Local and RADIUS/TACACS+ Authentication
Detailed Explanation
1. What is Local Authentication?
Local authentication stores usernames and passwords directly on the device (such as a router or switch).
Use Cases:
- Small networks with few administrators
- Out-of-band management or as backup when AAA servers are unreachable
Limitations: Not scalable; requires account management on every device; local credentials may be less secure.
2. What is RADIUS Authentication?
RADIUS (Remote Authentication Dial-In User Service) is a centralized AAA (Authentication, Authorization, Accounting) protocol, widely used for:
- 802.1X (wired/wireless access)
- VPN authentication
- Central device management
- Central credential management (e.g., Cisco ISE, FreeRADIUS)
- UDP-based (ports 1812, 1813)
- Provides accounting—logs user activity
3. What is TACACS+ Authentication?
TACACS+ (Terminal Access Controller Access-Control System Plus) is a Cisco-designed AAA protocol, mainly for device administration.
- Separates authentication, authorization, and accounting
- TCP-based (port 49)
- Encrypts the entire payload (greater security for admin access)
4. Differences Between RADIUS and TACACS+
| Feature | RADIUS | TACACS+ |
|---|---|---|
| Protocol | UDP (1812/1813) | TCP (49) |
| AAA Handling | Combines AAA | Separates AAA |
| Encryption | Encrypts only password | Encrypts entire payload |
| Primary Use Case | User access (Wi-Fi, VPN) | Device admin (CLI access) |
| Vendor | Multi-vendor | Cisco-focused |
5. Use Cases for Local vs. RADIUS/TACACS+
- Local Authentication: Small/simple networks, backup/fallback admin access
- RADIUS/TACACS+: Enterprise networks, centralized policy control, compliance
- RADIUS: User or device network access (802.1X, VPN)
- TACACS+: Device admin and command authorization
6. Configuration Basics
Local User Account (Cisco IOS):
username admin privilege 15 secret cisco123
RADIUS Client Example:
aaa new-model
radius-server host 192.168.1.10 key rad123
aaa authentication login default group radius local
TACACS+ Client Example:
aaa new-model
tacacs-server host 192.168.1.20 key tacacskey
aaa authentication login default group tacacs+ local
Tip: In both RADIUS and TACACS+ examples,
local is specified as backup if the AAA server is unreachable.
7. AAA Model Overview
- Authentication: Who are you? (username/password)
- Authorization: What are you allowed to do?
- Accounting: What did you do? (logs, duration, commands, etc.)
RADIUS and TACACS+ both provide AAA. TACACS+ offers finer command-level authorization.
8. Security Considerations
- RADIUS: Encrypts only the password, not the full packet.
- TACACS+: Encrypts the entire payload (preferred for device admin).
- Use strong shared secrets; secure management networks.
9. Integration with Network Devices
- Supported on: Cisco, Juniper, HP, Aruba, Palo Alto, and more
- Server software: Cisco ISE, FreeRADIUS, Microsoft NPS, Cisco Secure ACS, etc.
10. Troubleshooting Authentication Issues
| Problem | Diagnostic Steps | Solution |
|---|---|---|
| Login fails | Check server reachability, shared key, user list | Correct IP/key, user, or test locally |
| Slow logins | Check server response, network latency | Optimize server, reduce hops |
| Fallback not working | Check AAA method order | Ensure local is listed after group |
debug aaa authentication, show aaa servers, syslog messages, server logs
11. Scalability and Management
- RADIUS/TACACS+: Centralized user management and global policies—ideal for large networks
- Local: Manual management per device—inefficient for scale
12. Fallback and Redundancy
- Define local authentication as a backup in case RADIUS/TACACS+ is unreachable.
- Configure multiple servers for high availability.
radius-server host 192.168.1.10 key rad123
radius-server host 192.168.1.11 key rad123
Example Scenario:
A company wants all Wi-Fi users to authenticate via RADIUS, but network admins should use TACACS+ for CLI access.
A company wants all Wi-Fi users to authenticate via RADIUS, but network admins should use TACACS+ for CLI access.
- Wi-Fi APs configured to point to a RADIUS server for user authentication
- Switches/routers use TACACS+ server for administrative logins
aaa authentication login default group tacacs+ local
Key Points and Exam Tips
| Key Point | Description |
|---|---|
| Local | Quick/simple; not scalable. Always configure a fallback local account. |
| RADIUS | Best for user access; UDP; encrypts only password; combines AAA. |
| TACACS+ | Best for admin/device control; TCP; encrypts entire payload; separates AAA. |
| AAA | Authentication, Authorization, Accounting |
| Centralized AAA | Reduces admin overhead, improves audit and compliance. |
| Debugging | Use debug aaa authentication and logs for troubleshooting. |
| Documentation | Document server IPs, keys, and failover. |
When and Where to Use Each:
Local: Small or isolated setups, or as a backup admin method.
RADIUS: User/device network access (VPN, 802.1X, wireless).
TACACS+: Network device admin access with detailed authorization/auditing.
Local: Small or isolated setups, or as a backup admin method.
RADIUS: User/device network access (VPN, 802.1X, wireless).
TACACS+: Network device admin access with detailed authorization/auditing.