Security controls

You can configure routers to use RADIUS, TACACS+, and local authentication to validate users requesting access to the network. The order in which password authentication is processed among RADIUS, TACACS+ and local passwords can be specifically configured. That is, the authentication order can be configured to process authorization through TACACS+ first, then RADIUS for authentication and accounting. Local access can be specified next in the authentication order in the event that the RADIUS and TACACS+ servers are not operational.

The following table lists the types of security supported by each protocol.

Table: Security methods capabilities
Method Authentication Authorization Accounting 1

Local

Y

Y

N

TACACS+

Y

Y

Y

RADIUS

Y

Y

Y

1 Local commands always perform account logging using the config log command.