Authentication, Authorization, and Accounting Authentication Authorization Accounting
Authentication, Authorization, and Accounting Authentication Authorization Accounting
Securing access to Cisco routers and switches is a critical concern. Often, access is secured using enable
and vty/console passwords, configured locally on the device. For large networks with many devices, this
can become unmanageable, especially when passwords need to be changed. A centralized form of access
security is required.
AAA Protocols:
There are two most used protocols (RADIUS and TACACS+.) in implementing Authentication,
Authorization, and Accounting in the network. There are several key differences between RADIUS and
TACACS+ servers: •
Lab Topology:
Now we want to do authentication from AAA server. For this we have to do some configuration on
devices (Router-1).
R-1(config-sg-tacacs+)#server 192.168.1.100
R-1(config-sg-tacacs+)#exit
Note: To check username and password of tacacs+ server use following commands on AAA Server.
root@AAA-1:# cd /etc/tacacs+/
root@AAA-1:/etc/tacacs+# ls
tac_plus.conf