RADIUS and TACACS+
Authentication, Authorization, and Accounting (AAA) Protocols
Both RADIUS and TACACS+ are AAA protocols that centralize network access control - think of them as the security checkpoint for your network infrastructure.
- Authentication: “Who are you?” - Verifies user identity
- Authorization: “What can you do?” - Determines user permissions
- Accounting: “What did you do?” - Logs user activities for auditing
Protocol Comparison
| Feature | RADIUS | TACACS+ |
|---|---|---|
| Transport Protocol | UDP (ports 1812/1813) | TCP (port 49) |
| Encryption | Password only | Entire packet |
| AAA Functions | Combined Auth/Authz | Separates all three |
| Packet Types | 4 types | 6 types |
| Vendor | Open standard (RFC 2865) | Cisco proprietary |
| Primary Use | Network access (dial-up, wireless) | Device administration |
| Reliability | Less reliable (UDP) | More reliable (TCP) |
RADIUS (Remote Authentication Dial-In User Service)
Key Characteristics
- UDP-based protocol - faster but less reliable than TCP
- Encrypts only the password in Access-Request packets (security limitation)
- Combines authentication and authorization in single process
- Port 1812 for authentication, port 1813 for accounting
- Originally designed for dial-up access (hence the name), now used for wireless, VPN, and switch port access
RADIUS Packet Flow
- Access-Request → Client sends credentials to RADIUS server
- Access-Accept → Server grants access with authorization attributes
- Access-Reject → Server denies access
- Access-Challenge → Server requests additional information (used for multi-factor authentication)
Real-World Use Cases
- Wireless networks (WPA2-Enterprise with 802.1X)
- VPN authentication
- Network Access Control (NAC) solutions
- ISP dial-up and broadband authentication
TACACS+ (Terminal Access Controller Access-Control System Plus)
Key Characteristics
- TCP-based protocol (port 49) - provides reliable delivery
- Encrypts the entire packet body (superior security to RADIUS)
- Separates AAA functions - each can be handled by different servers
- Cisco proprietary but widely supported
- Designed specifically for device administration and command authorization
TACACS+ Advantages
- Granular command authorization - can authorize specific commands per user
- Reliable transport - TCP ensures packet delivery
- Better security - full packet encryption prevents eavesdropping
- Flexible deployment - can separate AAA servers for different functions
Command Authorization Example
|
|
Vocabulary
AAA: Authentication, Authorization, and Accounting - the three pillars of network access control
NAS (Network Access Server): The device (router, switch, wireless controller) that forwards authentication requests to the AAA server
Shared Secret: Pre-configured password used to encrypt communication between NAS and AAA server
RADIUS Client: The network device (NAS) that sends authentication requests - not the end user
Privilege Levels: Cisco’s 0-15 authorization levels (0=minimal access, 15=full admin access)
Implementation Considerations
When to Use RADIUS
- Wireless network authentication (most common modern use)
- Large number of concurrent users
- Standards-based environment (multi-vendor)
- Network access control scenarios
When to Use TACACS+
- Administrative access to network devices
- Granular command authorization required
- High-security environments (government/military installations)
- Cisco-centric infrastructure
Deployment Best Practices
- Always use backup AAA servers - single point of failure otherwise
- Configure local fallback authentication for emergency access
- Use strong shared secrets (minimum 22 characters recommended)
- Implement accounting for compliance and troubleshooting
- Consider network latency when placing AAA servers
Notes
- Critical Rule: If AAA server is unreachable, device behavior depends on configuration - can either deny all access or fall back to local authentication
- RADIUS uses UDP which means no guaranteed delivery - packets can be lost during network congestion
- TACACS+ command authorization creates significant processing overhead - consider performance impact
- Both protocols send shared secrets in configuration files - protect device configurations accordingly
- Modern deployments often use both: RADIUS for user access (wireless/VPN) and TACACS+ for administrative access
- 802.1X implementations typically use RADIUS with EAP (Extensible Authentication Protocol) for enhanced security
- Exam Tip: Remember the transport protocols - RADIUS uses UDP, TACACS+ uses TCP (more reliable for critical admin access)