Welcome![Sign In][Sign Up]
Location:
Search - cisco secure a

Search list

[OS programacs4.0-build-24

Description: Cisco Secure ACS 4.0 CISCO SECURE ACCESS CONTROL SERVER 4.0 FOR WINDOWS 思科® 安全访问控制服务器为思科智能信息网络提供基于身份的全面的访问控制解决方案。它是用于管理企业网络用户、管理员和网络基础设施资源的集成和控制层。 Cisco® Secure ACS (ACS)是具高可扩展性的高性能访问控制服务器,可作为集中的RADIUS 和 TACACS+ 服务器运行。Cisco Secure ACS将验证、用户访问和管理员访问与策略控制结合在一个集中的身份识别网络解决方案中,因此提高了灵活性、移动性、安全性和用户生产率, 从而进一步增强了访问安全性。它针对所有用户执行统一安全策略,不受用户网络访问方式的影响。它减轻了与扩展用户和网络管理员访问权限相关的管理负担。通过对所有用户帐户使用一个集中数据库,Cisco Secure ACS可集中控制所有的用户权限并将他们分配到网络中的几百甚至几千个接入点。对于记帐服务,Cisco Secure ACS针对网络用户的行为提供具体的报告和监控功能,并记录整个网络上每次的访问连接和设备配置变化。这个特性对于企业遵守Sarbanes Oxley法规尤其重要。Cisco Secure ACS支持广泛的访问连接,包括有线和无线局域网、宽带、内容、存储、IP上的语音(VoIP)、防火墙和VPN等。-Cisco Secure ACS 4.0 CISCO SECURE ACCESS CONTROL SERVER 4.0 FOR WINDOWS Cisco ® Secure Access Control Server for Cisco intelligent information network to provide a comprehensive identity-based access control solutions. It is used to manage enterprise network users, administrators and network infrastructure resources, integration and control layer. Cisco ® Secure ACS (ACS) is a highly scalable, high-performance access control server, as a centralized RADIUS and TACACS+ server is running. Cisco Secure ACS to verify user access and administrator access with policy control in conjunction with a centralized identity networking solutions, and therefore increased the flexibility, mobility, security and user productivity, and thus further enhance the safety of the visit. For all users of its implementation of a unified security policy, from the user mode of network access. Reduced with the expansion of its users and network administrators manage access-related burden. All user a
Platform: | Size: 44461056 | Author: 蔡建国 | Hits:

[Othermanaging-cisco-network-security.9781931836562.240

Description: Managing Cisco Network Security, Second Edition offers updated and revised information covering many of Cisco s security products that provide protection from threats, detection of network security incidents, measurement of vulnerability and policy compliance and management of security policy across an extended organization. These are the tools that network administrators have to mount defenses against threats. Chapters also cover the improved functionality and ease of the Cisco Secure Policy Manger software used by thousands of small-to-midsized businesses and a special section on the Cisco Aironet Wireless Security Solutions.
Platform: | Size: 5405696 | Author: kinomira | Hits:

[SCMEvil_Client_Sources

Description: The Evil Client is a replacement for the Cisco VPN Client GUI. The major feature is the ability to keep your VPN connection online all the time, i.e. the client automatically reconnects upon disconnection. The protocol used to control the Cisco background service has been reverse engineered and is used to trigger VPN connections and to keep them online. Besides, a secure storage mechanism for the VPN login credentials is provided.
Platform: | Size: 539648 | Author: louis | Hits:

CodeBus www.codebus.net