Cisco 3.3 Uživatelský manuál Strana 1

Procházejte online nebo si stáhněte Uživatelský manuál pro Počítače Cisco 3.3. Cisco 3.3 User Manual Uživatelská příručka

  • Stažení
  • Přidat do mých příruček
  • Tisk
  • Strana
    / 860
  • Tabulka s obsahem
  • ŘEŠENÍ PROBLÉMŮ
  • KNIHY
  • Hodnocené. / 5. Na základě hodnocení zákazníků
Zobrazit stránku 0
Corporate Headquarters
Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134-1706
USA
http://www.cisco.com
Tel: 408 526-4000
800 553-NETS (6387)
Fax: 408 526-4100
User Guide for Cisco Secure ACS for
Windows Server
Version 3.3
May 2004
Customer Order Number: DOC-7816592=
Text Part Number: 78-16592-01
Zobrazit stránku 0
1 2 3 4 5 6 ... 859 860

Shrnutí obsahu

Strany 1 - Windows Server

Corporate HeadquartersCisco Systems, Inc.170 West Tasman DriveSan Jose, CA 95134-1706USAhttp://www.cisco.comTel: 408 526-4000800 553-NETS (6387)Fax:

Strany 2

ContentsxUser Guide for Cisco Secure ACS for Windows Server78-16592-01Configuring BBSM RADIUS Settings for a User Group 6-51Configuring Custom RADIUS

Strany 3 - CONTENTS

Chapter 3 Interface ConfigurationInterface Design Concepts3-2User Guide for Cisco Secure ACS for Windows Server78-16592-01• Protocol Configurati

Strany 4

3-3User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 3 Interface ConfigurationUser Data Configuration OptionsUser Data Config

Strany 5

Chapter 3 Interface ConfigurationAdvanced Options3-4User Guide for Cisco Secure ACS for Windows Server78-16592-01Restarting Cisco Secure ACS-rel

Strany 6 - 4 Network Configuration 4-1

3-5User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 3 Interface ConfigurationAdvanced Options• User-Level Network Access Res

Strany 7

Chapter 3 Interface ConfigurationAdvanced Options3-6User Guide for Cisco Secure ACS for Windows Server78-16592-01• RDBMS Synchronization—When se

Strany 8 - 6 User Group Management 6-1

3-7User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 3 Interface ConfigurationProtocol Configuration Options for TACACS+advan

Strany 9

Chapter 3 Interface ConfigurationProtocol Configuration Options for TACACS+3-8User Guide for Cisco Secure ACS for Windows Server78-16592-01Note

Strany 10 - 7 User Management 7-1

3-9User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 3 Interface ConfigurationProtocol Configuration Options for TACACS+–Disp

Strany 11 - Contents

Chapter 3 Interface ConfigurationProtocol Configuration Options for TACACS+3-10User Guide for Cisco Secure ACS for Windows Server78-16592-01To c

Strany 12

3-11User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 3 Interface ConfigurationProtocol Configuration Options for RADIUSThe s

Strany 13

xiUser Guide for Cisco Secure ACS for Windows Server78-16592-01ContentsConfiguring Device-Management Command Authorization for a User7-30Configuring

Strany 14

Chapter 3 Interface ConfigurationProtocol Configuration Options for RADIUS3-12User Guide for Cisco Secure ACS for Windows Server78-16592-01Table

Strany 15

3-13User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 3 Interface ConfigurationProtocol Configuration Options for RADIUSTip Y

Strany 16 - 11 Logs and Reports 11-1

Chapter 3 Interface ConfigurationProtocol Configuration Options for RADIUS3-14User Guide for Cisco Secure ACS for Windows Server78-16592-01selec

Strany 17

3-15User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 3 Interface ConfigurationProtocol Configuration Options for RADIUSSessi

Strany 18 - 13 User Databases 13-1

Chapter 3 Interface ConfigurationProtocol Configuration Options for RADIUS3-16User Guide for Cisco Secure ACS for Windows Server78-16592-01appea

Strany 19

3-17User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 3 Interface ConfigurationProtocol Configuration Options for RADIUSStep

Strany 20

Chapter 3 Interface ConfigurationProtocol Configuration Options for RADIUS3-18User Guide for Cisco Secure ACS for Windows Server78-16592-01Step

Strany 21 - 15 Unknown User Policy 15-1

CHAPTER 4-1User Guide for Cisco Secure ACS for Windows Server78-16592-014Network ConfigurationThis chapter details concepts and procedures for configu

