Original Publication Date: 11/10/2010
Updated Date: 07/20/2016
Topic
The TACACS+ secret key must not contain the number sign (#). If you configure a Terminal Access Controller Access-Control System Plus (TACACS+) profile for application authentication, and the TACACS+ shared key secret contains a number sign (#), authentication fails.
In addition, if you configure TACACS+ authentication to authenticate BIG-IP administrative users, and the TACACS+ shared key secret contains a number sign, authentication fails for all administrative accounts including the local root and admin accounts.
Configuring a TACACS+ shared secret that does not contain a number sign
If you configured a TACACS+ profile for application authentication, you can work around this issue by configuring a TACACS+ shared secret that does not contain a number sign. You must make this change on both the BIG-IP system and the TACACS+ server.
If you configured TACACS+ authentication for BIG-IP administrative users, and you can no longer log in to the BIG-IP system, restore access by performing one of the following two procedures:
Important: This procedure is preferred since it does not interrupt production traffic. To determine if your platform has an SCCP or AOM subsystem, refer to SOL9476: The F5 hardware/software compatibility matrix.
Reverting to local authentication using the SCCP/AOM subsystem
Note: If connecting using SSH, enter the root user name and password when prompted. If connecting using the serial console, press the L key at the SCCP or AOM command menu, then enter the root user name and password when prompted.
Note: For detailed instructions about accessing the SCCP subsystem, refer to SOL3454: Overview of the SCCP. For detailed instructions about accessing the AOM subsystem, refer to SOL9403: Overview of the AOM subsystem.
ssh host
Note: You will not be prompted for a password.
BIG-IP 11.x
tmsh modify auth source type local
BIG-IP versions prior to 11.x
bigpipe system auth source type local
BIG-IP 11.x
tmsh save sys config
BIG-IP versions prior to 11.x
bigpipe save
Reverting to local authentication by booting into single user mode
Important: The BIG-IP system will be unavailable for the duration of the following procedure. F5 recommends performing this procedure during a scheduled maintenance window.
Note: For instructions about booting in single user mode, refer to SOL4178: Booting the BIG-IP system in single-user mode.
sh-3.2#
BIG-IP 11.x
/config/bigip.conf
BIG-IP versions prior to 11.x
/config/bigip_sys.conf
BIG-IP 11.x
auth source {
type tacacs
}
BIG-IP versions prior to 11.x
system {
auth source type tacacs
}
For example:
system {
auth source type local
}
touch /service/mcpd/forceload
On VIPRION systems, you should use the following command to run this command on all blades:
clsh touch /service/mcpd/forceload
This command forces the BIG-IP system to read the files in the /config/ directory during startup.reboot
On a BIG-IP VIPRION system, repeat this command on each blade.