![Cisco Nexus 1000V Security Configuration Guide, Release 4.2(1) SV1(4) - Configuring TACACS+ [Cisco Nexus 1000V Switch for VMware vSphere] - Cisco Cisco Nexus 1000V Security Configuration Guide, Release 4.2(1) SV1(4) - Configuring TACACS+ [Cisco Nexus 1000V Switch for VMware vSphere] - Cisco](https://www.cisco.com/c/dam/en/us/td/docs/switches/datacenter/nexus1000/sw/4_2_1_s_v_1_4/security/configuration/guide/n1000v_security_6tacacs.fm/_jcr_content/renditions/n1000v_security_6tacacs-4.jpg)
Cisco Nexus 1000V Security Configuration Guide, Release 4.2(1) SV1(4) - Configuring TACACS+ [Cisco Nexus 1000V Switch for VMware vSphere] - Cisco
![Warning: The cli will be deprecated soon 'tacacs-server host 10.0.0.200 key CCNP2 ' Please move to 'tacacs server ' CLI – The DEVNET GRIND! Warning: The cli will be deprecated soon 'tacacs-server host 10.0.0.200 key CCNP2 ' Please move to 'tacacs server ' CLI – The DEVNET GRIND!](https://routingnull.files.wordpress.com/2019/08/cropped-loopedbacklogo4b.png?w=200)
Warning: The cli will be deprecated soon 'tacacs-server host 10.0.0.200 key CCNP2 ' Please move to 'tacacs server ' CLI – The DEVNET GRIND!
Solved: Cant enter enable mode after TACACS+ basic configuration - % Error in authentication - Cisco Community
![Warning: The cli will be deprecated soon 'tacacs-server host 10.0.0.200 key CCNP2 ' Please move to 'tacacs server ' CLI – The DEVNET GRIND! Warning: The cli will be deprecated soon 'tacacs-server host 10.0.0.200 key CCNP2 ' Please move to 'tacacs server ' CLI – The DEVNET GRIND!](https://routingnull.files.wordpress.com/2018/08/aaa_top1.png?w=700)
Warning: The cli will be deprecated soon 'tacacs-server host 10.0.0.200 key CCNP2 ' Please move to 'tacacs server ' CLI – The DEVNET GRIND!
![ACS 5.x: TACACS+ Authentication and Command Authorization based on AD group membership Configuration Example - Cisco ACS 5.x: TACACS+ Authentication and Command Authorization based on AD group membership Configuration Example - Cisco](https://www.cisco.com/c/dam/en/us/support/docs/security/secure-access-control-system/113590-acs5-tacas-config-01.gif)
ACS 5.x: TACACS+ Authentication and Command Authorization based on AD group membership Configuration Example - Cisco
![Configure ISE 2.0: IOS TACACS+ Authentication and Command Authorization based on AD group membership - Cisco Configure ISE 2.0: IOS TACACS+ Authentication and Command Authorization based on AD group membership - Cisco](https://www.cisco.com/c/dam/en/us/support/docs/security/identity-services-engine/200208-Configure-ISE-2-0-IOS-TACACS-Authentic-00.png)