Episode 51 — Administer 802.1X, RADIUS, and TACACS+ Authentication Services

Network authentication frameworks define who connects and with what privileges, a recurring focus on the SSCP exam. This episode introduces IEEE 802.1X as the standard for port-based network access control, showing how it uses an authenticator (such as a switch or wireless controller), a supplicant (the client), and an authentication server that validates credentials. We then compare Remote Authentication Dial-In User Service (RADIUS) and Terminal Access Controller Access-Control System Plus (TACACS+), explaining how both provide centralized authentication, authorization, and accounting but differ in protocol design, encryption scope, and typical use cases. Understanding these mechanisms allows you to select appropriate controls for enterprise and administrative contexts.
We apply the theory with concrete examples. A corporate Wi-Fi deployment may use 802.1X with RADIUS for user and device identity checks, while TACACS+ can secure administrative access to routers and firewalls. We discuss configuring redundancy, enforcing multifactor authentication, and logging every command executed by administrators for accountability. Troubleshooting guidance covers misconfigured shared secrets, certificate trust issues in EAP-TLS, and mismatched attributes between policy servers and network gear. By connecting the authentication flow—request, challenge, response, accept—with tangible artifacts like logs and policy sets, you’ll understand how to verify effective enforcement on networks and respond confidently to exam items about AAA design. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.
Episode 51 — Administer 802.1X, RADIUS, and TACACS+ Authentication Services
Broadcast by