<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=Windows-1252">
</head>
<body style="word-wrap: break-word; -webkit-nbsp-mode: space; -webkit-line-break: after-white-space; color: rgb(0, 0, 0); font-size: 14px; font-family: Calibri, sans-serif;">
<div>
<div>
<div>Yup Yup, I realized after sending that and reading John’s reply. </div>
<div><br>
</div>
<div>We use them both, so I got them mixed up.</div>
<div><br>
</div>
<div>Thanks, Matt</div>
<div><br>
</div>
<div><br>
</div>
<div>
<div><br>
</div>
<div><br>
</div>
<div><br>
</div>
</div>
</div>
</div>
<div><br>
</div>
<span id="OLK_SRC_BODY_SECTION">
<div style="font-family:Calibri; font-size:11pt; text-align:left; color:black; BORDER-BOTTOM: medium none; BORDER-LEFT: medium none; PADDING-BOTTOM: 0in; PADDING-LEFT: 0in; PADDING-RIGHT: 0in; BORDER-TOP: #b5c4df 1pt solid; BORDER-RIGHT: medium none; PADDING-TOP: 3pt">
<span style="font-weight:bold">From: </span>John Fraizer <<a href="mailto:john@op-sec.us">john@op-sec.us</a>><br>
<span style="font-weight:bold">Date: </span>Friday, July 24, 2015 at 2:15 PM<br>
<span style="font-weight:bold">To: </span>Matt Almgren <<a href="mailto:matta@surveymonkey.com">matta@surveymonkey.com</a>><br>
<span style="font-weight:bold">Cc: </span>"Chase, John" <<a href="mailto:john.chase@rakuten.com">john.chase@rakuten.com</a>>, "<a href="mailto:tac_plus@shrubbery.net">tac_plus@shrubbery.net</a>" <<a href="mailto:tac_plus@shrubbery.net">tac_plus@shrubbery.net</a>><br>
<span style="font-weight:bold">Subject: </span>Re: [tac_plus] TACACS Solution?<br>
</div>
<div><br>
</div>
<div>
<div>
<div>TAC_PLUS is a TACACS+ daemon. It is going to provide a AAA</div>
<div>(Authentication, Authorization & Accounting) solution for you. It</div>
<div>does NOT synchronize or examine router/switch configurations. For</div>
<div>that, you will need something else - such as RANCID.</div>
<div><br>
</div>
<div>On Fri, Jul 24, 2015 at 1:33 PM, Matt Almgren <<a href="mailto:matta@surveymonkey.com">matta@surveymonkey.com</a>> wrote:</div>
<blockquote id="MAC_OUTLOOK_ATTRIBUTION_BLOCKQUOTE" style="BORDER-LEFT: #b5c4df 5 solid; PADDING:0 0 0 5; MARGIN:0 0 0 5;">
<div>1.2.2 Secure and synchronize router configuration files.</div>
<div>1.2.2.a Examine router configuration files to verify they are secured from unauthorized access.</div>
<div>1.2.2.b Examine router configurations to verify they are synchronized—for example, the running (or active) configuration matches the start-up configuration (used when machines are booted)</div>
<div><br>
</div>
<div>While the running (or active) router configuration files include the current, secure settings, the startup files (which are used when routers are restarted or booted) must be updated with the same secure settings to ensure these settings are applied when
the start-up configuration is run. Because they only run occasionally, start-up configuration files are often forgotten and are not updated. When a router re-starts and loads a start-up configuration that has not been updated with the same secure settings
as those in the running configuration, it may result in weaker rules that allow malicious individuals into the network.</div>
<div><br>
</div>
<div>Unless I’m missing something, that’s all our auditor told us we need to be concerned with. TAC+ handles all of it nicely.</div>
</blockquote>
<div><br>
</div>
<div><br>
</div>
<div><br>
</div>
<div>--</div>
<div>John Fraizer</div>
<div>LinkedIn profile: <a href="http://www.linkedin.com/in/johnfraizer/">http://www.linkedin.com/in/johnfraizer/</a></div>
<div><br>
</div>
</div>
</div>
</span>
</body>
</html>