Solved

Cisco Secure ACS -- what protocol is used for communicating user credentials to Cisco Secure?

Posted on 2010-09-23
5
670 Views
Last Modified: 2012-05-10
I am new to an environment that uses Cisco Secure ACS appliances. Sometimes I hear it referred to as TACACS which I think means that Cisco Secure ACS is being used to authenticate user ID and password from a Cisco router using TACACS protocol. But is that protocol only used for Cisco routers? Does ACS listen for LDAP requests?

Can someone help or point me to some entry level docs on how Cisco Secure interacts with different clients sending authentication requests?

Thanks
Steve
0
Comment
Question by:SteveJ
  • 3
5 Comments
 
LVL 16

Accepted Solution

by:
InteraX earned 300 total points
ID: 33747300
ACS is a core cisco product for their security. It is as you rightly say a TACAS+ server, but is also a lot more.

Features include AAA(Authentication, Authorisation, Accounting), downloadable ACL's when authenticating users to VPN's/ethernet ports etc, is a core part of their NAC solution.

It can use an internal or external database for accounts (user or device), can integrate with RSA and a lot more.

Have you looked at the docs from the main porduct page on Cisco's website?
http://www.cisco.com/en/US/products/sw/secursw/ps2086/

Config guides can be found at http://www.cisco.com/en/US/products/sw/secursw/ps2086/products_installation_and_configuration_guides_list.html

Release notes at http://www.cisco.com/en/US/products/sw/secursw/ps2086/prod_release_notes_list.html

Overview docs can be found at http://www.cisco.com/en/US/products/sw/secursw/ps2086/products_data_sheets_list.html
0
 
LVL 11

Assisted Solution

by:diprajbasu
diprajbasu earned 200 total points
ID: 33764922
try this out
win40ugP.pdf
0
 
LVL 11

Expert Comment

by:diprajbasu
ID: 33764931
0
 
LVL 11

Expert Comment

by:diprajbasu
ID: 33764936
try this
ucp40P.pdf
0
 
LVL 16

Author Closing Comment

by:SteveJ
ID: 33840222
Thanks
0

Featured Post

Netscaler Common Configuration How To guides

If you use NetScaler you will want to see these guides. The NetScaler How To Guides show administrators how to get NetScaler up and configured by providing instructions for common scenarios and some not so common ones.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
ssh setup on Cisco swith 11 86
EIGRP - redistribute without the default route 5 55
Cisco WLAN 5520 licensing 10 56
ip igmp join-group 8 39
The use of stolen credentials is a hot commodity this year allowing threat actors to move laterally within the network in order to avoid breach detection.
Transferring data across the virtual world became simpler but protecting it is becoming a real security challenge.  How to approach cyber security  in today's business world!
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

860 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question