Register your product to gain access to bonus material or receive a coupon.
Cisco's complete, authoritative guide to Authentication, Authorization, and Accounting (AAA) solutions with CiscoSecure ACS
This is the first complete, authoritative, single-source guide to implementing, configuring, and managing Authentication, Authorization and Accounting (AAA) identity management with CiscoSecure Access Control Server (ACS) 4 and 5. Written by three of Cisco's most experienced CiscoSecure product support experts, it covers all AAA solutions (except NAC) on Cisco routers, switches, access points, firewalls, and concentrators. It also thoroughly addresses both ACS configuration and troubleshooting, including the use of external databases supported by ACS. Each of this book's six sections focuses on specific Cisco devices and their AAA configuration with ACS. Each chapter covers configuration syntax and examples, debug outputs with explanations, and ACS screenshots. Drawing on the authors' experience with several thousand support cases in organizations of all kinds, AAA Identity Management Security presents pitfalls, warnings, and tips throughout. Each major topic concludes with a practical, hands-on lab scenario corresponding to a real-life solution that has been widely implemented by Cisco customers. This book brings together crucial information that was previously scattered across multiple sources. It will be indispensable to every professional running CiscoSecure ACS 4 or 5, as well as all candidates for CCSP and CCIE (Security or R and S) certification.
Good Book If You Are a CISCO House,
This review is from: AAA Identity Management Security (Networking Technology: Security) (Paperback)I obtained AAA Identity Management Security at the Sonoran Desert Security Users Group (SDSUG) meeting. The book addresses the two major versions of the CISCO Access Control Server (ACS) platform, 4.x and 5.x and primarily focuses on how to implement, configure, and manage AAA identity management with CiscoSecure ACS 4.X and 5.X. It also covers how ACS integrates with various security solutions such as Identity Stores, VPN, NAS for 802.1X, and Cisco ASA/PIX.
The book explains everything with real, practical examples, beginning with basic AAA concepts to advance concepts on ACS 4.x & 5.X. It provides a mixture of scenarios and configuration examples. The book is a nice reference on how on to tie up all the elements of AAA on the various Cisco Devices.
PROS: If you are a CISCO house, then this is an excellent book. It focuses on specific Cisco devices (e.g. routers, switches, access points, firewalls) and their AAA configuration with ACS. Each section provides... Read more
improved network security,
This review is from: AAA Identity Management Security (Networking Technology: Security) (Paperback)The authors explain how Cisco has enabled this latest version of network identity security. The AAA refers to the 3 fundamental issues of authentication, authorisation and accounting [logging]. If you keep these ideas in focus, then it greatly simplifies the reading of the details in the book. The Access Control Server is the firmware via which you administer and deal with AAA.
ACS covers the important topic of handling LDAP. While this is meant to be 'lightweight', the details of understanding and managing an LDAP database can still be quite involved. The GUI-driven interface in ACS guides the sysop in giving the various possible administrative options, along with online help. Perhaps far easier than a command line interface.
Note however that while the book's subtitle mentions ACS, the book is not strictly confined to that. Chapter 8 on IOS switches explains at length how those can be used to handle 802.1X and the Extensible Authentication Protocol [EAP]. ACS... Read more
Part I - AAA and CiscoSecure ACS
1 Authentication Authorization Accounting (AAA) Authentication
2 CiscoSecure ACS Introduction to ACS
3 Getting Familiar with ACS 4.2 The 7 ACS Services
4 Getting Familiar with ACS 5.1 Differences between ACS 4 and ACS 5
5 Configuring External Databases with ACS Unknown User Policy
Part II - Administrative AAA
6 IOS Based Devices The Lines and Default Login
7 PIX and ASA Local Authentication of Telnet/SSH/HTTP
8 IOS Switches Introduction to 802.1x
9 Access Points Configuring SSID for Dot1x Authentication
10 Pix/ASA Introduction to Cut-through Proxy Authentication
11 Router Introduction to Auth-proxy
Part V - Remote Access
12 Routers and Access Servers Authenticating Remote Access VPN Sessions
13 Pix/ASA Authentication of Remote Access VPN Sessions
Part VI - ACS Advanced Configuration
14 ACS 4.2 Network Access Restriction
15 ACS 5.1 Replication
Download the sample pages (includes Chapter 4 and Index)
Book + eBook Bundle
Book Price $56.00
eBook Price $19.60
eBook formats included
This book includes free shipping!
This book includes free shipping!
Includes EPUB, MOBI, and PDF
About Watermarked eBooks
This eBook includes the following formats, accessible from your Account page after purchase:
EPUBThe open industry format known for its reflowable content and usability on supported mobile devices.
MOBIThe eBook format compatible with the Amazon Kindle and Amazon Kindle applications.
PDFThe popular standard, used most often with the free Adobe® Reader® software.
This eBook requires no passwords or activation to read. We customize your eBook by discretely watermarking it with your name, making it uniquely yours.
Get access to thousands of books and training videos about technology, professional development and digital media from more than 40 leading publishers, including Addison-Wesley, Prentice Hall, Cisco Press, IBM Press, O'Reilly Media, Wrox, Apress, and many more. If you continue your subscription after your 30-day trial, you can receive 30% off a monthly subscription to the Safari Library for up to 12 months. That's a total savings of $199.