Strany 22

Chapter 4 Network ConfigurationAbout Distributed Systems4-2User Guide for Cisco Secure ACS for Windows Server78-16592-01If you are using network

Strany 23 - C RADIUS Attributes C-1

4-3User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 4 Network ConfigurationAbout Distributed Systems• CiscoSecure database r

Strany 24 - D CSUtil Database Utility D-1

ContentsxiiUser Guide for Cisco Secure ACS for Windows Server78-16592-01CHAPTER 8 System Configuration: Basic 8-1Service Control 8-1Determining the S

Strany 25

Chapter 4 Network ConfigurationProxy in Distributed Systems4-4User Guide for Cisco Secure ACS for Windows Server78-16592-01with one another. Eac

Strany 26 - G Internal Architecture G-1

4-5User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 4 Network ConfigurationProxy in Distributed SystemsNote When a Cisco Sec

Strany 27

Chapter 4 Network ConfigurationProxy in Distributed Systems4-6User Guide for Cisco Secure ACS for Windows Server78-16592-01continues, in order,

Strany 28

4-7User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 4 Network ConfigurationProxy in Distributed SystemsBecause Mary works in

Strany 29 - Organization

Chapter 4 Network ConfigurationNetwork Device Searches4-8User Guide for Cisco Secure ACS for Windows Server78-16592-01You can also choose to hav

Strany 30

4-9User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 4 Network ConfigurationNetwork Device Searchesor “m*”. Name-based search

Strany 31 - Conventions

Chapter 4 Network ConfigurationNetwork Device Searches4-10User Guide for Cisco Secure ACS for Windows Server78-16592-01Tip When you leave the Se

Strany 32 - Product Documentation

4-11User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 4 Network ConfigurationAAA Client ConfigurationStep 6 If you want to do

Strany 33 - Related Documentation

Chapter 4 Network ConfigurationAAA Client Configuration4-12User Guide for Cisco Secure ACS for Windows Server78-16592-01recommend that you adopt

Strany 34 - Table 2 Related Documentation

4-13User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 4 Network ConfigurationAAA Client ConfigurationFor correct operation, t

Strany 35 - Obtaining Documentation

xiiiUser Guide for Cisco Secure ACS for Windows Server78-16592-01ContentsEvent Logging 8-20Setting Up Event Logging 8-20VoIP Accounting Configuration

Strany 36 - Documentation Feedback

Chapter 4 Network ConfigurationAAA Client Configuration4-14User Guide for Cisco Secure ACS for Windows Server78-16592-01When an authentication r

Strany 37 - Submitting a Service Request

4-15User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 4 Network ConfigurationAAA Client Configurationattributes. If the AAA c

Strany 38

Chapter 4 Network ConfigurationAAA Client Configuration4-16User Guide for Cisco Secure ACS for Windows Server78-16592-01• Replace RADIUS Port in

Strany 39

4-17User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 4 Network ConfigurationAAA Client ConfigurationStep 2 Do one of the fol

Strany 40

Chapter 4 Network ConfigurationAAA Client Configuration4-18User Guide for Cisco Secure ACS for Windows Server78-16592-01Step 7 From the Authenti

Strany 41 - Overview

4-19User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 4 Network ConfigurationAAA Client ConfigurationTip If you want to save

Strany 42 - The Cisco Secure ACS Paradigm

Chapter 4 Network ConfigurationAAA Client Configuration4-20User Guide for Cisco Secure ACS for Windows Server78-16592-01Step 2 Do one of the fol

Strany 43 - Chapter 1 Overview

4-21User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 4 Network ConfigurationAAA Server ConfigurationDeleting a AAA ClientTo

Strany 44

Chapter 4 Network ConfigurationAAA Server Configuration4-22User Guide for Cisco Secure ACS for Windows Server78-16592-01To configure distributed

Strany 45

4-23User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 4 Network ConfigurationAAA Server ConfigurationNote After you submit th

Strany 46 - • Administration, page 1-23

ContentsxivUser Guide for Cisco Secure ACS for Windows Server78-16592-01RDBMS Synchronization Components 9-29About CSDBSync 9-29About the accountActi

Strany 47

Chapter 4 Network ConfigurationAAA Server Configuration4-24User Guide for Cisco Secure ACS for Windows Server78-16592-01–Cisco Secure ACS—Select

Strany 48 - Authentication

4-25User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 4 Network ConfigurationAAA Server ConfigurationTo add and configure a A

