Solved

Cisco Secure ACS -- what protocol is used for communicating user credentials to Cisco Secure?

Posted on 2010-09-23
5
638 Views
Last Modified: 2012-05-10
I am new to an environment that uses Cisco Secure ACS appliances. Sometimes I hear it referred to as TACACS which I think means that Cisco Secure ACS is being used to authenticate user ID and password from a Cisco router using TACACS protocol. But is that protocol only used for Cisco routers? Does ACS listen for LDAP requests?

Can someone help or point me to some entry level docs on how Cisco Secure interacts with different clients sending authentication requests?

Thanks
Steve
0
Comment
Question by:SteveJ
  • 3
5 Comments
 
LVL 16

Accepted Solution

by:
InteraX earned 300 total points
ID: 33747300
ACS is a core cisco product for their security. It is as you rightly say a TACAS+ server, but is also a lot more.

Features include AAA(Authentication, Authorisation, Accounting), downloadable ACL's when authenticating users to VPN's/ethernet ports etc, is a core part of their NAC solution.

It can use an internal or external database for accounts (user or device), can integrate with RSA and a lot more.

Have you looked at the docs from the main porduct page on Cisco's website?
http://www.cisco.com/en/US/products/sw/secursw/ps2086/

Config guides can be found at http://www.cisco.com/en/US/products/sw/secursw/ps2086/products_installation_and_configuration_guides_list.html

Release notes at http://www.cisco.com/en/US/products/sw/secursw/ps2086/prod_release_notes_list.html

Overview docs can be found at http://www.cisco.com/en/US/products/sw/secursw/ps2086/products_data_sheets_list.html
0
 
LVL 11

Assisted Solution

by:diprajbasu
diprajbasu earned 200 total points
ID: 33764922
try this out
win40ugP.pdf
0
 
LVL 11

Expert Comment

by:diprajbasu
ID: 33764931
0
 
LVL 11

Expert Comment

by:diprajbasu
ID: 33764936
try this
ucp40P.pdf
0
 
LVL 16

Author Closing Comment

by:SteveJ
ID: 33840222
Thanks
0

Featured Post

IT, Stop Being Called Into Every Meeting

Highfive is so simple that setting up every meeting room takes just minutes and every employee will be able to start or join a call from any room with ease. Never be called into a meeting just to get it started again. This is how video conferencing should work!

Join & Write a Comment

Cybersecurity has become the buzzword of recent years and years to come. The inventions of cloud infrastructure and the Internet of Things has made us question our online safety. Let us explore how cloud- enabled cybersecurity can help us with our b…
Read about achieving the basic levels of HRIS security in the workplace.
Viewers will learn how to properly install and use Secure Shell (SSH) to work on projects or homework remotely. Download Secure Shell: Follow basic installation instructions: Open Secure Shell and use "Quick Connect" to enter credentials includi…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

744 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

14 Experts available now in Live!

Get 1:1 Help Now