The ongoing explosion of different types of IP data, along with the perennial increase in the sheer volume of data, has necessitated a commensurate growth in the supporting network infrastructure—routers, switches, firewalls, wireless LAN controlle...
http://www.ebrahma.com/2013/09/cisco-secure-acs-access-control/Labels: Access-control-management, cisco-ACS, cisco-secure-ACS, role-based-access-policies