Strany 49 - Authentication Considerations

Chapter 4 Network ConfigurationAAA Server Configuration4-26User Guide for Cisco Secure ACS for Windows Server78-16592-01Step 9 From the Traffic

Strany 50

4-27User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 4 Network ConfigurationAAA Server ConfigurationTo edit a AAA server, fo

Strany 51 - Passwords

Chapter 4 Network ConfigurationNetwork Device Group Configuration4-28User Guide for Cisco Secure ACS for Windows Server78-16592-01Deleting a AAA

Strany 52 - Comparing PAP, CHAP, and ARAP

4-29User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 4 Network ConfigurationNetwork Device Group ConfigurationCisco Secure A

Strany 53 - EAP Support

Chapter 4 Network ConfigurationNetwork Device Group Configuration4-30User Guide for Cisco Secure ACS for Windows Server78-16592-01Tip If the Net

Strany 54 - Basic Password Configurations

4-31User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 4 Network ConfigurationNetwork Device Group ConfigurationTip If the Net

Strany 55 - Password Aging

Chapter 4 Network ConfigurationNetwork Device Group Configuration4-32User Guide for Cisco Secure ACS for Windows Server78-16592-01Renaming a Net

Strany 56 - User-Changeable Passwords

4-33User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 4 Network ConfigurationNetwork Device Group ConfigurationTip It may be

Strany 57 - Authorization

xvUser Guide for Cisco Secure ACS for Windows Server78-16592-01ContentsEAP-TLS Authentication 10-2About the EAP-TLS Protocol 10-3EAP-TLS and Cisco Se

Strany 58 - Dynamic Usage Quotas

Chapter 4 Network ConfigurationProxy Distribution Table Configuration4-34User Guide for Cisco Secure ACS for Windows Server78-16592-01Proxy Dist

Strany 59

4-35User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 4 Network ConfigurationProxy Distribution Table Configurationcharacter

Strany 60

Chapter 4 Network ConfigurationProxy Distribution Table Configuration4-36User Guide for Cisco Secure ACS for Windows Server78-16592-01Tip You ca

Strany 61

4-37User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 4 Network ConfigurationProxy Distribution Table ConfigurationStep 1 In

Strany 62 - Accounting

Chapter 4 Network ConfigurationProxy Distribution Table Configuration4-38User Guide for Cisco Secure ACS for Windows Server78-16592-01Deleting a

Strany 63 - Administration

CHAPTER 5-1User Guide for Cisco Secure ACS for Windows Server78-16592-015Shared Profile ComponentsThis chapter addresses the Cisco Secure ACS for Wind

Strany 64 - Network Device Groups

Chapter 5 Shared Profile ComponentsNetwork Access Filters5-2User Guide for Cisco Secure ACS for Windows Server78-16592-01named shared profile co

Strany 65

5-3User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 5 Shared Profile ComponentsNetwork Access Filters• NAFs in shared networ

Strany 66 - HTML Interface Security

Chapter 5 Shared Profile ComponentsNetwork Access Filters5-4User Guide for Cisco Secure ACS for Windows Server78-16592-01Step 3 Click Add.The Ne

Strany 67 - HTML Interface Layout

5-5User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 5 Shared Profile ComponentsNetwork Access FiltersTip You can also remove

Strany 68

ContentsxviUser Guide for Cisco Secure ACS for Windows Server78-16592-01Generating a Certificate Signing Request 10-45Using Self-Signed Certificates

Strany 69

Chapter 5 Shared Profile ComponentsNetwork Access Filters5-6User Guide for Cisco Secure ACS for Windows Server78-16592-01Caution If you change t

Strany 70

5-7User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 5 Shared Profile ComponentsDownloadable IP ACLsNote Restarting the servi

Strany 71

Chapter 5 Shared Profile ComponentsDownloadable IP ACLs5-8User Guide for Cisco Secure ACS for Windows Server78-16592-01This section contains the

Strany 72 - Accessing the HTML Interface

5-9User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 5 Shared Profile ComponentsDownloadable IP ACLsACL to each applicable us

Strany 73

Chapter 5 Shared Profile ComponentsDownloadable IP ACLs5-10User Guide for Cisco Secure ACS for Windows Server78-16592-01Examples of Cisco device

Strany 74 - Using Online Help

5-11User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 5 Shared Profile ComponentsDownloadable IP ACLsTo add a downloadable IP

