<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: tacacs+ authentication in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/tacacs-authentication/m-p/614266#M121375</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I want to just confirm what happens if m using PAP in TACACS and I want to change from PAP to CHAP. What will be the impact.&lt;/P&gt;</description>
    <pubDate>Thu, 24 Oct 2024 08:38:22 GMT</pubDate>
    <dc:creator>D.Kumar271534</dc:creator>
    <dc:date>2024-10-24T08:38:22Z</dc:date>
    <item>
      <title>tacacs+ authentication</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/tacacs-authentication/m-p/151440#M50148</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;i need to undersatnd if tacacs+ is cisco properiety , so how come juniper and paloalto use it ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;second question here , tacacs+ used mainly for cisco command authorization , so what is the need for that inside paloalto ?&lt;/P&gt;</description>
      <pubDate>Thu, 06 Apr 2017 09:56:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/tacacs-authentication/m-p/151440#M50148</guid>
      <dc:creator>NetworkGeek</dc:creator>
      <dc:date>2017-04-06T09:56:12Z</dc:date>
    </item>
    <item>
      <title>Re: tacacs+ authentication</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/tacacs-authentication/m-p/151447#M50149</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;i need to undersatnd if tacacs+ is cisco properiety , so how come juniper and paloalto use it ?&lt;/BLOCKQUOTE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So I think the key definer here is server vs client. officially, TACACS+ server is a Cisco product. So in theory, if you want to employ TACACS+, you'd need to buy a server from Cisco (though I believe there are knockoffs out there). In terms of being a client, however, Cisco would only encourage that from other vendors because it only helps them sell more ACS/ISE servers.&lt;/P&gt;&lt;BLOCKQUOTE&gt;&lt;P&gt;second question here , tacacs+ used mainly for cisco command authorization , so what is the need for that inside paloalto ?&lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Need is a strong word. Since Palo Alto is RBAC-based (and continues to be so for TACACS+ as I understand it), the benefit isn't immediately clear, especially since both ACS and ISE support RADIUS. So all I can offer is the fundamental differences between the two, which is that TACACS+ is TCP oriented and also encrypts the entire payload vs RADIUS which only encrypts the password.&lt;/P&gt;</description>
      <pubDate>Thu, 06 Apr 2017 10:06:39 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/tacacs-authentication/m-p/151447#M50149</guid>
      <dc:creator>bradk14</dc:creator>
      <dc:date>2017-04-06T10:06:39Z</dc:date>
    </item>
    <item>
      <title>Re: tacacs+ authentication</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/tacacs-authentication/m-p/151670#M50201</link>
      <description>&lt;P&gt;Thank you&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 07 Apr 2017 11:56:08 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/tacacs-authentication/m-p/151670#M50201</guid>
      <dc:creator>NetworkGeek</dc:creator>
      <dc:date>2017-04-07T11:56:08Z</dc:date>
    </item>
    <item>
      <title>Re: tacacs+ authentication</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/tacacs-authentication/m-p/158995#M52053</link>
      <description>&lt;P&gt;TACACS+ is not a Cisco proprietary protocol. &amp;nbsp;It was developed by Cisco as an extension to TACACS, but they did so openly, submitting a draft RFC and releasing a development kit to allow others to adopt the protocol. &amp;nbsp;There is a more current IETF draft under way as well -&amp;nbsp;&lt;A href="https://datatracker.ietf.org/doc/draft-ietf-opsawg-tacacs/" target="_blank"&gt;https://datatracker.ietf.org/doc/draft-ietf-opsawg-tacacs/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;TACACS+ can be used for Authentication, Authorization, and Accounting - a common use case is for command-level authorization on Cisco devices, but that's due more to how long Cisco has been implementing and pushing the&amp;nbsp;standard rather than because that's all it's good for. &amp;nbsp;In many customer environments, it is replacing or has replaced RADIUS as the AAA standard.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In the case of a Palo Alto Networks firewall or Panorama, we can leverage TACACS+ to authenticate a user, as well as authorize the user to perform specific functions though the use of a role, all without needing to define each individual user in Panorama or on the firewall. &amp;nbsp;This is exactly the same use case as RADIUS, it's just another (and much more secure) option for doing so.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 01 Jun 2017 19:14:36 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/tacacs-authentication/m-p/158995#M52053</guid>
      <dc:creator>drogers</dc:creator>
      <dc:date>2017-06-01T19:14:36Z</dc:date>
    </item>
    <item>
      <title>Re: tacacs+ authentication</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/tacacs-authentication/m-p/159308#M52099</link>
      <description>&lt;P&gt;&lt;SPAN&gt;TACACS+ is basically a Cisco solution. &amp;nbsp;The vast majority of the deploys and usage is done by Cisco using enterprises. &amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;The reason other vendors like Juniper and Palo Alto Networks support using&amp;nbsp;TACACS+ for authentication is that a large number of companies have&amp;nbsp;TACACS+ deployed as their primary AAA solution. &amp;nbsp;Nework vendors don't want to lose out on an RFC for equipment just because they don't support a AAA solution that is in place on the network. &amp;nbsp;By the nature of this type of solution enterprises only want to deploy one central AAA repository.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 02 Jun 2017 22:53:18 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/tacacs-authentication/m-p/159308#M52099</guid>
      <dc:creator>pulukas</dc:creator>
      <dc:date>2017-06-02T22:53:18Z</dc:date>
    </item>
    <item>
      <title>Re: tacacs+ authentication</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/tacacs-authentication/m-p/614266#M121375</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I want to just confirm what happens if m using PAP in TACACS and I want to change from PAP to CHAP. What will be the impact.&lt;/P&gt;</description>
      <pubDate>Thu, 24 Oct 2024 08:38:22 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/tacacs-authentication/m-p/614266#M121375</guid>
      <dc:creator>D.Kumar271534</dc:creator>
      <dc:date>2024-10-24T08:38:22Z</dc:date>
    </item>
  </channel>
</rss>

