User Tools

Site Tools


guides:user:compliance:examples:tacacs

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

guides:user:compliance:examples:tacacs [2022/04/29 08:39] – created pgelsguides:user:compliance:examples:tacacs [2024/07/03 12:31] (current) – external edit 127.0.0.1
Line 1: Line 1:
 +======Verify if tacacs is configured ======
 +
 +TACACS+ is a security application that provides centralized validation of users attempting to gain access to a router or network access server.
 +Below example helps in validating tacacs configuration using NetYCE Compliance module
 +
 +===Example config===
 +campus01-b02-access01 and campus01-b02-access02 are the two reference devices which we are using for this example.  One has tacacs configuration and other does not. 
 +
 +==campus01-b02-access01#==
 +
 +{{:guides:user:compliance:compliance:howto:cpl5_1.png}}
 +
 +==campus01-b02-access02#==
 +{{:guides:user:compliance:compliance:howto:cpl5_2.png}}
 +
 +===How its done===
 +Below are the steps to create new policy.
 +//Operate -> Compliance -> Policies -> New->//
 +{{:guides:user:compliance:compliance:howto:cpl5_3.png}}
 +
 +Click on the Node Group to select the relevant group of devices to add.
 +Node group named "building2_access" holds the nodes of both the nodes:
 +{{:guides:user:compliance:compliance:howto:cpl1_4.png}}
 +
 +Rule -> New
 +
 +{{:guides:user:compliance:compliance:howto:cpl5_5.png}}
 +
 +
 +===Report/test results:===
 +Below is how to create reports to see the results of the compliance policies.
 +
 +//Operate -> Compliance -> Reports -> New -> Report Name “test” -> Report type “Policies” -> Policy Name “Sample5 : TACACS Configuration” -> Show Report//
 +
 +{{:guides:user:compliance:compliance:howto:cpl5_6.png}}
 +
 +This was a simple example to understand how to implement compliance policy to verify tacacs configuration.  
  

Donate Powered by PHP Valid HTML5 Valid CSS Driven by DokuWiki