07-31-2008 09:28 AM - edited 03-10-2019 04:00 PM
We are authenticating our systems through dot1x. I also need to be able to authenticate our Cisco admins using the same ACS server. I see how to configure a switch to do both TACACS+ and RADIUS, but I don't see how to setup ACS to allow a switch to use both TACACS+ and RADIUS.
Can someone give me a pointer?
Thanks
Solved! Go to Solution.
07-31-2008 09:52 AM
You need to set up both authentication on switch.
aaa authentication login default group tacacs local
aaa authentication dot1x default group radius
aaa authorization exec default group tacacs+ if-authenticated
aaa authorization network default group radius
radius-server host 2.2.2.2 key cisco
tacacs-server host 2.2.2.2 key cisco
On ACS you need to add switch twice.
ACS--->network configuration--->add aaa-clinet
Host name switch1
IP : 3.3.3.3
Authen using : Radius IETF
Add another switch
Host name switch2
IP : 3.3.3.3
Authen using : Tacacs+
Regards,
~JG
Do rate helpful posts
07-31-2008 09:52 AM
You need to set up both authentication on switch.
aaa authentication login default group tacacs local
aaa authentication dot1x default group radius
aaa authorization exec default group tacacs+ if-authenticated
aaa authorization network default group radius
radius-server host 2.2.2.2 key cisco
tacacs-server host 2.2.2.2 key cisco
On ACS you need to add switch twice.
ACS--->network configuration--->add aaa-clinet
Host name switch1
IP : 3.3.3.3
Authen using : Radius IETF
Add another switch
Host name switch2
IP : 3.3.3.3
Authen using : Tacacs+
Regards,
~JG
Do rate helpful posts
07-31-2008 10:45 AM
Thanks. I started to try that, but I didn't think that it would let me use two different names. That works great.
Thanks,
Wes
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide