<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: TACACS+ RBA on GAiA in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TACACS-RBA-on-GAiA/m-p/82465#M6366</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;Jean-Christoph used tacacsgui which is using tac_plus distribution by&amp;nbsp;&lt;A href="http://www.pro-bono-publico.de/projects/tac_plus.html" target="_blank"&gt;http://www.pro-bono-publico.de/projects/tac_plus.html&lt;/A&gt;.&lt;/P&gt;&lt;P&gt;Using local users as described by Jean-Christoph is working.&lt;/P&gt;&lt;P&gt;But in case you will use MAVIS module to connect to LDAP user backend, the privilege level escalation will accidently work for all users with default settings.&lt;/P&gt;&lt;P&gt;The reason is, that in case of TACACS, checkpoint is not using the real authorization (sending the name of role for the user by AV pair). The authorization is working only with RADIUS. It is confusing, because TACACS was originally developed for that purpose. In oppose, RADIUS was originally developed for remote user dial-in authentication like RA VPN, WiFi etc.&lt;/P&gt;&lt;P&gt;Solution, in case of tacacsgui is to disable the option "enable password as login" in Mavis module -&amp;gt;&amp;nbsp; Mavis LDAP and for user who needs for example access escalation to enable 7 use manual settings on user-group in tacacsgui bellow:&lt;/P&gt;&lt;P&gt;enable 7 =login&lt;/P&gt;&lt;P&gt;enable 15=deny&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;For user, who need access escalation to enable 15, just use manual settings on user-group in tacacs gui like:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;enable 15=login&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have setted up several technologies with tacacsgui like Aruba Instant, Aruba Airwave, ArubaOS, Cisco, FortiOS, OneAccess, Linksys... All of them supports the true TACACS autorization. Checkpoint NOT - WTF?!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The other thing which is not properly done in GAIA is the fact, that in case the user has no service in TACACS defined like:&lt;/P&gt;&lt;P&gt;service = shell {&lt;/P&gt;&lt;P&gt;&amp;nbsp; ....&lt;/P&gt;&lt;P&gt;}&lt;/P&gt;&lt;P&gt;The user is allowed to log in!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Tomas&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 20 Apr 2020 11:47:41 GMT</pubDate>
    <dc:creator>nohejlt</dc:creator>
    <dc:date>2020-04-20T11:47:41Z</dc:date>
    <item>
      <title>TACACS+ RBA on GAiA</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TACACS-RBA-on-GAiA/m-p/28005#M2196</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I have been researching about how TACACS+ works on GAiA for the past 4 to 5 hours and I have come to a conclusion that either I am confused or my understanding was wrong all these years.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a setup with few CP firewalls trying to authenticate using TACACS+ running on ACS 5.X. The configuration is fine on both devices, in fact I am able to authenticate to the boxes as well. If I need to escalate my privilege, i am supposed to be using tacacs_enable TACP-N (15 in my case). Then I have RBA roles configuration related to TACP-15 on the Checkpoint firewalls which allows me to perform certain actions.&lt;/P&gt;&lt;P&gt;Here comes my million dollar doubt, In a typical environment we might have read-only and read-write user on ACS/external authentication server. R77.X documentation about TACACS+ highlights the following statement "&lt;EM&gt;Gaia supports TACACS+ for authentication only. Challenge-response authentication, such as S/Key, is not supported&lt;/EM&gt;."&lt;/P&gt;&lt;P&gt;So in a scenario where a read-only User according to my ACS authenticates to Checkpoint and uses TACP-15 with his enable password he/she gets complete privilege. Logically speaking just beats the purpose of access control, unless my understanding here is wrong.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In addition to this, R77.X guide also says the following - "&lt;EM&gt;When a non-local user logs in to Gaia, the TACACS server authenticates the user and assigns the permissions to the user. You must configure the TACACS server to correctly authenticate and authorize non-local Gaia users."&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;These statements are contradicting in its own way unless there are attributes which can used on ACS which can control the Authorization as well.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 19 Sep 2018 13:10:36 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TACACS-RBA-on-GAiA/m-p/28005#M2196</guid>
      <dc:creator>Udupi_krishna</dc:creator>
      <dc:date>2018-09-19T13:10:36Z</dc:date>
    </item>
    <item>
