<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How many devices (MAB) can be authenticated via  the interna in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/how-many-devices-mab-can-be-authenticated-via-the-internal/m-p/1853706#M209517</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Carlos,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;that's great to know as I don't need to be afraid of any pitfalls - at least not in this regard. &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks a lot,&lt;/P&gt;&lt;P&gt;T.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 24 Jan 2012 20:07:36 GMT</pubDate>
    <dc:creator>toschu</dc:creator>
    <dc:date>2012-01-24T20:07:36Z</dc:date>
    <item>
      <title>How many devices (MAB) can be authenticated via  the internal identity stores ACS 5.3? ACS 1120 (802.1x))</title>
      <link>https://community.cisco.com/t5/network-access-control/how-many-devices-mab-can-be-authenticated-via-the-internal/m-p/1853701#M209444</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I´m currently looking for a document that specify how many MAC addresses can be stored and authenticated via an ACS (1120)? I prefer to use the internal identity store over AD or LDAP for MAB authentication for 802.1X project.&lt;/P&gt;&lt;P&gt;I would like to know what is the impact on the ACS? CPU/MEM?&lt;/P&gt;&lt;P&gt;What is the impact on the user authentication? delay, timeout, etc.&lt;/P&gt;&lt;P&gt;Please specify any other restriction or side effect.&lt;/P&gt;&lt;P&gt;Thanks for your input&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 01:45:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/how-many-devices-mab-can-be-authenticated-via-the-internal/m-p/1853701#M209444</guid>
      <dc:creator>amin.amor</dc:creator>
      <dc:date>2019-03-11T01:45:33Z</dc:date>
    </item>
    <item>
      <title>Re: How many devices (MAB) can be authenticated via  the interna</title>
      <link>https://community.cisco.com/t5/network-access-control/how-many-devices-mab-can-be-authenticated-via-the-internal/m-p/1853702#M209452</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Amin,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You might want to check the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/net_mgmt/cisco_secure_access_control_system/5.3/migration/guide/Migration_Deploy.html#wp1054828"&gt;http://www.cisco.com/en/US/docs/net_mgmt/cisco_secure_access_control_system/5.3/migration/guide/Migration_Deploy.html#wp1054828&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;H3&gt; Performance &lt;/H3&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; A single ACS 5.3 server that does not act as the log collector can&amp;nbsp; process more than 100 authentications per second. You should make sure&amp;nbsp; that a single ACS server processing AAA requests is able to manage the&amp;nbsp; load during peak hours. Peak hours typically occur when users arrive to&amp;nbsp; work, or when network equipment reboots. This creates a large amount of&amp;nbsp; authentications requests. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; For example, 50,000 employees of a company log on to a network evenly,&amp;nbsp; over a fifteen minute period. This translates to approximately 56&amp;nbsp; authentications per second as the peak authentication rate. In this&amp;nbsp; case, a single ACS server which does not act as the log collector, can&amp;nbsp; support this peak authentication rate. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.cisco.com/en/US/docs/net_mgmt/cisco_secure_access_control_system/5.3/migration/guide/Migration_Deploy.html#wp1054837"&gt;Table 1-5&lt;/A&gt; shows the number of authentications a single ACS server can support for&amp;nbsp; different time periods, assuming a minimal rate of 100 authentications&amp;nbsp; per second. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;DIV align="left"&gt;&lt;TABLE border="1" cellpadding="3" cellspacing="0" id="wp1054837table1054834" style="width: 80%;"&gt;&lt;CAPTION&gt;&lt;P&gt; Table 1-5&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Authentications Over Different Time Periods &lt;/P&gt;&lt;/CAPTION&gt; &lt;TBODY&gt;&lt;TR align="left" valign="bottom"&gt;&lt;TH scope="col"&gt;&lt;P&gt;1 second &lt;/P&gt;&lt;/TH&gt; &lt;TH scope="col"&gt;&lt;P&gt;100 authentications &lt;/P&gt;&lt;/TH&gt; &lt;/TR&gt;&lt;TR align="left" valign="top"&gt;&lt;TD&gt;&lt;P&gt;60 seconds &lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P&gt;6000 authentications &lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR align="left" valign="top"&gt;&lt;TD&gt;&lt;P&gt;5 minutes &lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P&gt;30000 authentications &lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR align="left" valign="top"&gt;&lt;TD&gt;&lt;P&gt;15 minutes &lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P&gt;90000 authentications &lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR align="left" valign="top"&gt;&lt;TD&gt;&lt;P&gt;1 hour &lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P&gt;360000 authentications &lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/DIV&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; There are many factors that affect ACS authentication performance, such&amp;nbsp; as configuration size, policy complexity, communication with external&amp;nbsp; servers and authentication protocol complexity. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;A href="http://www.cisco.com/en/US/docs/net_mgmt/cisco_secure_access_control_system/5.3/migration/guide/Migration_Deploy.html#wp1055476"&gt;Table 1-6&lt;/A&gt; lists the ACS performance for different authentication environments.&amp;nbsp; This performance data represents the lower range of authentication rates&amp;nbsp; observed while testing ACS with complex configurations. The performance&amp;nbsp; is higher for simpler configurations. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;DIV align="left"&gt;&lt;TABLE border="1" cellpadding="3" cellspacing="0" id="wp1055476table1055473" style="width: 80%;"&gt;&lt;CAPTION&gt;&lt;P&gt;Table 1-6&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; The Lower Range of ACS 5.3 Authentication Performance, in Authentications per Second &lt;/P&gt;&lt;/CAPTION&gt; &lt;TBODY&gt;&lt;TR align="left" valign="bottom"&gt;&lt;TH scope="col"&gt;&lt;DIV&gt;Authentication Types &lt;/DIV&gt;&lt;/TH&gt; &lt;TH colspan="3" scope="col"&gt;&lt;DIV&gt;Identity Stores &lt;/DIV&gt;&lt;/TH&gt; &lt;/TR&gt;&lt;TR align="left" valign="top"&gt;&lt;TD&gt;&lt;BR /&gt;&lt;/TD&gt;&lt;TD&gt;&lt;DIV&gt;Internal &lt;/DIV&gt;&lt;/TD&gt;&lt;TD&gt;&lt;DIV&gt;AD &lt;/DIV&gt;&lt;/TD&gt;&lt;TD&gt;&lt;DIV&gt;LDAP &lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR align="left" valign="top"&gt;&lt;TD&gt;&lt;P&gt;PAP &lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P&gt;500 &lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P&gt;100 &lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P&gt;800 &lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR align="left" valign="top"&gt;&lt;TD&gt;&lt;P&gt;CHAP &lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P&gt;500 &lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P&gt;500 &lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P&gt;N/A &lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR align="left" valign="top"&gt;&lt;TD&gt;&lt;P&gt;TACACS+ &lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P&gt;400 &lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P&gt;160 &lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P&gt;1200 &lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR align="left" valign="top"&gt;&lt;TD&gt;&lt;P&gt;MSCHAP &lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P&gt;500 &lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P&gt;300 &lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P&gt;N/A &lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR align="left" valign="top"&gt;&lt;TD&gt;&lt;P&gt;PEAP-MSCHAP &lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P&gt;200 &lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P&gt;100 &lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P&gt;N/A &lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR align="left" valign="top"&gt;&lt;TD&gt;&lt;P&gt;PEAP-GTC &lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P&gt;200 &lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P&gt;100 &lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P&gt;300 &lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR align="left" valign="top"&gt;&lt;TD&gt;&lt;P&gt;EAP-TLS &lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P&gt;200 &lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P&gt;180 &lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P&gt;270 &lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR align="left" valign="top"&gt;&lt;TD&gt;&lt;P&gt;LEAP &lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P&gt;330 &lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P&gt;280 &lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P&gt;N/A &lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR align="left" valign="top"&gt;&lt;TD&gt;&lt;P&gt;FAST-MSCHAP &lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P&gt;120 &lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P&gt;120 &lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P&gt;N/A &lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR align="left" valign="top"&gt;&lt;TD&gt;&lt;P&gt;FAST-GTC &lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P&gt;130 &lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P&gt;110 &lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P&gt;190 &lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR align="left" valign="top"&gt;&lt;TD&gt;&lt;P&gt;MAC-Auth Bypass &lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P&gt;750 &lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P&gt;N/A &lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P&gt;2000 &lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/DIV&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG src="http://www.cisco.com/en/US/i/templates/note.gif" /&gt;&lt;/P&gt;&lt;HR /&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;STRONG&gt;Note &lt;/STRONG&gt;&lt;IMG border="0" height="2" src="http://www.cisco.com/en/US/i/templates/blank.gif" width="1" /&gt;The above numbers assume fast reconnect and session resume is in use for the applicable EAP methods. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;HR /&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; There is an approximate 50% drop in authentication performance if the&amp;nbsp; ACS server is also being used as the log collector for the Monitoring&amp;nbsp; and Report Viewer. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; There is an approximate 10% to 15% increase in performance, on the CSACS 1121 appliance than the numbers shown in &lt;A href="http://www.cisco.com/en/US/docs/net_mgmt/cisco_secure_access_control_system/5.3/migration/guide/Migration_Deploy.html#wp1055476"&gt;Table 1-6&lt;/A&gt;. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; Performance on a virtual machine is slower than on an actual 1120&amp;nbsp; appliance because of the virtual machine overhead. Performance of a&amp;nbsp; virtual machine increases when you increase the CPU resources. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; For virtual machine environments, the minimum requirements are similar&amp;nbsp; to the 1121 appliance. For more information on virtual machine&amp;nbsp; environments, refer to the &lt;A href="http://www.cisco.com/en/US/docs/net_mgmt/cisco_secure_access_control_system/5.3/installation/guide/csacs_book.html"&gt;Installation and Upgrade Guide for the Cisco Secure Access Control System 5.3&lt;/A&gt;. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I hope the above clarifies it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; If you find the information provided helpful please rate.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Best Regards.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 24 Jan 2012 16:20:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/how-many-devices-mab-can-be-authenticated-via-the-internal/m-p/1853702#M209452</guid>
      <dc:creator>camejia</dc:creator>
      <dc:date>2012-01-24T16:20:57Z</dc:date>
    </item>
    <item>
      <title>Re: How many devices (MAB) can be authenticated via  the interna</title>
      <link>https://community.cisco.com/t5/network-access-control/how-many-devices-mab-can-be-authenticated-via-the-internal/m-p/1853703#M209463</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi Carlos,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am just replying to your response on Amins questions because I am wondering in fact whether there is a reasonable number of MAC addresses being stored for MAB within the internal identity store. So it is less about having 60 authentication requests handled per second by the ACS, but more about storing e.g. several thousand MAC addresses instead. Are there any known limitations so far? I thought I would have come across something around 8.000 addresses, but can't find it anymore.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Torsten.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 24 Jan 2012 19:41:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/how-many-devices-mab-can-be-authenticated-via-the-internal/m-p/1853703#M209463</guid>
      <dc:creator>toschu</dc:creator>
      <dc:date>2012-01-24T19:41:32Z</dc:date>
    </item>
    <item>
      <title>Re: How many devices (MAB) can be authenticated via  the interna</title>
      <link>https://community.cisco.com/t5/network-access-control/how-many-devices-mab-can-be-authenticated-via-the-internal/m-p/1853704#M209485</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Torsten,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ACS 5.x was tested by ACS Developers with 50,000 Internal Hosts configured. There does not seem to be a limit on the amount of Internal Hosts configured but instead the amount of Authentication Requests it can handle per second.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please mark the post as answered if the provided information has clarified your concerns.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Best Regards.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 24 Jan 2012 19:52:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/how-many-devices-mab-can-be-authenticated-via-the-internal/m-p/1853704#M209485</guid>
      <dc:creator>camejia</dc:creator>
      <dc:date>2012-01-24T19:52:01Z</dc:date>
    </item>
    <item>
      <title>Re: How many devices (MAB) can be authenticated via  the interna</title>
