Solved

ACS 4.1 and ASA 5510 Firewall.

Posted on 2009-05-20
3
662 Views
Last Modified: 2012-05-07
Does anyone know if ACS4.1 can work with ASA5510 with TACACS+ authentication or I have to use RADIUS? Please also provide  me some steps or link on how to go about it if possible.
0
Comment
Question by:oliverwari
  • 2
3 Comments
 
LVL 33

Accepted Solution

by:
MikeKane earned 500 total points
Comment Utility
Well, I don't have specific knowledge on that version...  but the ASA will certainly work with TACACS+ for authentication.    

Here are links showing the configuration examples on the ASA with TACACS+, hopefully it will get you going...

http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_configuration_example09186a008046f307.shtml
http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_configuration_example09186a00807349e7.shtml
http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_tech_note09186a00800949d6.shtml#csnt-tacacs

0
 

Author Comment

by:oliverwari
Comment Utility
What I am trying to do is configure such that the ASA administrator should be logging into the device via the ACS 4.1 server.   The ASA device is reporting an AAA decode failure....server secret mismatch.
0
 
LVL 33

Assisted Solution

by:MikeKane
MikeKane earned 500 total points
Comment Utility
TACACS (as well as radius) use a key to provide the encryption between the server and clients.     If the keys don't match, you might see an error like this.  


Here's another excellent paper that's worth a read:
http://www.sans.org/reading_room/whitepapers/networkdevs/understanding_and_implementing_tacacs_117
0

Featured Post

How your wiki can always stay up-to-date

Quip doubles as a “living” wiki and a project management tool that evolves with your organization. As you finish projects in Quip, the work remains, easily accessible to all team members, new and old.
- Increase transparency
- Onboard new hires faster
- Access from mobile/offline

Join & Write a Comment

Read about achieving the basic levels of HRIS security in the workplace.
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
Access reports are powerful and flexible. Learn how to create a query and then a grouped report using the wizard. Modify the report design after the wizard is done to make it look better. There will be another video to explain how to put the final p…
This tutorial demonstrates a quick way of adding group price to multiple Magento products.

772 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

13 Experts available now in Live!

Get 1:1 Help Now