Cisco 3.3 Instrukcja Użytkownika Strona 1

Przeglądaj online lub pobierz Instrukcja Użytkownika dla Komputery Cisco 3.3. Cisco 3.3 User Manual Instrukcja obsługi

  • Pobierz
  • Dodaj do moich podręczników
  • Drukuj
Przeglądanie stron 0
Corporate Headquarters
Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134-1706
USA
http://www.cisco.com
Tel: 408 526-4000
800 553-NETS (6387)
Fax: 408 526-4100
User Guide for Cisco Secure ACS for
Windows Server
Version 3.3
May 2004
Customer Order Number: DOC-7816592=
Text Part Number: 78-16592-01
Przeglądanie stron 0
1 2 3 4 5 6 ... 859 860

Podsumowanie treści

Strona 1 - Windows Server

Corporate HeadquartersCisco Systems, Inc.170 West Tasman DriveSan Jose, CA 95134-1706USAhttp://www.cisco.comTel: 408 526-4000800 553-NETS (6387)Fax:

Strona 2

ContentsxUser Guide for Cisco Secure ACS for Windows Server78-16592-01Configuring BBSM RADIUS Settings for a User Group 6-51Configuring Custom RADIUS

Strona 3 - CONTENTS

Chapter 3 Interface ConfigurationInterface Design Concepts3-2User Guide for Cisco Secure ACS for Windows Server78-16592-01• Protocol Configurati

Strona 4

3-3User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 3 Interface ConfigurationUser Data Configuration OptionsUser Data Config

Strona 5

Chapter 3 Interface ConfigurationAdvanced Options3-4User Guide for Cisco Secure ACS for Windows Server78-16592-01Restarting Cisco Secure ACS-rel

Strona 6 - 4 Network Configuration 4-1

3-5User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 3 Interface ConfigurationAdvanced Options• User-Level Network Access Res

Strona 7

Chapter 3 Interface ConfigurationAdvanced Options3-6User Guide for Cisco Secure ACS for Windows Server78-16592-01• RDBMS Synchronization—When se

Strona 8 - 6 User Group Management 6-1

3-7User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 3 Interface ConfigurationProtocol Configuration Options for TACACS+advan

Strona 9

Chapter 3 Interface ConfigurationProtocol Configuration Options for TACACS+3-8User Guide for Cisco Secure ACS for Windows Server78-16592-01Note

Strona 10 - 7 User Management 7-1

3-9User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 3 Interface ConfigurationProtocol Configuration Options for TACACS+–Disp

Strona 11 - Contents

Chapter 3 Interface ConfigurationProtocol Configuration Options for TACACS+3-10User Guide for Cisco Secure ACS for Windows Server78-16592-01To c

Strona 12

3-11User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 3 Interface ConfigurationProtocol Configuration Options for RADIUSThe s

Strona 13

xiUser Guide for Cisco Secure ACS for Windows Server78-16592-01ContentsConfiguring Device-Management Command Authorization for a User7-30Configuring

Strona 14

Chapter 3 Interface ConfigurationProtocol Configuration Options for RADIUS3-12User Guide for Cisco Secure ACS for Windows Server78-16592-01Table

Strona 15

3-13User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 3 Interface ConfigurationProtocol Configuration Options for RADIUSTip Y

Strona 16 - 11 Logs and Reports 11-1

Chapter 3 Interface ConfigurationProtocol Configuration Options for RADIUS3-14User Guide for Cisco Secure ACS for Windows Server78-16592-01selec

Strona 17

3-15User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 3 Interface ConfigurationProtocol Configuration Options for RADIUSSessi

Strona 18 - 13 User Databases 13-1

Chapter 3 Interface ConfigurationProtocol Configuration Options for RADIUS3-16User Guide for Cisco Secure ACS for Windows Server78-16592-01appea

Strona 19

3-17User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 3 Interface ConfigurationProtocol Configuration Options for RADIUSStep

Strona 20

Chapter 3 Interface ConfigurationProtocol Configuration Options for RADIUS3-18User Guide for Cisco Secure ACS for Windows Server78-16592-01Step

Strona 21 - 15 Unknown User Policy 15-1

CHAPTER 4-1User Guide for Cisco Secure ACS for Windows Server78-16592-014Network ConfigurationThis chapter details concepts and procedures for configu

Strona 22

Chapter 4 Network ConfigurationAbout Distributed Systems4-2User Guide for Cisco Secure ACS for Windows Server78-16592-01If you are using network

Strona 23 - C RADIUS Attributes C-1

4-3User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 4 Network ConfigurationAbout Distributed Systems• CiscoSecure database r

Strona 24 - D CSUtil Database Utility D-1

ContentsxiiUser Guide for Cisco Secure ACS for Windows Server78-16592-01CHAPTER 8 System Configuration: Basic 8-1Service Control 8-1Determining the S

Strona 25

Chapter 4 Network ConfigurationProxy in Distributed Systems4-4User Guide for Cisco Secure ACS for Windows Server78-16592-01with one another. Eac

Strona 26 - G Internal Architecture G-1

4-5User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 4 Network ConfigurationProxy in Distributed SystemsNote When a Cisco Sec

Strona 27

Chapter 4 Network ConfigurationProxy in Distributed Systems4-6User Guide for Cisco Secure ACS for Windows Server78-16592-01continues, in order,

Strona 28

4-7User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 4 Network ConfigurationProxy in Distributed SystemsBecause Mary works in

Strona 29 - Organization

Chapter 4 Network ConfigurationNetwork Device Searches4-8User Guide for Cisco Secure ACS for Windows Server78-16592-01You can also choose to hav

Strona 30

4-9User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 4 Network ConfigurationNetwork Device Searchesor “m*”. Name-based search

Strona 31 - Conventions

Chapter 4 Network ConfigurationNetwork Device Searches4-10User Guide for Cisco Secure ACS for Windows Server78-16592-01Tip When you leave the Se

Strona 32 - Product Documentation

4-11User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 4 Network ConfigurationAAA Client ConfigurationStep 6 If you want to do

Strona 33 - Related Documentation

Chapter 4 Network ConfigurationAAA Client Configuration4-12User Guide for Cisco Secure ACS for Windows Server78-16592-01recommend that you adopt

Strona 34 - Table 2 Related Documentation

4-13User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 4 Network ConfigurationAAA Client ConfigurationFor correct operation, t

Strona 35 - Obtaining Documentation

xiiiUser Guide for Cisco Secure ACS for Windows Server78-16592-01ContentsEvent Logging 8-20Setting Up Event Logging 8-20VoIP Accounting Configuration

Strona 36 - Documentation Feedback

Chapter 4 Network ConfigurationAAA Client Configuration4-14User Guide for Cisco Secure ACS for Windows Server78-16592-01When an authentication r

Strona 37 - Submitting a Service Request

4-15User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 4 Network ConfigurationAAA Client Configurationattributes. If the AAA c

Strona 38

Chapter 4 Network ConfigurationAAA Client Configuration4-16User Guide for Cisco Secure ACS for Windows Server78-16592-01• Replace RADIUS Port in

Strona 39

4-17User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 4 Network ConfigurationAAA Client ConfigurationStep 2 Do one of the fol

Strona 40

Chapter 4 Network ConfigurationAAA Client Configuration4-18User Guide for Cisco Secure ACS for Windows Server78-16592-01Step 7 From the Authenti

Strona 41 - Overview

4-19User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 4 Network ConfigurationAAA Client ConfigurationTip If you want to save

Strona 42 - The Cisco Secure ACS Paradigm

Chapter 4 Network ConfigurationAAA Client Configuration4-20User Guide for Cisco Secure ACS for Windows Server78-16592-01Step 2 Do one of the fol

Strona 43 - Chapter 1 Overview

4-21User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 4 Network ConfigurationAAA Server ConfigurationDeleting a AAA ClientTo

Strona 44

Chapter 4 Network ConfigurationAAA Server Configuration4-22User Guide for Cisco Secure ACS for Windows Server78-16592-01To configure distributed

Strona 45

4-23User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 4 Network ConfigurationAAA Server ConfigurationNote After you submit th

Strona 46 - • Administration, page 1-23

ContentsxivUser Guide for Cisco Secure ACS for Windows Server78-16592-01RDBMS Synchronization Components 9-29About CSDBSync 9-29About the accountActi

Strona 47

Chapter 4 Network ConfigurationAAA Server Configuration4-24User Guide for Cisco Secure ACS for Windows Server78-16592-01–Cisco Secure ACS—Select

Strona 48 - Authentication

4-25User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 4 Network ConfigurationAAA Server ConfigurationTo add and configure a A

Strona 49 - Authentication Considerations

Chapter 4 Network ConfigurationAAA Server Configuration4-26User Guide for Cisco Secure ACS for Windows Server78-16592-01Step 9 From the Traffic

Strona 50

4-27User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 4 Network ConfigurationAAA Server ConfigurationTo edit a AAA server, fo

Strona 51 - Passwords

Chapter 4 Network ConfigurationNetwork Device Group Configuration4-28User Guide for Cisco Secure ACS for Windows Server78-16592-01Deleting a AAA

Strona 52 - Comparing PAP, CHAP, and ARAP

4-29User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 4 Network ConfigurationNetwork Device Group ConfigurationCisco Secure A

Strona 53 - EAP Support

Chapter 4 Network ConfigurationNetwork Device Group Configuration4-30User Guide for Cisco Secure ACS for Windows Server78-16592-01Tip If the Net

Strona 54 - Basic Password Configurations

4-31User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 4 Network ConfigurationNetwork Device Group ConfigurationTip If the Net

Strona 55 - Password Aging

Chapter 4 Network ConfigurationNetwork Device Group Configuration4-32User Guide for Cisco Secure ACS for Windows Server78-16592-01Renaming a Net

Strona 56 - User-Changeable Passwords

4-33User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 4 Network ConfigurationNetwork Device Group ConfigurationTip It may be

Strona 57 - Authorization

xvUser Guide for Cisco Secure ACS for Windows Server78-16592-01ContentsEAP-TLS Authentication 10-2About the EAP-TLS Protocol 10-3EAP-TLS and Cisco Se

Strona 58 - Dynamic Usage Quotas

Chapter 4 Network ConfigurationProxy Distribution Table Configuration4-34User Guide for Cisco Secure ACS for Windows Server78-16592-01Proxy Dist

Strona 59

4-35User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 4 Network ConfigurationProxy Distribution Table Configurationcharacter

Strona 60

Chapter 4 Network ConfigurationProxy Distribution Table Configuration4-36User Guide for Cisco Secure ACS for Windows Server78-16592-01Tip You ca

Strona 61

4-37User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 4 Network ConfigurationProxy Distribution Table ConfigurationStep 1 In

Strona 62 - Accounting

Chapter 4 Network ConfigurationProxy Distribution Table Configuration4-38User Guide for Cisco Secure ACS for Windows Server78-16592-01Deleting a

Strona 63 - Administration

CHAPTER 5-1User Guide for Cisco Secure ACS for Windows Server78-16592-015Shared Profile ComponentsThis chapter addresses the Cisco Secure ACS for Wind

Strona 64 - Network Device Groups

Chapter 5 Shared Profile ComponentsNetwork Access Filters5-2User Guide for Cisco Secure ACS for Windows Server78-16592-01named shared profile co

Strona 65

5-3User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 5 Shared Profile ComponentsNetwork Access Filters• NAFs in shared networ

Strona 66 - HTML Interface Security

Chapter 5 Shared Profile ComponentsNetwork Access Filters5-4User Guide for Cisco Secure ACS for Windows Server78-16592-01Step 3 Click Add.The Ne

Strona 67 - HTML Interface Layout

5-5User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 5 Shared Profile ComponentsNetwork Access FiltersTip You can also remove

Strona 68

ContentsxviUser Guide for Cisco Secure ACS for Windows Server78-16592-01Generating a Certificate Signing Request 10-45Using Self-Signed Certificates

Strona 69

Chapter 5 Shared Profile ComponentsNetwork Access Filters5-6User Guide for Cisco Secure ACS for Windows Server78-16592-01Caution If you change t

Strona 70

5-7User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 5 Shared Profile ComponentsDownloadable IP ACLsNote Restarting the servi

Strona 71

Chapter 5 Shared Profile ComponentsDownloadable IP ACLs5-8User Guide for Cisco Secure ACS for Windows Server78-16592-01This section contains the

Strona 72 - Accessing the HTML Interface

5-9User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 5 Shared Profile ComponentsDownloadable IP ACLsACL to each applicable us

Strona 73

Chapter 5 Shared Profile ComponentsDownloadable IP ACLs5-10User Guide for Cisco Secure ACS for Windows Server78-16592-01Examples of Cisco device

Strona 74 - Using Online Help

5-11User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 5 Shared Profile ComponentsDownloadable IP ACLsTo add a downloadable IP

Strona 75

Chapter 5 Shared Profile ComponentsDownloadable IP ACLs5-12User Guide for Cisco Secure ACS for Windows Server78-16592-01Step 9 To save the ACL c

Strona 76

5-13User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 5 Shared Profile ComponentsDownloadable IP ACLsEditing a Downloadable I

Strona 77 - Deployment Considerations

Chapter 5 Shared Profile ComponentsNetwork Access Restrictions5-14User Guide for Cisco Secure ACS for Windows Server78-16592-01Cisco Secure ACS

Strona 78 - System Requirements

5-15User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 5 Shared Profile ComponentsNetwork Access RestrictionsThis section cont

Strona 79

xviiUser Guide for Cisco Secure ACS for Windows Server78-16592-01ContentsConfiguring an ODBC Log 11-23Remote Logging 11-26About Remote Logging 11-26I

Strona 80 - Network and Port Requirements

Chapter 5 Shared Profile ComponentsNetwork Access Restrictions5-16User Guide for Cisco Secure ACS for Windows Server78-16592-01the client. For t

Strona 81

5-17User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 5 Shared Profile ComponentsNetwork Access RestrictionsAbout IP-based NA

Strona 82 - Network Topology

Chapter 5 Shared Profile ComponentsNetwork Access Restrictions5-18User Guide for Cisco Secure ACS for Windows Server78-16592-01About Non-IP-base

Strona 83

5-19User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 5 Shared Profile ComponentsNetwork Access Restrictions• If you are usin

Strona 84

Chapter 5 Shared Profile ComponentsNetwork Access Restrictions5-20User Guide for Cisco Secure ACS for Windows Server78-16592-01To add a shared N

Strona 85 - Wireless Network

5-21User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 5 Shared Profile ComponentsNetwork Access RestrictionsNote The total nu

Strona 86 - Cisco Aironet AP

Chapter 5 Shared Profile ComponentsNetwork Access Restrictions5-22User Guide for Cisco Secure ACS for Windows Server78-16592-01d. To specify the

Strona 87

5-23User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 5 Shared Profile ComponentsNetwork Access RestrictionsEditing a Shared

Strona 88 - Remote Access using VPN

Chapter 5 Shared Profile ComponentsNetwork Access Restrictions5-24User Guide for Cisco Secure ACS for Windows Server78-16592-01Step 7 To edit a

Strona 89 - Network WAN

5-25User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 5 Shared Profile ComponentsCommand Authorization SetsTo delete a shared

Strona 90 - Remote Access Policy

ContentsxviiiUser Guide for Cisco Secure ACS for Windows Server78-16592-01CHAPTER 13 User Databases 13-1CiscoSecure User Database 13-2About the Cisco

Strona 91 - Administrative Access Policy

Chapter 5 Shared Profile ComponentsCommand Authorization Sets5-26User Guide for Cisco Secure ACS for Windows Server78-16592-01About Command Auth

Strona 92

5-27User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 5 Shared Profile ComponentsCommand Authorization SetsTo offer fine-grai

Strona 93

Chapter 5 Shared Profile ComponentsCommand Authorization Sets5-28User Guide for Cisco Secure ACS for Windows Server78-16592-01Cisco Secure ACS h

Strona 94 - Database

5-29User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 5 Shared Profile ComponentsCommand Authorization Sets• Device Managemen

Strona 95 - Suggested Deployment Sequence

Chapter 5 Shared Profile ComponentsCommand Authorization Sets5-30User Guide for Cisco Secure ACS for Windows Server78-16592-01For example, if a

Strona 96

5-31User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 5 Shared Profile ComponentsCommand Authorization SetsTo permit/deny com

Strona 97

Chapter 5 Shared Profile ComponentsCommand Authorization Sets5-32User Guide for Cisco Secure ACS for Windows Server78-16592-01Step 6 If Cisco Se

Strona 98

5-33User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 5 Shared Profile ComponentsCommand Authorization Setsc. Click Add Comma

Strona 99 - Interface Configuration

Chapter 5 Shared Profile ComponentsCommand Authorization Sets5-34User Guide for Cisco Secure ACS for Windows Server78-16592-01Step 3 From the Na

Strona 100 - Interface Design Concepts

5-35User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 5 Shared Profile ComponentsCommand Authorization SetsDeleting a Command