      <title>Re: TACACS+ RBA on GAiA</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TACACS-RBA-on-GAiA/m-p/28006#M2197</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;For the authorization you use the&amp;nbsp;&lt;SPAN style="color: #333333; background-color: #ffffff;"&gt;TACP-N&lt;SPAN&gt;&amp;nbsp;key you create a RBA role:&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #333333; background-color: #ffffff;"&gt;&lt;SPAN&gt;add rba role TACP-15 domain-type System all-features&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #333333; background-color: #ffffff;"&gt;&lt;SPAN&gt;now with the following command you can remove specific commands from the list of available commands, using the tab key you will see the full list of options:&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #333333; background-color: #ffffff;"&gt;&lt;SPAN&gt;delete rba role TACP-0 readwrite-features &amp;lt;features to be removed&amp;gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #333333; background-color: #ffffff;"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #333333; background-color: #ffffff;"&gt;&lt;SPAN&gt;You can create multiple TACP-N RBA roles with different functionality, but I don't think you will be able to elevate yourself from one rba role to anther, there is no enable option.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 19 Sep 2018 20:51:30 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TACACS-RBA-on-GAiA/m-p/28006#M2197</guid>
      <dc:creator>Maarten_Sjouw</dc:creator>
      <dc:date>2018-09-19T20:51:30Z</dc:date>
    </item>
    <item>
      <title>Re: TACACS+ RBA on GAiA</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TACACS-RBA-on-GAiA/m-p/28007#M2198</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The R77.X documentation confirms that all TACACS users are by default in TACP-0. So if I am executing tacacs_enable TACP-15 the user is indeed jumping from 0 to 15.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now my question is from the perspective of how read-write and read-only authorization can be controlled from TACACS server if it's only possible. For e.g., I have few Palo Alto firewalls where I use attribute values of auth profiles setup on the firewalls in TACACS to ensure read-only users in TACACS cannot have any additional privilege.&lt;/P&gt;&lt;P&gt;But in case of a Checkpoint firewall, if a read-only based user access firewall, he/she can just go into TACP-15 because there aren't any such attribute values which is setup on TACACS server.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 24 Sep 2018 16:16:37 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TACACS-RBA-on-GAiA/m-p/28007#M2198</guid>
      <dc:creator>Udupi_krishna</dc:creator>
      <dc:date>2018-09-24T16:16:37Z</dc:date>
    </item>
    <item>
      <title>Re: TACACS+ RBA on GAiA</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TACACS-RBA-on-GAiA/m-p/28008#M2199</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You will have to create a RBA role for TACP-15 as well and remove the features you don't want a user to have in that role.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 24 Sep 2018 21:08:55 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TACACS-RBA-on-GAiA/m-p/28008#M2199</guid>
      <dc:creator>Maarten_Sjouw</dc:creator>
      <dc:date>2018-09-24T21:08:55Z</dc:date>
    </item>
    <item>
      <title>Re: TACACS+ RBA on GAiA</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TACACS-RBA-on-GAiA/m-p/49543#M3694</link>
      <description>&lt;P&gt;Sorry about the late reply, been away for a while.&amp;nbsp;&lt;/P&gt;&lt;P&gt;After going through couple of other posts and documentation, understand that I cannot use TACACS+ to run central authorization for non-local users which is what I was trying to acheive. It supports only authentication since there are no such VSAs supported by Checkpoint to map a RBA role.&lt;/P&gt;&lt;P&gt;In a way the above limitation beats the purpose of using TACACS.&lt;/P&gt;&lt;P&gt;On the other hand RADIUS does support central authorization for non-local users.&lt;/P&gt;</description>
      <pubDate>Tue, 02 Apr 2019 08:15:42 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TACACS-RBA-on-GAiA/m-p/49543#M3694</guid>
      <dc:creator>Udupi_krishna</dc:creator>
      <dc:date>2019-04-02T08:15:42Z</dc:date>
    </item>
    <item>
      <title>Re: TACACS+ RBA on GAiA</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TACACS-RBA-on-GAiA/m-p/55221#M4167</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Answer is a little bit late, but anyway, TACACS+ with Gaia support Authentication &amp;amp; Authorization.&lt;/P&gt;&lt;P&gt;Gaia uses shell/exec service and read for priv-lvl value to authorize user.&lt;/P&gt;&lt;P&gt;Basically, this configuration allow users to enable to level 15:&lt;/P&gt;&lt;PRE&gt;user = jcvaliere {
    login = mavis # LDAP
    pap = login # Clone login
    enable = login # Clone login
    default service = permit
    ###Service AdminAuthorizationSVC START###
###MANUAL CONFIGURATION START###
    service = shell {
        default command = permit
        default attribute = permit