Strany 75

Chapter 5 Shared Profile ComponentsDownloadable IP ACLs5-12User Guide for Cisco Secure ACS for Windows Server78-16592-01Step 9 To save the ACL c

Strany 76

5-13User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 5 Shared Profile ComponentsDownloadable IP ACLsEditing a Downloadable I

Strany 77 - Deployment Considerations

Chapter 5 Shared Profile ComponentsNetwork Access Restrictions5-14User Guide for Cisco Secure ACS for Windows Server78-16592-01Cisco Secure ACS

Strany 78 - System Requirements

5-15User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 5 Shared Profile ComponentsNetwork Access RestrictionsThis section cont

Strany 79

xviiUser Guide for Cisco Secure ACS for Windows Server78-16592-01ContentsConfiguring an ODBC Log 11-23Remote Logging 11-26About Remote Logging 11-26I

Strany 80 - Network and Port Requirements

Chapter 5 Shared Profile ComponentsNetwork Access Restrictions5-16User Guide for Cisco Secure ACS for Windows Server78-16592-01the client. For t

Strany 81

5-17User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 5 Shared Profile ComponentsNetwork Access RestrictionsAbout IP-based NA

Strany 82 - Network Topology

Chapter 5 Shared Profile ComponentsNetwork Access Restrictions5-18User Guide for Cisco Secure ACS for Windows Server78-16592-01About Non-IP-base

Strany 83

5-19User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 5 Shared Profile ComponentsNetwork Access Restrictions• If you are usin

Strany 84

Chapter 5 Shared Profile ComponentsNetwork Access Restrictions5-20User Guide for Cisco Secure ACS for Windows Server78-16592-01To add a shared N

Strany 85 - Wireless Network

5-21User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 5 Shared Profile ComponentsNetwork Access RestrictionsNote The total nu

Strany 86 - Cisco Aironet AP

Chapter 5 Shared Profile ComponentsNetwork Access Restrictions5-22User Guide for Cisco Secure ACS for Windows Server78-16592-01d. To specify the

Strany 87

5-23User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 5 Shared Profile ComponentsNetwork Access RestrictionsEditing a Shared

Strany 88 - Remote Access using VPN

Chapter 5 Shared Profile ComponentsNetwork Access Restrictions5-24User Guide for Cisco Secure ACS for Windows Server78-16592-01Step 7 To edit a

Strany 89 - Network WAN

5-25User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 5 Shared Profile ComponentsCommand Authorization SetsTo delete a shared

Strany 90 - Remote Access Policy

ContentsxviiiUser Guide for Cisco Secure ACS for Windows Server78-16592-01CHAPTER 13 User Databases 13-1CiscoSecure User Database 13-2About the Cisco

Strany 91 - Administrative Access Policy

Chapter 5 Shared Profile ComponentsCommand Authorization Sets5-26User Guide for Cisco Secure ACS for Windows Server78-16592-01About Command Auth

Strany 92

5-27User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 5 Shared Profile ComponentsCommand Authorization SetsTo offer fine-grai

Strany 93

Chapter 5 Shared Profile ComponentsCommand Authorization Sets5-28User Guide for Cisco Secure ACS for Windows Server78-16592-01Cisco Secure ACS h

Strany 94 - Database

5-29User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 5 Shared Profile ComponentsCommand Authorization Sets• Device Managemen

Strany 95 - Suggested Deployment Sequence

Chapter 5 Shared Profile ComponentsCommand Authorization Sets5-30User Guide for Cisco Secure ACS for Windows Server78-16592-01For example, if a

Strany 96

5-31User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 5 Shared Profile ComponentsCommand Authorization SetsTo permit/deny com

Strany 97

Chapter 5 Shared Profile ComponentsCommand Authorization Sets5-32User Guide for Cisco Secure ACS for Windows Server78-16592-01Step 6 If Cisco Se

Strany 98

5-33User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 5 Shared Profile ComponentsCommand Authorization Setsc. Click Add Comma

Strany 99 - Interface Configuration

Chapter 5 Shared Profile ComponentsCommand Authorization Sets5-34User Guide for Cisco Secure ACS for Windows Server78-16592-01Step 3 From the Na

Strany 100 - Interface Design Concepts

5-35User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 5 Shared Profile ComponentsCommand Authorization SetsDeleting a Command

Strany 101 - Defining New User Data Fields

xixUser Guide for Cisco Secure ACS for Windows Server78-16592-01ContentsGeneric LDAP 13-32Cisco Secure ACS Authentication Process with a Generic LDAP

