Cisco Upgrade any 111x appliance to ACS SE 4.1 software CSACSE-4.1-SWUP-K9 Hoja De Datos
Los códigos de productos
CSACSE-4.1-SWUP-K9
Product Bulletin
All contents are Copyright © 1992–2006 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
Page 1 of 2
Cisco Secure Access Control Server Solution Engine 4.1
PB378412
Product Overview
Cisco
®
Secure Access Control Server (ACS) Solution Engine is a rack-mounted,
dedicated platform supporting a comprehensive identity-based networking solution for
architecture, Cisco Secure ACS Solution Engine
extends access security by combining authentication, user or administrator access, and
policy control from a centralized identity-based networking framework. This gives
enterprise networks greater flexibility, mobility, and security, resulting in user productivity
gains. Cisco Secure ACS Solution Engine supports a wide array of access connection
types, including wired and wireless LAN, dialup, broadband, content, storage, voice over
IP (VoIP), firewalls, and VPNs. Cisco Secure ACS is available in two options: the Cisco
Secure ACS for Windows software kit, and the Cisco Secure ACS Solution Engine appliance.
Cisco Secure ACS is the leading authentication, authorization, and accounting (AAA)
platform in the market; it is deployed by 90 percent of the top 500 Cisco customers and by
more than 20,000 customers worldwide.
Cisco Secure ACS Solution Engine is a ready-to-use, security-hardened server focused on
exclusively running the Cisco Secure ACS services. Cisco Secure ACS Solution Engine provides
customers with dedicated, exclusive service for AAA that reduces the support and day-to-day
management requirements of Cisco Secure ACS systems in the network.
For more information on Cisco Secure ACS 4.1 for Windows, please refer to the data sheet and
the product bulletin
here
.
New Features
●
Support for Sarbanes-Oxley Act compliance—Cisco Secure ACS 4.1 addresses the
customer-compliance requirements associated with Cisco Secure ACS administrator
permissions and audit reports. These include:
◦
Administrative constraints on log settings
◦
Forced administrator password change at logon
◦
Administrator password policy
◦
Forced administrator password change for stale account
◦
Generation of entitlement reports
◦
Password history for administrators
●
Syslog support
●
External database MAC authentication bypass
●
Protected Extensible Authentication Protocol (PEAP) with Extensible Authentication
Protocol Transport Layer Security (EAP-TLS)