Cisco ASA uses the TCP version for its TACACS implementation.
The SDI server can be configured to require the user to enter a new PIN when trying to authenticate.
This process is called The purpose of New PIN mode is to allow the user to change its PIN for authentication.
It sends the authentication request from the Cisco ASA to RADIUS Server 2 and proxies the response back to the ASA.
TACACS is an AAA security protocol that provides centralized validation of users who are attempting to gain access to NASs.
This chapter provides a detailed explanation of the configuration and troubleshooting of authentication, authorization, and accounting (AAA) network security services that Cisco ASA supports.
AAA offers different solutions that provide access control to network devices.
The Cisco ASA hashes the password, using the shared secret that is defined on the Cisco ASA and the RADIUS server.
In Figure 6-2, RADIUS Server 1 acts as a proxy to RADIUS Server 2.
The SDI solution uses small physical devices called that provide users with an OTP that changes every 60 seconds.
These OTPs are generated when a user enters a personal identification number and are synchronized with the server to provide the authentication service.