Strona 101 - Defining New User Data Fields

xixUser Guide for Cisco Secure ACS for Windows Server78-16592-01ContentsGeneric LDAP 13-32Cisco Secure ACS Authentication Process with a Generic LDAP

Strona 102 - Advanced Options

Chapter 5 Shared Profile ComponentsCommand Authorization Sets5-36User Guide for Cisco Secure ACS for Windows Server78-16592-01

Strona 103 - 78-16592-01

CHAPTER 6-1User Guide for Cisco Secure ACS for Windows Server78-16592-016User Group ManagementThis chapter provides information about setting up and m

Strona 104 - Interface

Chapter 6 User Group ManagementAbout User Group Setup Features and Functions6-2User Guide for Cisco Secure ACS for Windows Server78-16592-01Abou

Strona 105

6-3User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 6 User Group ManagementBasic User Group SettingsIf you have configured C

Strona 106

Chapter 6 User Group ManagementBasic User Group Settings6-4User Guide for Cisco Secure ACS for Windows Server78-16592-01Group DisablementYou per

Strona 107 - Setting Options for TACACS+

6-5User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 6 User Group ManagementBasic User Group SettingsPerform this procedure t

Strona 108

Chapter 6 User Group ManagementBasic User Group Settings6-6User Guide for Cisco Secure ACS for Windows Server78-16592-01To define the times duri

Strona 109

6-7User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 6 User Group ManagementBasic User Group SettingsSetting Callback Options

Strona 110

Chapter 6 User Group ManagementBasic User Group Settings6-8User Guide for Cisco Secure ACS for Windows Server78-16592-01Step 5 To continue speci

Strona 111

6-9User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 6 User Group ManagementBasic User Group SettingsNote When an authenticat

Strona 112

THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOM

Strona 113

ContentsxxUser Guide for Cisco Secure ACS for Windows Server78-16592-01PAP Procedure Output 13-65CHAP/MS-CHAP/ARAP Authentication Procedure Input 13-

Strona 114 - Attributes

Chapter 6 User Group ManagementBasic User Group Settings6-10User Guide for Cisco Secure ACS for Windows Server78-16592-01Step 4 To define and ap

Strona 115

6-11User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 6 User Group ManagementBasic User Group SettingsStep 5 To permit or den

Strona 116

Chapter 6 User Group ManagementBasic User Group Settings6-12User Guide for Cisco Secure ACS for Windows Server78-16592-01Note The total number o

Strona 117 - Network Configuration

6-13User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 6 User Group ManagementBasic User Group SettingsNote A session is any t

Strona 118 - About Distributed Systems

Chapter 6 User Group ManagementBasic User Group Settings6-14User Guide for Cisco Secure ACS for Windows Server78-16592-01Step 6 To continue spec

Strona 119

6-15User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 6 User Group ManagementBasic User Group Settingsnetwork fails, the quot

Strona 120 - Proxy in Distributed Systems

Chapter 6 User Group ManagementConfiguration-specific User Group Settings6-16User Guide for Cisco Secure ACS for Windows Server78-16592-01Note U

Strona 121 - Fallback on Failed Connection

6-17User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 6 User Group ManagementConfiguration-specific User Group Settings• To c

Strona 122 - Proxy in an Enterprise

Chapter 6 User Group ManagementConfiguration-specific User Group Settings6-18User Guide for Cisco Secure ACS for Windows Server78-16592-01Settin

Strona 123 - • Log them locally

6-19User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 6 User Group ManagementConfiguration-specific User Group SettingsStep 4

Strona 124 - Network Device Searches

xxiUser Guide for Cisco Secure ACS for Windows Server78-16592-01ContentsNAC Databases 14-10About NAC Databases 14-10About NAC Credentials and Attribu

Strona 125 - Searching for Network Devices

Chapter 6 User Group ManagementConfiguration-specific User Group Settings6-20User Guide for Cisco Secure ACS for Windows Server78-16592-01Note T

Strona 126

6-21User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 6 User Group ManagementConfiguration-specific User Group SettingsEnabli

Strona 127 - AAA Client Configuration

Chapter 6 User Group ManagementConfiguration-specific User Group Settings6-22User Guide for Cisco Secure ACS for Windows Server78-16592-01the ca

Strona 128

6-23User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 6 User Group ManagementConfiguration-specific User Group Settingsand di

Strona 129

Chapter 6 User Group ManagementConfiguration-specific User Group Settings6-24User Guide for Cisco Secure ACS for Windows Server78-16592-01reques

Strona 130

6-25User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 6 User Group ManagementConfiguration-specific User Group SettingsTo set

Strona 131

Chapter 6 User Group ManagementConfiguration-specific User Group Settings6-26User Guide for Cisco Secure ACS for Windows Server78-16592-01Step 8

Strona 132 - Adding a AAA Client

6-27User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 6 User Group ManagementConfiguration-specific User Group SettingsTip Fo

Strona 133

Chapter 6 User Group ManagementConfiguration-specific User Group Settings6-28User Guide for Cisco Secure ACS for Windows Server78-16592-01–Users

Strona 134

6-29User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 6 User Group ManagementConfiguration-specific User Group Settings• Assi

Strona 135 - Editing a AAA Client

ContentsxxiiUser Guide for Cisco Secure ACS for Windows Server78-16592-01Performance of Unknown User Authentication 15-8Added Authentication Latency

Strona 136

Chapter 6 User Group ManagementConfiguration-specific User Group Settings6-30User Guide for Cisco Secure ACS for Windows Server78-16592-01Step 5

Strona 137 - AAA Server Configuration

6-31User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 6 User Group ManagementConfiguration-specific User Group SettingsStep 6

Strona 138

Chapter 6 User Group ManagementConfiguration-specific User Group Settings6-32User Guide for Cisco Secure ACS for Windows Server78-16592-01To emp

Strona 139

6-33User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 6 User Group ManagementConfiguration-specific User Group SettingsConfig

Strona 140 - Adding a AAA Server

Chapter 6 User Group ManagementConfiguration-specific User Group Settings6-34User Guide for Cisco Secure ACS for Windows Server78-16592-01Step 6

Strona 141

6-35User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 6 User Group ManagementConfiguration-specific User Group SettingsTip To

Strona 142 - Editing a AAA Server

Chapter 6 User Group ManagementConfiguration-specific User Group Settings6-36User Guide for Cisco Secure ACS for Windows Server78-16592-01Step 3

Strona 143

6-37User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 6 User Group ManagementConfiguration-specific User Group SettingsConfig

Strona 144 - Deleting a AAA Server

Chapter 6 User Group ManagementConfiguration-specific User Group Settings6-38User Guide for Cisco Secure ACS for Windows Server78-16592-01Step 5

Strona 145 - Adding a Network Device Group

6-39User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 6 User Group ManagementConfiguration-specific User Group SettingsTo con

Strona 146

xxiiiUser Guide for Cisco Secure ACS for Windows Server78-16592-01ContentsNAC Group Mapping 16-13Configuring NAC Group Mapping 16-13RADIUS-Based Grou

Strona 147

Chapter 6 User Group ManagementConfiguration-specific User Group Settings6-40User Guide for Cisco Secure ACS for Windows Server78-16592-01Config

Strona 148

6-41User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 6 User Group ManagementConfiguration-specific User Group SettingsStep 3

Strona 149

Chapter 6 User Group ManagementConfiguration-specific User Group Settings6-42User Guide for Cisco Secure ACS for Windows Server78-16592-01The Ci

Strona 150

6-43User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 6 User Group ManagementConfiguration-specific User Group SettingsStep 7

Strona 151

Chapter 6 User Group ManagementConfiguration-specific User Group Settings6-44User Guide for Cisco Secure ACS for Windows Server78-16592-01Step 3

Strona 152

6-45User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 6 User Group ManagementConfiguration-specific User Group SettingsCisco

Strona 153

Chapter 6 User Group ManagementConfiguration-specific User Group Settings6-46User Guide for Cisco Secure ACS for Windows Server78-16592-01Config

Strona 154 - Step 4 Click OK

6-47User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 6 User Group ManagementConfiguration-specific User Group SettingsStep 5

Strona 155 - Shared Profile Components

Chapter 6 User Group ManagementConfiguration-specific User Group Settings6-48User Guide for Cisco Secure ACS for Windows Server78-16592-01The fo

Strona 156 - Network Access Filters

6-49User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 6 User Group ManagementConfiguration-specific User Group SettingsNote T

Strona 157

ContentsxxivUser Guide for Cisco Secure ACS for Windows Server78-16592-01Cisco VPN 3000 Concentrator Dictionary of RADIUS VSAs C-9Cisco VPN 5000 Conc

Strona 158

Chapter 6 User Group ManagementConfiguration-specific User Group Settings6-50User Guide for Cisco Secure ACS for Windows Server78-16592-01Step 2

Strona 159

6-51User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 6 User Group ManagementConfiguration-specific User Group SettingsTo con

Strona 160

Chapter 6 User Group ManagementConfiguration-specific User Group Settings6-52User Guide for Cisco Secure ACS for Windows Server78-16592-01Note T

Strona 161 - Downloadable IP ACLs

6-53User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 6 User Group ManagementConfiguration-specific User Group SettingsConfig

Strona 162 - About Downloadable IP ACLs

Chapter 6 User Group ManagementGroup Setting Management6-54User Guide for Cisco Secure ACS for Windows Server78-16592-01Step 6 To save the group

Strona 163

6-55User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 6 User Group ManagementGroup Setting ManagementResetting Usage Quota Co

Strona 164 - Adding a Downloadable IP ACL

Chapter 6 User Group ManagementGroup Setting Management6-56User Guide for Cisco Secure ACS for Windows Server78-16592-01Step 5 Click Submit.Note

Strona 165

CHAPTER 7-1User Guide for Cisco Secure ACS for Windows Server78-16592-017User ManagementThis chapter provides information about setting up and managin

Strona 166

Chapter 7 User ManagementAbout User Databases7-2User Guide for Cisco Secure ACS for Windows Server78-16592-01 From within the User Setup section

Strona 167 - Editing a Downloadable IP ACL

7-3User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 7 User ManagementBasic User Setup Options• Windows Database—Authenticate

Strona 168 - Network Access Restrictions

xxvUser Guide for Cisco Secure ACS for Windows Server78-16592-01ContentsADD_NAS Statements D-21DEL_NAS Statements D-23Import File Example D-24Exporti

Strona 169

Chapter 7 User ManagementBasic User Setup Options7-4User Guide for Cisco Secure ACS for Windows Server78-16592-01This section contains the follo

Strona 170

7-5User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 7 User ManagementBasic User Setup OptionsStep 4 Make sure that the Acco

Strona 171 - About IP-based NAR Filters

Chapter 7 User ManagementBasic User Setup Options7-6User Guide for Cisco Secure ACS for Windows Server78-16592-01Tip For lengthy account configu

Strona 172

7-7User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 7 User ManagementBasic User Setup OptionsSetting a Separate CHAP/MS-CHAP

Strona 173

Chapter 7 User ManagementBasic User Setup Options7-8User Guide for Cisco Secure ACS for Windows Server78-16592-01Assigning a User to a GroupA us

Strona 174

7-9User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 7 User ManagementBasic User Setup OptionsSetting User Callback OptionCal

Strona 175

Chapter 7 User ManagementBasic User Setup Options7-10User Guide for Cisco Secure ACS for Windows Server78-16592-01Step 3 Do one of the following

Strona 176

7-11User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 7 User ManagementBasic User Setup Options• Assigned by AAA client pool—

Strona 177

Chapter 7 User ManagementBasic User Setup Options7-12User Guide for Cisco Secure ACS for Windows Server78-16592-01Typically, you define (shared)

Strona 178

7-13User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 7 User ManagementBasic User Setup OptionsStep 2 To apply a previously c

Strona 179 - Command Authorization Sets

ContentsxxviUser Guide for Cisco Secure ACS for Windows Server78-16592-01APPENDIX E VPDN Processing E-1VPDN Process E-1APPENDIX F RDBMS Synchronizati

Strona 180

Chapter 7 User ManagementBasic User Setup Options7-14User Guide for Cisco Secure ACS for Windows Server78-16592-01c. Select or enter the informa

Strona 181

7-15User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 7 User ManagementBasic User Setup Optionsc. Complete the following boxe

Strona 182

Chapter 7 User ManagementBasic User Setup Options7-16User Guide for Cisco Secure ACS for Windows Server78-16592-01d. Click enter.The information

Strona 183

7-17User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 7 User ManagementBasic User Setup OptionsTo set max sessions options fo

Strona 184 - About Pattern Matching

Chapter 7 User ManagementBasic User Setup Options7-18User Guide for Cisco Secure ACS for Windows Server78-16592-01Setting User Usage Quotas Opti

Strona 185

7-19User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 7 User ManagementBasic User Setup Optionswith ISDN, the quota is not up

Strona 186

Chapter 7 User ManagementBasic User Setup Options7-20User Guide for Cisco Secure ACS for Windows Server78-16592-01c. Select the period for which

Strona 187

7-21User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 7 User ManagementBasic User Setup Optionsb. Select the Disable account

Strona 188

Chapter 7 User ManagementAdvanced User Authentication Settings7-22User Guide for Cisco Secure ACS for Windows Server78-16592-01To assign a downl

Strona 189 - Step 4 Click Delete

7-23User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 7 User ManagementAdvanced User Authentication Settings• RADIUS Attribut

Strona 190

xxviiUser Guide for Cisco Secure ACS for Windows Server78-16592-01ContentsCSMon G-4Monitoring G-5Recording G-6Notification G-7Response G-7CSTacacs an

Strona 191 - User Group Management

Chapter 7 User ManagementAdvanced User Authentication Settings7-24User Guide for Cisco Secure ACS for Windows Server78-16592-01Configuring TACAC

Strona 192 - Group TACACS+ Settings

7-25User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 7 User ManagementAdvanced User Authentication SettingsBefore You Begin•

Strona 193 - Basic User Group Settings

Chapter 7 User ManagementAdvanced User Authentication Settings7-26User Guide for Cisco Secure ACS for Windows Server78-16592-01Step 6 Do one of

Strona 194 - Group Disablement

7-27User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 7 User ManagementAdvanced User Authentication SettingsTo specify shell

Strona 195

Chapter 7 User ManagementAdvanced User Authentication Settings7-28User Guide for Cisco Secure ACS for Windows Server78-16592-01Step 7 To define

Strona 196

7-29User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 7 User ManagementAdvanced User Authentication SettingsConfiguring a PIX

Strona 197

Chapter 7 User ManagementAdvanced User Authentication Settings7-30User Guide for Cisco Secure ACS for Windows Server78-16592-01Step 4 To assign

Strona 198

7-31User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 7 User ManagementAdvanced User Authentication Settings• Assign a device

Strona 199

Chapter 7 User ManagementAdvanced User Authentication Settings7-32User Guide for Cisco Secure ACS for Windows Server78-16592-01Step 5 To assign

Strona 200

7-33User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 7 User ManagementAdvanced User Authentication SettingsStep 3 To allow T

Strona 201

ContentsxxviiiUser Guide for Cisco Secure ACS for Windows Server78-16592-01

Strona 202

Chapter 7 User ManagementAdvanced User Authentication Settings7-34User Guide for Cisco Secure ACS for Windows Server78-16592-01Note This is the

Strona 203

7-35User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 7 User ManagementAdvanced User Authentication SettingsStep 4 If you sel

Strona 204

Chapter 7 User ManagementAdvanced User Authentication Settings7-36User Guide for Cisco Secure ACS for Windows Server78-16592-01To set the option

Strona 205

7-37User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 7 User ManagementAdvanced User Authentication SettingsSetting TACACS+ O

Strona 206

Chapter 7 User ManagementAdvanced User Authentication Settings7-38User Guide for Cisco Secure ACS for Windows Server78-16592-01This section cont

Strona 207

7-39User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 7 User ManagementAdvanced User Authentication SettingsNote For a list a

Strona 208

Chapter 7 User ManagementAdvanced User Authentication Settings7-40User Guide for Cisco Secure ACS for Windows Server78-16592-01replace the assoc

Strona 209

7-41User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 7 User ManagementAdvanced User Authentication SettingsSetting Cisco Air

Strona 210

Chapter 7 User ManagementAdvanced User Authentication Settings7-42User Guide for Cisco Secure ACS for Windows Server78-16592-01To configure and

Strona 211

7-43User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 7 User ManagementAdvanced User Authentication SettingsSetting Ascend RA

Strona 212

xxixUser Guide for Cisco Secure ACS for Windows Server78-16592-01PrefaceThis document will help you configure and use Cisco Secure Access Control Serv

Strona 213

Chapter 7 User ManagementAdvanced User Authentication Settings7-44User Guide for Cisco Secure ACS for Windows Server78-16592-01For more informat

