<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ACS 4.0 authentications in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/acs-4-0-authentications/m-p/680911#M422419</link>
    <description>&lt;P&gt;Can a single ACS server be used for both TACACS and RADIUS authentication for a single device? For example on an access point I have TACACS pointed to a production 3.3 ACS server for admin authentication and RADIUS pointed to a lab 4.0 ACS server for VLAN assignment using RADIUS.  Can I point both RADIUS and TACACS to the same server for both admin terminal auth and 802.1x auth? And segregate the access of each by the groups on ACS?  These groups are dynamically mapped to windows domain groups also, if that matters any.  If I point them both at the same ACS server it appears that all authenticated users are able to access the console/terminal.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here's the aaa setup lines:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa new-model&lt;/P&gt;&lt;P&gt;aaa group server radius rad_eap&lt;/P&gt;&lt;P&gt; server 192.168.28.60 auth-port 1645 acct-port 1646&lt;/P&gt;&lt;P&gt;aaa group server tacacs+ tac_auth&lt;/P&gt;&lt;P&gt; server 192.168.28.54&lt;/P&gt;&lt;P&gt;aaa authentication login console line&lt;/P&gt;&lt;P&gt;aaa authentication login eap_methods group rad_eap&lt;/P&gt;&lt;P&gt;aaa authentication login admin_auth group tac_auth local enable&lt;/P&gt;&lt;P&gt;tacacs-server host 192.168.28.54&lt;/P&gt;&lt;P&gt;tacacs-server key 7 &amp;lt;removed&amp;gt;&lt;/P&gt;&lt;P&gt;radius-server host 192.168.28.60 auth-port 1645 acct-port 1646 key 7 &amp;lt;removed&amp;gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;dot11 ssid &amp;lt;removed&amp;gt;&lt;/P&gt;&lt;P&gt;   vlan 12&lt;/P&gt;&lt;P&gt;   authentication open eap eap_methods &lt;/P&gt;&lt;P&gt;   authentication network-eap eap_methods &lt;/P&gt;&lt;P&gt;   authentication key-management wpa&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;line con 0&lt;/P&gt;&lt;P&gt; exec-timeout 0 0&lt;/P&gt;&lt;P&gt; login authentication admin_auth&lt;/P&gt;&lt;P&gt;password 7 &amp;lt;removed&amp;gt;&lt;/P&gt;&lt;P&gt;line vty 0 4&lt;/P&gt;&lt;P&gt; exec-timeout 0 0&lt;/P&gt;&lt;P&gt; password 7 &amp;lt;removed&amp;gt;&lt;/P&gt;&lt;P&gt; login authentication admin_auth&lt;/P&gt;&lt;P&gt; transport input ssh&lt;/P&gt;&lt;P&gt;line vty 5 15&lt;/P&gt;&lt;P&gt; password 7 &amp;lt;removed&amp;gt;&lt;/P&gt;&lt;P&gt; login authentication admin_auth&lt;/P&gt;&lt;P&gt; transport input ssh&lt;/P&gt;</description>
    <pubDate>Sun, 10 Mar 2019 21:50:59 GMT</pubDate>
    <dc:creator>David Niemann</dc:creator>
    <dc:date>2019-03-10T21:50:59Z</dc:date>
    <item>
      <title>ACS 4.0 authentications</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-4-0-authentications/m-p/680911#M422419</link>
      <description>&lt;P&gt;Can a single ACS server be used for both TACACS and RADIUS authentication for a single device? For example on an access point I have TACACS pointed to a production 3.3 ACS server for admin authentication and RADIUS pointed to a lab 4.0 ACS server for VLAN assignment using RADIUS.  Can I point both RADIUS and TACACS to the same server for both admin terminal auth and 802.1x auth? And segregate the access of each by the groups on ACS?  These groups are dynamically mapped to windows domain groups also, if that matters any.  If I point them both at the same ACS server it appears that all authenticated users are able to access the console/terminal.