Cisco Secure ACS -- what protocol is used for communicating user credentials to Cisco Secure?

Posted on 2010-09-23
Last Modified: 2012-05-10
I am new to an environment that uses Cisco Secure ACS appliances. Sometimes I hear it referred to as TACACS which I think means that Cisco Secure ACS is being used to authenticate user ID and password from a Cisco router using TACACS protocol. But is that protocol only used for Cisco routers? Does ACS listen for LDAP requests?

Can someone help or point me to some entry level docs on how Cisco Secure interacts with different clients sending authentication requests?

Question by:SteveJ
  • 3
LVL 16

Accepted Solution

InteraX earned 300 total points
ID: 33747300
ACS is a core cisco product for their security. It is as you rightly say a TACAS+ server, but is also a lot more.

Features include AAA(Authentication, Authorisation, Accounting), downloadable ACL's when authenticating users to VPN's/ethernet ports etc, is a core part of their NAC solution.

It can use an internal or external database for accounts (user or device), can integrate with RSA and a lot more.

Have you looked at the docs from the main porduct page on Cisco's website?

Config guides can be found at

Release notes at

Overview docs can be found at
LVL 11

Assisted Solution

diprajbasu earned 200 total points
ID: 33764922
try this out
LVL 11

Expert Comment

ID: 33764931
LVL 11

Expert Comment

ID: 33764936
try this
LVL 16

Author Closing Comment

ID: 33840222

Featured Post

Ransomware-A Revenue Bonanza for Service Providers

Ransomware – malware that gets on your customers’ computers, encrypts their data, and extorts a hefty ransom for the decryption keys – is a surging new threat.  The purpose of this eBook is to educate the reader about ransomware attacks.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

This is the first one of a series of articles I’ll be writing to address technical issues that are always referred to as network problems. The network boundaries have changed, therefore having an understanding of how each piece in the network  puzzl…
It’s 2016. Password authentication should be dead — or at least close to dying. But, unfortunately, it has not traversed Quagga stage yet. Using password authentication is like laundering hotel guest linens with a washboard — it’s Passé.
Viewers will learn how to properly install and use Secure Shell (SSH) to work on projects or homework remotely. Download Secure Shell: Follow basic installation instructions: Open Secure Shell and use "Quick Connect" to enter credentials includi…
After creating this article (, I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

809 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question