Hi,
TAC/TAC+ should be added to Mikrotik devices as all (I really do not have any other equipment that does not know about AAA with tacacs) know how to use tacacs for remote AAA.
We use TACACS for all of our network equipment and just saw that Mikrotik does not use that. TACACS is the way to go for logging remote commands and restrict users.
Here is just a quick diff between TACACS+ and RADIUS from GPT:
The choice between TACACS+ (Terminal Access Controller Access Control System Plus) and RADIUS (Remote Authentication Dial-In User Service) for network equipment login depends on the specific requirements and priorities of the organization. Both protocols have their strengths, but TACACS+ is generally preferred over RADIUS for network equipment login in certain scenarios due to the following reasons:
1. Granular Access Control: TACACS+ offers more granular access control capabilities compared to RADIUS. It allows administrators to define detailed authorization policies on a per-user or per-group basis, specifying exactly what commands and network resources each user can access. This level of granularity is especially important in large enterprise networks with complex security requirements.
2. Separation of Authentication and Authorization: TACACS+ separates authentication and authorization functions, whereas RADIUS often combines them. This separation allows for a more secure implementation, as authentication can be handled centrally while authorization decisions are made locally on the network device. In contrast, RADIUS usually performs both authentication and authorization on the RADIUS server, potentially exposing the server to greater risks.
3. Enhanced Security: TACACS+ provides stronger security mechanisms, including end-to-end encryption of communication between the client and the TACACS+ server. This encryption ensures that sensitive data, such as user credentials, is protected from potential eavesdropping and tampering. While RADIUS can also support encryption, it is not a mandatory requirement, and some RADIUS implementations might not use it by default.
4. Accounting Flexibility: TACACS+ offers more comprehensive accounting features compared to RADIUS. It provides detailed logging of all user activities on the network device, offering valuable data for auditing and compliance purposes. While RADIUS can handle accounting as well, TACACS+ is known for its more robust accounting capabilities.
5. Vendor Support: While both TACACS+ and RADIUS are widely supported by networking vendors, TACACS+ is favored in environments with Cisco network equipment. Cisco devices, in particular, have native support for TACACS+ and offer more features and integration options when using TACACS+ for authentication and authorization.
6. Extensible Attributes: TACACS+ allows for extensible attributes to be passed during the authentication and authorization process. This feature enables administrators to exchange additional information between the client and server, providing more flexibility for implementing custom features.
7. Device Administration vs. Dial-in Access: Historically, RADIUS was designed for dial-in access scenarios (e.g., remote user access to the network via modems). While it has been extended to support other use cases, TACACS+ was specifically designed for device administration, making it a more suitable choice for network equipment login scenarios.
In summary, TACACS+ is often preferred over RADIUS for network equipment login when the organization requires fine-grained access control, enhanced security, comprehensive accounting, and native vendor support for Cisco devices. However, it's essential to evaluate the specific needs and infrastructure of the organization before making a final decision, as both protocols have their merits and can be suitable for different network environments.