- #Cisco secure access control system acs 5.3 tutorial update#
- #Cisco secure access control system acs 5.3 tutorial verification#
So, for a room that holds valuable goods, you might ask people to use their access card for identification and then ask them to supply a PIN or present their fingerprint for verification.
#Cisco secure access control system acs 5.3 tutorial verification#
This is called verification – you use the first method to identify yourself and the second to verify that it’s you.
You can also combine two identification methods to increase your security standards. You might choose one method for external doors, for example, and another method for internal doors.
Something you are – biometric identifiers such as your fingerprint or iris.Įach identification method has pros and cons, so the method to choose depends on the situation. Something you know – for example a PIN or password. Something you have – such as an access card or badge or another type of identification tag. There are other options to cards, however, and some offer higher levels of security. You present your card to a reader and, if all the conditions stored in the system are met, you’re allowed to enter. It will also show you who’s accessed where and when so that, if there’s an incident, it’s easier to determine who might have been involved.Ī variety of identifiers for access control solutionsĪccess cards are still the most common identifiers used in access control systems. #Cisco secure access control system acs 5.3 tutorial update#
And you can quickly and easily update them whenever you need to. What gives you even more control is that a good access control system lets you set these parameters for each individual.
Under which conditions they’re allowed accessįor example, you may set your system so contractors are only allowed access if it shows they’ve presented their certification. For example, you only want technicians to be allowed in your labs.Ĭontractors and junior staff may only be allowed access during their standard shift pattern, whereas senior staff can enter the building at any time. You may want only some people to enter certain areas. Whereas you’d like visitors and contractors to report to the reception desk on arrival. You may, for example, only want to allow automatic access to employees. It can be difficult to remember which key is for which door, but it’s too much of a security risk to label them.īy using an electronic access control system, you can avoid the downsides of using mechanical keys and also gain much more control. If someone needs to enter many different buildings and rooms, they’ll need a large number of keys, which are inconvenient to carry and use. You can’t see if and when someone’s used a key, so you don’t know who’s entered or at what time. You then need to distribute new keys to everyone who needs access to that door. If someone loses a key, you need to replace the lock to make sure the lost key can’t be misused. Below are just some of the problems presented by using keys. Even for a small company, however, using mechanical keys has several flaws and limitations – especially as an organisation gets bigger. Mechanical keys are the simplest form of physical access control and the method many smaller organisations use. Why use an access control system instead of keys? And, as they’re capable of logging who accessed where and when, they can provide valuable data to help you track how your buildings and sites are being used. They typically use an identifier such as an access card to authorise people to enter certain areas. When we talk about a physical access control system, we’re usually referring to an electronic security system. Including the improved efficiency of your business processes and site or building management. And, although one of its primary uses is to increase security, a physical access control system can offer many other benefits too. We tend to call it physical access control to differentiate it from access control that prevents people from entering virtual spaces – for example when logging into a computer network.
The location they’re entering may be, for example, a site, a building, a room or a cabinet. The person entering may be an employee, a contractor or a visitor and they may be on foot, driving a vehicle or using another mode of transport. At a very basic level, access control is a means of controlling who enters a location and when.