======Verify if tacacs is configured ====== TACACS+ is a security application that provides centralized validation of users attempting to gain access to a router or network access server. Below example helps in validating tacacs configuration using NetYCE Compliance module ===Example config=== campus01-b02-access01 and campus01-b02-access02 are the two reference devices which we are using for this example. One has tacacs configuration and other does not. ==campus01-b02-access01#== {{:guides:user:compliance:compliance:howto:cpl5_1.png}} ==campus01-b02-access02#== {{:guides:user:compliance:compliance:howto:cpl5_2.png}} ===How its done=== Below are the steps to create new policy. //Operate -> Compliance -> Policies -> New->// {{:guides:user:compliance:compliance:howto:cpl5_3.png}} Click on the Node Group to select the relevant group of devices to add. Node group named "building2_access" holds the nodes of both the nodes: {{:guides:user:compliance:compliance:howto:cpl1_4.png}} Rule -> New {{:guides:user:compliance:compliance:howto:cpl5_5.png}} ===Report/test results:=== Below is how to create reports to see the results of the compliance policies. //Operate -> Compliance -> Reports -> New -> Report Name “test” -> Report type “Policies” -> Policy Name “Sample5 : TACACS Configuration” -> Show Report// {{:guides:user:compliance:compliance:howto:cpl5_6.png}} This was a simple example to understand how to implement compliance policy to verify tacacs configuration.