Generally, there are two forms of approaches that are used widely in networks today for User Credentials management i.e.  Username & Password based authentication and/or Certificate based authentication.First approach is easier to manage but if you choose easy passwords or your passwords are stolen, your identity can get compromised. 2nd approach requires little bit of [...]

Read more about Two factor authentication for Cisco VPN Solutions »

Since Cisco Secure ACS 5.X is based on a rule-based policy model, you can configure Policies (rules) based on a particular “condition” & apply a “result” if that condition is matched. In ACS terms, these conditions & results are called Policy Elements which constitute a Policy i.e. a Time based Access Restriction policy to allow [...]

Read more about ACS 5.X : Time-based Access Restrictions »

hide totop
  • RSS
  • Facebook
  • Twitter
  • RSS
  • Facebook
  • Twitter