      <link>https://community.cisco.com/t5/network-access-control/how-many-devices-mab-can-be-authenticated-via-the-internal/m-p/1853705#M209500</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Torsten,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have confirmed on our database and also on this Community and the answer is the same &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Refer to:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A _jive_internal="true" href="https://community.cisco.com/thread/2101657"&gt;https://supportforums.cisco.com/thread/2101657&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Adding additional information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE style="margin: 0em;"&gt;Internal Users : 300000
Internal Hosts : 50000&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Best Regards.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 24 Jan 2012 19:53:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/how-many-devices-mab-can-be-authenticated-via-the-internal/m-p/1853705#M209500</guid>
      <dc:creator>camejia</dc:creator>
      <dc:date>2012-01-24T19:53:55Z</dc:date>
    </item>
    <item>
      <title>Re: How many devices (MAB) can be authenticated via  the interna</title>
      <link>https://community.cisco.com/t5/network-access-control/how-many-devices-mab-can-be-authenticated-via-the-internal/m-p/1853706#M209517</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Carlos,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;that's great to know as I don't need to be afraid of any pitfalls - at least not in this regard. &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks a lot,&lt;/P&gt;&lt;P&gt;T.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 24 Jan 2012 20:07:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/how-many-devices-mab-can-be-authenticated-via-the-internal/m-p/1853706#M209517</guid>
      <dc:creator>toschu</dc:creator>
      <dc:date>2012-01-24T20:07:36Z</dc:date>
    </item>
    <item>
      <title>How many devices (MAB) can be authenticated via  the internal id</title>
      <link>https://community.cisco.com/t5/network-access-control/how-many-devices-mab-can-be-authenticated-via-the-internal/m-p/1853707#M209542</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P style="margin: 0cm; margin-bottom: .0001pt;"&gt;Dear Carlos,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="margin: 0cm; margin-bottom: .0001pt;"&gt;Thanks for your reply, the following Cisco PDF file confirm the 50.000 MAC address limit on the ACS.&lt;/P&gt;&lt;P style="margin: 0cm; margin-bottom: .0001pt;"&gt;&lt;A href="http://www.cisco.com/en/US/prod/collateral/iosswrel/ps6537/ps6586/ps6638/config_guide_c17-663759.pdf"&gt;http://www.cisco.com/en/US/prod/collateral/iosswrel/ps6537/ps6586/ps6638/config_guide_c17-663759.pdf&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="margin: 0cm; margin-bottom: .0001pt;"&gt;As I can see from your answer, the accounting could consume upto 50% of the ACS performance, as you know monitoring is critical for 802.1x deployment in order to check which host has passed the authentication during the open phase. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="margin: 0cm; margin-bottom: .0001pt;"&gt;My question is: &lt;/P&gt;&lt;P style="margin: 0cm; margin-bottom: .0001pt;"&gt;If I disable the accounting in the production ACS, in order to increase the ACS performance. What is the proposed solution for the accounting? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="margin: 0cm; margin-bottom: .0001pt;"&gt;Regards&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 25 Jan 2012 13:43:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/how-many-devices-mab-can-be-authenticated-via-the-internal/m-p/1853707#M209542</guid>
      <dc:creator>amin.amor</dc:creator>
      <dc:date>2012-01-25T13:43:49Z</dc:date>
    </item>
    <item>
      <title>How many devices (MAB) can be authenticated via  the internal id</title>
      <link>https://community.cisco.com/t5/network-access-control/how-many-devices-mab-can-be-authenticated-via-the-internal/m-p/1853708#M209558</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Amin,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you have one Standalone server you cannot disable the ACS Log Collector features on it. Usually the best approach is to get another ACS 5.x registered as a Secondary Instance of the Primary ACS. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The Primary ACS will handle the Authentication Load and we can change the Log Collector to run on the Secondary ACS server instead.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;With the above deployment the Primary ACS will only perform authentication tasks while the secondary will be used for authentication if the primary goes down. The Secondary will always run as the Log Collector reducing the load on the Primary ACS.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Best Regards.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 27 Jan 2012 00:47:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/how-many-devices-mab-can-be-authenticated-via-the-internal/m-p/1853708#M209558</guid>
      <dc:creator>camejia</dc:creator>
      <dc:date>2012-01-27T00:47:34Z</dc:date>
    </item>
  </channel>
</rss>