Strany 102 - Advanced Options

Chapter 5 Shared Profile ComponentsCommand Authorization Sets5-36User Guide for Cisco Secure ACS for Windows Server78-16592-01

Strany 103 - 78-16592-01

CHAPTER 6-1User Guide for Cisco Secure ACS for Windows Server78-16592-016User Group ManagementThis chapter provides information about setting up and m

Strany 104 - Interface

Chapter 6 User Group ManagementAbout User Group Setup Features and Functions6-2User Guide for Cisco Secure ACS for Windows Server78-16592-01Abou

Strany 105

6-3User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 6 User Group ManagementBasic User Group SettingsIf you have configured C

Strany 106

Chapter 6 User Group ManagementBasic User Group Settings6-4User Guide for Cisco Secure ACS for Windows Server78-16592-01Group DisablementYou per

Strany 107 - Setting Options for TACACS+

6-5User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 6 User Group ManagementBasic User Group SettingsPerform this procedure t

Strany 108

Chapter 6 User Group ManagementBasic User Group Settings6-6User Guide for Cisco Secure ACS for Windows Server78-16592-01To define the times duri

Strany 109

6-7User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 6 User Group ManagementBasic User Group SettingsSetting Callback Options

Strany 110

Chapter 6 User Group ManagementBasic User Group Settings6-8User Guide for Cisco Secure ACS for Windows Server78-16592-01Step 5 To continue speci

Strany 111

6-9User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 6 User Group ManagementBasic User Group SettingsNote When an authenticat

Strany 112

THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOM

Strany 113

ContentsxxUser Guide for Cisco Secure ACS for Windows Server78-16592-01PAP Procedure Output 13-65CHAP/MS-CHAP/ARAP Authentication Procedure Input 13-

Strany 114 - Attributes

Chapter 6 User Group ManagementBasic User Group Settings6-10User Guide for Cisco Secure ACS for Windows Server78-16592-01Step 4 To define and ap

Strany 115

6-11User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 6 User Group ManagementBasic User Group SettingsStep 5 To permit or den

Strany 116

Chapter 6 User Group ManagementBasic User Group Settings6-12User Guide for Cisco Secure ACS for Windows Server78-16592-01Note The total number o

Strany 117 - Network Configuration

6-13User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 6 User Group ManagementBasic User Group SettingsNote A session is any t

Strany 118 - About Distributed Systems

Chapter 6 User Group ManagementBasic User Group Settings6-14User Guide for Cisco Secure ACS for Windows Server78-16592-01Step 6 To continue spec

Strany 119

6-15User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 6 User Group ManagementBasic User Group Settingsnetwork fails, the quot

Strany 120 - Proxy in Distributed Systems

Chapter 6 User Group ManagementConfiguration-specific User Group Settings6-16User Guide for Cisco Secure ACS for Windows Server78-16592-01Note U

Strany 121 - Fallback on Failed Connection

6-17User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 6 User Group ManagementConfiguration-specific User Group Settings• To c

Strany 122 - Proxy in an Enterprise

Chapter 6 User Group ManagementConfiguration-specific User Group Settings6-18User Guide for Cisco Secure ACS for Windows Server78-16592-01Settin

Strany 123 - • Log them locally

6-19User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 6 User Group ManagementConfiguration-specific User Group SettingsStep 4

Strany 124 - Network Device Searches

xxiUser Guide for Cisco Secure ACS for Windows Server78-16592-01ContentsNAC Databases 14-10About NAC Databases 14-10About NAC Credentials and Attribu

Strany 125 - Searching for Network Devices

Chapter 6 User Group ManagementConfiguration-specific User Group Settings6-20User Guide for Cisco Secure ACS for Windows Server78-16592-01Note T

Strany 126

6-21User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 6 User Group ManagementConfiguration-specific User Group SettingsEnabli

Strany 127 - AAA Client Configuration

Chapter 6 User Group ManagementConfiguration-specific User Group Settings6-22User Guide for Cisco Secure ACS for Windows Server78-16592-01the ca

Strany 128

6-23User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 6 User Group ManagementConfiguration-specific User Group Settingsand di

Strany 129

Chapter 6 User Group ManagementConfiguration-specific User Group Settings6-24User Guide for Cisco Secure ACS for Windows Server78-16592-01reques

Strany 130

6-25User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 6 User Group ManagementConfiguration-specific User Group SettingsTo set

