Cisco Secure Access Control System (v. 5) - license - 1 additional license

Mfg.Part: CSACS-5-ADV-LIC | CDW Part: 2149663 | UNSPSC: 43233205
Availability: In Stock Ships same day if ordered before 4 PM CT
Lease Option ($248.59/month)
Note: Leasing is available to organizations only. Leasing is not available to individuals.
Product Details
  • (v. 5)
  • license
  • 1 additional license
View Full Product Details
Better Together
Quick View
Total Price:

Product Overview

Main Features
  • (v. 5)
  • license
  • 1 additional license
Cisco Secure Access Control System (ACS) ties together an enterprise's network access policy and identity strategy. Cisco Secure ACS 5 is a policy platform providing RADIUS and TACACS+ services. It supports the increasingly complex policies needed to meet today's new demands for access control management and compliance. Cisco Secure ACS provides central management of access policies for device administration and wireless and wired 802.1x network access scenarios.

Cisco Secure ACS provides the policy control for the Cisco Self Defending Network architecture, an architecture that protects your business by identifying, preventing, and adapting to threats from inside and outside the company. Cisco Secure ACS is a highly scalable, high-performance access policy system that centralizes device administration, authentication, and user access policy and reduces the management and support burden for these functions.

The Cisco Secure ACS 5 rules-based policy model supports the application of different authorization rules under different conditions, and thus policy is contextual and not limited to authorization determined by a single group membership. Integration capabilities allow information in external databases to be directly referenced in access policy rules, and attributes can be used both in policy conditions and authorization rules.

Cisco Secure ACS 5 features centralized collection and reporting for activity and system health information for full manageability of distributed deployments. It supports proactive operations such as monitoring and diagnostics, and reactive operations such as reporting and troubleshooting. Advanced features include a deployment-wide session monitor, threshold-based notifications, entitlement reports, and diagnostic tools.