Strona 214

7-45User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 7 User ManagementAdvanced User Authentication SettingsNote To hide or d

Strona 215

Chapter 7 User ManagementAdvanced User Authentication Settings7-46User Guide for Cisco Secure ACS for Windows Server78-16592-01Setting Cisco VPN

Strona 216

7-47User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 7 User ManagementAdvanced User Authentication SettingsStep 3 In the Cis

Strona 217

Chapter 7 User ManagementAdvanced User Authentication Settings7-48User Guide for Cisco Secure ACS for Windows Server78-16592-01The Microsoft RAD

Strona 218

7-49User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 7 User ManagementAdvanced User Authentication SettingsStep 3 In the Mic

Strona 219

Chapter 7 User ManagementAdvanced User Authentication Settings7-50User Guide for Cisco Secure ACS for Windows Server78-16592-01Note To hide or d

Strona 220

7-51User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 7 User ManagementAdvanced User Authentication SettingsSetting Juniper R

Strona 221

Chapter 7 User ManagementAdvanced User Authentication Settings7-52User Guide for Cisco Secure ACS for Windows Server78-16592-01For more informat

Strona 222

7-53User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 7 User ManagementAdvanced User Authentication SettingsStep 2 Before con

Strona 223

iiiUser Guide for Cisco Secure ACS for Windows Server78-16592-01CONTENTSPreface xxixAudience xxixOrganization xxixConventions xxxiProduct Documentati

Strona 224

PrefaceOrganizationxxxUser Guide for Cisco Secure ACS for Windows Server78-16592-01• Chapter 5, “Shared Profile Components”—Concepts and procedures re

Strona 225

Chapter 7 User ManagementUser Management7-54User Guide for Cisco Secure ACS for Windows Server78-16592-01To configure and enable custom RADIUS a

Strona 226

7-55User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 7 User ManagementUser Management• Deleting a User Account, page 7-57• R

Strona 227 - User Group

Chapter 7 User ManagementUser Management7-56User Guide for Cisco Secure ACS for Windows Server78-16592-01Tip You can use wildcard characters (*)

Strona 228

7-57User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 7 User ManagementUser ManagementStep 3 Click Add/Edit.The User Setup Ed

Strona 229

Chapter 7 User ManagementUser Management7-58User Guide for Cisco Secure ACS for Windows Server78-16592-01Step 3 Click Add/Edit.Step 4 At the bot

Strona 230

7-59User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 7 User ManagementUser ManagementStep 5 Click Submit at the bottom of th

Strona 231

Chapter 7 User ManagementUser Management7-60User Guide for Cisco Secure ACS for Windows Server78-16592-01Note If the user authenticates with a W

Strona 232

CHAPTER 8-1User Guide for Cisco Secure ACS for Windows Server78-16592-018System Configuration: BasicThis chapter addresses the basic features found in

Strona 233 - Ascend-Remote-Addr

Chapter 8 System Configuration: BasicService Control8-2User Guide for Cisco Secure ACS for Windows Server78-16592-01Tip You can configure Cisco

Strona 234

8-3User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 8 System Configuration: BasicLoggingStep 1 In the navigation bar, click

Strona 235

xxxiUser Guide for Cisco Secure ACS for Windows Server78-16592-01PrefaceConventions• Appendix A, “Troubleshooting”—How to identify and solve certain p

Strona 236

Chapter 8 System Configuration: BasicDate Format Control8-4User Guide for Cisco Secure ACS for Windows Server78-16592-01report generated on July

Strona 237

8-5User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 8 System Configuration: BasicLocal Password ManagementLocal Password Man

Strona 238

Chapter 8 System Configuration: BasicLocal Password Management8-6User Guide for Cisco Secure ACS for Windows Server78-16592-01–Upon remote user

Strona 239

8-7User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 8 System Configuration: BasicLocal Password ManagementConfiguring Local

Strona 240

Chapter 8 System Configuration: BasicLocal Password Management8-8User Guide for Cisco Secure ACS for Windows Server78-16592-01d. If you want Cis

Strona 241

8-9User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 8 System Configuration: BasicCisco Secure ACS BackupCisco Secure ACS Bac

Strona 242

Chapter 8 System Configuration: BasicCisco Secure ACS Backup8-10User Guide for Cisco Secure ACS for Windows Server78-16592-01where drive is the

Strona 243

8-11User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 8 System Configuration: BasicCisco Secure ACS BackupBackup OptionsThe A

Strona 244 - Group Setting Management

Chapter 8 System Configuration: BasicCisco Secure ACS Backup8-12User Guide for Cisco Secure ACS for Windows Server78-16592-01Step 2 Click ACS Ba

Strona 245 - Renaming a User Group

8-13User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 8 System Configuration: BasicCisco Secure ACS BackupTip Clicking times

Strona 246

PrefaceProduct DocumentationxxxiiUser Guide for Cisco Secure ACS for Windows Server78-16592-01Tip Identifies information to help you get the most bene

Strona 247 - User Management

Chapter 8 System Configuration: BasicCisco Secure ACS System Restore8-14User Guide for Cisco Secure ACS for Windows Server78-16592-01Cisco Secur

Strona 248 - About User Databases

8-15User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 8 System Configuration: BasicCisco Secure ACS System Restorehard drive.

Strona 249 - Basic User Setup Options

Chapter 8 System Configuration: BasicCisco Secure ACS System Restore8-16User Guide for Cisco Secure ACS for Windows Server78-16592-01Reports of

Strona 250 - Adding a Basic User Account

8-17User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 8 System Configuration: BasicCisco Secure ACS Active Service Management

Strona 251

Chapter 8 System Configuration: BasicCisco Secure ACS Active Service Management8-18User Guide for Cisco Secure ACS for Windows Server78-16592-01

Strona 252

8-19User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 8 System Configuration: BasicCisco Secure ACS Active Service Management

Strona 253

Chapter 8 System Configuration: BasicCisco Secure ACS Active Service Management8-20User Guide for Cisco Secure ACS for Windows Server78-16592-01

Strona 254 - Assigning a User to a Group

8-21User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 8 System Configuration: BasicVoIP Accounting Configurationc. In the SMT

Strona 255 - Setting User Callback Option

Chapter 8 System Configuration: BasicVoIP Accounting Configuration8-22User Guide for Cisco Secure ACS for Windows Server78-16592-01To configure

Strona 256

CHAPTER 9-1User Guide for Cisco Secure ACS for Windows Server78-16592-019System Configuration: AdvancedThis chapter addresses the CiscoSecure Database

Strona 257

xxxiiiUser Guide for Cisco Secure ACS for Windows Server78-16592-01PrefaceRelated DocumentationRelated DocumentationNote We sometimes update the print

Strona 258

Chapter 9 System Configuration: AdvancedCiscoSecure Database Replication9-2User Guide for Cisco Secure ACS for Windows Server78-16592-01• Replic

Strona 259

9-3User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 9 System Configuration: AdvancedCiscoSecure Database Replication• IP poo

Strona 260

Chapter 9 System Configuration: AdvancedCiscoSecure Database Replication9-4User Guide for Cisco Secure ACS for Windows Server78-16592-01be runni

Strona 261

9-5User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 9 System Configuration: AdvancedCiscoSecure Database Replicationc. The p

Strona 262

Chapter 9 System Configuration: AdvancedCiscoSecure Database Replication9-6User Guide for Cisco Secure ACS for Windows Server78-16592-01c. The s

Strona 263

9-7User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 9 System Configuration: AdvancedCiscoSecure Database ReplicationReplicat

Strona 264

Chapter 9 System Configuration: AdvancedCiscoSecure Database Replication9-8User Guide for Cisco Secure ACS for Windows Server78-16592-01–In its

Strona 265

9-9User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 9 System Configuration: AdvancedCiscoSecure Database Replication• A seco

Strona 266

Chapter 9 System Configuration: AdvancedCiscoSecure Database Replication9-10User Guide for Cisco Secure ACS for Windows Server78-16592-01of sett

Strona 267

9-11User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 9 System Configuration: AdvancedCiscoSecure Database ReplicationFor mor

Strona 268

PrefaceRelated DocumentationxxxivUser Guide for Cisco Secure ACS for Windows Server78-16592-01Table 2 describes a set of white papers about Cisco Secu

Strona 269 - TACACS+ Settings (User)

Chapter 9 System Configuration: AdvancedCiscoSecure Database Replication9-12User Guide for Cisco Secure ACS for Windows Server78-16592-01Note If

Strona 270

9-13User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 9 System Configuration: AdvancedCiscoSecure Database Replication–Manual

Strona 271

Chapter 9 System Configuration: AdvancedCiscoSecure Database Replication9-14User Guide for Cisco Secure ACS for Windows Server78-16592-01Note Th

Strona 272

9-15User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 9 System Configuration: AdvancedCiscoSecure Database ReplicationInbound

Strona 273

Chapter 9 System Configuration: AdvancedCiscoSecure Database Replication9-16User Guide for Cisco Secure ACS for Windows Server78-16592-01To impl

Strona 274

9-17User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 9 System Configuration: AdvancedCiscoSecure Database ReplicationConfigu

Strona 275

Chapter 9 System Configuration: AdvancedCiscoSecure Database Replication9-18User Guide for Cisco Secure ACS for Windows Server78-16592-01Step 4

Strona 276

9-19User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 9 System Configuration: AdvancedCiscoSecure Database ReplicationNote Fo

Strona 277

Chapter 9 System Configuration: AdvancedCiscoSecure Database Replication9-20User Guide for Cisco Secure ACS for Windows Server78-16592-01Note If

Strona 278

9-21User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 9 System Configuration: AdvancedCiscoSecure Database ReplicationNote Re

Strona 279

xxxvUser Guide for Cisco Secure ACS for Windows Server78-16592-01PrefaceObtaining DocumentationObtaining DocumentationCisco documentation and addition

Strona 280

Chapter 9 System Configuration: AdvancedCiscoSecure Database Replication9-22User Guide for Cisco Secure ACS for Windows Server78-16592-01Note If

Strona 281

9-23User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 9 System Configuration: AdvancedCiscoSecure Database ReplicationTip Cli

Strona 282

Chapter 9 System Configuration: AdvancedCiscoSecure Database Replication9-24User Guide for Cisco Secure ACS for Windows Server78-16592-01c. Repe

Strona 283 - RADIUS Attributes

9-25User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 9 System Configuration: AdvancedRDBMS SynchronizationDatabase Replicati

Strona 284

Chapter 9 System Configuration: AdvancedRDBMS Synchronization9-26User Guide for Cisco Secure ACS for Windows Server78-16592-01–Synchronization P

Strona 285

9-27User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 9 System Configuration: AdvancedRDBMS SynchronizationUsersAmong the use

Strona 286

Chapter 9 System Configuration: AdvancedRDBMS Synchronization9-28User Guide for Cisco Secure ACS for Windows Server78-16592-01• Specifying outbo

Strona 287

9-29User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 9 System Configuration: AdvancedRDBMS SynchronizationNote If you intend

Strona 288

Chapter 9 System Configuration: AdvancedRDBMS Synchronization9-30User Guide for Cisco Secure ACS for Windows Server78-16592-01Figure 9-2 RDBMS S

Strona 289

9-31User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 9 System Configuration: AdvancedRDBMS SynchronizationAbout the accountA

Strona 290

PrefaceDocumentation FeedbackxxxviUser Guide for Cisco Secure ACS for Windows Server78-16592-01Cisco.comYou can access the most current Cisco document

Strona 291

Chapter 9 System Configuration: AdvancedRDBMS Synchronization9-32User Guide for Cisco Secure ACS for Windows Server78-16592-01• Oracle 7—Contain

Strona 292

9-33User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 9 System Configuration: AdvancedRDBMS SynchronizationReplaying transact

Strona 293

Chapter 9 System Configuration: AdvancedRDBMS Synchronization9-34User Guide for Cisco Secure ACS for Windows Server78-16592-01implementation. If

Strona 294

9-35User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 9 System Configuration: AdvancedRDBMS SynchronizationStep 7 Schedule RD

Strona 295

Chapter 9 System Configuration: AdvancedRDBMS Synchronization9-36User Guide for Cisco Secure ACS for Windows Server78-16592-01Preparing for CSV-

Strona 296

9-37User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 9 System Configuration: AdvancedRDBMS Synchronizationnet start CSDBSync

Strona 297

Chapter 9 System Configuration: AdvancedRDBMS Synchronization9-38User Guide for Cisco Secure ACS for Windows Server78-16592-01Step 6 Complete th

Strona 298

9-39User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 9 System Configuration: AdvancedRDBMS Synchronization• Password—Specifi

Strona 299

Chapter 9 System Configuration: AdvancedRDBMS Synchronization9-40User Guide for Cisco Secure ACS for Windows Server78-16592-01For more informati

Strona 300

9-41User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 9 System Configuration: AdvancedRDBMS SynchronizationNote You do not ha

Strona 301 - Finding a User

xxxviiUser Guide for Cisco Secure ACS for Windows Server78-16592-01PrefaceObtaining Technical AssistanceYou can submit comments by using the response

Strona 302 - Disabling a User Account

Chapter 9 System Configuration: AdvancedRDBMS Synchronization9-42User Guide for Cisco Secure ACS for Windows Server78-16592-01Note For more info

Strona 303 - Deleting a User Account

9-43User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 9 System Configuration: AdvancedRDBMS SynchronizationNote For more info

Strona 304

Chapter 9 System Configuration: AdvancedIP Pools Server9-44User Guide for Cisco Secure ACS for Windows Server78-16592-01Step 2 Click RDBMS Synch

Strona 305

9-45User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 9 System Configuration: AdvancedIP Pools Serveryou enable this feature,

Strona 306 - Saving User Settings

Chapter 9 System Configuration: AdvancedIP Pools Server9-46User Guide for Cisco Secure ACS for Windows Server78-16592-01You can determine whethe

Strona 307 - System Configuration: Basic

9-47User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 9 System Configuration: AdvancedIP Pools ServerRefreshing the AAA Serve

Strona 308 - Service Control

Chapter 9 System Configuration: AdvancedIP Pools Server9-48User Guide for Cisco Secure ACS for Windows Server78-16592-01Note All addresses in an

Strona 309 - Date Format Control

9-49User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 9 System Configuration: AdvancedIP Pools ServerNote All addresses in an

Strona 310

Chapter 9 System Configuration: AdvancedIP Pools Server9-50User Guide for Cisco Secure ACS for Windows Server78-16592-01The name pool table appe

Strona 311 - Local Password Management

9-51User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 9 System Configuration: AdvancedIP Pools Address RecoveryStep 4 Click D

Strona 312

PrefaceObtaining Technical AssistancexxxviiiUser Guide for Cisco Secure ACS for Windows Server78-16592-01recommended solutions. If your issue is not r

Strona 313

Chapter 9 System Configuration: AdvancedIP Pools Address Recovery9-52User Guide for Cisco Secure ACS for Windows Server78-16592-01Cisco Secure A

Strona 314

CHAPTER 10-1User Guide for Cisco Secure ACS for Windows Server78-16592-0110System Configuration: Authentication and CertificatesThis chapter addresses

Strona 315 - Cisco Secure ACS Backup

Chapter 10 System Configuration: Authentication and CertificatesAbout Certification and EAP Protocols10-2User Guide for Cisco Secure ACS for Win

Strona 316 - Components Backed Up

10-3User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 10 System Configuration: Authentication and CertificatesAbout Certifica

Strona 317 - Backup Options

Chapter 10 System Configuration: Authentication and CertificatesAbout Certification and EAP Protocols10-4User Guide for Cisco Secure ACS for Win

Strona 318

10-5User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 10 System Configuration: Authentication and CertificatesAbout Certifica

Strona 319

Chapter 10 System Configuration: Authentication and CertificatesAbout Certification and EAP Protocols10-6User Guide for Cisco Secure ACS for Win

Strona 320

10-7User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 10 System Configuration: Authentication and CertificatesAbout Certifica

Strona 321 - Components Restored

Chapter 10 System Configuration: Authentication and CertificatesAbout Certification and EAP Protocols10-8User Guide for Cisco Secure ACS for Win

Strona 322 - Step 2 Click ACS Restore

10-9User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 10 System Configuration: Authentication and CertificatesAbout Certifica

Strona 323 - System Monitoring

xxxixUser Guide for Cisco Secure ACS for Windows Server78-16592-01PrefaceObtaining Additional Publications and InformationObtaining Additional Publica

Strona 324 - System Monitoring Options

Chapter 10 System Configuration: Authentication and CertificatesAbout Certification and EAP Protocols10-10User Guide for Cisco Secure ACS for Wi

Strona 325 - Setting Up System Monitoring

10-11User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 10 System Configuration: Authentication and CertificatesAbout Certific

Strona 326 - Event Logging

Chapter 10 System Configuration: Authentication and CertificatesAbout Certification and EAP Protocols10-12User Guide for Cisco Secure ACS for Wi

