[Day 12] Cisco ISE Mastery Training: TACACS+ Overview & Use Cases

Day 12 – Cisco ISE Mastery Training: TACACS+ Overview & Use Cases

Introduction

TACACS+ (Terminal Access Controller Access Control System Plus) is the go-to protocol for device administration control in enterprise networks. Unlike RADIUS, which is primarily for network access (wired/wireless), TACACS+ is designed for controlling administrative access to routers, switches, firewalls, and other network gear.

In Cisco ISE, TACACS+ centralizes the authentication, authorization, and accounting of network device administrators. This is critical in multi-admin environments where tracking every login, command execution, and privilege level change is necessary for compliance, auditing, and security.

With TACACS+ in ISE, you can:

  • Grant different privilege levels to different users.
  • Log every administrative action.
  • Enforce multi-factor authentication for device logins.
  • Ensure unauthorized users cannot access device CLI.

Problem Statement

In large networks:

  • Admin credentials are often shared among engineers — a huge security risk.
  • Local device accounts make it difficult to revoke access when someone leaves.
  • Tracking who ran what command is nearly impossible without centralized logging.

Without TACACS+, you’re left with scattered admin accounts, weak accountability, and no granular command control — a compliance nightmare.


Solution Overview

Cisco ISE with the Device Administration Service (TACACS+) solves this by:

  • Acting as a central TACACS+ server for all network devices.
  • Authenticating admins via corporate Active Directory or internal ISE database.
  • Authorizing commands based on roles, privilege levels, or policy sets.
  • Storing detailed accounting logs for every admin action.

Sample Lab Topology

Lab Components:

  • ISE 3.x running in VMware/EVE-NG.
  • Catalyst Switch (access & core role).
  • Cisco WLC for wireless device admin demo.
  • Two endpoints (Admin PCs) with SSH client.
  • Active Directory Server (optional for external auth).

Diagram Description:

  • Admin PCs connect via SSH to Switch/WLC.
  • Switch/WLC sends TACACS+ requests to ISE.
  • ISE verifies credentials, applies admin role policies, and logs activities.

Step-by-Step GUI Configuration Guide

Step 1 – Enable TACACS+ on ISE

  1. Log in to ISE GUI.
  2. Go to Administration → System → Deployment.
  3. Select your ISE node.
  4. Under TACACS+ Service, enable the checkbox.
  5. Save & restart application services if prompted.
    • [Screenshot: ISE Deployment TACACS+ Service Enabled]

Step 2 – Add Network Device for TACACS+

  1. Go to Administration → Network Resources → Network Devices.
  2. Click Add.
  3. Name: LAB-SW1
  4. IP Address: 192.168.1.10 (switch mgmt IP)
  5. Enable TACACS+ Authentication Settings.
  6. Set a shared secret (must match switch config).
  7. Save.
    • [Screenshot: Network Device TACACS+ Config]

Step 3 – Create Device Admin Policy Set

  1. Go to Work Centers → Device Administration → Policy Sets.
  2. Create a new Policy Set named Switch_Admin_Access.
  3. Conditions:
    • Device: Device Type = Switch
  4. Authentication Policy: Use Internal Users or AD join point.
  5. Authorization Policy: Map users to Privilege Levels (e.g., 15 for full access, 1 for read-only).
    • [Screenshot: TACACS+ Policy Set Screen]

Step 4 – Create Command Sets (Optional Granular Control)

  1. Go to Work Centers → Device Administration → Policy Elements → Command Sets.
  2. Create Full_Access (Permit All Commands).
  3. Create Read_Only (Permit show commands, deny configure commands).
    • [Screenshot: TACACS+ Command Set Creation]

Step 5 – Switch CLI Configuration

! Enable AAA
aaa new-model

! Define TACACS+ servers
tacacs server ISE1
 address ipv4 192.168.1.50
 key cisco123

! Enable device admin via TACACS+
aaa authentication login default group tacacs+ local
aaa authorization exec default group tacacs+ local
aaa accounting commands 15 default start-stop group tacacs+

! Optional: Fallback to local if ISE is down
aaa authentication login default group tacacs+ local

! Enable privilege level support
aaa authorization commands 15 default group tacacs+ local

Step 6 – Validation

  • SSH from Admin PC to switch:
ssh admin@192.168.1.10
  • Authenticate with ISE user credentials.
  • Check ISE Live Logs → TACACS+ Authentication for login records.
  • Run a few commands (e.g., show run) and confirm they appear in TACACS+ Accounting logs.

