Does TACACS+ offer multivendor support?
TACACS+ is an open protocol (despite being developed by Cisco), and many vendors support it across their device lines. You can use a single TACACS+ server to control access across gear from:
Networking Vendors
- Cisco
- Juniper
- Aruba (HPE)
- Arista
- Extreme Networks
- Dell Networking
- Fortinet
Security & Infrastructure
- Palo Alto Networks
- Check Point
- F5
- SonicWall
đź”§ Others
- Linux/Unix systems (via PAM modules)
- Virtual appliances with SSH/CLI access
- Network management platforms and NAC solutions (like Portnox)
Caveat:
Each vendor may have slightly different syntax or attribute mappings in how they implement TACACS+ for command authorization, but authentication and accounting typically work consistently.
Most of the time, if your device supports external AAA via TACACS+, you can integrate it into a central policy—regardless of vendor.
TL;DR:
Yes—TACACS+ works across multiple vendors. It’s ideal for managing authentication and access policies across a mixed network environment.
Is TACACS multifactor authentication?
No, TACACS+ is not inherently multifactor authentication (MFA)—but it can be part of an MFA setup when integrated with the right tools.
What TACACS+ Does:
TACACS+ is a protocol for AAA (Authentication, Authorization, Accounting). It handles:
- Username + Password Authentication
- Authorization policies (like what commands a user can run)
- Logging/accounting of access events and commands
But by default, TACACS+ is single-factor—usually just a username and password.
How to Add MFA to TACACS+
You can enable MFA by integrating TACACS+ with an identity provider (IdP) or external authentication source that supports MFA.
Common MFA Integrations:
- TACACS+ + RADIUS proxy + MFA provider
- E.g., TACACS+ server forwards auth to RADIUS, which talks to Duo, Okta, or Azure MFA.
- TACACS+ server with LDAP/AD backend where MFA is enforced at the directory level.
- Cloud-native NAC platforms (like Portnox) that sit in front of device access and apply MFA policies.
Example Workflow:
- User connects to switch via SSH
- Switch uses TACACS+ for AAA
- TACACS+ server forwards auth to an MFA-enabled IdP (e.g., Duo)
- User gets push notification or TOTP prompt
- Upon successful MFA, TACACS+ completes login and applies command authorization
TACACS+ is not MFA by itself, but it can support MFA when combined with an identity provider or secondary authentication method.
What is the authentication protocol for TACACS+?
The authentication protocol used by TACACS+ is its own proprietary protocol, designed specifically for centralized AAA (Authentication, Authorization, and Accounting). Unlike protocols like RADIUS (which often use PAP, CHAP, or EAP for authentication), TACACS+ uses a custom TCP-based protocol with built-in mechanisms for secure authentication exchanges.
Key Characteristics of TACACS+ Authentication:
Custom, TCP-Based Protocol
- TACACS+ uses TCP port 49
- TCP ensures reliable delivery and session-oriented communication (vs. RADIUS, which uses UDP)
Full Payload Encryption
- Entire communication is encrypted (not just passwords)
- This includes username, password, authorization data, and accounting records
- Encryption is done using a shared secret between the TACACS+ client (e.g., a switch) and server
Flexible Authentication Flow
- Supports plaintext passwords, hashed passwords, one-time passwords (OTP), or even forwarded authentication to LDAP, RADIUS, or Active Directory
- This makes it adaptable for modern identity integrations
Separation of AAA
- Authentication is handled as a distinct, modular phase from authorization and accounting
- Great for implementing custom login policies or chaining external auth sources
TACACS+ uses its own encrypted TCP-based protocol for authentication, not standard protocols like PAP or CHAP. It’s secure, flexible, and designed for device-level access control.
What is the difference between TACACS and TACACS+?
TACACS and TACACS+ are related, but they’re very different in functionality and design. Here’s a quick breakdown to clear it up:
TACACS vs. TACACS+: What’s the Difference?
Feature | TACACS (Original) | TACACS+ (Modern) |
Release Date | 1984 | 1993 (developed by Cisco) |
Protocol Type | UDP | TCP (port 49) |
Encryption | Password only | Full payload encryption |
AAA Separation | Limited | True separation of AAA |
Extensibility | Minimal | Highly extensible |
Support for Command Control | No | Yes (per-command authorization) |
Standardized? | Obsolete | De facto standard (open spec) |
In Plain English:
- TACACS (original) was a simple protocol for remote authentication developed in the 1980s. It’s obsolete and no longer used.
- TACACS+ is a completely new and much more secure protocol that supports:
- Centralized authentication
- Per-command authorization (e.g., on routers/switches)
- Full accounting and logging
- Modern encryption and policy enforcement
Despite the similar name, TACACS+ ≠“TACACS but better” — it’s a totally redesigned protocol with enterprise-grade security features.
TACACS is dead. TACACS+ is the secure, modern standard. If you’re using “TACACS” today, it’s almost certainly TACACS+.