Strona 327 - VoIP Accounting Configuration

10-13User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 10 System Configuration: Authentication and CertificatesAbout Certific

Strona 328 - Step 4 Click Submit

Chapter 10 System Configuration: Authentication and CertificatesAbout Certification and EAP Protocols10-14User Guide for Cisco Secure ACS for Wi

Strona 329

10-15User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 10 System Configuration: Authentication and CertificatesAbout Certific

Strona 330

Chapter 10 System Configuration: Authentication and CertificatesAbout Certification and EAP Protocols10-16User Guide for Cisco Secure ACS for Wi

Strona 331

10-17User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 10 System Configuration: Authentication and CertificatesAbout Certific

Strona 332 - Replication Process

Chapter 10 System Configuration: Authentication and CertificatesAbout Certification and EAP Protocols10-18User Guide for Cisco Secure ACS for Wi

Strona 333

10-19User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 10 System Configuration: Authentication and CertificatesAbout Certific

Strona 334

ContentsivUser Guide for Cisco Secure ACS for Windows Server78-16592-01AAA Protocols—TACACS+ and RADIUS 1-6TACACS+ 1-7RADIUS 1-7Authentication 1-8Aut

Strona 335 - Replication Frequency

PrefaceObtaining Additional Publications and InformationxlUser Guide for Cisco Secure ACS for Windows Server78-16592-01• Internet Protocol Journal is

Strona 336

Chapter 10 System Configuration: Authentication and CertificatesAbout Certification and EAP Protocols10-20User Guide for Cisco Secure ACS for Wi

Strona 337

10-21User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 10 System Configuration: Authentication and CertificatesAbout Certific

Strona 338 - Database Replication Logging

Chapter 10 System Configuration: Authentication and CertificatesAbout Certification and EAP Protocols10-22User Guide for Cisco Secure ACS for Wi

Strona 339 - Replication Options

10-23User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 10 System Configuration: Authentication and CertificatesAbout Certific

Strona 340 - Outbound Replication Options

Chapter 10 System Configuration: Authentication and CertificatesAbout Certification and EAP Protocols10-24User Guide for Cisco Secure ACS for Wi

Strona 341

10-25User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 10 System Configuration: Authentication and CertificatesAbout Certific

Strona 342

Chapter 10 System Configuration: Authentication and CertificatesGlobal Authentication Setup10-26User Guide for Cisco Secure ACS for Windows Serv

Strona 343 - Cisco Secure ACSes

10-27User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 10 System Configuration: Authentication and CertificatesGlobal Authent

Strona 344

Chapter 10 System Configuration: Authentication and CertificatesGlobal Authentication Setup10-28User Guide for Cisco Secure ACS for Windows Serv

Strona 345

10-29User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 10 System Configuration: Authentication and CertificatesGlobal Authent

Strona 346

CHAPTER1-1User Guide for Cisco Secure ACS for Windows Server78-16592-011OverviewThis chapter provides an overview of Cisco Secure ACS for Windows Serv

Strona 347 - Replicating Immediately

Chapter 10 System Configuration: Authentication and CertificatesGlobal Authentication Setup10-30User Guide for Cisco Secure ACS for Windows Serv

Strona 348

10-31User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 10 System Configuration: Authentication and CertificatesGlobal Authent

Strona 349 - Scheduling Replication

Chapter 10 System Configuration: Authentication and CertificatesGlobal Authentication Setup10-32User Guide for Cisco Secure ACS for Windows Serv

Strona 350

10-33User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 10 System Configuration: Authentication and CertificatesGlobal Authent

Strona 351

Chapter 10 System Configuration: Authentication and CertificatesCisco Secure ACS Certificate Setup10-34User Guide for Cisco Secure ACS for Windo

Strona 352

10-35User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 10 System Configuration: Authentication and CertificatesCisco Secure A

Strona 353 - RDBMS Synchronization

Chapter 10 System Configuration: Authentication and CertificatesCisco Secure ACS Certificate Setup10-36User Guide for Cisco Secure ACS for Windo

Strona 354 - About RDBMS Synchronization

10-37User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 10 System Configuration: Authentication and CertificatesCisco Secure A

Strona 355 - User Groups

Chapter 10 System Configuration: Authentication and CertificatesCisco Secure ACS Certificate Setup10-38User Guide for Cisco Secure ACS for Windo

Strona 356

10-39User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 10 System Configuration: Authentication and CertificatesCisco Secure A

Strona 357 - About CSDBSync

Chapter 1 OverviewThe Cisco Secure ACS Paradigm1-2User Guide for Cisco Secure ACS for Windows Server78-16592-01–Accessing the HTML Interface, pag

Strona 358

Chapter 10 System Configuration: Authentication and CertificatesCisco Secure ACS Certificate Setup10-40User Guide for Cisco Secure ACS for Windo

Strona 359

10-41User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 10 System Configuration: Authentication and CertificatesCisco Secure A

Strona 360

Chapter 10 System Configuration: Authentication and CertificatesCisco Secure ACS Certificate Setup10-42User Guide for Cisco Secure ACS for Windo

Strona 361

10-43User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 10 System Configuration: Authentication and CertificatesCisco Secure A

Strona 362

Chapter 10 System Configuration: Authentication and CertificatesCisco Secure ACS Certificate Setup10-44User Guide for Cisco Secure ACS for Windo

Strona 363

10-45User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 10 System Configuration: Authentication and CertificatesCisco Secure A

Strona 364

Chapter 10 System Configuration: Authentication and CertificatesCisco Secure ACS Certificate Setup10-46User Guide for Cisco Secure ACS for Windo

Strona 365 - Synchronization

10-47User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 10 System Configuration: Authentication and CertificatesCisco Secure A

Strona 366 - RDBMS Synchronization Options

Chapter 10 System Configuration: Authentication and CertificatesCisco Secure ACS Certificate Setup10-48User Guide for Cisco Secure ACS for Windo

Strona 367

10-49User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 10 System Configuration: Authentication and CertificatesCisco Secure A

Strona 368

1-3User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 1 OverviewCisco Secure ACS Specificationsservices that ensure a secure en

Strona 369

Chapter 10 System Configuration: Authentication and CertificatesCisco Secure ACS Certificate Setup10-50User Guide for Cisco Secure ACS for Windo

Strona 370

10-51User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 10 System Configuration: Authentication and CertificatesCisco Secure A

Strona 371

Chapter 10 System Configuration: Authentication and CertificatesCisco Secure ACS Certificate Setup10-52User Guide for Cisco Secure ACS for Windo

Strona 372 - IP Pools Server

CHAPTER 11-1User Guide for Cisco Secure ACS for Windows Server78-16592-0111Logs and ReportsCisco Secure ACS for Windows Server produces a variety of l

Strona 373

Chapter 11 Logs and ReportsLogging Formats11-2User Guide for Cisco Secure ACS for Windows Server78-16592-01Logging FormatsCisco Secure ACS logs

Strona 374

11-3User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 11 Logs and ReportsSpecial Logging AttributesThe content of these attri

Strona 375 - Adding a New IP Pool

Chapter 11 Logs and ReportsNAC Attributes in Logs11-4User Guide for Cisco Secure ACS for Windows Server78-16592-01Note Cisco Secure ACS cannot d

Strona 376 - Editing an IP Pool Definition

11-5User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 11 Logs and ReportsUpdate Packets in Accounting LogsPosture validation

Strona 377 - Resetting an IP Pool

Chapter 11 Logs and ReportsAbout Cisco Secure ACS Logs and Reports11-6User Guide for Cisco Secure ACS for Windows Server78-16592-01About Cisco S

Strona 378 - Deleting an IP Pool

11-7User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 11 Logs and ReportsAbout Cisco Secure ACS Logs and ReportsTable 11-1 Ac

Strona 379 - IP Pools Address Recovery

Chapter 1 OverviewCisco Secure ACS Specifications1-4User Guide for Cisco Secure ACS for Windows Server78-16592-01• Maximum users supported by the

Strona 380

Chapter 11 Logs and ReportsAbout Cisco Secure ACS Logs and Reports11-8User Guide for Cisco Secure ACS for Windows Server78-16592-01Failed Attemp

Strona 381

11-9User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 11 Logs and ReportsAbout Cisco Secure ACS Logs and ReportsDynamic Admin

Strona 382 - EAP-TLS Authentication

Chapter 11 Logs and ReportsAbout Cisco Secure ACS Logs and Reports11-10User Guide for Cisco Secure ACS for Windows Server78-16592-01Viewing the

Strona 383 - About the EAP-TLS Protocol

11-11User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 11 Logs and ReportsAbout Cisco Secure ACS Logs and ReportsTip You can

Strona 384 - EAP-TLS and Cisco Secure ACS

Chapter 11 Logs and ReportsAbout Cisco Secure ACS Logs and Reports11-12User Guide for Cisco Secure ACS for Windows Server78-16592-01Note Deletin

Strona 385

11-13User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 11 Logs and ReportsAbout Cisco Secure ACS Logs and ReportsFor more inf

Strona 386 - EAP-TLS Limitations

Chapter 11 Logs and ReportsAbout Cisco Secure ACS Logs and Reports11-14User Guide for Cisco Secure ACS for Windows Server78-16592-01Configuring

Strona 387

11-15User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 11 Logs and ReportsWorking with CSV LogsStep 4 To generate a new Admin

Strona 388 - PEAP Authentication

Chapter 11 Logs and ReportsWorking with CSV Logs11-16User Guide for Cisco Secure ACS for Windows Server78-16592-01Older files are named in the f

Strona 389 - PEAP and Cisco Secure ACS

11-17User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 11 Logs and ReportsWorking with CSV LogsEnabling or Disabling a CSV Lo

Strona 390

1-5User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 1 OverviewAAA Server Functions and ConceptsWhen you install Cisco Secure

Strona 391

Chapter 11 Logs and ReportsWorking with CSV Logs11-18User Guide for Cisco Secure ACS for Windows Server78-16592-01Viewing a CSV ReportWhen you s

Strona 392 - Enabling PEAP Authentication

11-19User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 11 Logs and ReportsWorking with CSV LogsTip To check for newer informa

Strona 393 - EAP-FAST Authentication

Chapter 11 Logs and ReportsWorking with CSV Logs11-20User Guide for Cisco Secure ACS for Windows Server78-16592-01• CSV file location—You can sp

Strona 394

11-21User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 11 Logs and ReportsWorking with ODBC LogsStep 7 To generate a new CSV

Strona 395 - About Master Keys

Chapter 11 Logs and ReportsWorking with ODBC Logs11-22User Guide for Cisco Secure ACS for Windows Server78-16592-01Preparing for ODBC LoggingTo

Strona 396

11-23User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 11 Logs and ReportsWorking with ODBC LogsStep 3 Click Add.Step 4 Selec

Strona 397 - About PACs

Chapter 11 Logs and ReportsWorking with ODBC Logs11-24User Guide for Cisco Secure ACS for Windows Server78-16592-01To configure an ODBC log, fol

Strona 398 - Automatic PAC Provisioning

11-25User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 11 Logs and ReportsWorking with ODBC LogsNote The user must have suffi

Strona 399

Chapter 11 Logs and ReportsRemote Logging11-26User Guide for Cisco Secure ACS for Windows Server78-16592-01c. Click the name of the ODBC log you

Strona 400 - Manual PAC Provisioning

11-27User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 11 Logs and ReportsRemote Logginggenerates the accounting logs in the

Strona 401 - Master Key and PAC TTLs

Chapter 1 OverviewAAA Server Functions and Concepts1-6User Guide for Cisco Secure ACS for Windows Server78-16592-01• Authorization, page 1-17• Ac

Strona 402 - Replication and EAP-FAST

Chapter 11 Logs and ReportsRemote Logging11-28User Guide for Cisco Secure ACS for Windows Server78-16592-01b. Add to the AAA Servers table each

Strona 403

11-29User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 11 Logs and ReportsRemote Loggingbehavior enables you to configure one

Strona 404

Chapter 11 Logs and ReportsRemote Logging11-30User Guide for Cisco Secure ACS for Windows Server78-16592-01Step 5 Select the applicable remote l

Strona 405 - Enabling EAP-FAST

11-31User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 11 Logs and ReportsService LogsStep 8 Click Submit.Cisco Secure ACS sa

Strona 406 - Global Authentication Setup

Chapter 11 Logs and ReportsService Logs11-32User Guide for Cisco Secure ACS for Windows Server78-16592-01Services LoggedCisco Secure ACS generat

Strona 407

11-33User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 11 Logs and ReportsService LogsConfiguring Service LogsYou can configu

Strona 408

Chapter 11 Logs and ReportsService Logs11-34User Guide for Cisco Secure ACS for Windows Server78-16592-01Step 3 To disable the service log file,

Strona 409

CHAPTER 12-1User Guide for Cisco Secure ACS for Windows Server78-16592-0112Administrators and Administrative PolicyThis chapter addresses the Cisco Se

Strona 410

Chapter 12 Administrators and Administrative PolicyAdministrator Accounts12-2User Guide for Cisco Secure ACS for Windows Server78-16592-01About

Strona 411

12-3User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 12 Administrators and Administrative PolicyAdministrator AccountsAdmini

Strona 412

1-7User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 1 OverviewAAA Server Functions and ConceptsTACACS+Cisco Secure ACS confor

Strona 413

Chapter 12 Administrators and Administrative PolicyAdministrator Accounts12-4User Guide for Cisco Secure ACS for Windows Server78-16592-01Note A

Strona 414

12-5User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 12 Administrators and Administrative PolicyAdministrator Accounts–VoIP

Strona 415

Chapter 12 Administrators and Administrative PolicyAdministrator Accounts12-6User Guide for Cisco Secure ACS for Windows Server78-16592-01–ACS B

Strona 416

12-7User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 12 Administrators and Administrative PolicyAdministrator AccountsAll pr

Strona 417

Chapter 12 Administrators and Administrative PolicyAdministrator Accounts12-8User Guide for Cisco Secure ACS for Windows Server78-16592-01Note Y

Strona 418

12-9User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 12 Administrators and Administrative PolicyAdministrator AccountsNote I

Strona 419

Chapter 12 Administrators and Administrative PolicyAdministrator Accounts12-10User Guide for Cisco Secure ACS for Windows Server78-16592-01Step

Strona 420

12-11User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 12 Administrators and Administrative PolicyAccess PolicyDeleting an Ad

Strona 421

Chapter 12 Administrators and Administrative PolicyAccess Policy12-12User Guide for Cisco Secure ACS for Windows Server78-16592-01Access Policy

Strona 422

12-13User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 12 Administrators and Administrative PolicyAccess PolicyCisco Secure A

Strona 423

Chapter 1 OverviewAAA Server Functions and Concepts1-8User Guide for Cisco Secure ACS for Windows Server78-16592-01• RFC 2868• RFC 2869The ports

Strona 424

Chapter 12 Administrators and Administrative PolicyAccess Policy12-14User Guide for Cisco Secure ACS for Windows Server78-16592-01Setting Up Acc

Strona 425 - Step 5 Click Delete

12-15User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 12 Administrators and Administrative PolicyAccess Policyb. For each IP

Strona 426

Chapter 12 Administrators and Administrative PolicySession Policy12-16User Guide for Cisco Secure ACS for Windows Server78-16592-01Session Polic

Strona 427

12-17User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 12 Administrators and Administrative PolicySession Policy• Respond to

Strona 428

Chapter 12 Administrators and Administrative PolicyAudit Policy12-18User Guide for Cisco Secure ACS for Windows Server78-16592-01Step 5 Set the

Strona 429

CHAPTER 13-1User Guide for Cisco Secure ACS for Windows Server78-16592-0113User DatabasesCisco Secure ACS for Windows Server authenticates users again

Strona 430

Chapter 13 User DatabasesCiscoSecure User Database13-2User Guide for Cisco Secure ACS for Windows Server78-16592-01• Token Server User Databases

Strona 431

13-3User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 13 User DatabasesCiscoSecure User DatabaseUser Import and CreationThere

Strona 432

Chapter 13 User DatabasesAbout External User Databases13-4User Guide for Cisco Secure ACS for Windows Server78-16592-01Cisco Secure ACS. Any use

Strona 433 - Logs and Reports

13-5User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 13 User DatabasesAbout External User DatabasesFor Cisco Secure ACS to i

Strona 434 - Special Logging Attributes

1-9User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 1 OverviewAAA Server Functions and ConceptsThere is a fundamental implici

Strona 435

Chapter 13 User DatabasesAbout External User Databases13-6User Guide for Cisco Secure ACS for Windows Server78-16592-01• By Unknown User Policy—

Strona 436 - NAC Attributes in Logs

13-7User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 13 User DatabasesWindows User DatabaseWindows User DatabaseYou can conf

Strona 437

Chapter 13 User DatabasesWindows User Database13-8User Guide for Cisco Secure ACS for Windows Server78-16592-01What’s Supported with Windows Use

