n}\r\n\r\nacl = net_admin {\r\n        permit = .*\r\n}\r\nacl = sys_admin {\r\n        permit = ^192\\.168\\.0\\.\r\n}\r\n\r\n# Much more features are availables, like ACL, more service compatibilities,\r\n# commands authorization, scripting authorization.\r\n# See the man page for those features.\r\n#\r\n\r\ngroup = net_admin {\r\n        default service = permit\r\n        acl = net_admin\r\n        service = exec {\r\n                priv-lvl = 15\r\n        }\r\n}\r\n\r\ngroup = sys_admin {\r\n        default service = deny\r\n        acl = sys_admin\r\n        service = exec {\r\n                priv-lvl = 0\r\n        }\r\n        cmd = enable {\r\n                permit .*\r\n        }\r\n        cmd = show {\r\n                permit .*\r\n        }\r\n        cmd = exit {\r\n                permit .*\r\n        }\r\n        cmd = interface {\r\n                permit Ethernet.*\r\n                permit FastEthernet.*\r\n                permit GigabitEthernet.*\r\n        }\r\n        cmd = switchport {\r\n                permit \"access vlan.*\"\r\n                permit \"trunk encapsulation.*\"\r\n                permit \"mode.*\"\r\n                permit \"trunk allowed vlan.*\"\r\n                permit \"trunk allowed vlan.*\"\r\n        }\r\n        cmd = description {\r\n                permit .*\r\n        }\r\n        cmd = no {\r\n                permit shutdown\r\n        }\r\n}\r\n\r\n## user account and passwd\r\nuser =  nadmin {\r\n        member = net_admin\r\n        login = des IZHuieAMcFwuU\r\n        enable = des WuVeol5JWp3Nk\r\n}\r\n\r\nuser = fox {\r\n        login = file \/etc\/passwd\r\n        member = sys_admin\r\n}\r\n\r\nuser = $enable$ {\r\n        login = des 8Kytdhagh743s\r\n}\r\n<\/pre>\n<p>5.2. CISCO \uc2a4\uc704\uce58 \uc124\uc815(TACACS+ \ud14c\uc2a4\ud2b8\ub97c \uc704\ud55c \ucd5c\uc18c \uc124\uc815\uc784).<\/p>\n<pre class=\"lang:sh highlight:0 decode:true \" >Switch#sh run\r\nBuilding configuration...\r\n\r\nCurrent configuration : 5233 bytes\r\n!\r\nversion 12.2\r\nno service pad\r\nservice timestamps debug datetime msec\r\nservice timestamps log datetime msec\r\nno service password-encryption\r\n!\r\nhostname Switch\r\n!\r\n!\r\naaa new-model\r\n!\r\n!\r\naaa authentication login default group tacacs+ local\r\naaa authentication enable default group tacacs+ enable\r\naaa authorization config-commands\r\naaa authorization commands 0 default group tacacs+ local\r\naaa authorization commands 1 default group tacacs+ local\r\naaa authorization commands 7 default group tacacs+ local\r\naaa authorization commands 15 default group tacacs+ local\r\naaa accounting commands 0 default start-stop group tacacs+\r\naaa accounting commands 1 default start-stop group tacacs+\r\naaa accounting commands 7 default start-stop group tacacs+\r\naaa accounting commands 15 default start-stop group tacacs+\r\naaa accounting network 0 start-stop group tacacs+\r\naaa accounting network 15 start-stop group tacacs+\r\naaa accounting connection 0 start-stop group tacacs+\r\naaa accounting connection 15 start-stop group tacacs+\r\n!\r\n!\r\n!\r\naaa session-id common\r\n!\r\nvlan 192\r\n!\r\n!\r\n!\r\ninterface FastEthernet0\/1\r\n switchport access vlan 192\r\n switchport mode dynamic desirable\r\n!\r\ninterface FastEthernet0\/2\r\n switchport mode dynamic desirable\r\n!\r\ninterface FastEthernet0\/3\r\n switchport mode dynamic desirable\r\n!