Using linux NBD module to change GNS3 appliance default output method

Some GNS3 appliance images are not configured to use the ttyS0 as the default output method, VNC and graphical are the only access methods available. Even after the appliance once booted in the GNS3 network topology, there hardly a way to change the boot optioons of its underlaying operating system. Nowadays in the year 2023, the underlaying OS is mostly linux. Linux is cheap, available and has everything on board needed for advanced IP networking.

Now, using linux NBD network block device it is possible to mount partitions and alter files without the necessity to boot the underlaying operating system.

This is how to re-configure a existing and shipped QEMU image, and add the ttyS0 serial output as the default output method.

The example QEMU image used in this article is a Huawei USG6000V1 virtual firewall appliance. The name of its QEMU image is hda.qcow2.

Preparation tasks

Verify the filesize and md5sum of the used image before changing anything. This will get important later.

user@host ~ % ls -lah hda.qcow2
-rw-r--r-- 1 user user 670M Feb 29  2016 hda.qcow2

user@host /tmp % md5sum hda.qcow2
270540eef614462a79ce1257e2c28238  hda.qcow2

read more

TAC PLUS-NG-Configuring basic authentication

This article is about the TAC_PLUS-NG server software. A free server implementation for the TACACS+ protocol. Availble for linux, and BSD/UNIX operating systems. Author is Marc Huber.

The TAC_PLUS-NG server server is ran using a simple configuration (for authenticacion only), and uses system availble cryptographic libraries:

  • Blowfish
  • SHA-512
  • SHA-256
  • MD5
  • 3DES

Without the need for installation and configuration of additional cryptographic software, libraries, or any other software dependencies. It is achived using configuration options available in TAC_PLUS-NG and the standard OS options.

There are 2 existing open-source TACACS+ protocol server implementations available:

The Pro-Bono-Publico software offers 2 different TAC_PLUS daemon implementations out of the box. Mentioning this since perhaps while reading the documentation for the first time, it is easy overlooked and leads to confusion while working on TACACS+. No matter which implementation is used.

According to the manual official documentation, TAC_PLUS-NG is the more advanced of both implementations. Meaning, more features, and more recent code. TAC_PLUS implementation has been deprecated in favour of TAC_PLUS-NG.

📘 Note
Do NOT use TAC_PLUS for new installations. TAC_PLUS has been deprecated

Brief overview over the actual state of the TACACS+ protocol and its recent 25 years of history:

The TACACS+ protocol has never really been officially published and standardised. But it is the de facto standard for handling AAA requests from networking equipment. If you are interested in sound engineering, there is something very similar to the TACACS+ protocol. The Yamaha NS-10 speakers, black box with white membrane. These speakers, NS-10, are the de facto standard near-field speakers for professional audio editing engineering sound-mixing too.

The RFC8907 states, that the TACACS+ protocol has been widely deployed based mainly on a simple DRAFT document only. That TACACS+ draft document here is from 1997 called THE_DRAFT. It has never been officially "released". In September 2020 the first, real informational RFC appeared has been published. This literally means, all implementations out there are written based on a DRAFT only document.

click for more

Configuring PAP-CHAP authentication on TACACS+NG for AOS-CX

Configuring TACACS+ PAP/CHAP authentication for the Aruba AOS-CX platform.

The documentation about this topic is hard to find. Much from HP(E), some ArubaOS, then AOS-CX versions configuration are described. Aruba has its own TACACS+ server product, called Clearpass, which probably uses RADIUS and TACACS+. It is not easy to find working configuration examples for the Aruba devices and additional TACACS+NG example setups, that are working.

AOS-CX uses PPP PAP/CHAP authentication method. Aruba community users reporting the issues with TACACS-GUI. TACACS-GUI uses TAC_PLUS implementation from Pro-Bono-Publico. The follow up user reports similar issue using Aruba's Clearpass.