Strona 438 - Accounting Logs

13-9User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 13 User DatabasesWindows User DatabaseAuthentication with Windows User

Strona 439

Chapter 13 User DatabasesWindows User Database13-10User Guide for Cisco Secure ACS for Windows Server78-16592-01but no trust relationship is est

Strona 440

13-11User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 13 User DatabasesWindows User DatabaseWindows Dial-up Networking Clien

Strona 441

Chapter 13 User DatabasesWindows User Database13-12User Guide for Cisco Secure ACS for Windows Server78-16592-01To determine the format of a use

Strona 442 - Step 2 Click Logged-in Users

13-13User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 13 User DatabasesWindows User DatabaseNon-domain-qualified UsernamesCi

Strona 443 - Deleting Logged-in Users

Chapter 13 User DatabasesWindows User Database13-14User Guide for Cisco Secure ACS for Windows Server78-16592-01Note If your Domain List contain

Strona 444

13-15User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 13 User DatabasesWindows User DatabaseIf the authentication protocol u

Strona 445 - Cisco Secure ACS System Logs

vUser Guide for Cisco Secure ACS for Windows Server78-16592-01ContentsAdministrative Sessions through a NAT Gateway 1-31Accessing the HTML Interface

Strona 446

Chapter 1 OverviewAAA Server Functions and Concepts1-10User Guide for Cisco Secure ACS for Windows Server78-16592-01Authentication and User Datab

Strona 447 - Working with CSV Logs

Chapter 13 User DatabasesWindows User Database13-16User Guide for Cisco Secure ACS for Windows Server78-16592-01EAP-TLS Domain StrippingIf you u

Strona 448 - CSV Log File Locations

13-17User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 13 User DatabasesWindows User DatabaseWhen machine authentication is e

Strona 449

Chapter 13 User DatabasesWindows User Database13-18User Guide for Cisco Secure ACS for Windows Server78-16592-01Cisco Secure ACS supports both E

Strona 450 - Viewing a CSV Report

13-19User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 13 User DatabasesWindows User Databasethat was added to the local mach

Strona 451 - Configuring a CSV Log

Chapter 13 User DatabasesWindows User Database13-20User Guide for Cisco Secure ACS for Windows Server78-16592-01–Calling-Station-Id value not fo

Strona 452

13-21User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 13 User DatabasesWindows User DatabaseClient operating systems support

Strona 453 - Working with ODBC Logs

Chapter 13 User DatabasesWindows User Database13-22User Guide for Cisco Secure ACS for Windows Server78-16592-01d. On the Protected EAP Properti

Strona 454 - Preparing for ODBC Logging

13-23User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 13 User DatabasesWindows User DatabaseNote End-user client computers a

Strona 455 - Configuring an ODBC Log

Chapter 13 User DatabasesWindows User Database13-24User Guide for Cisco Secure ACS for Windows Server78-16592-01Cisco Secure ACS allows you to c

Strona 456

13-25User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 13 User DatabasesWindows User DatabaseUser-Changeable Passwords with W

Strona 457

1-11User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 1 OverviewAAA Server Functions and ConceptsTable 1-3 specifies EAP authe

Strona 458 - Remote Logging

Chapter 13 User DatabasesWindows User Database13-26User Guide for Cisco Secure ACS for Windows Server78-16592-01Preparing Users for Authenticati

Strona 459

13-27User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 13 User DatabasesWindows User DatabaseTip Windows dialin permission is

Strona 460 - Remote Logging Options

Chapter 13 User DatabasesWindows User Database13-28User Guide for Cisco Secure ACS for Windows Server78-16592-01Note The check boxes under MS CH

Strona 461

13-29User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 13 User DatabasesWindows User Database• EAP-TLS and PEAP machine authe

Strona 462

Chapter 13 User DatabasesWindows User Database13-30User Guide for Cisco Secure ACS for Windows Server78-16592-01Note If you do not change the va

Strona 463 - Service Logs

13-31User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 13 User DatabasesWindows User DatabaseStep 3 Click Windows Database.If

Strona 464 - Services Logged

Chapter 13 User DatabasesGeneric LDAP13-32User Guide for Cisco Secure ACS for Windows Server78-16592-01Step 7 Click Submit.Cisco Secure ACS save

Strona 465 - Configuring Service Logs

13-33User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 13 User DatabasesGeneric LDAP• LDAP Failover, page 13-36• LDAP Configu

Strona 466

Chapter 13 User DatabasesGeneric LDAP13-34User Guide for Cisco Secure ACS for Windows Server78-16592-01For each LDAP instance, you can add or le

Strona 467 - Administrator Accounts

13-35User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 13 User DatabasesGeneric LDAPIf you choose to make use of domain filte

Strona 468 - About Administrator Accounts

Chapter 1 OverviewAAA Server Functions and Concepts1-12User Guide for Cisco Secure ACS for Windows Server78-16592-01• PEAP(EAP-GTC)• PEAP(EAP-MSC

Strona 469 - Administrator Privileges

Chapter 13 User DatabasesGeneric LDAP13-36User Guide for Cisco Secure ACS for Windows Server78-16592-01Note With this option, Cisco Secure ACS s

Strona 470

13-37User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 13 User DatabasesGeneric LDAPUnsuccessful Previous Authentication with

Strona 471

Chapter 13 User DatabasesGeneric LDAP13-38User Guide for Cisco Secure ACS for Windows Server78-16592-01This table contains the following options

Strona 472

13-39User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 13 User DatabasesGeneric LDAP–Strip domain before submitting username

Strona 473

Chapter 13 User DatabasesGeneric LDAP13-40User Guide for Cisco Secure ACS for Windows Server78-16592-01For example, if the delimiter character i

Strona 474

13-41User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 13 User DatabasesGeneric LDAP–UserObjectType—The name of the attribute

Strona 475

Chapter 13 User DatabasesGeneric LDAP13-42User Guide for Cisco Secure ACS for Windows Server78-16592-01–Port—The TCP/IP port number on which the

Strona 476

13-43User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 13 User DatabasesGeneric LDAP–Admin DN—The DN of the administrator; th

Strona 477 - Access Policy

Chapter 13 User DatabasesGeneric LDAP13-44User Guide for Cisco Secure ACS for Windows Server78-16592-01To configure Cisco Secure ACS to use the

Strona 478 - Access Policy Options

13-45User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 13 User DatabasesGeneric LDAPStep 8 If you want to limit authenticatio

Strona 479

1-13User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 1 OverviewAAA Server Functions and Concepts• ARAP—Uses a two-way challen

Strona 480 - Setting Up Access Policy

Chapter 13 User DatabasesGeneric LDAP13-46User Guide for Cisco Secure ACS for Windows Server78-16592-01Note For information about domain filteri

Strona 481

13-47User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 13 User DatabasesGeneric LDAPStep 13 In the User Object Class box, typ

Strona 482 - Session Policy

Chapter 13 User DatabasesGeneric LDAP13-48User Guide for Cisco Secure ACS for Windows Server78-16592-01Step 20 For the Primary LDAP Server and S

Strona 483 - Setting Up Session Policy

13-49User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 13 User DatabasesNovell NDS DatabaseFor example:uid=joesmith,ou=member

Strona 484 - Audit Policy

Chapter 13 User DatabasesNovell NDS Database13-50User Guide for Cisco Secure ACS for Windows Server78-16592-01About Novell NDS User DatabasesCis

Strona 485 - User Databases

13-51User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 13 User DatabasesNovell NDS DatabaseFor users to authenticate against

Strona 486 - CiscoSecure User Database

Chapter 13 User DatabasesNovell NDS Database13-52User Guide for Cisco Secure ACS for Windows Server78-16592-01Novell NDS External User Database

Strona 487 - User Import and Creation

13-53User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 13 User DatabasesNovell NDS DatabaseNote If the administrator username

Strona 488 - About External User Databases

Chapter 13 User DatabasesNovell NDS Database13-54User Guide for Cisco Secure ACS for Windows Server78-16592-01Before You BeginThe Novell Request

Strona 489

13-55User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 13 User DatabasesODBC DatabaseFor more information about the content o

Strona 490 - External user

Chapter 1 OverviewAAA Server Functions and Concepts1-14User Guide for Cisco Secure ACS for Windows Server78-16592-01• EAP-FAST—EAP Flexible Authe

Strona 491 - Windows User Database

Chapter 13 User DatabasesODBC Database13-56User Guide for Cisco Secure ACS for Windows Server78-16592-01ACS to authenticate against an ODBC-comp

Strona 492

13-57User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 13 User DatabasesODBC Database• EAP-TLS Authentication Procedure Input

Strona 493 - Trust Relationships

Chapter 13 User DatabasesODBC Database13-58User Guide for Cisco Secure ACS for Windows Server78-16592-01• Group Mapping for Unknown Users—Cisco

Strona 494

13-59User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 13 User DatabasesODBC DatabaseCisco Secure ACS grants authorization ba

Strona 495

Chapter 13 User DatabasesODBC Database13-60User Guide for Cisco Secure ACS for Windows Server78-16592-01Step 4 Write the stored procedures inten

Strona 496

13-61User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 13 User DatabasesODBC DatabaseThe Cisco Secure ACS product CD provides

Strona 497

Chapter 13 User DatabasesODBC Database13-62User Guide for Cisco Secure ACS for Windows Server78-16592-01will default to case sensitive, whereas

Strona 498 - UPN Usernames

13-63User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 13 User DatabasesODBC DatabaseGRANT EXECUTE ON dbo.CSNTAuthUserPap TO

Strona 499

Chapter 13 User DatabasesODBC Database13-64User Guide for Cisco Secure ACS for Windows Server78-16592-01Sample Routine for Generating an EAP-TLS

Strona 500 - Machine Authentication

13-65User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 13 User DatabasesODBC DatabaseThe input names are for guidance only. P

Strona 501

1-15User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 1 OverviewAAA Server Functions and Concepts• Outbound passwords—The TACA

Strona 502

Chapter 13 User DatabasesODBC Database13-66User Guide for Cisco Secure ACS for Windows Server78-16592-01Note If the ODBC database returns data i

Strona 503 - Machine Access Restrictions

13-67User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 13 User DatabasesODBC DatabaseThe CSNTGroup and CSNTacctInfo fields ar

Strona 504

Chapter 13 User DatabasesODBC Database13-68User Guide for Cisco Secure ACS for Windows Server78-16592-01Note Because Cisco Secure ACS performs a

Strona 505

13-69User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 13 User DatabasesODBC DatabaseThe CSNTGroup and CSNTacctInfo fields ar

Strona 506

Chapter 13 User DatabasesODBC Database13-70User Guide for Cisco Secure ACS for Windows Server78-16592-01Configuring a System Data Source Name fo

Strona 507

13-71User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 13 User DatabasesODBC DatabaseStep 10 Close the ODBC Data Source Admin

Strona 508

Chapter 13 User DatabasesODBC Database13-72User Guide for Cisco Secure ACS for Windows Server78-16592-01Step 6 From the System DSN list, select

Strona 509

13-73User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 13 User DatabasesODBC DatabaseStep 11 From the DSN Procedure Type list

Strona 510

Chapter 13 User DatabasesODBC Database13-74User Guide for Cisco Secure ACS for Windows Server78-16592-01Note If you enabled CHAP/MS-CHAP/ARAP au

Strona 511

13-75User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 13 User DatabasesLEAP Proxy RADIUS Server DatabaseLEAP Proxy RADIUS Se

Strona 512

Chapter 1 OverviewAAA Server Functions and Concepts1-16User Guide for Cisco Secure ACS for Windows Server78-16592-01For information on the requir

Strona 513

Chapter 13 User DatabasesLEAP Proxy RADIUS Server Database13-76User Guide for Cisco Secure ACS for Windows Server78-16592-01Configuring a LEAP P

Strona 514

13-77User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 13 User DatabasesLEAP Proxy RADIUS Server DatabaseStep 7 In the follow

Strona 515

Chapter 13 User DatabasesToken Server User Databases13-78User Guide for Cisco Secure ACS for Windows Server78-16592-01Token Server User Database

Strona 516 - Generic LDAP

13-79User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 13 User DatabasesToken Server User DatabasesFor RSA SecurID, Cisco Sec

Strona 517 - Multiple LDAP Instances

Chapter 13 User DatabasesToken Server User Databases13-80User Guide for Cisco Secure ACS for Windows Server78-16592-01About RADIUS-Enabled Token

Strona 518 - Domain Filtering

13-81User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 13 User DatabasesToken Server User DatabasesCisco Secure ACS expects t

Strona 519

Chapter 13 User DatabasesToken Server User Databases13-82User Guide for Cisco Secure ACS for Windows Server78-16592-01c. Click Submit.Cisco Secu

Strona 520 - LDAP Failover

13-83User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 13 User DatabasesToken Server User Databases• Timeout (seconds):—The n

Strona 521 - LDAP Configuration Options

Chapter 13 User DatabasesToken Server User Databases13-84User Guide for Cisco Secure ACS for Windows Server78-16592-01Note You should only use t

Strona 522

13-85User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 13 User DatabasesToken Server User DatabasesConfiguring an RSA SecurID

Strona 523

1-17User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 1 OverviewAAA Server Functions and Concepts• Configurable character stri

Strona 524

Chapter 13 User DatabasesDeleting an External User Database Configuration13-86User Guide for Cisco Secure ACS for Windows Server78-16592-01Step

Strona 525

13-87User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 13 User DatabasesDeleting an External User Database ConfigurationStep

Strona 526

Chapter 13 User DatabasesDeleting an External User Database Configuration13-88User Guide for Cisco Secure ACS for Windows Server78-16592-01

Strona 527

CHAPTER 14-1User Guide for Cisco Secure ACS for Windows Server78-16592-0114Network Admission ControlNAC enables you to control the degree of access pe

Strona 528

Chapter 14 Network Admission ControlAbout Network Admission Control14-2User Guide for Cisco Secure ACS for Windows Server78-16592-01NAC AAA Comp

Strona 529

14-3User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 14 Network Admission ControlAbout Network Admission ControlPosture Vali

Strona 530

Chapter 14 Network Admission ControlAbout Network Admission Control14-4User Guide for Cisco Secure ACS for Windows Server78-16592-016. Cisco Sec

Strona 531

14-5User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 14 Network Admission ControlImplementing Network Admission ControlFrom

Strona 532

Chapter 14 Network Admission ControlImplementing Network Admission Control14-6User Guide for Cisco Secure ACS for Windows Server78-16592-01To im

Strona 533 - Novell NDS Database

14-7User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 14 Network Admission ControlImplementing Network Admission ControlStep

Strona 534

Chapter 1 OverviewAAA Server Functions and Concepts1-18User Guide for Cisco Secure ACS for Windows Server78-16592-01This section contains the fol

Strona 535 - User Contexts

Chapter 14 Network Admission ControlImplementing Network Admission Control14-8User Guide for Cisco Secure ACS for Windows Server78-16592-01b. Cr

Strona 536

14-9User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 14 Network Admission ControlImplementing Network Admission Controlb. (O

Strona 537

Chapter 14 Network Admission ControlNAC Databases14-10User Guide for Cisco Secure ACS for Windows Server78-16592-01NAC DatabasesThis section con

Strona 538

14-11User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 14 Network Admission ControlNAC Databasesmandatory credential types. T

Strona 539 - ODBC Database

Chapter 14 Network Admission ControlNAC Databases14-12User Guide for Cisco Secure ACS for Windows Server78-16592-01Cisco Secure ACS communicates

Strona 540

14-13User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 14 Network Admission ControlNAC Databases–Name—Displays the policy nam

Strona 541

Chapter 14 Network Admission ControlNAC Databases14-14User Guide for Cisco Secure ACS for Windows Server78-16592-01Configuring a NAC DatabaseThi

Strona 542 - External User Database

14-15User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 14 Network Admission ControlNAC DatabasesStep 6 Click Configure.Cautio

Strona 543 - Relational Database

Chapter 14 Network Admission ControlNAC Policies14-16User Guide for Cisco Secure ACS for Windows Server78-16592-01b. If you need to create a pol

Strona 544

14-17User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 14 Network Admission ControlNAC PoliciesPolicies are reusable; that is

Strona 545 - Type Definitions

1-19User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 1 OverviewAAA Server Functions and ConceptsQuotas can be either absolute

Strona 546 - Procedure

Chapter 14 Network Admission ControlNAC Policies14-18User Guide for Cisco Secure ACS for Windows Server78-16592-01About Local PoliciesLocal poli

Strona 547

14-19User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 14 Network Admission ControlNAC PoliciesAbout Rules, Rule Elements, an

Strona 548

Chapter 14 Network Admission ControlNAC Policies14-20User Guide for Cisco Secure ACS for Windows Server78-16592-01• unsigned integer—The attribu

Strona 549 - PAP Procedure Output

14-21User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 14 Network Admission ControlNAC PoliciesThe following are the operator

Strona 550

Chapter 14 Network Admission ControlNAC Policies14-22User Guide for Cisco Secure ACS for Windows Server78-16592-01–$ (dollar)—The $ operator mat

Strona 551

14-23User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 14 Network Admission ControlNAC Policies• Description—Specifies a text

Strona 552 - EAP-TLS Procedure Output

Chapter 14 Network Admission ControlNAC Policies14-24User Guide for Cisco Secure ACS for Windows Server78-16592-01Note Under Default Rule, the m

Strona 553 - Result Codes

14-25User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 14 Network Admission ControlNAC Policiesappear in the Attribute list.

