Solved

Cisco Security Agent (CSA) vs Cisco Secure Access Control Server (ACS)

Posted on 2006-11-08
7
183 Views
Last Modified: 2010-04-11
I could not find the difference between these two terminology when I did googled.

Any help for that ?

Regards
0
Comment
Question by:zillah
  • 4
  • 2
7 Comments
 
LVL 32

Expert Comment

by:rsivanandan
ID: 17897984
Cisco Security Agent:

  This is Host Based IDS System which comes in a Server/Client model. You have a server and you install clients on all your workstations. So you get the Host based IDS System and for monitoring/deploying you can use the Server.

Cisco Secure Access Control Server:

  This is an Authentication Server which supports TACACS+ and RADIUS. It is more versatile and integrates very well with different Cisco Management Products. Dynamic downloading of ACL based on user login etc are some great features.

Cheers,
Rajesh

CSA -> http://www.cisco.com/en/US/products/sw/secursw/ps5057/index.html

CSACS -> http://www.cisco.com/en/US/products/sw/secursw/ps2086/index.html
0
 

Author Comment

by:zillah
ID: 17898155
[cut]
This is Host Based IDS System which comes in a Server/Client model. You have a server and you install clients on all your workstations. So you get the Host based IDS System and for monitoring/deploying you can use the Server.
[/cut]

Again thanks Rajesh

If I have got cisco IDS (4215) as stand alone device, within my network, is there any need to use Cisco Security Agent (Host Based IDS) ?
0
 
LVL 32

Accepted Solution

by:
rsivanandan earned 125 total points
ID: 17899102
Both serves its own purpose Zillah. For example, most of the times a *well placed* Network IDS like 4215 would suffice. But if you are running 4.x code on it you'll only get detection. But CSA is a host based IPS, it will prevent it as well.

A well organized company will have enough security configurations for the workstations (like user not being in administrator group, well maintained Group Policy etc.) In such cases NIDS is enough.

But if that is not the case, then I would recommend for CSA, since it will do a better job. If you want to try out you can I guess, just see if you like the behavior and you'll come to know.

Cheers,
Rajesh
0
How to run any project with ease

Manage projects of all sizes how you want. Great for personal to-do lists, project milestones, team priorities and launch plans.
- Combine task lists, docs, spreadsheets, and chat in one
- View and edit from mobile/offline
- Cut down on emails

 
LVL 32

Expert Comment

by:rsivanandan
ID: 17904111
May I know why grade B ? For this question as well as the other one (for radius). I thought I did help you to what you wanted to know, just asking.

Cheers,
Rajesh
0
 

Author Comment

by:zillah
ID: 17904189
Sorry I will try to modify it if I can
0
 
LVL 32

Expert Comment

by:rsivanandan
ID: 17904356
No worries, forget it. I am wondering if I left out anything thats all.

Cheers,
Rajesh
0

Featured Post

Maximize Your Threat Intelligence Reporting

Reporting is one of the most important and least talked about aspects of a world-class threat intelligence program. Here’s how to do it right.

Join & Write a Comment

Ransomware continues to be a growing problem for both personal and business users alike and Antivirus companies are still struggling to find a reliable way to protect you from this dangerous threat.
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…

744 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

10 Experts available now in Live!

Get 1:1 Help Now