Strany 131

Chapter 6 User Group ManagementConfiguration-specific User Group Settings6-26User Guide for Cisco Secure ACS for Windows Server78-16592-01Step 8

Strany 132 - Adding a AAA Client

6-27User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 6 User Group ManagementConfiguration-specific User Group SettingsTip Fo

Strany 133

Chapter 6 User Group ManagementConfiguration-specific User Group Settings6-28User Guide for Cisco Secure ACS for Windows Server78-16592-01–Users

Strany 134

6-29User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 6 User Group ManagementConfiguration-specific User Group Settings• Assi

Strany 135 - Editing a AAA Client

ContentsxxiiUser Guide for Cisco Secure ACS for Windows Server78-16592-01Performance of Unknown User Authentication 15-8Added Authentication Latency

Strany 136

Chapter 6 User Group ManagementConfiguration-specific User Group Settings6-30User Guide for Cisco Secure ACS for Windows Server78-16592-01Step 5

Strany 137 - AAA Server Configuration

6-31User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 6 User Group ManagementConfiguration-specific User Group SettingsStep 6

Strany 138

Chapter 6 User Group ManagementConfiguration-specific User Group Settings6-32User Guide for Cisco Secure ACS for Windows Server78-16592-01To emp

Strany 139

6-33User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 6 User Group ManagementConfiguration-specific User Group SettingsConfig

Strany 140 - Adding a AAA Server

Chapter 6 User Group ManagementConfiguration-specific User Group Settings6-34User Guide for Cisco Secure ACS for Windows Server78-16592-01Step 6

Strany 141

6-35User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 6 User Group ManagementConfiguration-specific User Group SettingsTip To

Strany 142 - Editing a AAA Server

Chapter 6 User Group ManagementConfiguration-specific User Group Settings6-36User Guide for Cisco Secure ACS for Windows Server78-16592-01Step 3

Strany 143

6-37User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 6 User Group ManagementConfiguration-specific User Group SettingsConfig

Strany 144 - Deleting a AAA Server

Chapter 6 User Group ManagementConfiguration-specific User Group Settings6-38User Guide for Cisco Secure ACS for Windows Server78-16592-01Step 5

Strany 145 - Adding a Network Device Group

6-39User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 6 User Group ManagementConfiguration-specific User Group SettingsTo con

Strany 146

xxiiiUser Guide for Cisco Secure ACS for Windows Server78-16592-01ContentsNAC Group Mapping 16-13Configuring NAC Group Mapping 16-13RADIUS-Based Grou

Strany 147

Chapter 6 User Group ManagementConfiguration-specific User Group Settings6-40User Guide for Cisco Secure ACS for Windows Server78-16592-01Config

Strany 148

6-41User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 6 User Group ManagementConfiguration-specific User Group SettingsStep 3

Strany 149

Chapter 6 User Group ManagementConfiguration-specific User Group Settings6-42User Guide for Cisco Secure ACS for Windows Server78-16592-01The Ci

Strany 150

6-43User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 6 User Group ManagementConfiguration-specific User Group SettingsStep 7

Strany 151

Chapter 6 User Group ManagementConfiguration-specific User Group Settings6-44User Guide for Cisco Secure ACS for Windows Server78-16592-01Step 3

Strany 152

6-45User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 6 User Group ManagementConfiguration-specific User Group SettingsCisco

Strany 153

Chapter 6 User Group ManagementConfiguration-specific User Group Settings6-46User Guide for Cisco Secure ACS for Windows Server78-16592-01Config

Strany 154 - Step 4 Click OK

6-47User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 6 User Group ManagementConfiguration-specific User Group SettingsStep 5

Strany 155 - Shared Profile Components

Chapter 6 User Group ManagementConfiguration-specific User Group Settings6-48User Guide for Cisco Secure ACS for Windows Server78-16592-01The fo

Strany 156 - Network Access Filters

6-49User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 6 User Group ManagementConfiguration-specific User Group SettingsNote T

Strany 157

ContentsxxivUser Guide for Cisco Secure ACS for Windows Server78-16592-01Cisco VPN 3000 Concentrator Dictionary of RADIUS VSAs C-9Cisco VPN 5000 Conc

Strany 158

Chapter 6 User Group ManagementConfiguration-specific User Group Settings6-50User Guide for Cisco Secure ACS for Windows Server78-16592-01Step 2

Strany 159

6-51User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 6 User Group ManagementConfiguration-specific User Group SettingsTo con

