Solved

ACS vs NAC

Posted on 2016-09-07
2
108 Views
Last Modified: 2016-09-09
What is the main difference between the two? Advantages? Disadvantages? Why would I want to implement NAC over ACS? or ACS over NAC? Which is better?
0
Comment
Question by:Shark Attack
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 63

Accepted Solution

by:
btan earned 500 total points
ID: 41789059
I supposed you are referring to Cisco use term on NAC and ACS.

NAC serves a network enforcement point supporting 802.1x. It offers Authentication, Authorization and Remediation

ACS also does the NAC part and further provides TACACS/Radius support for network device management. However, it does not offer remediation.

You can check out the comparison details
http://www.thesecurityblogger.com/summarizing-cisco-access-control-nac-technologies/

There is in fact Identity Services Engine (ISE) which is probably what you should be exploring too

ISE takes on the features of NAC appliance, ACS 802.1x, Cisco Profiler and Cisco Guest server
http://www.thesecurityblogger.com/comparing-cisco-nac-solutions-identity-services-engine-ise-network-admission-control-nac-and-acs/
0
 
LVL 38

Expert Comment

by:Rich Rumble
ID: 41791304
0

Featured Post

NEW Veeam Agent for Microsoft Windows

Backup and recover physical and cloud-based servers and workstations, as well as endpoint devices that belong to remote users. Avoid downtime and data loss quickly and easily for Windows-based physical or public cloud-based workloads!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Web site adult filtering solutions for a small LAN network 27 190
Setting up a VPN 60 206
Equivalent of WSUS for Solaris, AIX and Cisco devices 11 75
VLAN 1 Line Protocol Down 9 42
PRTG Network Monitor lets you monitor your bandwidth usage, so you know who is using up your bandwidth, and what they're using it for.
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're looking for how to monitor bandwidth using netflow or packet s…

726 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question