Comparing TACACS+ and RADIUS
The following sections compare several features of TACACS+ and RADIUS.

UDP and TCP
RADIUS uses UDP while TACACS+ uses TCP. TCP offers several advantages over
UDP. TCP offers a connection-oriented transport, while UDP offers
best-effort delivery. RADIUS requires additional programmable variables such
as re-transmit attempts and time-outs to compensate for best-effort
transport, but it lacks the level of built-in support that a TCP transport
offers:

Using TCP provides a separate acknowledgment that a request has been
received, within (approximately) a network round-trip time (RTT), regardless
of how loaded and slow the backend authentication mechanism (a TCP
acknowledgment) might be.

TCP provides immediate indication of a crashed, or not running, server by a
reset (RST). You can determine when a server crashes and returns to service
if you use long-lived TCP connections. UDP cannot tell the difference
between a server that is down, a slow server, and a non-existent server.

Using TCP keepalives, server crashes can be detected out-of-band with actual
requests. Connections to multiple servers can be maintained simultaneously,
and you only need to send messages to the ones that are known to be up and
running.

TCP is more scalable and adapts to growing, as well as congested, networks.

Packet Encryption
RADIUS encrypts only the password in the access-request packet, from the
client to the server. The remainder of the packet is unencrypted. Other
information, such as username, authorized services, and accounting, could be
captured by a third party.

TACACS+ encrypts the entire body of the packet but leaves a standard TACACS+
header. Within the header is a field that indicates whether the body is
encrypted or not. For debugging purposes, it is useful to have the body of
the packets unencrypted. However, during normal operation, the body of the
packet is fully encrypted for more secure communications.

Authentication and Authorization
RADIUS combines authentication and authorization. The access-accept packets
sent by the RADIUS server to the client contain authorization information.
This makes it difficult to decouple authentication and authorization.

TACACS+ uses the AAA architecture, which separates authentication,
authorization, and accounting. This allows separate authentication solutions
that can still use TACACS+ for authorization and accounting. For example,
with TACACS+, it is possible to use Kerberos authentication and TACACS+
authorization and accounting. After a NAS authenticates on a Kerberos
server, it requests authorization information from a TACACS+ server without
having to re-authenticate. The NAS informs the TACACS+ server that it has
successfully authenticated on a Kerberos server, and the server then
provides authorization information.

During a session, if additional authorization checking is needed, the access
server checks with a TACACS+ server to determine if the user is granted
permission to use a particular command. This provides greater control over
the commands that can be executed on the access server while decoupling from
the authentication mechanism.

Multiprotocol Support
RADIUS does not support the following protocols:

AppleTalk Remote Access (ARA) protocol

NetBIOS Frame Protocol Control protocol

Novell Asynchronous Services Interface (NASI)

X.25 PAD connection

TACACS+ offers multiprotocol support.

Router Management
RADIUS does not allow users to control which commands can be executed on a
router and which cannot. Therefore, RADIUS is not as useful for router
management or as flexible for terminal services.

TACACS+ provides two methods to control the authorization of router commands
on a per-user or per-group basis. The first method is to assign privilege
levels to commands and have the router verify with the TACACS+ server
whether or not the user is authorized at the specified privilege level. The
second method is to explicitly specify in the TACACS+ server, on a per-user
or per-group basis, the commands that are allowed.

Interoperability
Due to various interpretations of the RADIUS Request for Comments (RFCs),
compliance with the RADIUS RFCs does not guarantee interoperability. Even
though several vendors implement RADIUS clients, this does not mean they are
interoperable. Cisco implements most RADIUS attributes and is consistently
adding more. If customers use only the standard RADIUS attributes in their
servers, they can probably interoperate between several vendors, providing
that these vendors implement the same attributes. However, many vendors
implement extensions that are proprietary attributes. If a customer uses one
of these vendor-specific extended attributes, interoperability is not
possible.

Traffic
Due to the previously cited differences between TACACS+ and RADIUS, the
amount of traffic generated between the client and server will differ. The
following examples illustrate the traffic between the client and server for
TACACS+ and RADIUS when used for router management with authentication, exec
authorization, command authorization (which RADIUS cannot do), exec
accounting, and command accounting (which RADIUS cannot do).




Message Posted at:
http://www.groupstudy.com/form/read.php?f=7&i=73120&t=72617
--------------------------------------------------
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]

Reply via email to