MNS-BB
Software User Guide
-117-
5. After you make the desired changes, click on [OK] button.
7. Click [Save] to save the configuration.
22.0
(Terminal Access Controller Access Control System)
22.1 Introduction
, short for Terminal Access Controller Access Control System, protocol provides access
control for routers, network access servers and other networked computing devices via one or more
centralized servers. provides separate authentication, authorization and accounting
services.
22.2 History
TACACS allows a client to accept a username and password and send a query to a TACACS
authentication server, sometimes called a TACACS daemon (server) or simply TACACSD. This
server was normally a program running on a host. The host would determine whether to accept or
deny the request and sent a response back.
The protocol is the latest generation of TACACS. TACACS is a simple UDP (
User
Datagram Protocol
) based access control protocol originally developed by BBN for the MILNET
(Military Network). Cisco has enhanced (extended) TACACS several times and Cisco's
implementation, based on the original TACACS, is referred to as XTACACS. Later it enhanced to
. is a TCP (
Transmission Control Protocol)
based access control protocol.
TCP offers a connection-oriented transport, while UDP offers best-effort delivery.
22.3 Overview
improves on TACACS and XTACACS by separating the functions of authentication,
authorization and accounting and by encrypting all traffic between the NAS (Network Access Server)
and the daemon. It allows for arbitrary length and content authentication exchanges,
which allows any authentication mechanism to be utilized with clients. It is extendable to
provide for site customization and future development features and it uses TCP to ensure reliable
delivery. The protocol allows the client to request very fine-grained access control and
allows the daemon to respond to each component of that request.
The LE2425A and LEV2525A switches implement a client that integrates neatly with its
local access control.
and TCP
servers or daemons use TCP Port 49 for listening to client requests. Clients connect to this
port number to send authentication and authorization packets.
22.4
LE2425A / LEV2525A
The LE2425A and LEV2525A switches use and integrate the client authentication and
authorization to control access login to management control agent. With , the LE2425A
and LEV2525A switches can use network-based user authentication thus allowing multiple switches
with refers to a common user database.
The figure below shows the basic enabled network.