        set priv-lvl = 15
        set shell:roles = "\"network-admin\""
    }
    service = ciscowlc {
        set role1 = ALL
    }
    service = ppp {
        protocol = ip { }
        set F5-LTM-User-Info-1 = NetworkAdmin
        set F5-LTM-User-Console = 1
        set F5-LTM-User-Role = 0
        set F5-LTM-User-Partition = all
    }
    service = fmg {
    }
    service = fortigate {
        set memberof = TacacsNetworkAdminGroup
        set admin_prof = super_admin
    }
    opap = login
###MANUAL CONFIGURATION END###
    ###Service AdminAuthorizationSVC END###
  } #END OF jcvaliere&lt;/PRE&gt;&lt;P&gt;&amp;nbsp;While, this configuration allow users to enable to leve 7:&lt;/P&gt;&lt;PRE&gt;  user = izanine {
    login = mavis # LDAP
    pap = login # Clone login
    enable = login # Clone login
    default service = permit
    ###Service OperatorAuthorizationSVC START###
###MANUAL CONFIGURATION START###
    enable = deny
    service = shell {
        default command = permit
        default attribute = permit
        set priv-lvl = 7
        set shell:roles = "\"network-operator\""
        cmd = show {
            permit .*
        }
        cmd = configure {
            deny .*
        }
    }
    service = ciscowlc {
        set role1 = WLAN
        set role2 = WIRELESS
    }
    service = ppp {
        protocol = ip { }
        set F5-LTM-User-Info-1 = NetworkOperator
        set F5-LTM-User-Console = 0
        set F5-LTM-User-Role = 400
        set F5-LTM-User-Partition = all
    }
    service = fmg {
    }
    service = fortigate {
        set memberof = TacacsNetworkOperatorGroup
        set admin_prof = read_only
    }
    opap = login
###MANUAL CONFIGURATION END###
    ###Service OperatorAuthorizationSVC END###
  } #END OF izanine&lt;/PRE&gt;&lt;P&gt;Below is the result:&lt;/P&gt;&lt;P&gt;Users with priv-lvl = 15:&lt;/P&gt;&lt;TABLE border="1"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;&lt;P&gt;&lt;FONT face="courier new,courier" size="2"&gt;login as: jcvaliere&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;This system is for authorized use only.&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;jcvaliere@172.16.68.4's password:&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;Last login: Thu Jun 6 16:51:43 2019 from valiere.bcp-bank.com&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;CLINFR0771 Config lock is owned by admin. Use the command 'lock database override' to acquire the lock.&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;FONCPFW02:TACP-0&amp;gt; tac&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;FONCPFW02:TACP-0&amp;gt; tacacs_enable&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT face="courier new,courier" size="2"&gt;TACP-0 TACP-7 TACP-15&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;FONCPFW02:TACP-0&amp;gt; tacacs_enable TACP-15&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;CLINFR0519 Configuration lock present. Can not execute this command. To acquire the lock use the command 'lock database override'.&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;FONCPFW02:TACP-0&amp;gt; lock database override&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;FONCPFW02:TACP-0&amp;gt; tacacs_enable TACP-15&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;Enable password:&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;CLINFR0771 Config lock is owned by admin. Use the command 'lock database override' to acquire the lock.&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;FONCPFW02:TACP-15&amp;gt;&lt;/FONT&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Users with priv-lvl = 7:&lt;/P&gt;&lt;TABLE border="1"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;&lt;P&gt;&lt;FONT face="courier new,courier" size="3"&gt;login as: izanine&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="3"&gt;This system is for authorized use only.&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="3"&gt;izanine@172.16.68.4's password:&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="3"&gt;Last login: Thu Jun 6 16:36:02 2019 from valiere.bcp-bank.com&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="3"&gt;FONCPFW02:TACP-0&amp;gt; tacacs&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="3"&gt;FONCPFW02:TACP-0&amp;gt; tacacs_enable&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT face="courier new,courier" size="3"&gt;TACP-0 TACP-7 TACP-15&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="3"&gt;FONCPFW02:TACP-0&amp;gt; tacacs_enable TACP-15&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="3"&gt;Enable password:&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="3"&gt;Authentication failure: check your username and password&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="3"&gt;FONCPFW02:TACP-0&amp;gt; tacacs_enable TACP-7&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="3"&gt;Enable password:&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="3"&gt;CLINFR0771 Config lock is owned by admin. Use the command 'lock database override' to acquire the lock.&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="3"&gt;FONCPFW02:TACP-7&amp;gt;&lt;/FONT&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Cheers,&lt;/P&gt;&lt;P&gt;Jean-Christophe&lt;/P&gt;</description>