\r\ninterface FastEthernet0\/4\r\n switchport mode dynamic desirable\r\n!\r\ninterface FastEthernet0\/5\r\n switchport mode dynamic desirable\r\n!\r\ninterface FastEthernet0\/6\r\n switchport mode dynamic desirable\r\n!\r\ninterface FastEthernet0\/7\r\n switchport mode dynamic desirable\r\n!\r\ninterface FastEthernet0\/8\r\n switchport mode dynamic desirable\r\n!\r\ninterface FastEthernet0\/9\r\n switchport mode dynamic desirable\r\n!\r\ninterface FastEthernet0\/10\r\n switchport mode dynamic desirable\r\n!\r\ninterface FastEthernet0\/11\r\n switchport mode dynamic desirable\r\n!\r\ninterface FastEthernet0\/12\r\n switchport mode dynamic desirable\r\n!\r\ninterface FastEthernet0\/13\r\n switchport mode dynamic desirable\r\n!\r\ninterface FastEthernet0\/14\r\n switchport mode dynamic desirable\r\n!\r\ninterface FastEthernet0\/15\r\n switchport mode dynamic desirable\r\n!\r\ninterface FastEthernet0\/16\r\n switchport mode dynamic desirable\r\n!\r\ninterface FastEthernet0\/17\r\n switchport mode dynamic desirable\r\n!\r\ninterface FastEthernet0\/18\r\n switchport mode dynamic desirable\r\n!\r\ninterface FastEthernet0\/19\r\n switchport mode dynamic desirable\r\n!\r\ninterface FastEthernet0\/20\r\n switchport mode dynamic desirable\r\n!\r\ninterface FastEthernet0\/21\r\n switchport mode dynamic desirable\r\n!\r\ninterface FastEthernet0\/22\r\n switchport mode dynamic desirable\r\n!\r\ninterface FastEthernet0\/23\r\n switchport mode dynamic desirable\r\n!\r\ninterface FastEthernet0\/24\r\n switchport mode dynamic desirable\r\n!\r\ninterface FastEthernet0\/25\r\n switchport mode dynamic desirable\r\n!\r\ninterface FastEthernet0\/26\r\n switchport mode dynamic desirable\r\n!\r\ninterface FastEthernet0\/27\r\n switchport mode dynamic desirable\r\n!\r\ninterface FastEthernet0\/28\r\n switchport mode dynamic desirable\r\n!\r\ninterface FastEthernet0\/29\r\n switchport mode dynamic desirable\r\n!\r\ninterface FastEthernet0\/30\r\n switchport mode dynamic desirable\r\n!\r\ninterface FastEthernet0\/31\r\n switchport mode dynamic desirable\r\n!\r\ninterface FastEthernet0\/32\r\n switchport mode dynamic desirable\r\n!\r\ninterface FastEthernet0\/33\r\n switchport mode dynamic desirable\r\n!\r\ninterface FastEthernet0\/34\r\n switchport mode dynamic desirable\r\n!\r\ninterface FastEthernet0\/35\r\n switchport mode dynamic desirable\r\n!\r\ninterface FastEthernet0\/36\r\n switchport mode dynamic desirable\r\n!\r\ninterface FastEthernet0\/37\r\n switchport mode dynamic desirable\r\n!\r\ninterface FastEthernet0\/38\r\n switchport mode dynamic desirable\r\n!\r\ninterface FastEthernet0\/39\r\n switchport mode dynamic desirable\r\n!\r\ninterface FastEthernet0\/40\r\n switchport mode dynamic desirable\r\n!\r\ninterface FastEthernet0\/41\r\n switchport mode dynamic desirable\r\n!\r\ninterface FastEthernet0\/42\r\n switchport mode dynamic desirable\r\n!\r\ninterface FastEthernet0\/43\r\n switchport mode dynamic desirable\r\n!\r\ninterface FastEthernet0\/44\r\n switchport mode dynamic desirable\r\n!\r\ninterface FastEthernet0\/45\r\n switchport mode dynamic desirable\r\n!\r\ninterface FastEthernet0\/46\r\n switchport mode dynamic desirable\r\n!\r\ninterface FastEthernet0\/47\r\n switchport mode dynamic desirable\r\n!\r\ninterface FastEthernet0\/48\r\n switchport mode dynamic desirable\r\n!\r\ninterface GigabitEthernet0\/1\r\n switchport mode dynamic desirable\r\n!