Strona 554

Chapter 14 Network Admission ControlNAC Policies14-26User Guide for Cisco Secure ACS for Windows Server78-16592-01b. Click Database Configuratio

Strona 555

14-27User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 14 Network Admission ControlNAC PoliciesTip If you want to change a ru

Strona 556

ContentsviUser Guide for Cisco Secure ACS for Windows Server78-16592-01CHAPTER 3 Interface Configuration 3-1Interface Design Concepts 3-2User-to-Grou

Strona 557

Chapter 1 OverviewAAA Server Functions and Concepts1-20User Guide for Cisco Secure ACS for Windows Server78-16592-01AAA client that uses TACACS+.

Strona 558

Chapter 14 Network Admission ControlNAC Policies14-28User Guide for Cisco Secure ACS for Windows Server78-16592-01When Cisco Secure ACS applies

Strona 559

14-29User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 14 Network Admission ControlNAC PoliciesCisco Secure ACS evaluates a p

Strona 560

Chapter 14 Network Admission ControlNAC Policies14-30User Guide for Cisco Secure ACS for Windows Server78-16592-01ACS cannot reach the primary s

Strona 561

14-31User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 14 Network Admission ControlNAC Policies–Password—Specifies the passwo

Strona 562 - Token Server User Databases

Chapter 14 Network Admission ControlNAC Policies14-32User Guide for Cisco Secure ACS for Windows Server78-16592-01• Forwarding Credential Types—

Strona 563 - RADIUS-Enabled Token Servers

14-33User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 14 Network Admission ControlNAC Policiesd. Under Credential Validation

Strona 564

Chapter 14 Network Admission ControlNAC Policies14-34User Guide for Cisco Secure ACS for Windows Server78-16592-01The Select External Policies p

Strona 565

14-35User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 14 Network Admission ControlNAC PoliciesTip If the policy you want to

Strona 566

Chapter 14 Network Admission ControlNAC Policies14-36User Guide for Cisco Secure ACS for Windows Server78-16592-01Deleting a PolicyBefore You Be

Strona 567

14-37User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 14 Network Admission ControlNAC PoliciesStep 5 Click Delete Policy.Ste

Strona 568 - RSA SecurID Token Servers

1-21User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 1 OverviewAAA Server Functions and ConceptsOther Authorization-Related F

Strona 569

Chapter 14 Network Admission ControlNAC Policies14-38User Guide for Cisco Secure ACS for Windows Server78-16592-01

Strona 570

CHAPTER 15-1User Guide for Cisco Secure ACS for Windows Server78-16592-0115Unknown User PolicyAfter you have configured at least one database in the E

Strona 571

Chapter 15 Unknown User PolicyKnown, Unknown, and Discovered Users15-2User Guide for Cisco Secure ACS for Windows Server78-16592-01• Posture Val

Strona 572

15-3User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 15 Unknown User PolicyKnown, Unknown, and Discovered UsersCisco Secure

Strona 573 - Network Admission Control

Chapter 15 Unknown User PolicyAuthentication and Unknown Users15-4User Guide for Cisco Secure ACS for Windows Server78-16592-01–Authentication—T

Strona 574 - NAC AAA Components

15-5User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 15 Unknown User PolicyAuthentication and Unknown UsersThe Unknown User

Strona 575 - Posture Validation

Chapter 15 Unknown User PolicyAuthentication and Unknown Users15-6User Guide for Cisco Secure ACS for Windows Server78-16592-01Note Because user

Strona 576 - Posture Tokens

15-7User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 15 Unknown User PolicyAuthentication and Unknown Userswith various Wind

Strona 577

Chapter 15 Unknown User PolicyAuthentication and Unknown Users15-8User Guide for Cisco Secure ACS for Windows Server78-16592-01Note If your netw

Strona 578

15-9User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 15 Unknown User PolicyAuthentication and Unknown UsersAdded Authenticat

Strona 579

Chapter 1 OverviewAAA Server Functions and Concepts1-22User Guide for Cisco Secure ACS for Windows Server78-16592-01AccountingAAA clients use the

Strona 580

Chapter 15 Unknown User PolicyPosture Validation and the Unknown User Policy15-10User Guide for Cisco Secure ACS for Windows Server78-16592-01Po

Strona 581

15-11User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 15 Unknown User PolicyPosture Validation and the Unknown User PolicyCr

Strona 582 - NAC Databases

Chapter 15 Unknown User PolicyPosture Validation and the Unknown User Policy15-12User Guide for Cisco Secure ACS for Windows Server78-16592-01No

Strona 583

15-13User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 15 Unknown User PolicyAuthorization of Unknown UsersAuthorization of U

Strona 584

Chapter 15 Unknown User PolicyDatabase Search Order15-14User Guide for Cisco Secure ACS for Windows Server78-16592-01• External Databases—Of the

Strona 585 - Policy Selection Options

15-15User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 15 Unknown User PolicyDatabase Search Order• Posture validation—The Un

Strona 586 - Configuring a NAC Database

Chapter 15 Unknown User PolicyConfiguring the Unknown User Policy15-16User Guide for Cisco Secure ACS for Windows Server78-16592-01Tip If you cr

Strona 587

15-17User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 15 Unknown User PolicyDisabling Unknown User AuthenticationNote For mo

Strona 588 - NAC Policies

Chapter 15 Unknown User PolicyDisabling Unknown User Authentication15-18User Guide for Cisco Secure ACS for Windows Server78-16592-01

Strona 589 - Local Policies

CHAPTER 16-1User Guide for Cisco Secure ACS for Windows Server78-16592-0116User Group Mapping and SpecificationThis chapter provides information about

Strona 590 - About Local Policies

1-23User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 1 OverviewAAA Server Functions and ConceptsAdministrationTo configure, m

Strona 591 - NAC Attribute Data Types

Chapter 16 User Group Mapping and SpecificationGroup Mapping by External User Database16-2User Guide for Cisco Secure ACS for Windows Server78-1

Strona 592 - Rule Operators

16-3User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 16 User Group Mapping and SpecificationGroup Mapping by External User D

Strona 593

Chapter 16 User Group Mapping and SpecificationGroup Mapping by Group Set Membership16-4User Guide for Cisco Secure ACS for Windows Server78-165

Strona 594

16-5User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 16 User Group Mapping and SpecificationGroup Mapping by Group Set Membe

Strona 595

Chapter 16 User Group Mapping and SpecificationGroup Mapping by Group Set Membership16-6User Guide for Cisco Secure ACS for Windows Server78-165

Strona 596 - Rule Configuration Options

16-7User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 16 User Group Mapping and SpecificationGroup Mapping by Group Set Membe

Strona 597 - Creating a Local Policy

Chapter 16 User Group Mapping and SpecificationGroup Mapping by Group Set Membership16-8User Guide for Cisco Secure ACS for Windows Server78-165

Strona 598

16-9User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 16 User Group Mapping and SpecificationGroup Mapping by Group Set Membe

Strona 599

Chapter 16 User Group Mapping and SpecificationGroup Mapping by Group Set Membership16-10User Guide for Cisco Secure ACS for Windows Server78-16

Strona 600 - External Policies

16-11User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 16 User Group Mapping and SpecificationGroup Mapping by Group Set Memb

Strona 601

Chapter 1 OverviewAAA Server Functions and Concepts1-24User Guide for Cisco Secure ACS for Windows Server78-16592-01For information about configu

Strona 602

Chapter 16 User Group Mapping and SpecificationGroup Mapping by Group Set Membership16-12User Guide for Cisco Secure ACS for Windows Server78-16

Strona 603

16-13User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 16 User Group Mapping and SpecificationNAC Group MappingThe Order mapp

Strona 604 - Creating an External Policy

Chapter 16 User Group Mapping and SpecificationRADIUS-Based Group Specification16-14User Guide for Cisco Secure ACS for Windows Server78-16592-0

Strona 605

16-15User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 16 User Group Mapping and SpecificationRADIUS-Based Group Specificatio

Strona 606 - Editing a Policy

Chapter 16 User Group Mapping and SpecificationRADIUS-Based Group Specification16-16User Guide for Cisco Secure ACS for Windows Server78-16592-0

Strona 607

A-1User Guide for Cisco Secure ACS for Windows Server78-16592-01APPENDIXATroubleshootingThis appendix provides information about certain basic proble

Strona 608 - Deleting a Policy

Appendix A TroubleshootingAdministration IssuesA-2User Guide for Cisco Secure ACS for Windows Server78-16592-01Administration IssuesCondition Re

Strona 609 - Step 6 Click Submit

A-3User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix A TroubleshootingAdministration IssuesAdministrator configured for even

Strona 610

Appendix A TroubleshootingBrowser IssuesA-4User Guide for Cisco Secure ACS for Windows Server78-16592-01Browser IssuesCondition Recovery ActionT

Strona 611 - Unknown User Policy

A-5User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix A TroubleshootingCisco IOS IssuesCisco IOS IssuesCondition Recovery Act

Strona 612

1-25User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 1 OverviewCisco Secure ACS HTML Interface• CSMonitor service, providing

Strona 613

Appendix A TroubleshootingCisco IOS IssuesA-6User Guide for Cisco Secure ACS for Windows Server78-16592-01Under EXEC Commands, Cisco IOS command

Strona 614

A-7User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix A TroubleshootingDatabase IssuesDatabase IssuesCondition Recovery Actio

Strona 615

Appendix A TroubleshootingDatabase IssuesA-8User Guide for Cisco Secure ACS for Windows Server78-16592-01External databases not operating proper

Strona 616

A-9User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix A TroubleshootingDatabase IssuesUnable to authenticate against the Nove

Strona 617 - \username. The

Appendix A TroubleshootingDial-in Connection IssuesA-10User Guide for Cisco Secure ACS for Windows Server78-16592-01Dial-in Connection IssuesCon

Strona 618

A-11User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix A TroubleshootingDial-in Connection IssuesA dial-in user cannot connec

Strona 619 - Added Authentication Latency

Appendix A TroubleshootingDial-in Connection IssuesA-12User Guide for Cisco Secure ACS for Windows Server78-16592-01A dial-in user cannot connec

Strona 620 - :username

A-13User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix A TroubleshootingDial-in Connection IssuesA dial-in user cannot connec

Strona 621

Appendix A TroubleshootingDebug IssuesA-14User Guide for Cisco Secure ACS for Windows Server78-16592-01Debug IssuesCondition Recovery ActionWhen

Strona 622

A-15User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix A TroubleshootingProxy IssuesProxy IssuesCondition Recovery ActionProx

Strona 623 - Unknown User Policy Options

Chapter 1 OverviewCisco Secure ACS HTML Interface1-26User Guide for Cisco Secure ACS for Windows Server78-16592-01This section contains the follo

Strona 624 - Database Search Order

Appendix A TroubleshootingInstallation and Upgrade IssuesA-16User Guide for Cisco Secure ACS for Windows Server78-16592-01Installation and Upgra

Strona 625

A-17User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix A TroubleshootingReport IssuesReport IssuesCondition Recovery ActionTh

Strona 626

Appendix A TroubleshootingReport IssuesA-18User Guide for Cisco Secure ACS for Windows Server78-16592-01The Logged in Users report works with so

Strona 627

A-19User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix A TroubleshootingThird-Party Server IssuesThird-Party Server IssuesCon

Strona 628

Appendix A TroubleshootingUser Authentication IssuesA-20User Guide for Cisco Secure ACS for Windows Server78-16592-01User Authentication IssuesC

Strona 629 - Specification

A-21User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix A TroubleshootingUser Authentication IssuesAuthentication fails; the e

Strona 630

Appendix A TroubleshootingTACACS+ and RADIUS Attribute IssuesA-22User Guide for Cisco Secure ACS for Windows Server78-16592-01TACACS+ and RADIUS

Strona 631

B-1User Guide for Cisco Secure ACS for Windows Server78-16592-01APPENDIXBTACACS+ Attribute-Value PairsCisco Secure Access Control Server (ACS) for Wi

Strona 632 - • Generic LDAP

Appendix B TACACS+ Attribute-Value PairsCisco IOS AV Pair DictionaryB-2User Guide for Cisco Secure ACS for Windows Server78-16592-01TACACS+ AV P

Strona 633 - Group Mapping Order

B-3User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix B TACACS+ Attribute-Value PairsCisco IOS AV Pair Dictionary• ip-address

Strona 634

1-27User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 1 OverviewCisco Secure ACS HTML InterfaceAdministrative sessions timeout

Strona 635

Appendix B TACACS+ Attribute-Value PairsCisco IOS AV Pair DictionaryB-4User Guide for Cisco Secure ACS for Windows Server78-16592-01• wins-serve

Strona 636

B-5User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix B TACACS+ Attribute-Value PairsCisco IOS AV Pair Dictionary• protocol•

Strona 637

Appendix B TACACS+ Attribute-Value PairsCisco IOS AV Pair DictionaryB-6User Guide for Cisco Secure ACS for Windows Server78-16592-01

Strona 638

C-1User Guide for Cisco Secure ACS for Windows Server78-16592-01APPENDIXCRADIUS AttributesCisco Secure Access Control Server (ACS) for Windows Server

Strona 639

Appendix C RADIUS AttributesCisco IOS Dictionary of RADIUS AV PairsC-2User Guide for Cisco Secure ACS for Windows Server78-16592-013. In the pro

Strona 640

C-3User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix C RADIUS AttributesCisco IOS Dictionary of RADIUS AV PairsNote If you s

Strona 641 - NAC Group Mapping

Appendix C RADIUS AttributesCisco IOS Dictionary of RADIUS AV PairsC-4User Guide for Cisco Secure ACS for Windows Server78-16592-0113 Framed-Com

Strona 642

C-5User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix C RADIUS AttributesCisco IOS/PIX Dictionary of RADIUS VSAsCisco IOS/PIX

Strona 643

Appendix C RADIUS AttributesCisco IOS/PIX Dictionary of RADIUS VSAsC-6User Guide for Cisco Secure ACS for Windows Server78-16592-0124 cisco-h323

Strona 644

C-7User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix C RADIUS AttributesAbout the cisco-av-pair RADUIS AttributeAbout the ci

Strona 645 - Troubleshooting

Chapter 1 OverviewCisco Secure ACS HTML Interface1-28User Guide for Cisco Secure ACS for Windows Server78-16592-01advanced features such as datab

Strona 646 - Administration Issues

Appendix C RADIUS AttributesAbout the cisco-av-pair RADUIS AttributeC-8User Guide for Cisco Secure ACS for Windows Server78-16592-01In IOS, supp

Strona 647

C-9User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix C RADIUS AttributesCisco VPN 3000 Concentrator Dictionary of RADIUS VSA

Strona 648 - Browser Issues

Appendix C RADIUS AttributesCisco VPN 3000 Concentrator Dictionary of RADIUS VSAsC-10User Guide for Cisco Secure ACS for Windows Server78-16592-

Strona 649 - Cisco IOS Issues

C-11User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix C RADIUS AttributesCisco VPN 3000 Concentrator Dictionary of RADIUS VS

Strona 650

Appendix C RADIUS AttributesCisco VPN 3000 Concentrator Dictionary of RADIUS VSAsC-12User Guide for Cisco Secure ACS for Windows Server78-16592-

Strona 651 - Database Issues

C-13User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix C RADIUS AttributesCisco VPN 5000 Concentrator Dictionary of RADIUS VS

Strona 652

Appendix C RADIUS AttributesCisco Building Broadband Service Manager Dictionary of RADIUS VSAC-14User Guide for Cisco Secure ACS for Windows Ser

Strona 653

C-15User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix C RADIUS AttributesIETF Dictionary of RADIUS AV Pairs5 NAS-Port Physic

Strona 654 - Dial-in Connection Issues

Appendix C RADIUS AttributesIETF Dictionary of RADIUS AV PairsC-16User Guide for Cisco Secure ACS for Windows Server78-16592-016 Service-Type Ty

Strona 655

C-17User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix C RADIUS AttributesIETF Dictionary of RADIUS AV Pairs10 Framed-Routing

Strona 656

1-29User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 1 OverviewCisco Secure ACS HTML Interface–Online Help—Displays basic hel

Strona 657

Appendix C RADIUS AttributesIETF Dictionary of RADIUS AV PairsC-18User Guide for Cisco Secure ACS for Windows Server78-16592-0115 Login-Service

