Thanks For the detailed Info that really helped me in the configuration. I configured my router to use tacacs+ and its working fine .In this Article you Specified that TACACS+ provides two methods to control the authorization of router commands on a per-user or per-group basis. The first method is to assign privilege levels to commands and have the router verify with the TACACS+ server whether or not the user is authorized at the specified privilege level.Can i have some Config Example how to Provide this privilege Using CISCO ACS 3.0 Software
Thanks and Regards Rohit Sundriyal ""Greg Hauser"" wrote in message news:[EMAIL PROTECTED] > Comparing TACACS+ and RADIUS > The following sections compare several features of TACACS+ and RADIUS. > > UDP and TCP > RADIUS uses UDP while TACACS+ uses TCP. TCP offers several advantages over > UDP. TCP offers a connection-oriented transport, while UDP offers > best-effort delivery. RADIUS requires additional programmable variables such > as re-transmit attempts and time-outs to compensate for best-effort > transport, but it lacks the level of built-in support that a TCP transport > offers: > > Using TCP provides a separate acknowledgment that a request has been > received, within (approximately) a network round-trip time (RTT), regardless > of how loaded and slow the backend authentication mechanism (a TCP > acknowledgment) might be. > > TCP provides immediate indication of a crashed, or not running, server by a > reset (RST). You can determine when a server crashes and returns to service > if you use long-lived TCP connections. UDP cannot tell the difference > between a server that is down, a slow server, and a non-existent server. > > Using TCP keepalives, server crashes can be detected out-of-band with actual > requests. Connections to multiple servers can be maintained simultaneously, > and you only need to send messages to the ones that are known to be up and > running. > > TCP is more scalable and adapts to growing, as well as congested, networks. > > Packet Encryption > RADIUS encrypts only the password in the access-request packet, from the > client to the server. The remainder of the packet is unencrypted. Other > information, such as username, authorized services, and accounting, could be > captured by a third party. > > TACACS+ encrypts the entire body of the packet but leaves a standard TACACS+ > header. Within the header is a field that indicates whether the body is > encrypted or not. For debugging purposes, it is useful to have the body of > the packets unencrypted. However, during normal operation, the body of the > packet is fully encrypted for more secure communications. > > Authentication and Authorization > RADIUS combines authentication and authorization. The access-accept packets > sent by the RADIUS server to the client contain authorization information. > This makes it difficult to decouple authentication and authorization. > > TACACS+ uses the AAA architecture, which separates authentication, > authorization, and accounting. This allows separate authentication solutions > that can still use TACACS+ for authorization and accounting. For example, > with TACACS+, it is possible to use Kerberos authentication and TACACS+ > authorization and accounting. After a NAS authenticates on a Kerberos > server, it requests authorization information from a TACACS+ server without > having to re-authenticate. The NAS informs the TACACS+ server that it has > successfully authenticated on a Kerberos server, and the server then > provides authorization information. > > During a session, if additional authorization checking is needed, the access > server checks with a TACACS+ server to determine if the user is granted > permission to use a particular command. This provides greater control over > the commands that can be executed on the access server while decoupling from > the authentication mechanism. > > Multiprotocol Support > RADIUS does not support the following protocols: > > AppleTalk Remote Access (ARA) protocol > > NetBIOS Frame Protocol Control protocol > > Novell Asynchronous Services Interface (NASI) > > X.25 PAD connection > > TACACS+ offers multiprotocol support. > > Router Management > RADIUS does not allow users to control which commands can be executed on a > router and which cannot. Therefore, RADIUS is not as useful for router > management or as flexible for terminal services. > > TACACS+ provides two methods to control the authorization of router commands > on a per-user or per-group basis. The first method is to assign privilege > levels to commands and have the router verify with the TACACS+ server > whether or not the user is authorized at the specified privilege level. The > second method is to explicitly specify in the TACACS+ server, on a per-user > or per-group basis, the commands that are allowed. > > Interoperability > Due to various interpretations of the RADIUS Request for Comments (RFCs), > compliance with the RADIUS RFCs does not guarantee interoperability. Even > though several vendors implement RADIUS clients, this does not mean they are > interoperable. Cisco implements most RADIUS attributes and is consistently > adding more. If customers use only the standard RADIUS attributes in their > servers, they can probably interoperate between several vendors, providing > that these vendors implement the same attributes. However, many vendors > implement extensions that are proprietary attributes. If a customer uses one > of these vendor-specific extended attributes, interoperability is not > possible. > > Traffic > Due to the previously cited differences between TACACS+ and RADIUS, the > amount of traffic generated between the client and server will differ. The > following examples illustrate the traffic between the client and server for > TACACS+ and RADIUS when used for router management with authentication, exec > authorization, command authorization (which RADIUS cannot do), exec > accounting, and command accounting (which RADIUS cannot do). Message Posted at: http://www.groupstudy.com/form/read.php?f=7&i=73157&t=72617 -------------------------------------------------- FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]

