Remote Access Policy - Cisco 3.3 User Manual

For windows server version 3.3
Table of Contents

Advertisement

Basic Deployment Factors for Cisco Secure ACS
Figure 2-8
Enterprise VPN Solution
Tunnel
Home office
ISP
Tunnel
Mobile
worker

Remote Access Policy

User Guide for Cisco Secure ACS for Windows Server
2-14
ISP
Internet
For more information about implementing VPN solutions, see the reference guide
A Primer for Implementing a Cisco Virtual Private
Remote access is a broad concept. In general, it defines how the user can connect
to the LAN, or from the LAN to outside resources (that is, the Internet). There are
several ways this may occur. The methods include dial-in, ISDN, wireless bridges,
and secure Internet connections. Each method incurs its own advantages and
disadvantages, and provides a unique challenge to providing AAA services. This
closely ties remote access policies to the enterprise network topology. In addition
to the method of access, other decisions can also affect how Cisco Secure ACS is
deployed; these include specific network routing (access lists), time-of-day
access, individual restrictions on AAA client access, access control lists (ACLs),
and so on.
Remote access policies can be implemented for employees who telecommute or
for mobile users who dial in over ISDN or public switched telephone network
(PSTN). Such policies are enforced at the corporate campus with Cisco Secure
ACS and the AAA client. Inside the enterprise network, remote access policies
can control wireless access by individual employees.
Chapter 2
VPN concentrator
Cisco Secure
Access Control
Server
Deployment Considerations
Network.
78-16592-01

Advertisement

Table of Contents
loading

This manual is also suitable for:

Secure access control serverSecure acs

Table of Contents