11-29-2024 11:42 AM
Hello Team,
I need to know if is possible nowadays to use an ACS 5.7 to authenticate with Radius the PaloAlto devices with OS 10.2, I followed a couple of guides with no success, no matches on the services selection rules, neither on the authorization policies, the PA devices can reach the ACS via icmp and port 1812
Solved! Go to Solution.
12-01-2024 11:09 AM
cs.co/ise-interop
That being said ACS is LONG EOL. https://www.cisco.com/c/en/us/obsolete/security/cisco-secure-access-control-system-5-7.html
12-01-2024 11:09 AM
cs.co/ise-interop
That being said ACS is LONG EOL. https://www.cisco.com/c/en/us/obsolete/security/cisco-secure-access-control-system-5-7.html
12-02-2024 08:17 AM
I know this device is obsolete, however is the only device I have so far, so, the main objective here is if someone provides me an old guide to configure the acs and PA devices, I tried with a couple of them on the web, but didn't work.
12-02-2024 09:03 AM
Not sure if you came across this link? if so, what is the exact issue you are experiencing?
12-02-2024 09:53 AM
thank for your answer @Aref Alsouqi , YEs I tried with this guide but no luck, the problem is the radius authentication doesn't work, I have no hit count incremental on Service selection rules, neither on the authorization policy rules, however the PA device can reach the ACS via icmp and port 1812
12-03-2024 01:21 AM
You're welcome. Could you please share your configs of both the PA and ACS for review?
12-09-2024 04:09 PM
Thanks again for your answer, at the end of day, I switched from Radius to Tacacs and it's working, so the radius configuration is no longer needed anymore
12-10-2024 01:32 AM
You're welcome any time.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide