Network Access & Device Administration Flashcards
Difference between AuthC & AuthZ
Authentication verifies User Identity, Authorization determines what user is allowed to do
Which protocol is best suited for granular command-level control
TACACS+ separates authentication & authorization.
Suitable for authenticating users access to network devices and performing command-level authorization
Which protocol is best suited for authenticating and authorizing a user on the network
RADIUS combines authentication and authorization.
Suitable for network access control of users
Which protocol can be used for Device Administration AAA
TACACS+
What port is used by TACACS+
TCP/49
What port is used by RADIUS
UDP/1812 (AuthC, AuthZ)
UDP/1813 (Acct)
Which TACACS messages are sent from AAA client to server
START
REQUEST
What needs to match between ISE and NAD to successfully authenticate endpoints
Shared secret
Which command allows a switch to send accounting info to ISE
radius-server vsa send-accounting
Benefits of TACACS+ over RADIUS
Entire payload encrypted
Separates authentication and authorization
Which task types are included in ISE for TACACS+
WLC & Shell
RADIUS responses to Authenticator during Authentication
Access-Accept
Access-Reject
Access-Challenge
Global command to turn on 802.1x
dot1x system-auth-control
Interface command to turn on 802.1x
dot1x pae authenticator
Which features must be used on ISE for TACACS+
Device Administration License
Device Admin service