Solved

ACS 4.1 and ASA 5510 Firewall.

Posted on 2009-05-20
3
663 Views
Last Modified: 2012-05-07
Does anyone know if ACS4.1 can work with ASA5510 with TACACS+ authentication or I have to use RADIUS? Please also provide  me some steps or link on how to go about it if possible.
0
Comment
Question by:oliverwari
  • 2
3 Comments
 
LVL 33

Accepted Solution

by:
MikeKane earned 500 total points
ID: 24432453
Well, I don't have specific knowledge on that version...  but the ASA will certainly work with TACACS+ for authentication.    

Here are links showing the configuration examples on the ASA with TACACS+, hopefully it will get you going...

http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_configuration_example09186a008046f307.shtml
http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_configuration_example09186a00807349e7.shtml
http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_tech_note09186a00800949d6.shtml#csnt-tacacs

0
 

Author Comment

by:oliverwari
ID: 24433496
What I am trying to do is configure such that the ASA administrator should be logging into the device via the ACS 4.1 server.   The ASA device is reporting an AAA decode failure....server secret mismatch.
0
 
LVL 33

Assisted Solution

by:MikeKane
MikeKane earned 500 total points
ID: 24433560
TACACS (as well as radius) use a key to provide the encryption between the server and clients.     If the keys don't match, you might see an error like this.  


Here's another excellent paper that's worth a read:
http://www.sans.org/reading_room/whitepapers/networkdevs/understanding_and_implementing_tacacs_117
0

Featured Post

VMware Disaster Recovery and Data Protection

In this expert guide, you’ll learn about the components of a Modern Data Center. You will use cases for the value-added capabilities of Veeam®, including combining backup and replication for VMware disaster recovery and using replication for data center migration.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

In every aspect, security is essential for your business, and for that matter you need to always keep an eye on it. The same can be said about your computer network system too. Your computer network is prone to various malware and security threats t…
BIND is the most widely used Name Server. A Name Server is the one that translates a site name to it's IP address. There is a new bug in BIND (https://kb.isc.org/article/AA-01272), affecting all versions of BIND 9 from BIND 9.1.0 (inclusive) thro…
As a trusted technology advisor to your customers you are likely getting the daily question of, ‘should I put this in the cloud?’ As customer demands for cloud services increases, companies will see a shift from traditional buying patterns to new…
Both in life and business – not all partnerships are created equal. Spend 30 short minutes with us to learn:   • Key questions to ask when considering a partnership to accelerate your business into the cloud • Pitfalls and mistakes other partners…

863 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

28 Experts available now in Live!

Get 1:1 Help Now