Strona 658 - Debug Issues

C-19User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix C RADIUS AttributesIETF Dictionary of RADIUS AV Pairs24 State Allows S

Strona 659 - Proxy Issues

Appendix C RADIUS AttributesIETF Dictionary of RADIUS AV PairsC-20User Guide for Cisco Secure ACS for Windows Server78-16592-0128 Idle-Timeout M

Strona 660 - MaxSessions Issues

C-21User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix C RADIUS AttributesIETF Dictionary of RADIUS AV Pairs34 Login-LAT-Serv

Strona 661 - Report Issues

Appendix C RADIUS AttributesIETF Dictionary of RADIUS AV PairsC-22User Guide for Cisco Secure ACS for Windows Server78-16592-0144 Acct-Session-I

Strona 662

C-23User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix C RADIUS AttributesIETF Dictionary of RADIUS AV Pairs49 Acct-Terminate

Strona 663 - Third-Party Server Issues

Appendix C RADIUS AttributesIETF Dictionary of RADIUS AV PairsC-24User Guide for Cisco Secure ACS for Windows Server78-16592-0152 Acct-Input-Gig

Strona 664 - User Authentication Issues

C-25User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix C RADIUS AttributesIETF Dictionary of RADIUS AV Pairs66 Tunnel-Client-

Strona 665 - • If you have RADIUS/TACACS

Appendix C RADIUS AttributesIETF Dictionary of RADIUS AV PairsC-26User Guide for Cisco Secure ACS for Windows Server78-16592-0181 Tunnel-Private

Strona 666 - Note Some attributes are not

C-27User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix C RADIUS AttributesIETF Dictionary of RADIUS AV Pairs193 Pre-Output-Pa

Strona 667 - TACACS+ Attribute-Value Pairs

viiUser Guide for Cisco Secure ACS for Windows Server78-16592-01ContentsAAA Client Configuration 4-11AAA Client Configuration Options 4-11Adding a AA

Strona 668 - TACACS+ AV Pairs

Chapter 1 OverviewCisco Secure ACS HTML Interface1-30User Guide for Cisco Secure ACS for Windows Server78-16592-01If SSL is enabled and you do no

Strona 669 - Cisco IOS AV Pair Dictionary

Appendix C RADIUS AttributesMicrosoft MPPE Dictionary of RADIUS VSAsC-28User Guide for Cisco Secure ACS for Windows Server78-16592-01Microsoft M

Strona 670 - TACACS+ Accounting AV Pairs

C-29User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix C RADIUS AttributesMicrosoft MPPE Dictionary of RADIUS VSAs5MS-CHAP-LM

Strona 671

Appendix C RADIUS AttributesMicrosoft MPPE Dictionary of RADIUS VSAsC-30User Guide for Cisco Secure ACS for Windows Server78-16592-0112 MS-CHAP-

Strona 672

C-31User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix C RADIUS AttributesAscend Dictionary of RADIUS AV PairsAscend Dictiona

Strona 673

Appendix C RADIUS AttributesAscend Dictionary of RADIUS AV PairsC-32User Guide for Cisco Secure ACS for Windows Server78-16592-016 Service-Type

Strona 674

C-33User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix C RADIUS AttributesAscend Dictionary of RADIUS AV Pairs44 Acct-Session

Strona 675

Appendix C RADIUS AttributesAscend Dictionary of RADIUS AV PairsC-34User Guide for Cisco Secure ACS for Windows Server78-16592-01112 Ascend-CBCP

Strona 676

C-35User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix C RADIUS AttributesAscend Dictionary of RADIUS AV Pairs128 Ascend-Shar

Strona 677

Appendix C RADIUS AttributesAscend Dictionary of RADIUS AV PairsC-36User Guide for Cisco Secure ACS for Windows Server78-16592-01145 Ascend-Assi

Strona 678

C-37User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix C RADIUS AttributesAscend Dictionary of RADIUS AV PairsFrame Datalink

Strona 679

1-31User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 1 OverviewCisco Secure ACS HTML InterfaceAlso, IP filtering of proxied a

Strona 680

Appendix C RADIUS AttributesAscend Dictionary of RADIUS AV PairsC-38User Guide for Cisco Secure ACS for Windows Server78-16592-01170 Ascend-TS-I

Strona 681

C-39User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix C RADIUS AttributesAscend Dictionary of RADIUS AV Pairs185 Ascend-Home

Strona 682

Appendix C RADIUS AttributesAscend Dictionary of RADIUS AV PairsC-40User Guide for Cisco Secure ACS for Windows Server78-16592-01205 Ascend-Menu

Strona 683

C-41User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix C RADIUS AttributesAscend Dictionary of RADIUS AV Pairs221 Ascend-FR-D

Strona 684

Appendix C RADIUS AttributesAscend Dictionary of RADIUS AV PairsC-42User Guide for Cisco Secure ACS for Windows Server78-16592-01238 Ascend-Seco

Strona 685

C-43User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix C RADIUS AttributesNortel Dictionary of RADIUS VSAsNortel Dictionary o

Strona 686 - Dictionary of RADIUS VSA

Appendix C RADIUS AttributesJuniper Dictionary of RADIUS VSAsC-44User Guide for Cisco Secure ACS for Windows Server78-16592-01Juniper Dictionary

Strona 687

D-1User Guide for Cisco Secure ACS for Windows Server78-16592-01APPENDIXDCSUtil Database UtilityThis appendix details the Cisco Secure Access Control

Strona 688

Appendix D CSUtil Database UtilityLocation of CSUtil.exe and Related FilesD-2User Guide for Cisco Secure ACS for Windows Server78-16592-01• Expo

Strona 689

D-3User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix D CSUtil Database UtilityCSUtil.exe OptionsNote Most CSUtil.exe options

Strona 690

Chapter 1 OverviewCisco Secure ACS HTML Interface1-32User Guide for Cisco Secure ACS for Windows Server78-16592-01If Cisco Secure ACS is behind a

Strona 691

Appendix D CSUtil Database UtilityCSUtil.exe OptionsD-4User Guide for Cisco Secure ACS for Windows Server78-16592-01• -i—Import user or AAA clie

Strona 692

D-5User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix D CSUtil Database UtilityDisplaying Command-Line Syntax• -listUDV—List

Strona 693

Appendix D CSUtil Database UtilityBacking Up Cisco Secure ACS with CSUtil.exeD-6User Guide for Cisco Secure ACS for Windows Server78-16592-01Bac

Strona 694

D-7User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix D CSUtil Database UtilityRestoring Cisco Secure ACS with CSUtil.exeRest

Strona 695

Appendix D CSUtil Database UtilityCreating a CiscoSecure User DatabaseD-8User Guide for Cisco Secure ACS for Windows Server78-16592-01• To resto

Strona 696

D-9User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix D CSUtil Database UtilityCreating a CiscoSecure User DatabaseTo create

Strona 697

Appendix D CSUtil Database UtilityCreating a Cisco Secure ACS Database Dump FileD-10User Guide for Cisco Secure ACS for Windows Server78-16592-0

Strona 698

D-11User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix D CSUtil Database UtilityLoading the Cisco Secure ACS Database from a

Strona 699

Appendix D CSUtil Database UtilityCompacting the CiscoSecure User DatabaseD-12User Guide for Cisco Secure ACS for Windows Server78-16592-01Step

Strona 700 - • Ascend

D-13User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix D CSUtil Database UtilityCompacting the CiscoSecure User DatabaseCompa

Strona 701

1-33User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 1 OverviewCisco Secure ACS HTML InterfaceStep 2 In the Address or Locati

Strona 702 - Note The MS-CHAP-MPPE-Keys

Appendix D CSUtil Database UtilityUser and AAA Client Import OptionD-14User Guide for Cisco Secure ACS for Windows Server78-16592-01If you do no

Strona 703

D-15User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix D CSUtil Database UtilityUser and AAA Client Import OptionImporting Us

Strona 704

Appendix D CSUtil Database UtilityUser and AAA Client Import OptionD-16User Guide for Cisco Secure ACS for Windows Server78-16592-01b. To start

Strona 705

D-17User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix D CSUtil Database UtilityUser and AAA Client Import OptionAbout User a

Strona 706

Appendix D CSUtil Database UtilityUser and AAA Client Import OptionD-18User Guide for Cisco Secure ACS for Windows Server78-16592-01ADD Statemen

Strona 707

D-19User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix D CSUtil Database UtilityUser and AAA Client Import OptionFor example,

Strona 708

Appendix D CSUtil Database UtilityUser and AAA Client Import OptionD-20User Guide for Cisco Secure ACS for Windows Server78-16592-01Table D-3 UP

Strona 709

D-21User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix D CSUtil Database UtilityUser and AAA Client Import OptionFor example,

Strona 710

Appendix D CSUtil Database UtilityUser and AAA Client Import OptionD-22User Guide for Cisco Secure ACS for Windows Server78-16592-01Table D-5 AD

Strona 711

D-23User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix D CSUtil Database UtilityUser and AAA Client Import OptionFor example,

Strona 712

Chapter 1 OverviewCisco Secure ACS HTML Interface1-34User Guide for Cisco Secure ACS for Windows Server78-16592-01Using Online HelpOnline help is

Strona 713

Appendix D CSUtil Database UtilityExporting User List to a Text FileD-24User Guide for Cisco Secure ACS for Windows Server78-16592-01Import File

Strona 714

D-25User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix D CSUtil Database UtilityExporting Group Information to a Text FileSte

Strona 715 - Table C-9 Nortel RADIUS VSAs

Appendix D CSUtil Database UtilityExporting Registry Information to a Text FileD-26User Guide for Cisco Secure ACS for Windows Server78-16592-01

Strona 716

D-27User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix D CSUtil Database UtilityDecoding Error NumbersCSUtil.exe exports Wind

Strona 717 - CSUtil Database Utility

Appendix D CSUtil Database UtilityRecalculating CRC ValuesD-28User Guide for Cisco Secure ACS for Windows Server78-16592-01Step 2 Type:CSUtil.ex

Strona 718 - CSUtil.exe Syntax

D-29User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix D CSUtil Database UtilityUser-Defined RADIUS Vendors and VSA SetsAbout

Strona 719 - CSUtil.exe Options

Appendix D CSUtil Database UtilityUser-Defined RADIUS Vendors and VSA SetsD-30User Guide for Cisco Secure ACS for Windows Server78-16592-01Befor

Strona 720

D-31User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix D CSUtil Database UtilityUser-Defined RADIUS Vendors and VSA SetsNote

Strona 721 - CSUtil.exe -x

Appendix D CSUtil Database UtilityUser-Defined RADIUS Vendors and VSA SetsD-32User Guide for Cisco Secure ACS for Windows Server78-16592-01Step

Strona 722 - Step 2 Type:

D-33User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix D CSUtil Database UtilityUser-Defined RADIUS Vendors and VSA SetsStep

Strona 723

1-35User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 1 OverviewCisco Secure ACS HTML InterfaceTo access online documentation,

Strona 724 - CSUtil.exe -r config filename

Appendix D CSUtil Database UtilityUser-Defined RADIUS Vendors and VSA SetsD-34User Guide for Cisco Secure ACS for Windows Server78-16592-01Step

Strona 725

D-35User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix D CSUtil Database UtilityUser-Defined RADIUS Vendors and VSA SetsVendo

Strona 726 - Step 3 Type:

Appendix D CSUtil Database UtilityUser-Defined RADIUS Vendors and VSA SetsD-36User Guide for Cisco Secure ACS for Windows Server78-16592-01For e

Strona 727 - Dump File

D-37User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix D CSUtil Database UtilityUser-Defined RADIUS Vendors and VSA SetsTable

Strona 728

Appendix D CSUtil Database UtilityUser-Defined RADIUS Vendors and VSA SetsD-38User Guide for Cisco Secure ACS for Windows Server78-16592-01For e

Strona 729

D-39User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix D CSUtil Database UtilityUser-Defined RADIUS Vendors and VSA SetsFor e

Strona 730

Appendix D CSUtil Database UtilityPAC File GenerationD-40User Guide for Cisco Secure ACS for Windows Server78-16592-01VSA 2=widget-admin-interfa

Strona 731

D-41User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix D CSUtil Database UtilityPAC File GenerationPAC File Options and Examp

Strona 732

Appendix D CSUtil Database UtilityPAC File GenerationD-42User Guide for Cisco Secure ACS for Windows Server78-16592-01–-f list—CSUtil.exe genera

Strona 733 - ONLINE or OFFLINE Statement

D-43User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix D CSUtil Database UtilityPAC File GenerationGenerating PAC FilesNote I

Strona 734 - ADD Statements

Chapter 1 OverviewCisco Secure ACS HTML Interface1-36User Guide for Cisco Secure ACS for Windows Server78-16592-01

Strona 735 - UPDATE Statements

Appendix D CSUtil Database UtilityPosture Validation AttributesD-44User Guide for Cisco Secure ACS for Windows Server78-16592-01If you specified

Strona 736

D-45User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix D CSUtil Database UtilityPosture Validation AttributesExample D-1 show

Strona 737 - ADD_NAS Statements

Appendix D CSUtil Database UtilityPosture Validation AttributesD-46User Guide for Cisco Secure ACS for Windows Server78-16592-01Vendor IDs have

Strona 738

D-47User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix D CSUtil Database UtilityPosture Validation Attributes• attribute-name

Strona 739 - DEL_NAS Statements

Appendix D CSUtil Database UtilityPosture Validation AttributesD-48User Guide for Cisco Secure ACS for Windows Server78-16592-01–date–version–oc

Strona 740 - Import File Example

D-49User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix D CSUtil Database UtilityPosture Validation Attributes• To preserve th

Strona 741

Appendix D CSUtil Database UtilityPosture Validation AttributesD-50User Guide for Cisco Secure ACS for Windows Server78-16592-01Tip When you spe

Strona 742

D-51User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix D CSUtil Database UtilityPosture Validation AttributesDeleting a Postu

Strona 743 - Decoding Error Numbers

Appendix D CSUtil Database UtilityPosture Validation AttributesD-52User Guide for Cisco Secure ACS for Windows Server78-16592-01CSUtil v3.3, Cop

Strona 744 - Recalculating CRC Values

D-53User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix D CSUtil Database UtilityPosture Validation Attributesattribute-name=A

Strona 745

CHAPTER 2-1User Guide for Cisco Secure ACS for Windows Server78-16592-012Deployment ConsiderationsDeployment of Cisco Secure ACS for Windows Server ca

Strona 746

Appendix D CSUtil Database UtilityPosture Validation AttributesD-54User Guide for Cisco Secure ACS for Windows Server78-16592-01application-name

Strona 747

D-55User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix D CSUtil Database UtilityPosture Validation Attributesvendor-name=Cisc

Strona 748 - Listing Custom RADIUS Vendors

Appendix D CSUtil Database UtilityPosture Validation AttributesD-56User Guide for Cisco Secure ACS for Windows Server78-16592-01[attr#15]vendor-

Strona 749

D-57User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix D CSUtil Database UtilityPosture Validation Attributesattribute-type=u

Strona 750 - RADIUS Vendor/VSA Import File

Appendix D CSUtil Database UtilityPosture Validation AttributesD-58User Guide for Cisco Secure ACS for Windows Server78-16592-01attribute-name=S

Strona 751 - Vendor and VSA Set Definition

D-59User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix D CSUtil Database UtilityPosture Validation Attributesapplication-name

Strona 752 - Attribute Definition

Appendix D CSUtil Database UtilityPosture Validation AttributesD-60User Guide for Cisco Secure ACS for Windows Server78-16592-01vendor-name=NAIa

Strona 753

D-61User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix D CSUtil Database UtilityPosture Validation Attributes[attr#39]vendor-

Strona 754 - Enumeration Definition

Appendix D CSUtil Database UtilityPosture Validation AttributesD-62User Guide for Cisco Secure ACS for Windows Server78-16592-01attribute-type=v

Strona 755

D-63User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix D CSUtil Database UtilityPosture Validation Attributesattribute-name=A

Strona 756 - PAC File Generation

Chapter 2 Deployment ConsiderationsBasic Deployment Requirements for Cisco Secure ACS2-2User Guide for Cisco Secure ACS for Windows Server78-165

Strona 757 - PAC File Options and Examples

Appendix D CSUtil Database UtilityPosture Validation AttributesD-64User Guide for Cisco Secure ACS for Windows Server78-16592-01

Strona 758

E-1User Guide for Cisco Secure ACS for Windows Server78-16592-01APPENDIXEVPDN ProcessingCisco Secure ACS for Windows Server supports authentication f

Strona 759 - Generating PAC Files

Appendix E VPDN ProcessingVPDN ProcessE-2User Guide for Cisco Secure ACS for Windows Server78-16592-01Figure E-1 VPDN User Dials In2. If VPDN is