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here's the aaa setup lines:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa new-model&lt;/P&gt;&lt;P&gt;aaa group server radius rad_eap&lt;/P&gt;&lt;P&gt; server 192.168.28.60 auth-port 1645 acct-port 1646&lt;/P&gt;&lt;P&gt;aaa group server tacacs+ tac_auth&lt;/P&gt;&lt;P&gt; server 192.168.28.54&lt;/P&gt;&lt;P&gt;aaa authentication login console line&lt;/P&gt;&lt;P&gt;aaa authentication login eap_methods group rad_eap&lt;/P&gt;&lt;P&gt;aaa authentication login admin_auth group tac_auth local enable&lt;/P&gt;&lt;P&gt;tacacs-server host 192.168.28.54&lt;/P&gt;&lt;P&gt;tacacs-server key 7 &amp;lt;removed&amp;gt;&lt;/P&gt;&lt;P&gt;radius-server host 192.168.28.60 auth-port 1645 acct-port 1646 key 7 &amp;lt;removed&amp;gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;dot11 ssid &amp;lt;removed&amp;gt;&lt;/P&gt;&lt;P&gt;   vlan 12&lt;/P&gt;&lt;P&gt;   authentication open eap eap_methods &lt;/P&gt;&lt;P&gt;   authentication network-eap eap_methods &lt;/P&gt;&lt;P&gt;   authentication key-management wpa&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;line con 0&lt;/P&gt;&lt;P&gt; exec-timeout 0 0&lt;/P&gt;&lt;P&gt; login authentication admin_auth&lt;/P&gt;&lt;P&gt;password 7 &amp;lt;removed&amp;gt;&lt;/P&gt;&lt;P&gt;line vty 0 4&lt;/P&gt;&lt;P&gt; exec-timeout 0 0&lt;/P&gt;&lt;P&gt; password 7 &amp;lt;removed&amp;gt;&lt;/P&gt;&lt;P&gt; login authentication admin_auth&lt;/P&gt;&lt;P&gt; transport input ssh&lt;/P&gt;&lt;P&gt;line vty 5 15&lt;/P&gt;&lt;P&gt; password 7 &amp;lt;removed&amp;gt;&lt;/P&gt;&lt;P&gt; login authentication admin_auth&lt;/P&gt;&lt;P&gt; transport input ssh&lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 21:50:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-4-0-authentications/m-p/680911#M422419</guid>
      <dc:creator>David Niemann</dc:creator>
      <dc:date>2019-03-10T21:50:59Z</dc:date>
    </item>
    <item>
      <title>Re: ACS 4.0 authentications</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-4-0-authentications/m-p/680912#M422421</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, you can achieve this as ACS has both TACACS+ and Radius services running together.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On ACS, create/add the device under 2 different protocols (tacacs+ and radius). Assign a different name to differentiate the device with tacacs+ and radius, but maintai the same IP Address.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On your device, make sure you have aaa statement that point to tacacs+ and radius:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;tacacs-server host 171.68.118.101&lt;/P&gt;&lt;P&gt;tacacs-server key cisco&lt;/P&gt;&lt;P&gt;radius-server host 171.68.118.101&lt;/P&gt;&lt;P&gt;radius-server key cisco&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps. Pls rate useful post(s).&lt;/P&gt;&lt;P&gt;AK&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 18 Nov 2006 00:49:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-4-0-authentications/m-p/680912#M422421</guid>
      <dc:creator>a.kiprawih</dc:creator>
      <dc:date>2006-11-18T00:49:47Z</dc:date>
    </item>
    <item>
      <title>Re: ACS 4.0 authentications</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-4-0-authentications/m-p/680913#M422422</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;For radius-server, you can either leave the it to use default value, or manually set the auth-port &amp;amp; acct-port to 1645/1646 or 1812/1813.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;AK&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 18 Nov 2006 00:52:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-4-0-authentications/m-p/680913#M422422</guid>
      <dc:creator>a.kiprawih</dc:creator>
      <dc:date>2006-11-18T00:52:11Z</dc:date>
    </item>
    <item>
      <title>Re: ACS 4.0 authentications</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-4-0-authentications/m-p/680914#M422423</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If I use TACACS for administration authentication and RADIUS for port authentication how do I keep RADIUS users from being able to log onto the console/telnet?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 20 Nov 2006 13:15:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-4-0-authentications/m-p/680914#M422423</guid>
      <dc:creator>David Niemann</dc:creator>
      <dc:date>2006-11-20T13:15:57Z</dc:date>
    </item>
  </channel>
</rss>

