I have ACS appliance V5 where I am using it as a radius server with the ASA firewall for VPN Connection user’s authentication.
I am planning to use the same ACS Appliance as a AAA server using Tacacs for controlling (allowing/denying) network user admin access on the network Components (Routers, switches, Firewalls, etc)
So i end up ith two different users lists, one list of users as vpn users, another list of users as network administrators.
Firstly, is it feasible to do it? And do you think this will affect the performance of the appliance?
Does it have any relation with the number of users, or number of managed components?
Also I would like to ask if I can group the management of the ACS Appliance admin permissions onto groups.
Which means a group is only allowed to grant VPN Access for certain users, and another group has only the right to manage network admin user’s access for the different network components; without any collapsing or interference between the ACS Appliance Administrators permissions.
Enable full visibilityCreating first policy setUnderstanding ISE Live Log status
These are few tips that will help you with your first deployment of ISE. For advanced tips, please visit: https://community.cisco.com/t5/security-documents/advanced-i...
This guide helps in troubleshooting the IBM QRadar pxGrid App. It is assumed that the ISE pxGrid App has already been installed in QRadar. The official IBM QRadar pxGrid App How-to Guide can be downloaded from: https://exchange.xforce.ibmcloud.com/...
Join us live on Tuesday, July 16 at 10 am PT to learn how integration and automation are the key to successful security designs. We’ll answer questions about Threat Response and also do a quick demo of our browser plugin and our latest integration wi...
Hello and welcome to the repository for the Monthly Webinar Series put together by our Desert Plains Operation Security Architecture team.
Our sessions are NOT recorded -- however you'll find historical slide decks attached as well as futu...
In June we have had new additions to our growing list of Machine-Learning-powered Confirmed Threat detections provided by the Cognitive Intelligence engine. Thanks to the improvement made to our Machine Learning backend (see Machine Learning Backend Impro...