TL;DR;

ARUBA CX SImulator Tacacs Integration doesn't Work ... From the TACACS GUI LOG, PAP Authentication has been successful but access to the switch is still denied, as folows: ... Did I miss something? Thank you very much for the help.

Sincerely,Gibs

This thread quesiton is still open.

This is about Authentication only. The Authorisation and Accounting parts are easy to setup once the Authentication part works. Read the official documentation of the used software.

Router

AOS-CX version used in this netlab:

RS105#show ver

ArubaOS-CX (c) Copyright Hewlett Packard Enterprise Development LP  ------------------------------------------------------------------ Version : Virtual.10.07.0004 Build ID : ArubaOS-CX:Virtual.10.07.0004 Build SHA : 6d2cadb8b3acdc132b345544abfa023a9989d39e Active Image : _ Service OS Version : BIOS Version :

click for more

Configuring TACACS+NG authentication for VRP

TACACS+ configuration using Huawei's (VRP) OS. This is about configuring authentication using the TACACS+ protocol. Authorization and Accounting are easy to set up once Authentication is working, but are not part of this netlab.

This is a configuration from scratch. VRP usage for the first time, no experience at all. TACACS+ VRP authentication.

IP addressing

The IP addressing used in this netlab. 3 appliances:

Node Function IP address
R102 VRP router 10.100.100.102/24
AAA-49 TACACS+ server 192.0.2.1
node-10 TACACS+ client 10.100.100.10

Testing authentication is done from the node-10 to the router R102 using telnet protocol.

TACACS+

This netlab is using the TAC_PLUS-NG server project from Event-driven servers.

Version of TACACS+NG used in this netlab:

user % tac_plus-ng -v tac_plus-ng version f4325f4dfa8b12e9a419af0eee909f2cf13a9c4e/PCRE2

TACACS+ server IP settings:

Setting Value
IP 192.0.2.1
TCP port 4949
TACACS+ key 123-my_tacacs_key

Preconfigured tac_plus-ng.cfg settings for user authentication:

Method Option User Password
ASCII login cisco cisco
PAP pap cisco auth-pap
CHAP chap cisco auth-chap

The basic TACACS+NG configuration used in this netlab, has been explained in previous netlabs, read:

click for more

Configuring TACACS+NG authentication for freeRtr

TACACS+ configuration using freeRtr. This is about configuring authentication using the TACACS+ protocol. Authorization and Accounting are easy to set up once Authentication is working, but are not part of this netlab.

This is a configuration from scratch. freeRtr usage for the first time, no experience at all. TACACS+ freeRtr authentication.

The official freeRtr appliance is available here, or can be simply installed using the GNS3 marketplace or the GNS-gui import appliance function.

IP addressing

The IP addressing used in this netlab. 3 appliances:

Node Function IP address
R104 freeRtr router 10.100.100.104/24
AAA-49 TACACS+ daemon 192.0.2.1
node-10 TACACS+ client 10.100.100.10

Connections in the netlab from node-10 to R104 using telnet client.

TACACS+

This netlab is using the TAC_PLUS-NG server project from Event-driven servers.

Version of TACACS+NG:

user % tac_plus-ng -v tac_plus-ng version f4325f4dfa8b12e9a419af0eee909f2cf13a9c4e/PCRE2

TACACS daemon IP settings, this time the TACACS+ daemon is running on standard port 49. The reason behind is simple. The tac_plus client implemented on freeRtr has no AAA daemon TCP port configuration option, to test authentication the daemon runs on standard TCP port 49.

Setting Value
IP 192.0.2.1
TCP port 49
TACACS+ key 123-my_tacacs_key

Preconfigured tac_plus-ng.cfg settings for user authentication:

Method Option User Password
ASCII login cisco cisco
PAP pap cisco auth-pap
CHAP chap cisco auth-chap

The basic TACACS+NG configuration used in this example, has been explained in previous netlabs. For more details about the configuration read following articles:

click for more