Cisco Secure Access Control Server Eases Administration Work

2008-01-02 11:34:11

( Computers )



Cisco secure access control server helps large network infrastructure to regulate accessibility and use of various devices utilized to deliver critical services. With Cisco secure access control server properly in placed, you have full control over all Cisco-based authentication, authorization, and accounting configurations and management.

Authentication

Authentication is the process of establishing user identification to the Cisco secure access control server. There are several ways on how to carry authentication, but the most common is the use of username and password. The Cisco secure access control server has an alternative authentication method that compares against diverse data sources so that you can authenticate against this source to impose one policy for login. Depending on authentication type and protocol, you can enable its encryption for a more secure login process.

Authorization

Authorization sets the activities allowed and not allowed to a user on the network after the user is authenticated. It works by using a created set of attributes describing what the user is allowed to access. These attribute-sets are compared to items stored in the database on the Cisco secure access control server, and the user's actual restrictions may be determined and delivered to the local network or remote access server ras where the user has connection.

Accounting

Accounting is a means of gathering and reporting usage data so that it can be used for billing and auditing purposes. The data collected include the times when the user starts and stops connection, the commands a user executes, and the number of bytes downloaded. The accounting module, once configured, transmits statistics on usage back to the Cisco secure access control server. You can then create a detailed report regarding network usage.

Without Cisco secure access control server that allows scalable and management application platform for configuration and monitoring of device access, security managers would be loaded with time-consuming network administration.


All rights Reserved © Tradenet Services srl
Do not duplicate or redistribute in any form.