Cisco Systems Servers Manuale Utente

Pagina di 654
2-11
Cisco Secure ACS 3.0 for Windows 2000/NT Servers User Guide
78-13751-01, Version 3.0
Chapter 2      Deploying Cisco Secure ACS
Basic Deployment Factors for Cisco Secure ACS
Figure 2-6
Large Deployment of Small Sites
For the model in 
, the decision where to site Cisco Secure ACS depends 
on whether users from the entire network need access on any AP, or whether they 
only require regional or local network access. This, along with database type, 
controls whether local or regional Cisco Secure ACS installations are required, 
and how database continuity is maintained. In this very large deployment model, 
security becomes a more complicated issue, too.
Remote Access using VPN 
Virtual Private Networks (VPNs) use advanced encryption and tunneling to 
permit organizations to establish secure, end-to-end, private network connections 
over third-party networks, such as the Internet or extranets; see 
. The benefits of a VPN include the following:
Cost Savings—By leveraging third-party networks with VPN, organizations 
no longer have to use expensive leased or frame relay lines and can connect 
remote users to their corporate networks via a local Internet service provider 
(ISP) instead of via expensive 800-number or long distance calls to 
resource-consuming modem banks.
I
63491