<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic AAA &amp; VPN in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/aaa-vpn/m-p/2199568#M155300</link>
    <description>&lt;P&gt;hello,&lt;/P&gt;&lt;P&gt;AAA server is nowadays an essential product on nowadays enterprises to control network equipments, &lt;SPAN style="font-size: 10pt;"&gt;and provides Authentication, Authorisation, and Accounting over all network devices. AAA is part of the management policy.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In parallel, the same server can be used for VPN users. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;so do you think each company must ship two ACS servers to the company or we can uses the same server for both services? (but this way the administrators of the ACS server will be the same people so they can grant themselve access to any network equipments)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;can i have a clear analysis about this critical issue?&lt;/P&gt;</description>
    <pubDate>Mon, 11 Mar 2019 03:18:14 GMT</pubDate>
    <dc:creator>learnsec</dc:creator>
    <dc:date>2019-03-11T03:18:14Z</dc:date>
    <item>
      <title>AAA &amp; VPN</title>
      <link>https://community.cisco.com/t5/network-access-control/aaa-vpn/m-p/2199568#M155300</link>
      <description>&lt;P&gt;hello,&lt;/P&gt;&lt;P&gt;AAA server is nowadays an essential product on nowadays enterprises to control network equipments, &lt;SPAN style="font-size: 10pt;"&gt;and provides Authentication, Authorisation, and Accounting over all network devices. AAA is part of the management policy.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In parallel, the same server can be used for VPN users. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;so do you think each company must ship two ACS servers to the company or we can uses the same server for both services? (but this way the administrators of the ACS server will be the same people so they can grant themselve access to any network equipments)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;can i have a clear analysis about this critical issue?&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 03:18:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/aaa-vpn/m-p/2199568#M155300</guid>
      <dc:creator>learnsec</dc:creator>
      <dc:date>2019-03-11T03:18:14Z</dc:date>
    </item>
    <item>
      <title>AAA &amp; VPN</title>
      <link>https://community.cisco.com/t5/network-access-control/aaa-vpn/m-p/2199569#M155301</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can never prevent a "Full" administrator on a AAA server from providing himself an access. The full privilege admin will be able at any time to create users and get access to whatever network resources that available.&lt;BR /&gt;What management can do it to monitor the admin activity reports to see what the admin is diong and there should be a company policy that the admin is not creating any config change on the AAA server without management approval.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Another thing that can be done is role-based administrators. some AAA servers allows you to create an admin user that has access to some of the AAA functionalities, but not all of them. For example, you can create an admin that can do network devices change but can not create or modify users.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Amjad&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: blue;"&gt;Rating useful replies is more useful than saying &lt;SPAN style="color: green;"&gt; "&lt;SPAN style="text-decoration: underline;"&gt;Thank you&lt;/SPAN&gt;"&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 13 Apr 2013 07:53:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/aaa-vpn/m-p/2199569#M155301</guid>
      <dc:creator>Amjad Abdullah</dc:creator>
      <dc:date>2013-04-13T07:53:41Z</dc:date>
    </item>
    <item>
      <title>Re: AAA &amp; VPN</title>
      <link>https://community.cisco.com/t5/network-access-control/aaa-vpn/m-p/2199570#M155303</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;thx amjad,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;in the role-based, can i allow certain ACS administrator(i.e. admin1) to create users and groups for VPN access, but this administrator (adimin1) cannot grant himself access to a certain network device (i.e. firewall A) ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;if this is feasable, then i can have two groups of adinistrators on the ACS, a group can manage the AAA service for network devices management, and another group for managing the users and groups of VPN users.&lt;/P&gt;&lt;P&gt;is this surely feasable through ACS role-based?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and finally, is there anything i can benefit from if i implement two different ACS Servers!!!!!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 14 Apr 2013 16:24:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/aaa-vpn/m-p/2199570#M155303</guid>
      <dc:creator>learnsec</dc:creator>
      <dc:date>2013-04-14T16:24:46Z</dc:date>
    </item>
    <item>
      <title>Re: AAA &amp; VPN</title>
      <link>https://community.cisco.com/t5/network-access-control/aaa-vpn/m-p/2199571#M155309</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;AFAIK it is not possible to restrict the admin from adding/deleting/modifying users or groups by specific criteria. Once the admin got the privilege to add/remote groups for example then s/he can do that for all groups.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can have two ACS servers for:&lt;BR /&gt;- Redundancy. If one goes down the users can still authenticate via the other one.&lt;/P&gt;&lt;P&gt;- load balancing. If you have large number of users you can load-balance them between two -or more- ACS servers.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Amjad&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: blue;"&gt;Rating useful replies is more useful than saying &lt;SPAN style="color: green;"&gt; "&lt;SPAN style="text-decoration: underline;"&gt;Thank you&lt;/SPAN&gt;"&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 15 Apr 2013 06:41:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/aaa-vpn/m-p/2199571#M155309</guid>
      <dc:creator>Amjad Abdullah</dc:creator>
      <dc:date>2013-04-15T06:41:21Z</dc:date>
    </item>
    <item>
      <title>Re: AAA &amp; VPN</title>
      <link>https://community.cisco.com/t5/network-access-control/aaa-vpn/m-p/2199572#M155313</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;yes you are right, as having two ACS appliances within the same cluster for redundancy and load balancing is the correct solution. As i cant find any meaning to have two diferrent clusters (4 servers) for two different services, where each cluster (2servers) serve an independent service.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;it is not the big deal to allow the network administrator to be granted access to all network devices espcially with accountibility enabled. this is not a constraint.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;the right architecture for me is one cluster (containing two acs servers) to do both jobs.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thx amjad&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Note: what is "AFAIK"?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 15 Apr 2013 08:21:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/aaa-vpn/m-p/2199572#M155313</guid>
      <dc:creator>learnsec</dc:creator>
      <dc:date>2013-04-15T08:21:02Z</dc:date>
    </item>
    <item>
      <title>AAA &amp; VPN</title>
      <link>https://community.cisco.com/t5/network-access-control/aaa-vpn/m-p/2199573#M155318</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I will tell you what AFAIK if you rate my answers above. &lt;SPAN __jive_emoticon_name="grin" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/grin.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;kidding, I will tell you. but I really apprecaite if you mark this thread as answered and rate the above answers.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;AFAIK = As Far As I Know.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Amjad&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: blue;"&gt;Rating useful replies is more useful than saying &lt;SPAN style="color: green;"&gt; "&lt;SPAN style="text-decoration: underline;"&gt;Thank you&lt;/SPAN&gt;"&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 15 Apr 2013 13:01:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/aaa-vpn/m-p/2199573#M155318</guid>
      <dc:creator>Amjad Abdullah</dc:creator>
      <dc:date>2013-04-15T13:01:41Z</dc:date>
    </item>
  </channel>
</rss>

