Want to win a PS4? Go Premium and enter to win our High-Tech Treats giveaway. Enter to Win


Cisco Secure ACS -- what protocol is used for communicating user credentials to Cisco Secure?

Posted on 2010-09-23
Medium Priority
Last Modified: 2012-05-10
I am new to an environment that uses Cisco Secure ACS appliances. Sometimes I hear it referred to as TACACS which I think means that Cisco Secure ACS is being used to authenticate user ID and password from a Cisco router using TACACS protocol. But is that protocol only used for Cisco routers? Does ACS listen for LDAP requests?

Can someone help or point me to some entry level docs on how Cisco Secure interacts with different clients sending authentication requests?

Question by:SteveJ
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
LVL 16

Accepted Solution

InteraX earned 1200 total points
ID: 33747300
ACS is a core cisco product for their security. It is as you rightly say a TACAS+ server, but is also a lot more.

Features include AAA(Authentication, Authorisation, Accounting), downloadable ACL's when authenticating users to VPN's/ethernet ports etc, is a core part of their NAC solution.

It can use an internal or external database for accounts (user or device), can integrate with RSA and a lot more.

Have you looked at the docs from the main porduct page on Cisco's website?

Config guides can be found at http://www.cisco.com/en/US/products/sw/secursw/ps2086/products_installation_and_configuration_guides_list.html

Release notes at http://www.cisco.com/en/US/products/sw/secursw/ps2086/prod_release_notes_list.html

Overview docs can be found at http://www.cisco.com/en/US/products/sw/secursw/ps2086/products_data_sheets_list.html
LVL 11

Assisted Solution

DIPRAJ earned 800 total points
ID: 33764922
try this out
LVL 11

Expert Comment

ID: 33764931
LVL 11

Expert Comment

ID: 33764936
try this
LVL 16

Author Closing Comment

ID: 33840222

Featured Post

2017 Webroot Threat Report

MSPs: Get the facts you need to protect your clients.
The 2017 Webroot Threat Report provides a uniquely insightful global view into the analysis and discoveries made by the Webroot® Threat Intelligence Platform to provide insights on key trends and risks as seen by our users.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Envision that you are chipping away at another e-business site with a team of pundit developers and designers. Everything seems, by all accounts, to be going easily.
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
Viewers will learn how to properly install and use Secure Shell (SSH) to work on projects or homework remotely. Download Secure Shell: Follow basic installation instructions: Open Secure Shell and use "Quick Connect" to enter credentials includi…
In this brief tutorial Pawel from AdRem Software explains how you can quickly find out which services are running on your network, or what are the IP addresses of servers responsible for each service. Software used is freeware NetCrunch Tools (https…
Suggested Courses

618 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question