Two factor authentication with Cisco ACS 5.1 & Vasco
Essentially, you want to use radius between the two - stick to the standards for authenticaiton to avoid lock-in. I don't have any docs for adding two-factor auth to the ACS, but I do have one for a VPN concentrator:
While it makes the configuration up-front more complex, you should really run the authentication through your user directory for authorization first. The benefit is that disabling a user in your directory then prevents their credentials from even reaching the two-factor server. So, an AD admin or HR can disable a user without being an Admin on your 2FA server. Microsoft supports this using their Radius plugin called NPS. Here's a doc on running radius through NPS, but using SSH as the network client - so subsitute your ACS for the SSH server:
Login to the FXOS chassis manager.
Direct your browser to https://hostname/, and log-in using the user-name and password.
Go to Help > About and check the current version:
Check the current version availa...
We have configured the outside and inside Interface with official ipv6 adresses, set a default route on outside Interface to our router, we also have definied a rule , which also gets hits, to permit tcp from inside Interface to any6.
In Syslog I also se...