I have a ASA 5555 Active/standby failover firewall. In which, the tacacs login for Active Firewall is successful. But, the tacacs login for Standby Firewall doesnt work. Its shows the username prompt, however cannot login.
After issuing test aaa authentication <server-group> host <ip-address> username user password pass command, it shows that "Authentication Server not responding; No error"
On packet capturing, I found that it Standby Firewall uses the Active Firewall IP to send the tacacs authentication packet on port 49. However, ACS Tacacs server doesn't show any passed attempts or failed attempts log in the particular time.
CISCO ACS is configured right and serves the other devices and the active firewall.
At standby Firewall, "show aaa-server" shows that the ACS server is active and timeout increases for every authentication.
Are you responsible for risk management, compliance management and auditing of a network?
If so, we’d like to speak with you to learn your current processes of enforcing compliance and managing risk to help us develop services that will ...
Once you've expanded Cisco Secure Endpoint connector deployment to about 50% of your licensed count (check out this article that shows you how to do that), it's time to put those connectors to action i.e. convert them to Protect from Audit mode for vari...
Hello! I’m Betsy, UX Researcher, on the Cisco+ Secure Connect Now team. Nice to meet you all .We have a short survey to learn about your Zero Trust Network Access (ZTNA) journey. Whether you have, plan to, or have not implemented a ...
A set of interface access rules can cause the Cisco Adaptive Security Appliance to permit or deny a designated host to access another particular host with a specific network application (service). When there is only one client, one host and one se...
How To: Cisco ISE Captive Portals with Aruba Wireless
Authors: Adam Hollifield, Brad Johnson
IntroductionPrerequisitesMinimum RequirementsComponents UsedConfigurationAruba Wireless ControllerWLAN CreationAuthentication ConfigurationRole & Policy Confi...