Strany 160

Chapter 6 User Group ManagementConfiguration-specific User Group Settings6-52User Guide for Cisco Secure ACS for Windows Server78-16592-01Note T

Strany 161 - Downloadable IP ACLs

6-53User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 6 User Group ManagementConfiguration-specific User Group SettingsConfig

Strany 162 - About Downloadable IP ACLs

Chapter 6 User Group ManagementGroup Setting Management6-54User Guide for Cisco Secure ACS for Windows Server78-16592-01Step 6 To save the group

Strany 163

6-55User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 6 User Group ManagementGroup Setting ManagementResetting Usage Quota Co

Strany 164 - Adding a Downloadable IP ACL

Chapter 6 User Group ManagementGroup Setting Management6-56User Guide for Cisco Secure ACS for Windows Server78-16592-01Step 5 Click Submit.Note

Strany 165

CHAPTER 7-1User Guide for Cisco Secure ACS for Windows Server78-16592-017User ManagementThis chapter provides information about setting up and managin

Strany 166

Chapter 7 User ManagementAbout User Databases7-2User Guide for Cisco Secure ACS for Windows Server78-16592-01 From within the User Setup section

Strany 167 - Editing a Downloadable IP ACL

7-3User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 7 User ManagementBasic User Setup Options• Windows Database—Authenticate

Strany 168 - Network Access Restrictions

xxvUser Guide for Cisco Secure ACS for Windows Server78-16592-01ContentsADD_NAS Statements D-21DEL_NAS Statements D-23Import File Example D-24Exporti

Strany 169

Chapter 7 User ManagementBasic User Setup Options7-4User Guide for Cisco Secure ACS for Windows Server78-16592-01This section contains the follo

Strany 170

7-5User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 7 User ManagementBasic User Setup OptionsStep 4 Make sure that the Acco

Strany 171 - About IP-based NAR Filters

Chapter 7 User ManagementBasic User Setup Options7-6User Guide for Cisco Secure ACS for Windows Server78-16592-01Tip For lengthy account configu

Strany 172

7-7User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 7 User ManagementBasic User Setup OptionsSetting a Separate CHAP/MS-CHAP

Strany 173

Chapter 7 User ManagementBasic User Setup Options7-8User Guide for Cisco Secure ACS for Windows Server78-16592-01Assigning a User to a GroupA us

Strany 174

7-9User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 7 User ManagementBasic User Setup OptionsSetting User Callback OptionCal

Strany 175

Chapter 7 User ManagementBasic User Setup Options7-10User Guide for Cisco Secure ACS for Windows Server78-16592-01Step 3 Do one of the following

Strany 176

7-11User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 7 User ManagementBasic User Setup Options• Assigned by AAA client pool—

Strany 177

Chapter 7 User ManagementBasic User Setup Options7-12User Guide for Cisco Secure ACS for Windows Server78-16592-01Typically, you define (shared)

Strany 178

7-13User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 7 User ManagementBasic User Setup OptionsStep 2 To apply a previously c

Strany 179 - Command Authorization Sets

ContentsxxviUser Guide for Cisco Secure ACS for Windows Server78-16592-01APPENDIX E VPDN Processing E-1VPDN Process E-1APPENDIX F RDBMS Synchronizati

Strany 180

Chapter 7 User ManagementBasic User Setup Options7-14User Guide for Cisco Secure ACS for Windows Server78-16592-01c. Select or enter the informa

Strany 181

7-15User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 7 User ManagementBasic User Setup Optionsc. Complete the following boxe

Strany 182

Chapter 7 User ManagementBasic User Setup Options7-16User Guide for Cisco Secure ACS for Windows Server78-16592-01d. Click enter.The information

Strany 183

7-17User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 7 User ManagementBasic User Setup OptionsTo set max sessions options fo

Strany 184 - About Pattern Matching

Chapter 7 User ManagementBasic User Setup Options7-18User Guide for Cisco Secure ACS for Windows Server78-16592-01Setting User Usage Quotas Opti

Strany 185

7-19User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 7 User ManagementBasic User Setup Optionswith ISDN, the quota is not up

Strany 186

Chapter 7 User ManagementBasic User Setup Options7-20User Guide for Cisco Secure ACS for Windows Server78-16592-01c. Select the period for which

Strany 187

7-21User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 7 User ManagementBasic User Setup Optionsb. Select the Disable account

Strany 188

Chapter 7 User ManagementAdvanced User Authentication Settings7-22User Guide for Cisco Secure ACS for Windows Server78-16592-01To assign a downl

