Solved

TACACS RADIUS - Wireless AP's

Posted on 2006-11-03
2
414 Views
Last Modified: 2007-02-12
I need to set up TACACS for wireless using CiscoSecure ACS v.2.3.  Is this possible?  I keep seeing guides for 3.0 and above but not 2.3.  It's about $4000.00 for an upgrade for the ACS.  Also, I could use Radius on Windows 2000 but I'm not sure if the clients need to be 2000 or above.  Some of mine are actually Win98.  This is a fairly large change as we have about 38 of these units around the country that will be authenticating here.  Any help you can give will be much appreciated.

My superiors want to use MAC and user authentication.  I dont care for the MAC but...  some of our wireless units are forklifts and maynot be able to be given usernames (I still have to check into that).
0
Comment
Question by:chiefcrazythumb
2 Comments
 
LVL 6

Accepted Solution

by:
bmedward earned 500 total points
ID: 17878882
According to the user's guide at http://cisco.com/en/US/products/sw/secursw/ps2086/products_user_guide_book09186a008007cd2b.html 
This ACS should handle TACACS+ as well as RADIUS.

While not directly related to your question, it seems a bit misguided to be implementing a security infrastructure when you have clients running Win '98.

The wireless cards on your forklift's computer will determine what kind of security they support.  Newer radios will have no problems with many variations of WAP, and WAP2.  Older radios will simply not support the latest security.
0

Featured Post

Migrating Your Company's PCs

To keep pace with competitors, businesses must keep employees productive, and that means providing them with the latest technology. This document provides the tips and tricks you need to help you migrate an outdated PC fleet to new desktops, laptops, and tablets.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Gmail Account risks 4 91
Using Outlook for iOS securely 2 45
Protecting a SKY 4.0 (Android) devise 15 130
Create users share on file server 2 44
Examines three attack vectors, specifically, the different types of malware used in malicious attacks, web application attacks, and finally, network based attacks.  Concludes by examining the means of securing and protecting critical systems and inf…
Data breaches are on the rise, and companies are preparing by boosting their cybersecurity budgets. According to the Cybersecurity Market Report (http://www.cybersecurityventures.com/cybersecurity-market-report), worldwide spending on cybersecurity …
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

832 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question