Solved

Cisco Secure ACS -- what protocol is used for communicating user credentials to Cisco Secure?

Posted on 2010-09-23
5
692 Views
Last Modified: 2012-05-10
I am new to an environment that uses Cisco Secure ACS appliances. Sometimes I hear it referred to as TACACS which I think means that Cisco Secure ACS is being used to authenticate user ID and password from a Cisco router using TACACS protocol. But is that protocol only used for Cisco routers? Does ACS listen for LDAP requests?

Can someone help or point me to some entry level docs on how Cisco Secure interacts with different clients sending authentication requests?

Thanks
Steve
0
Comment
Question by:SteveJ
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
5 Comments
 
LVL 16

Accepted Solution

by:
InteraX earned 300 total points
ID: 33747300
ACS is a core cisco product for their security. It is as you rightly say a TACAS+ server, but is also a lot more.

Features include AAA(Authentication, Authorisation, Accounting), downloadable ACL's when authenticating users to VPN's/ethernet ports etc, is a core part of their NAC solution.

It can use an internal or external database for accounts (user or device), can integrate with RSA and a lot more.

Have you looked at the docs from the main porduct page on Cisco's website?
http://www.cisco.com/en/US/products/sw/secursw/ps2086/

Config guides can be found at http://www.cisco.com/en/US/products/sw/secursw/ps2086/products_installation_and_configuration_guides_list.html

Release notes at http://www.cisco.com/en/US/products/sw/secursw/ps2086/prod_release_notes_list.html

Overview docs can be found at http://www.cisco.com/en/US/products/sw/secursw/ps2086/products_data_sheets_list.html
0
 
LVL 11

Assisted Solution

by:DIPRAJ
DIPRAJ earned 200 total points
ID: 33764922
try this out
win40ugP.pdf
0
 
LVL 11

Expert Comment

by:DIPRAJ
ID: 33764931
0
 
LVL 11

Expert Comment

by:DIPRAJ
ID: 33764936
try this
ucp40P.pdf
0
 
LVL 16

Author Closing Comment

by:SteveJ
ID: 33840222
Thanks
0

Featured Post

Retailers - Is your network secure?

With the prevalence of social media & networking tools, for retailers, reputation is critical. Have you considered the impact your network security could have in your customer's experience? Learn more in our Retail Security Resource Kit Today!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Envision that you are chipping away at another e-business site with a team of pundit developers and designers. Everything seems, by all accounts, to be going easily.
Keystroke loggers have been around for a very long time. While the threat is old, some of the remedies are new!
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

724 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question