\r\ninterface GigabitEthernet0\/2\r\n switchport mode dynamic desirable\r\n!\r\ninterface Vlan1\r\n ip address dhcp\r\n shutdown\r\n!\r\ninterface Vlan192\r\n ip address 192.168.0.200 255.255.255.0\r\n!\r\nip default-gateway 192.168.0.1\r\nip classless\r\nip http server\r\n!\r\ntacacs-server host 192.168.0.6 timeout 5\r\ntacacs-server directed-request\r\ntacacs-server key snowfox_tacacs\r\n!\r\ncontrol-plane\r\n!\r\n!\r\nline con 0\r\n login authentication consol\r\nline vty 0 4\r\n exec-timeout 15 0\r\n privilege level 15\r\n authorization exec vty\r\n accounting commands 1 pri1\r\n accounting commands 5 pri5\r\n accounting commands 15 pri15\r\n accounting exec vty\r\n login authentication vty\r\nline vty 5 15\r\n exec-timeout 15 0\r\n privilege level 15\r\n authorization exec vty\r\n accounting commands 1 pri1\r\n accounting commands 5 pri5\r\n accounting commands 15 pri15\r\n accounting exec vty\r\n login authentication vty\r\n!\r\nend<\/pre>\n<p>\ucc38\uace0\ubb38\uc11c: <\/p>\n<div class=\"embed-container\">\n<blockquote class=\"wp-embedded-content\" data-secret=\"vc2k78gvOa\"><p><a href=\"http:\/\/www.routingloops.co.uk\/cisco\/tacacs-on-ubuntu-14-04-lts\/\">TACACS+ on Ubuntu 14.04 LTS<\/a><\/p><\/blockquote>\n<p><iframe loading=\"lazy\" title=\"&#8220;TACACS+ on Ubuntu 14.04 LTS&#8221; &#8212; The Routing Loop\" class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" src=\"http:\/\/www.routingloops.co.uk\/cisco\/tacacs-on-ubuntu-14-04-lts\/embed\/#?secret=vc2k78gvOa\" data-secret=\"vc2k78gvOa\" width=\"600\" height=\"338\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><\/div>\n<p>,https:\/\/www.cisco.com\/c\/en\/us\/support\/docs\/security-vpn\/terminal-access-controller-access-control-system-tacacs-\/10384-security.html <\/p>\n","protected":false},"excerpt":{"rendered":"<p>\uc6b0\ubd84\ud22c \ub9ac\ub205\uc2a4\uc5d0 TACACS+ \uc778\uc99d\uc11c\ubc84 \uc124\uce58\ud558\uae30 \uc124\uce58\ud658\uacbd: TACACS+ \uc124\uce58 : ubuntu 18.04, ip address: 192.168.0.6 Cisco switch: C3550, ip address: 192.168.0.200 1. \uc791\uc5c5 \ud658\uacbd \ud655\uc778 \ubc0f tacacs plus \uc124\uce58 \ub9ac\ub205\uc2a4 \ubc84\uc804 \ud655\uc778 $ lsb_release -a No LSB modules are available. Distributor ID: Ubuntu Description: Ubuntu 18.04.1 LTS Release: 18.04 Codename: bionic TACACS+ \uc124\uce58 $ sudo apt-get &hellip; <\/p>\n<p><a class=\"more-link btn\" href=\"https:\/\/blog.boxcorea.com\/wp\/archives\/2591\">Continue reading<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"Ubuntu \ub9ac\ub205\uc2a4\uc5d0 TACACS+ \uc778\uc99d\uc11c\ubc84 \uc124\uce58\ud558\uace0 \uc2dc\uc2a4\ucf54 \uc2a4\uc704\uce58\uc5d0 \uc801\uc6a9\ud558\uae30","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[4,388],"tags":[595,592,591,594,593],"class_list":["post-2591","post","type-post","status-publish","format-standard","hentry","category-linux","category-network","tag-cisco-tacacs","tag-tacacs","tag-ubuntu-tacacs","tag--tacacs","tag-593","item-wrap"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Ubuntu \ub9ac\ub205\uc2a4\uc5d0 TACACS+ \uc778\uc99d\uc11c\ubc84 \uc124\uce58\ud558\uace0 \uc2dc\uc2a4\ucf54 \uc2a4\uc704\uce58\uc5d0 \uc801\uc6a9\ud558\uae30 - Blog-boxcorea<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.boxcorea.com\/wp\/archives\/2591\" \/>\n<meta property=\"og:locale\" content=\"ko_KR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ubuntu \ub9ac\ub205\uc2a4\uc5d0 TACACS+ \uc778\uc99d\uc11c\ubc84 \uc124\uce58\ud558\uace0 \uc2dc\uc2a4\ucf54 \uc2a4\uc704\uce58\uc5d0 \uc801\uc6a9\ud558\uae30 - Blog-boxcorea\" \/>\n<meta property=\"og:description\" content=\"\uc6b0\ubd84\ud22c \ub9ac\ub205\uc2a4\uc5d0 TACACS+ \uc778\uc99d\uc11c\ubc84 \uc124\uce58\ud558\uae30 \uc124\uce58\ud658\uacbd: TACACS+ \uc124\uce58 : ubuntu 18.04, ip address: 192.168.0.6 Cisco switch: C3550, ip address: 192.168.0.200 1. \uc791\uc5c5 \ud658\uacbd \ud655\uc778 \ubc0f tacacs plus \uc124\uce58 \ub9ac\ub205\uc2a4 \ubc84\uc804 \ud655\uc778 $ lsb_release -a No LSB modules are available. Distributor ID: Ubuntu Description: Ubuntu 18.04.1 LTS Release: 18.04 Codename: bionic TACACS+ \uc124\uce58 $ sudo apt-get &hellip; Continue reading\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.boxcorea.com\/wp\/archives\/2591\" \/>\n<meta property=\"og:site_name\" content=\"Blog-boxcorea\" \/>\n<meta property=\"article:published_time\" content=\"2019-05-31T22:00:41+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-06-13T13:03:39+00:00\" \/>\n<meta name=\"author\" content=\"snowffox\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"snowffox\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8\ubd84\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/blog.boxcorea.com\/wp\/archives\/2591#article\",\"isPartOf\":{\"@id\":\"https:\/\/blog.boxcorea.com\/wp\/archives\/2591\"},\"author\":{\"name\":\"snowffox\",\"@id\":\"https:\/\/blog.boxcorea.com\/wp\/#\/schema\/person\/6d8e12df2429d663a0a4e8362fbb650a\"},\"headline\":\"Ubuntu \ub9ac\ub205\uc2a4\uc5d0 TACACS+ \uc778\uc99d\uc11c\ubc84 \uc124\uce58\ud558\uace0 \uc2dc\uc2a4\ucf54 \uc2a4\uc704\uce58\uc5d0 \uc801\uc6a9\ud558\uae30\",\"datePublished\":\"2019-05-31T22:00:41+00:00\",\"dateModified\":\"2019-06-13T13:03:39+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/blog.boxcorea.com\/wp\/archives\/2591\"},\"wordCount\":113,\"commentCount\":2,\"keywords\":[\"cisco tacacs+\",\"TACACS+\",\"Ubuntu TACACS+\",\"\uc2dc\uc2a4\ucf54 TACACS+\",\"\uc778\uc99d\uc11c\ubc84\"],\"articleSection\":[\"Linux(\ub9ac\ub205\uc2a4)\",\"Network(\ub124\ud2b8\uc6cc\ud06c)\"],\"inLanguage\":\"ko-KR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/blog.boxcorea.com\/wp\/archives\/2591#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blog.boxcorea.com\/wp\/archives\/2591\",\"url\":\"https:\/\/blog.boxcorea.com\/wp\/archives\/2591\",\"name\":\"Ubuntu \ub9ac\ub205\uc2a4\uc5d0 TACACS+ \uc778\uc99d\uc11c\ubc84 \uc124\uce58\ud558\uace0 \uc2dc\uc2a4\ucf54 \uc2a4\uc704\uce58\uc5d0 \uc801\uc6a9\ud558\uae30 - Blog-boxcorea\",\"isPartOf\":{\"@id\":\"https:\/\/blog.boxcorea.com\/wp\/#website\"},\"datePublished\":\"2019-05-31T22:00:41+00:00\",\"dateModified\":\"2019-06-13T13:03:39+00:00\",\"author\":{\"@id\":\"https:\/\/blog.boxcorea.com\/wp\/#\/schema\/person\/6d8e12df2429d663a0a4e8362fbb650a\"},\"breadcrumb\":{\"@id\":\"https:\/\/blog.boxcorea.com\/wp\/archives\/2591#breadcrumb\"},\"inLanguage\":\"ko-KR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blog.boxcorea.com\/wp\/archives\/2591\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/blog.boxcorea.com\/wp\/archives\/2591#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/blog.boxcorea.com\/wp\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Ubuntu \ub9ac\ub205\uc2a4\uc5d0 TACACS+ \uc778\uc99d\uc11c\ubc84 \uc124\uce58\ud558\uace0 \uc2dc\uc2a4\ucf54 \uc2a4\uc704\uce58\uc5d0 \uc801\uc6a9\ud558\uae30\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blog.boxcorea.com\/wp\/#website\",\"url\":\"https:\/\/blog.boxcorea.com\/wp\/\",\"name\":\"Blog-boxcorea\",\"description\":\"Simple is Beautiful!\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blog.boxcorea.com\/wp\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ko-KR\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/blog.boxcorea.com\/wp\/#\/schema\/person\/6d8e12df2429d663a0a4e8362fbb650a\",\"name\":\"snowffox\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ko-KR\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/c0787be58ea7e470b1a6f5ea8ce367c7913809648a00e0c15faace5220902ffb?s=96&d=retro&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/c0787be58ea7e470b1a6f5ea8ce367c7913809648a00e0c15faace5220902ffb?s=96&d=retro&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/c0787be58ea7e470b1a6f5ea8ce367c7913809648a00e0c15faace5220902ffb?s=96&d=retro&r=g\",\"caption\":\"snowffox\"},\"url\":\"https:\/\/blog.boxcorea.com\/wp\/archives\/author\/admin\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Ubuntu \ub9ac\ub205\uc2a4\uc5d0 TACACS+ \uc778\uc99d\uc11c\ubc84 \uc124\uce58\ud558\uace0 \uc2dc\uc2a4\ucf54 \uc2a4\uc704\uce58\uc5d0 \uc801\uc6a9\ud558\uae30 - Blog-boxcorea","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.boxcorea.com\/wp\/archives\/2591","og_locale":"ko_KR","og_type":"article","og_title":"Ubuntu \ub9ac\ub205\uc2a4\uc5d0 TACACS+ \uc778\uc99d\uc11c\ubc84 \uc124\uce58\ud558\uace0 \uc2dc\uc2a4\ucf54 \uc2a4\uc704\uce58\uc5d0 \uc801\uc6a9\ud558\uae30 - Blog-boxcorea","og_description":"\uc6b0\ubd84\ud22c \ub9ac\ub205\uc2a4\uc5d0 TACACS+ \uc778\uc99d\uc11c\ubc84 \uc124\uce58\ud558\uae30 \uc124\uce58\ud658\uacbd: TACACS+ \uc124\uce58 : ubuntu 18.04, ip address: 192.168.0.6 Cisco switch: C3550, ip address: 192.168.0.200 1. \uc791\uc5c5 \ud658\uacbd \ud655\uc778 \ubc0f tacacs plus \uc124\uce58 \ub9ac\ub205\uc2a4 \ubc84\uc804 \ud655\uc778 $ lsb_release -a No LSB modules are available. Distributor ID: Ubuntu Description: Ubuntu 18.04.1 LTS Release: 18.04 Codename: bionic TACACS+ \uc124\uce58 $ sudo apt-get &hellip; Continue reading","og_url":"https:\/\/blog.boxcorea.com\/wp\/archives\/2591","og_site_name":"Blog-boxcorea","article_published_time":"2019-05-31T22:00:41+00:00","article_modified_time":"2019-06-13T13:03:39+00:00","author":"snowffox","twitter_card":"summary_large_image","twitter_misc":{"Written by":"snowffox","Est. reading time":"8\ubd84"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.boxcorea.com\/wp\/archives\/2591#article","isPartOf":{"@id":"https:\/\/blog.boxcorea.com\/wp\/archives\/2591"},"author":{"name":"snowffox","@id":"https:\/\/blog.boxcorea.com\/wp\/#\/schema\/person\/6d8e12df2429d663a0a4e8362fbb650a"},"headline":"Ubuntu \ub9ac\ub205\uc2a4\uc5d0 TACACS+ \uc778\uc99d\uc11c\ubc84 \uc124\uce58\ud558\uace0 \uc2dc\uc2a4\ucf54 \uc2a4\uc704\uce58\uc5d0 \uc801\uc6a9\ud558\uae30","datePublished":"2019-05-31T22:00:41+00:00","dateModified":"2019-06-13T13:03:39+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.boxcorea.com\/wp\/archives\/2591"},"wordCount":113,"commentCount":2,"keywords":["cisco tacacs+","TACACS+","Ubuntu TACACS+","\uc2dc\uc2a4\ucf54 