Strona 760 - Posture Validation Attributes

E-3User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix E VPDN ProcessingVPDN ProcessFigure E-3 Authorization of Domain FailsIf

Strona 761

Appendix E VPDN ProcessingVPDN ProcessE-4User Guide for Cisco Secure ACS for Windows Server78-16592-01Figure E-5 HG Authenticates Tunnel with AC

Strona 762

E-5User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix E VPDN ProcessingVPDN ProcessFigure E-7 NAS Authenticates Tunnel with A

Strona 763

Appendix E VPDN ProcessingVPDN ProcessE-6User Guide for Cisco Secure ACS for Windows Server78-16592-01Figure E-9 HG Uses ACS to Authenticate Use

Strona 764

F-1User Guide for Cisco Secure ACS for Windows Server78-16592-01APPENDIXFRDBMS Synchronization Import DefinitionsRDBMS synchronization import definit

Strona 765 - CSUtil.exe -addavp filename

Appendix F RDBMS Synchronization Import DefinitionsaccountActions SpecificationF-2User Guide for Cisco Secure ACS for Windows Server78-16592-01a

Strona 766

F-3User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix F RDBMS Synchronization Import DefinitionsaccountActions Specificationa

Strona 767 - CSUtil.exe -delavp vendor-ID

2-3User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 2 Deployment ConsiderationsBasic Deployment Requirements for Cisco Secur

Strona 768

Appendix F RDBMS Synchronization Import DefinitionsAction CodesF-4User Guide for Cisco Secure ACS for Windows Server78-16592-01accountActions Pr

Strona 769

F-5User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix F RDBMS Synchronization Import DefinitionsAction CodesIf an action can

Strona 770

Appendix F RDBMS Synchronization Import DefinitionsAction CodesF-6User Guide for Cisco Secure ACS for Windows Server78-16592-01Table F-2 Action

Strona 771

F-7User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix F RDBMS Synchronization Import DefinitionsAction CodesAction Codes for

Strona 772

Appendix F RDBMS Synchronization Import DefinitionsAction CodesF-8User Guide for Cisco Secure ACS for Windows Server78-16592-01105 SET_T+_ENABLE

Strona 773

F-9User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix F RDBMS Synchronization Import DefinitionsAction Codes108 SET_PASS_TYPE

Strona 774

Appendix F RDBMS Synchronization Import DefinitionsAction CodesF-10User Guide for Cisco Secure ACS for Windows Server78-16592-01110 ADD_PASS_STA

Strona 775

F-11User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix F RDBMS Synchronization Import DefinitionsAction Codes115 SET_MAX_SESS

Strona 776

Appendix F RDBMS Synchronization Import DefinitionsAction CodesF-12User Guide for Cisco Secure ACS for Windows Server78-16592-01261 DISABLE_QUOT

Strona 777

F-13User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix F RDBMS Synchronization Import DefinitionsAction Codes270 SET_DCS_TYPE

Strona 778

ContentsviiiUser Guide for Cisco Secure ACS for Windows Server78-16592-01Deleting a Network Access Filter 5-7Downloadable IP ACLs 5-7About Downloadab

Strona 779

Chapter 2 Deployment ConsiderationsBasic Deployment Requirements for Cisco Secure ACS2-4User Guide for Cisco Secure ACS for Windows Server78-165

Strona 780

Appendix F RDBMS Synchronization Import DefinitionsAction CodesF-14User Guide for Cisco Secure ACS for Windows Server78-16592-01Action Codes for

Strona 781 - VPDN Processing

F-15User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix F RDBMS Synchronization Import DefinitionsAction CodesTransactions usi

Strona 782 - VPDN Process

Appendix F RDBMS Synchronization Import DefinitionsAction CodesF-16User Guide for Cisco Secure ACS for Windows Server78-16592-01123 ADD_DIAL_ACC

Strona 783

F-17User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix F RDBMS Synchronization Import DefinitionsAction Codes140 SET_TODDOW_A

Strona 784

Appendix F RDBMS Synchronization Import DefinitionsAction CodesF-18User Guide for Cisco Secure ACS for Windows Server78-16592-01150 SET_STATIC_I

Strona 785

F-19User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix F RDBMS Synchronization Import DefinitionsAction CodesAction Codes for

Strona 786 - Figure E-10

Appendix F RDBMS Synchronization Import DefinitionsAction CodesF-20User Guide for Cisco Secure ACS for Windows Server78-16592-01163 ADD_RADIUS_

Strona 787 - Definitions

F-21User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix F RDBMS Synchronization Import DefinitionsAction Codes170 ADD_TACACS_S

Strona 788

Appendix F RDBMS Synchronization Import DefinitionsAction CodesF-22User Guide for Cisco Secure ACS for Windows Server78-16592-01172 ADD_TACACS_A

Strona 789

F-23User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix F RDBMS Synchronization Import DefinitionsAction Codes174 ADD_IOS_COMM

Strona 790 - Action Codes

2-5User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 2 Deployment ConsiderationsBasic Deployment Requirements for Cisco Secur

Strona 791

Appendix F RDBMS Synchronization Import DefinitionsAction CodesF-24User Guide for Cisco Secure ACS for Windows Server78-16592-01176 ADD_IOS_COMM

Strona 792

F-25User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix F RDBMS Synchronization Import DefinitionsAction CodesAction Codes for

Strona 793

Appendix F RDBMS Synchronization Import DefinitionsAction CodesF-26User Guide for Cisco Secure ACS for Windows Server78-16592-01Table F-6 Action

Strona 794

F-27User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix F RDBMS Synchronization Import DefinitionsAction Codes221 SET_NAS_FLAG

Strona 795

Appendix F RDBMS Synchronization Import DefinitionsAction CodesF-28User Guide for Cisco Secure ACS for Windows Server78-16592-01233 SET_AAA_TRAF

Strona 796

F-29User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix F RDBMS Synchronization Import DefinitionsAction Codes250 ADD_NDG VN C

Strona 797

Appendix F RDBMS Synchronization Import DefinitionsAction CodesF-30User Guide for Cisco Secure ACS for Windows Server78-16592-01351 DEL_UDV V1 R

Strona 798

F-31User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix F RDBMS Synchronization Import DefinitionsAction Codes353 SET_VSA_PROF

Strona 799 - PIX Shell (pixshell)

Appendix F RDBMS Synchronization Import DefinitionsCisco Secure ACS Attributes and Action CodesF-32User Guide for Cisco Secure ACS for Windows S

Strona 800

F-33User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix F RDBMS Synchronization Import DefinitionsCisco Secure ACS Attributes

Strona 801 - NAS01,tty0,0898-69696969

Chapter 2 Deployment ConsiderationsBasic Deployment Factors for Cisco Secure ACS2-6User Guide for Cisco Secure ACS for Windows Server78-16592-01

Strona 802

Appendix F RDBMS Synchronization Import DefinitionsCisco Secure ACS Attributes and Action CodesF-34User Guide for Cisco Secure ACS for Windows S

Strona 803

F-35User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix F RDBMS Synchronization Import DefinitionsCisco Secure ACS Attributes

Strona 804

Appendix F RDBMS Synchronization Import DefinitionsAn Example of accountActionsF-36User Guide for Cisco Secure ACS for Windows Server78-16592-01

Strona 805 - User Settings

F-37User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix F RDBMS Synchronization Import DefinitionsAn Example of accountActions

Strona 806

Appendix F RDBMS Synchronization Import DefinitionsAn Example of accountActionsF-38User Guide for Cisco Secure ACS for Windows Server78-16592-01

Strona 807

G-1User Guide for Cisco Secure ACS for Windows Server78-16592-01APPENDIXGInternal ArchitectureThis chapter describes the Cisco Secure ACS for Windows

Strona 808

Appendix G Internal ArchitectureWindows RegistryG-2User Guide for Cisco Secure ACS for Windows Server78-16592-01• CSMon• CSTacacs• CSRadiusYou c

Strona 809

G-3User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix G Internal ArchitectureCSAuthin the HTTP Port Allocation feature, you s

Strona 810

Appendix G Internal ArchitectureCSDBSyncG-4User Guide for Cisco Secure ACS for Windows Server78-16592-01password-aging information. The authoriz

Strona 811

G-5User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix G Internal ArchitectureCSMonNote CSMon is not intended as a replacement

Strona 812

2-7User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 2 Deployment ConsiderationsBasic Deployment Factors for Cisco Secure ACS

Strona 813

Appendix G Internal ArchitectureCSMonG-6User Guide for Cisco Secure ACS for Windows Server78-16592-01build up a “picture” of expected response t

Strona 814

G-7User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix G Internal ArchitectureCSMonNotificationCSMon can be configured to noti

Strona 815

Appendix G Internal ArchitectureCSTacacs and CSRadiusG-8User Guide for Cisco Secure ACS for Windows Server78-16592-01If the event is a warning e

Strona 816

IN-1User Guide for Cisco Secure ACS for Windows Server78-16592-01INDEXAAAASee also AAA clientsSee also AAA serversdefinition1-2pools for IP address a

Strona 817

IndexIN-2User Guide for Cisco Secure ACS for Windows Server78-16592-01accountingSee also loggingoverview1-22ACLsSee downloadable IP ACLsaction codesf

Strona 818 - User-Specific Attributes

IN-3User Guide for Cisco Secure ACS for Windows Server78-16592-01Indexprotocol supported 1-11Architecture G-1ASCII/PAPcompatible databases1-10protoco

Strona 819

IndexIN-4User Guide for Cisco Secure ACS for Windows Server78-16592-01browsersSee also HTML interfacetroubleshootingA-4Ccached usersSee discovered us

Strona 820 - User-Defined Attributes

IN-5User Guide for Cisco Secure ACS for Windows Server78-16592-01IndexCisco Secure ACS backupsSee backupsCisco Secure ACS system restoreSee restoreCi

Strona 821 - Group-Specific Attributes

IndexIN-6User Guide for Cisco Secure ACS for Windows Server78-16592-01displaying syntax D-5import text file (example) D-24overview D-1CSV (comma-sepa

Strona 822 - An Example of accountActions

IN-7User Guide for Cisco Secure ACS for Windows Server78-16592-01IndexSee RADIUS user databasesSee RSA user databasesunknown users15-1user databases

Strona 823

Chapter 2 Deployment ConsiderationsBasic Deployment Factors for Cisco Secure ACS2-8User Guide for Cisco Secure ACS for Windows Server78-16592-01

Strona 824

IndexIN-8User Guide for Cisco Secure ACS for Windows Server78-16592-01Domain Listconfiguring13-30inadvertent user lockouts 13-14, 13-27overview 13-13

Strona 825 - Internal Architecture

IN-9User Guide for Cisco Secure ACS for Windows Server78-16592-01Indexenable password options for TACACS+ 7-35enable privilege options for groups 6-1

Strona 826 - Windows Registry

IndexIN-10User Guide for Cisco Secure ACS for Windows Server78-16592-01supported protocols 1-10Global Authentication Setup 10-33grant dial-in permiss

Strona 827

IN-11User Guide for Cisco Secure ACS for Windows Server78-16592-01IndexHelp 1-29host system state G-5HTML interfaceSee also Interface Configurationen

Strona 828 - CSDBSync

IndexIN-12User Guide for Cisco Secure ACS for Windows Server78-16592-01LDAPSee generic LDAP user databasesLEAP proxy RADIUS user databasesconfiguring

Strona 829 - Monitoring

IN-13User Guide for Cisco Secure ACS for Windows Server78-16592-01Indexloginsgreeting upon6-24password aging dependency 6-23logsSee loggingSee Report

Strona 830 - Recording

IndexIN-14User Guide for Cisco Secure ACS for Windows Server78-16592-01definition of 14-10group mapping 16-13implementing 14-5introduction 1-25loggin

Strona 831 - Response

IN-15User Guide for Cisco Secure ACS for Windows Server78-16592-01IndexNetwork Admission ControlSee NACnetwork configuration4-1network device groupsa

Strona 832 - CSTacacs and CSRadius

IndexIN-16User Guide for Cisco Secure ACS for Windows Server78-16592-01EAP-TLS 13-68PAP 13-65vs. group mappings 16-3PAP authentication sample procedu

Strona 833

IN-17User Guide for Cisco Secure ACS for Windows Server78-16592-01Indexoutbound passwords 1-15separate passwords 1-14single password 1-14token cachin

Strona 834

2-9User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 2 Deployment ConsiderationsBasic Deployment Factors for Cisco Secure ACS

Strona 835

IndexIN-18User Guide for Cisco Secure ACS for Windows Server78-16592-01PPP password aging 6-21privilegesSee administratorsprocessor utilizationG-5pro

Strona 836

IN-19User Guide for Cisco Secure ACS for Windows Server78-16592-01Indextoken servers 13-79troubleshooting A-22tunneling packets 4-18vs. TACACS+ 1-6RA

Strona 837

IndexIN-20User Guide for Cisco Secure ACS for Windows Server78-16592-01in User Setup 7-49supported attributes C-43overview C-1user-definedabout9-28,

Strona 838

IN-21User Guide for Cisco Secure ACS for Windows Server78-16592-01Indexexternal user databases 9-2frequency 9-7group mappings 9-2immediate 9-19implem

Strona 839

IndexIN-22User Guide for Cisco Secure ACS for Windows Server78-16592-01Ssearch order of external user databases 15-15security policies 2-15security p

Strona 840

IN-23User Guide for Cisco Secure ACS for Windows Server78-16592-01Indexoutput values 13-66result codes 13-69EAP-TLS authenticationconfiguring13-74inp

Strona 841

IndexIN-24User Guide for Cisco Secure ACS for Windows Server78-16592-01time-of-day access 3-8troubleshooting A-22vs. RADIUS 1-6TACACS+ Accounting log

Strona 842

IN-25User Guide for Cisco Secure ACS for Windows Server78-16592-01IndexRADIUS issues A-22report issues A-17TACACS+ issues A-22third-party server issu

Strona 843

IndexIN-26User Guide for Cisco Secure ACS for Windows Server78-16592-01callback options 7-9configuring 7-2configuring device management command autho

Strona 844

IN-27User Guide for Cisco Secure ACS for Windows Server78-16592-01IndexODBC 11-23CSV (comma-separated values) file directory11-16enablingODBC11-23VPD

Strona 845

Chapter 2 Deployment ConsiderationsBasic Deployment Factors for Cisco Secure ACS2-10User Guide for Cisco Secure ACS for Windows Server78-16592-0

Strona 846

IndexIN-28User Guide for Cisco Secure ACS for Windows Server78-16592-01passwords 1-11rejection mode 15-6request handling 15-6trust relationships 13-9

Strona 847

2-11User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 2 Deployment ConsiderationsBasic Deployment Factors for Cisco Secure AC

Strona 848

Chapter 2 Deployment ConsiderationsBasic Deployment Factors for Cisco Secure ACS2-12User Guide for Cisco Secure ACS for Windows Server78-16592-0

Strona 849

2-13User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 2 Deployment ConsiderationsBasic Deployment Factors for Cisco Secure AC

Strona 850

ixUser Guide for Cisco Secure ACS for Windows Server78-16592-01ContentsBasic User Group Settings 6-3Group Disablement 6-4Enabling VoIP Support for a

Strona 851

Chapter 2 Deployment ConsiderationsBasic Deployment Factors for Cisco Secure ACS2-14User Guide for Cisco Secure ACS for Windows Server78-16592-0

Strona 852

2-15User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 2 Deployment ConsiderationsBasic Deployment Factors for Cisco Secure AC

Strona 853

Chapter 2 Deployment ConsiderationsBasic Deployment Factors for Cisco Secure ACS2-16User Guide for Cisco Secure ACS for Windows Server78-16592-0

Strona 854

2-17User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 2 Deployment ConsiderationsBasic Deployment Factors for Cisco Secure AC

Strona 855

Chapter 2 Deployment ConsiderationsBasic Deployment Factors for Cisco Secure ACS2-18User Guide for Cisco Secure ACS for Windows Server78-16592-0

Strona 856

2-19User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 2 Deployment ConsiderationsSuggested Deployment SequenceNetwork Latency

Strona 857

Chapter 2 Deployment ConsiderationsSuggested Deployment Sequence2-20User Guide for Cisco Secure ACS for Windows Server78-16592-01For more inform

Strona 858

2-21User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 2 Deployment ConsiderationsSuggested Deployment SequenceAlong with the

Strona 859

Chapter 2 Deployment ConsiderationsSuggested Deployment Sequence2-22User Guide for Cisco Secure ACS for Windows Server78-16592-01

Strona 860

CHAPTER 3-1User Guide for Cisco Secure ACS for Windows Server78-16592-013Interface ConfigurationEase of use is the overriding design principle of the

Komentarze do niniejszej Instrukcji

Brak uwag