Technote of the day (TOTD) -- How to configure External Authentication for users using TACACS on the Cisco DNAC?
Prepared for:Cisco DNA Customers, CX Support Teams
Prepared by:Tomas de Leon, Technical Leader Feb 16, 2019 Document number:02162019_v1
Objective The objective of this document is to provide users an example of enabling external authentication for access to the Cisco DNAC. This technote will focus on configuring the Cisco DNAC & the Cisco ISE for using the TACACS protocol for user authentication. For this technote, there is an assumption that the integration between the Cisco DNAC and the Cisco ISE is already configured and in an "Active" state.
Goals Provide an example of configuring the Cisco DNAC & the Cisco ISE for using the TACACS protocol for external authentication of users.
The following technote is written against theCisco DNA Center version 1.2.8 Patch Releaseand theCisco ISE version 220.127.116.117 Patch 5.The following technote is written to help answer the questions in regards to configuring the Cisco DNAC & the Cisco ISE for using the TACACS protocol for user authentication.
Cisco DNAC version 1.2.8
Cisco ISE version 18.104.22.1687 Patch 5
Cisco Digital Network Architecture Center Administrator Guide, Release 1.2.8 Chapter: Manage Users
Hi everyone,I'm configuring eBGP and attempted to establish neighbours with the use of a password (password 7). I have service password-encryption enabled on the router. I used a random combination of letters and numbers (26 charact...
Hi I am creating location groups and sub-groups in Cisco Prime 3.6. I would like to have an hierarchy like Campus > Areas > Buildings > Floors However, I see that in PI I can have only Campus > Building > Floor Does anyone kn...
We installed an ISR4321k9 in a colo today and the guy doing the physical install was informed we were given a redundant network connection, so clickclick, we're connected to two WAN ports!Trouble is, they only gave us a /28 subnet with addresses "172.8.0....
We are trying to get access to the Web Interface. According to documentation it should be as simple as plugging in a network cable to any one of the 24 non-management ports on the front and then just launch a browser to https://192.168.1.1. We've tried bo...