TACACS+","\uc778\uc99d\uc11c\ubc84"],"articleSection":["Linux(\ub9ac\ub205\uc2a4)","Network(\ub124\ud2b8\uc6cc\ud06c)"],"inLanguage":"ko-KR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/blog.boxcorea.com\/wp\/archives\/2591#respond"]}]},{"@type":"WebPage","@id":"https:\/\/blog.boxcorea.com\/wp\/archives\/2591","url":"https:\/\/blog.boxcorea.com\/wp\/archives\/2591","name":"Ubuntu \ub9ac\ub205\uc2a4\uc5d0 TACACS+ \uc778\uc99d\uc11c\ubc84 \uc124\uce58\ud558\uace0 \uc2dc\uc2a4\ucf54 \uc2a4\uc704\uce58\uc5d0 \uc801\uc6a9\ud558\uae30 - Blog-boxcorea","isPartOf":{"@id":"https:\/\/blog.boxcorea.com\/wp\/#website"},"datePublished":"2019-05-31T22:00:41+00:00","dateModified":"2019-06-13T13:03:39+00:00","author":{"@id":"https:\/\/blog.boxcorea.com\/wp\/#\/schema\/person\/6d8e12df2429d663a0a4e8362fbb650a"},"breadcrumb":{"@id":"https:\/\/blog.boxcorea.com\/wp\/archives\/2591#breadcrumb"},"inLanguage":"ko-KR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.boxcorea.com\/wp\/archives\/2591"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/blog.boxcorea.com\/wp\/archives\/2591#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blog.boxcorea.com\/wp"},{"@type":"ListItem","position":2,"name":"Ubuntu \ub9ac\ub205\uc2a4\uc5d0 TACACS+ \uc778\uc99d\uc11c\ubc84 \uc124\uce58\ud558\uace0 \uc2dc\uc2a4\ucf54 \uc2a4\uc704\uce58\uc5d0 \uc801\uc6a9\ud558\uae30"}]},{"@type":"WebSite","@id":"https:\/\/blog.boxcorea.com\/wp\/#website","url":"https:\/\/blog.boxcorea.com\/wp\/","name":"Blog-boxcorea","description":"Simple is Beautiful!","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.boxcorea.com\/wp\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ko-KR"},{"@type":"Person","@id":"https:\/\/blog.boxcorea.com\/wp\/#\/schema\/person\/6d8e12df2429d663a0a4e8362fbb650a","name":"snowffox","image":{"@type":"ImageObject","inLanguage":"ko-KR","@id":"https:\/\/secure.gravatar.com\/avatar\/c0787be58ea7e470b1a6f5ea8ce367c7913809648a00e0c15faace5220902ffb?s=96&d=retro&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/c0787be58ea7e470b1a6f5ea8ce367c7913809648a00e0c15faace5220902ffb?s=96&d=retro&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c0787be58ea7e470b1a6f5ea8ce367c7913809648a00e0c15faace5220902ffb?s=96&d=retro&r=g","caption":"snowffox"},"url":"https:\/\/blog.boxcorea.com\/wp\/archives\/author\/admin"}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4wGXL-FN","jetpack_likes_enabled":true,"jetpack-related-posts":[],"_links":{"self":[{"href":"https:\/\/blog.boxcorea.com\/wp\/wp-json\/wp\/v2\/posts\/2591","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.boxcorea.com\/wp\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.boxcorea.com\/wp\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.boxcorea.com\/wp\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.boxcorea.com\/wp\/wp-json\/wp\/v2\/comments?post=2591"}],"version-history":[{"count":3,"href":"https:\/\/blog.boxcorea.com\/wp\/wp-json\/wp\/v2\/posts\/2591\/revisions"}],"predecessor-version":[{"id":2603,"href":"https:\/\/blog.boxcorea.com\/wp\/wp-json\/wp\/v2\/posts\/2591\/revisions\/2603"}],"wp:attachment":[{"href":"https:\/\/blog.boxcorea.com\/wp\/wp-json\/wp\/v2\/media?parent=2591"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.boxcorea.com\/wp\/wp-json\/wp\/v2\/categories?post=2591"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.boxcorea.com\/wp\/wp-json\/wp\/v2\/tags?post=2591"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}