2.5.4 Ensure Radius or TACACS+ server is configured - aaa server

Information

Configured the TACACS-Servers or Radius server for central authentication.

Rationale:

Authentication, authorization and accounting (AAA) scheme provide an authoritative source for managing and monitoring access for devices.

Solution

run the following command to enable and add TACACS+ servers.
CLI:

Hostname> set aaa tacacs-servers state on
Hostname> add aaa tacacs-servers priority <priority_value> server <IP_Address> key <Key> timeout <timeout_value>

GUI:

Navigate to User Management > Authentication Servers > TACACS+ configuration > Ensuere Enable TACACS+ authentication is checked

Navigate to User Management > Authentication Servers > TACACS+ configuration > Enable TACACS+ Servers > Add Provide <Server_IP_Address>, <Priority> and <Timeout>.

Run the following command to enable and add Radius servers.
CLI:

Hostname>add aaa radius-servers priority <priority_value> host <IP_Address> secret <Key> port <Port_number> timeout <timeout_value>

GUI:

Navigate to User Management > Authentication Servers > Radius Servers > Add
Provide <Server_IP_Address>, <Priority>, <UDP_Port> and <Timeout>.

Default Value:

Not Configured

See Also

https://workbench.cisecurity.org/files/2828

Item Details

Category: ACCESS CONTROL

References: 800-53|AC-12, CSCv6|16.4

Plugin: CheckPoint

Control ID: 9c3bf86b05c4ccb8e443c0d80967ad76e018fcccfb6b11ca93fa2502dbd60639