?
Solved

Acs server deployment guide and price

Posted on 2013-11-08
4
Medium Priority
?
349 Views
Last Modified: 2014-01-31
i want to deploy tacacs in my company. where can i find deployment guide for it.
how much it will cost to deploy the server.
0
Comment
Question by:mohannitin
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
  • 2
4 Comments
 
LVL 46

Expert Comment

by:Craig Beck
ID: 39635799
I would probably say that ACS should only really be deployed on a VM now as the 1121 appliance is EoS.  The latest version of ACS is 5.4 and will run on VMWare.

Costs depend on what hardware you need, deployment model, licensing... You should really speak to your Cisco Account Manager to obtain accurate costs.

Here is the EoS/EoL announcement page which provides links to EoS notices and recommended replacement part numbers...

http://www.cisco.com/en/US/products/ps9911/prod_eol_notices_list.html
0
 

Author Comment

by:mohannitin
ID: 39636916
is there any way you can give me step by step  deployment  guide ..
let say i have got the ACS server virtual appliance running on our esx hosts.


can i authenticate our cisco devices using tacacs ?
0
 
LVL 46

Accepted Solution

by:
Craig Beck earned 600 total points
ID: 39637027
Yes you can.

In short you need at the very least:

1] To create a client entry on the ACS for each Cisco device you want to authenticate
2] Configure the Cisco device to use the ACS as a TACACS server for admin authentication

The actual configuration is the same from the device end, but the ACS configuration largely depends on how you want to authenticate users (in groups, different levels of access, from AD, etc)...

Here's a few links to get you started and help you decide which way you want to go...

http://www.cisco.com/en/US/tech/tk59/technologies_tech_note09186a0080094e99.shtml

http://www.cisco.com/en/US/products/ps9911/products_configuration_example09186a0080bc8514.shtml

http://www.youtube.com/watch?v=A_3EMZVvKTc
0
 

Author Closing Comment

by:mohannitin
ID: 39823682
thanks guys
0

Featured Post

Percona Live Europe 2017 | Sep 25 - 27, 2017

The Percona Live Open Source Database Conference Europe 2017 is the premier event for the diverse and active European open source database community, as well as businesses that develop and use open source database software.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

The use of stolen credentials is a hot commodity this year allowing threat actors to move laterally within the network in order to avoid breach detection.
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
If you're a developer or IT admin, you’re probably tasked with managing multiple websites, servers, applications, and levels of security on a daily basis. While this can be extremely time consuming, it can also be frustrating when systems aren't wor…
In this brief tutorial Pawel from AdRem Software explains how you can quickly find out which services are running on your network, or what are the IP addresses of servers responsible for each service. Software used is freeware NetCrunch Tools (https…

770 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question