Cisco Cisco Aironet 350 Wireless Bridge Hoja De Datos
Data Sheet
All contents are Copyright © 1992–2006 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
Page 1 of 4
Cisco Secure Access Control Server 4.1
Cisco
®
Secure Access Control Server (ACS) provides a comprehensive, identity-based
access control solution for Cisco intelligent information networks. It is the integration and
control layer for managing enterprise network users, administrators, and the resources of
the network infrastructure.
Cisco Secure ACS is available as a rack-mountable, dedicated appliance—Cisco Secure ACS
Solution Engine—or as software that runs on Windows 2000 and 2003 platforms, Cisco Secure
ACS for Windows. Both products provide secure, industry-leading authentication, authorization,
and accounting (AAA) services to enterprises.
Product Overview
With an ever-increasing number of methods for accessing networks today, security breaches and
uncontrolled user access are of primary concern among enterprises. With the wide adoption of
IEEE 802.11 wireless LANs and ubiquitous broadband Internet connections, security challenges
exist not only at the perimeter, but also inside a network. Identity networking technologies that can
mitigate these security vulnerabilities have become of prime interest to customers worldwide.
Stronger forms of authentication, such as public key infrastructure (PKI) and one-time passwords
(OTPs), are increasingly used to control user access to corporate resources from public networks.
Network administrators look for solutions that provide flexible authorization policies that are tied to
the user identity, as well as to the network access type and the security of the machine used to
access the network. Lastly, the ability to centrally track and monitor the connectivity of network
users is of primary importance in isolating unwanted and excessive use of valuable network
resources.
Cisco Secure ACS is a highly scalable, high-performance access control server that operates as a
centralized RADIUS and TACACS+ server. It extends access security by combining authentication,
user access, and administrator access with policy control within a centralized identity networking
solution, allowing greater flexibility and mobility, increased security, and user-productivity gains. It
enforces a uniform security policy for all users regardless of how they access the network. It reduces
the administrative and management burden involved in scaling user and network administrator
access to the network. By using a central database for all user accounts, Cisco Secure ACS
centralizes the control of all user privileges and distributes them to hundreds or thousands of
access points throughout the network. As an accounting service, Cisco Secure ACS provides
detailed reporting and monitoring capabilities of network users' behavior and keeps a record of
every access connection and device configuration change across the entire network. This feature
has become extremely important for organizations in complying with Sarbanes-Oxley Act
regulations. Cisco Secure ACS supports a broad variety of access connections, including wired
and wireless LAN, dialup, broadband, content, storage, voice over IP (VoIP), firewalls, and VPNs.
Cisco Secure ACS is an important component of the
Cisco Identity-Based Networking Services
(IBNS)
architecture. Cisco IBNS is based on port-security standards such as 802.1x (an IEEE
standard for port-based network access control) and Extensible Authentication Protocol (EAP),