This chapter has provided information to configure some of the enhanced options in ACS, including the following topics:
These options can be used together or as standalone configurations. They can greatly enhance the control of a secure network. In the next chapter, "System Configuration," you will learn about external database configuration, database replication, database backup, and synchronization. |