      <pubDate>Thu, 06 Jun 2019 15:00:02 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TACACS-RBA-on-GAiA/m-p/55221#M4167</guid>
      <dc:creator>Jean-Christoph1</dc:creator>
      <dc:date>2019-06-06T15:00:02Z</dc:date>
    </item>
    <item>
      <title>Re: TACACS+ RBA on GAiA</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TACACS-RBA-on-GAiA/m-p/81304#M6292</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I am trying to implement TACACS for authentication and I configured TACACS+ group and authorization rule the same way as &lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/17415"&gt;@Jean-Christoph1&lt;/a&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT face="terminal,monaco"&gt;group = 1_test_orlich {&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="terminal,monaco"&gt;#### LDAP Groups List #### DistinguishedName ###&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="terminal,monaco"&gt;### cn=tg_orlich_test,cn=groups,cn=compat,dc=tg,dc=cz,dc=net ###&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="terminal,monaco"&gt;default service = permit&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="terminal,monaco"&gt;###Service checkpoint_shell_ro START###&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="terminal,monaco"&gt;###MANUAL CONFIGURATION START###&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="terminal,monaco"&gt;enable = deny&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="terminal,monaco"&gt;service = shell {&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="terminal,monaco"&gt;default command = permit&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="terminal,monaco"&gt;default attribute = permit&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="terminal,monaco"&gt;set priv-lvl = 7&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="terminal,monaco"&gt;set shell:roles = "\"network-operator\""&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="terminal,monaco"&gt;cmd = show {&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="terminal,monaco"&gt;permit .*&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="terminal,monaco"&gt;}&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="terminal,monaco"&gt;cmd = configure {&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="terminal,monaco"&gt;deny .*&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="terminal,monaco"&gt;}&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="terminal,monaco"&gt;}&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="terminal,monaco"&gt;###MANUAL CONFIGURATION END###&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="terminal,monaco"&gt;###Service checkpoint_shell_ro END###&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="terminal,monaco"&gt;} #END OF 1_test_orlich&lt;/FONT&gt;&lt;BR /&gt;&lt;BR /&gt;-----------------------------------------------------------------------&lt;BR /&gt;However, I am able to log into elevated level - TACP-15.&lt;/P&gt;&lt;P&gt;Using username "orlich".&lt;BR /&gt;Pre-authentication banner message from server:&lt;BR /&gt;| This system is for authorized use only!&lt;BR /&gt;End of banner message from server&lt;BR /&gt;Last login: Wed Apr 8 11:28:14 2020 from 193.86.28.225&lt;BR /&gt;Welcome and be careful.&lt;BR /&gt;CP-FW01:TACP-0&amp;gt; tacacs_enable TACP-15&lt;BR /&gt;Enable password:&lt;BR /&gt;Authentication failure: check your username and password&lt;BR /&gt;CP-FW01:TACP-0&amp;gt; tacacs_enable TACP-15&lt;BR /&gt;Enable password:&lt;BR /&gt;CLINFR0771 Config lock is owned by admin. Use the command 'lock database override' to acquire the lock.&lt;/P&gt;&lt;P&gt;CP-FW01:TACP-15&amp;gt; show rba role&lt;/P&gt;&lt;P&gt;NOC TACP-0 TACP-7 TACP-15 adminRole cloningAdminRole monitorRole&lt;BR /&gt;CP-FW01:TACP-15&amp;gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;---------------&lt;BR /&gt;Sometime the 1st attempt is failing, but on next one I am authenticated to TACP-15. On TACACS+ server as enable password is configured login password globally.&lt;/P&gt;&lt;P&gt;I am not sure about: set shell:roles = "\"network-operator\""&lt;/P&gt;&lt;P&gt;Is this general Checkpoint configuration or is this related to the deployment ?&lt;/P&gt;&lt;P&gt;Thank you for reply.&lt;BR /&gt;BR Martin&lt;/P&gt;</description>
      <pubDate>Wed, 08 Apr 2020 10:59:22 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TACACS-RBA-on-GAiA/m-p/81304#M6292</guid>
      <dc:creator>Martin_Orlich</dc:creator>
      <dc:date>2020-04-08T10:59:22Z</dc:date>
    </item>
    <item>
      <title>Re: TACACS+ RBA on GAiA</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TACACS-RBA-on-GAiA/m-p/82465#M6366</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;Jean-Christoph used tacacsgui which is using tac_plus distribution by&amp;nbsp;&lt;A href="http://www.pro-bono-publico.de/projects/tac_plus.html" target="_blank"&gt;http://www.pro-bono-publico.de/projects/tac_plus.html&lt;/A&gt;.&lt;/P&gt;&lt;P&gt;Using local users as described by Jean-Christoph is working.&lt;/P&gt;&lt;P&gt;But in case you will use MAVIS module to connect to LDAP user backend, the privilege level escalation will accidently work for all users with default settings.&lt;/P&gt;&lt;P&gt;The reason is, that in case of TACACS, checkpoint is not using the real authorization (sending the name of role for the user by AV pair). The authorization is working only with RADIUS. It is confusing, because TACACS was originally developed for that purpose. In oppose, RADIUS was originally developed for remote user dial-in authentication like RA VPN, WiFi etc.&lt;/P&gt;&lt;P&gt;Solution, in case of tacacsgui is to disable the option "enable password as login" in Mavis module -&amp;gt;&amp;nbsp; Mavis LDAP and for user who needs for example access escalation to enable 7 use manual settings on user-group in tacacsgui bellow:&lt;/P&gt;&lt;P&gt;enable 7 =login&lt;/P&gt;&lt;P&gt;enable 15=deny&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;For user, who need access escalation to enable 15, just use manual settings on user-group in tacacs gui like:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;enable 15=login&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have setted up several technologies with tacacsgui like Aruba Instant, Aruba Airwave, ArubaOS, Cisco, FortiOS, OneAccess, Linksys... All of them supports the true TACACS autorization. Checkpoint NOT - WTF?!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The other thing which is not properly done in GAIA is the fact, that in case the user has no service in TACACS defined like:&lt;/P&gt;&lt;P&gt;service = shell {&lt;/P&gt;&lt;P&gt;&amp;nbsp; ....&lt;/P&gt;&lt;P&gt;}&lt;/P&gt;&lt;P&gt;The user is allowed to log in!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Tomas&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 20 Apr 2020 11:47:41 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TACACS-RBA-on-GAiA/m-p/82465#M6366</guid>
      <dc:creator>nohejlt</dc:creator>
      <dc:date>2020-04-20T11:47:41Z</dc:date>
    </item>
    <item>
      <title>Re: TACACS+ RBA on GAiA</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TACACS-RBA-on-GAiA/m-p/95374#M7402</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/45112"&gt;@nohejlt&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;P&gt;The reason is, that in case of TACACS, checkpoint is not using the real authorization (sending the name of role for the user by AV pair). The authorization is working only with RADIUS.&lt;/P&gt;&lt;P&gt;....The other thing which is not properly done in GAIA is the fact, that in case the user has no service in TACACS defined like:&lt;/P&gt;&lt;P&gt;service = shell {&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;&lt;BR /&gt;Hi,&lt;/P&gt;&lt;P&gt;Did you ever raise a RFC or talked to R&amp;amp;D team ? Any 'official feedback' from CheckPoint ?&lt;/P&gt;&lt;P&gt;Could not found anything interesting or relevant in R80.40/R81ea release notes.&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;</description>
      <pubDate>Thu, 27 Aug 2020 11:33:57 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TACACS-RBA-on-GAiA/m-p/95374#M7402</guid>
      <dc:creator>S_E_</dc:creator>
      <dc:date>2020-08-27T11:33:57Z</dc:date>
    </item>
    <item>
      <title>Re: TACACS+ RBA on GAiA</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TACACS-RBA-on-GAiA/m-p/95378#M7404</link>
      <description>&lt;P&gt;Hi S_E_,&lt;/P&gt;&lt;P&gt;No, I didn't raise a RFC nor talked to R&amp;amp;D. I am not the checkpoint guy, I even don't have checkpoint account. I was involved in troubleshooting why the admin users are not properly authorized by our TACACS implementation after logging in checkpoint GUI/CLI.&lt;/P&gt;&lt;P&gt;My experience with speed of implementing new features by HW vendors is bad, mostly the effort given to describe the feature and give&amp;nbsp; arguments to justify the need of the new feature is too inacceptable for me.&amp;nbsp;&lt;/P&gt;&lt;P&gt;My opinion is, that the properly implemented TACACS authorization should be the basic and common feature especially for security product.&amp;nbsp;&lt;/P&gt;&lt;P&gt;The only purpose of my comment to this thread was to share the results of my troubleshooting.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Tomas&lt;/P&gt;</description>
      <pubDate>Thu, 27 Aug 2020 11:54:18 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TACACS-RBA-on-GAiA/m-p/95378#M7404</guid>
      <dc:creator>nohejlt</dc:creator>
      <dc:date>2020-08-27T11:54:18Z</dc:date>
    </item>
  </channel>
</rss>