FAQs – Cisco ISE TACACS+

  1. What’s the primary difference between TACACS+ and RADIUS in ISE?
    • TACACS+ is used for device administration (managing switches, routers, firewalls, etc.) and separates authentication, authorization, and accounting functions.
    • RADIUS is used for network access control (wired, wireless, VPN). In ISE, you can run both on the same node.

  1. Which TCP/UDP ports does TACACS+ use, and do I need to open them in the firewall?
    • TACACS+ uses TCP port 49 by default. TCP ensures reliable delivery of authentication requests and accounting logs. You must allow TCP/49 between the network devices and the ISE node.

  1. Can I integrate TACACS+ with Active Directory for authentication?
    • Yes. In ISE, you can join the node to AD and map TACACS+ policies to AD groups (e.g., NetAdmin_Full or NetOps_ReadOnly). This eliminates the need to create separate local ISE accounts.

  1. How do I restrict an engineer to read-only access on network devices?
    • Use TACACS+ Command Sets in ISE.
      • Create a Command Set that allows only show commands.
      • Deny configure, reload, and other privileged commands.
      • Apply it in the Authorization Policy for that user/group.

  1. What happens if ISE is unavailable — will I be locked out of devices?
    • Not if you configure a local fallback on your network devices: aaa authentication login default group tacacs+ local This ensures that local accounts can still log in if TACACS+ is unreachable.

  1. Can TACACS+ log every command an admin runs?
    • Yes. TACACS+ Accounting in ISE can log:
      • Start/stop times of device sessions
      • Commands executed, along with timestamps
      • Privilege level changes

  1. Do I need a special license in ISE for TACACS+?
    • Yes. The Device Administration license is required to use TACACS+ in ISE. Without it, TACACS+ configuration and policies are not available.

  1. Can I have different TACACS+ policies for switches, firewalls, and wireless controllers?
    • Absolutely. In ISE Policy Sets, use Device Type or Location conditions to apply unique policies and command sets for each device category.

  1. How can I test TACACS+ connectivity from the device to ISE?
    • On the network device (e.g., Cisco switch): test aaa group tacacs+ admin password legacy Or from ISE CLI: ise/admin# ping <device_ip> ise/admin# show logging Check Live Logs → TACACS+ in ISE GUI for the test request.

  1. Can I run TACACS+ and RADIUS simultaneously on the same ISE node?
    • Yes. ISE can handle both services concurrently, using separate policy sets for TACACS+ (Device Admin) and RADIUS (Network Access). This is common in real-world deployments.

YouTube Link

For more in-depth Cisco ISE Mastery Training, subscribe to my YouTube channel Network Journey and join my instructor-led classes for hands-on, real-world ISE experience

[NEW COURSE ALERT] CISCO ISE (Identity Service Engine) by Sagar Dhawan
CCIE Security v6.1 Training – Ticket#1 Discussed
CCIE Security v6.1 – MAC Authentication Bypass (MAB) in Cisco ISE
CCNP to CCIE SECURITY v6.1 – New Online Batch

Closing Notes

By enabling TACACS+ on Cisco ISE, you gain granular control over network device administration, ensure accountability, and meet compliance requirements. This is a must-have for organizations aiming for strong operational security.


Fast-Track to Cisco ISE Mastery Pro

Ready to take your Cisco ISE skills to the next level?
I run a focused an intensive 4-month CCIE Security Instructor-Led Training — covering ISE, Firewalls, VPN, SD-WAN, and advanced security architectures.

  • This is not just theory — it’s live labs, real enterprise scenarios, and direct mentorship.
  • Seats are limited. Secure your spot today at: course.networkjourney.com/ccie-security
  • Learn. Lab. Master. Become the network security expert companies hire.

Enroll Now & Future‑Proof Your Career
Emailinfo@networkjourney.com
WhatsApp / Call: +91 97395 21088


Trainer Sagar Dhawan

Hi all,
Good to see you here.
I'm your Trainer for CCIE, CCNP, CCNA, Firewall batches and many more courses coming up!
Stay tuned for latest updates!
Keep me posted over Whatsapp/Email about your experience learning from us.
Thanks for being part of - "Network Journey - A journey towards packet-life!!!"