Strany 189 - Step 4 Click Delete

7-23User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 7 User ManagementAdvanced User Authentication Settings• RADIUS Attribut

Strany 190

xxviiUser Guide for Cisco Secure ACS for Windows Server78-16592-01ContentsCSMon G-4Monitoring G-5Recording G-6Notification G-7Response G-7CSTacacs an

Strany 191 - User Group Management

Chapter 7 User ManagementAdvanced User Authentication Settings7-24User Guide for Cisco Secure ACS for Windows Server78-16592-01Configuring TACAC

Strany 192 - Group TACACS+ Settings

7-25User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 7 User ManagementAdvanced User Authentication SettingsBefore You Begin•

Strany 193 - Basic User Group Settings

Chapter 7 User ManagementAdvanced User Authentication Settings7-26User Guide for Cisco Secure ACS for Windows Server78-16592-01Step 6 Do one of

Strany 194 - Group Disablement

7-27User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 7 User ManagementAdvanced User Authentication SettingsTo specify shell

Strany 195

Chapter 7 User ManagementAdvanced User Authentication Settings7-28User Guide for Cisco Secure ACS for Windows Server78-16592-01Step 7 To define

Strany 196

7-29User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 7 User ManagementAdvanced User Authentication SettingsConfiguring a PIX

Strany 197

Chapter 7 User ManagementAdvanced User Authentication Settings7-30User Guide for Cisco Secure ACS for Windows Server78-16592-01Step 4 To assign

Strany 198

7-31User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 7 User ManagementAdvanced User Authentication Settings• Assign a device

Strany 199

Chapter 7 User ManagementAdvanced User Authentication Settings7-32User Guide for Cisco Secure ACS for Windows Server78-16592-01Step 5 To assign

Strany 200

7-33User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 7 User ManagementAdvanced User Authentication SettingsStep 3 To allow T

Strany 201

ContentsxxviiiUser Guide for Cisco Secure ACS for Windows Server78-16592-01

Strany 202

Chapter 7 User ManagementAdvanced User Authentication Settings7-34User Guide for Cisco Secure ACS for Windows Server78-16592-01Note This is the

Strany 203

7-35User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 7 User ManagementAdvanced User Authentication SettingsStep 4 If you sel

Strany 204

Chapter 7 User ManagementAdvanced User Authentication Settings7-36User Guide for Cisco Secure ACS for Windows Server78-16592-01To set the option

Strany 205

7-37User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 7 User ManagementAdvanced User Authentication SettingsSetting TACACS+ O

Strany 206

Chapter 7 User ManagementAdvanced User Authentication Settings7-38User Guide for Cisco Secure ACS for Windows Server78-16592-01This section cont

Strany 207

7-39User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 7 User ManagementAdvanced User Authentication SettingsNote For a list a

Strany 208

Chapter 7 User ManagementAdvanced User Authentication Settings7-40User Guide for Cisco Secure ACS for Windows Server78-16592-01replace the assoc

Strany 209

7-41User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 7 User ManagementAdvanced User Authentication SettingsSetting Cisco Air

Strany 210

Chapter 7 User ManagementAdvanced User Authentication Settings7-42User Guide for Cisco Secure ACS for Windows Server78-16592-01To configure and

Strany 211

7-43User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 7 User ManagementAdvanced User Authentication SettingsSetting Ascend RA

Strany 212

xxixUser Guide for Cisco Secure ACS for Windows Server78-16592-01PrefaceThis document will help you configure and use Cisco Secure Access Control Serv

Strany 213

Chapter 7 User ManagementAdvanced User Authentication Settings7-44User Guide for Cisco Secure ACS for Windows Server78-16592-01For more informat

Strany 214

7-45User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 7 User ManagementAdvanced User Authentication SettingsNote To hide or d

Strany 215

Chapter 7 User ManagementAdvanced User Authentication Settings7-46User Guide for Cisco Secure ACS for Windows Server78-16592-01Setting Cisco VPN

Strany 216

7-47User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 7 User ManagementAdvanced User Authentication SettingsStep 3 In the Cis

Strany 217

Chapter 7 User ManagementAdvanced User Authentication Settings7-48User Guide for Cisco Secure ACS for Windows Server78-16592-01The Microsoft RAD

Strany 218

7-49User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 7 User ManagementAdvanced User Authentication SettingsStep 3 In the Mic

Strany 219

Chapter 7 User ManagementAdvanced User Authentication Settings7-50User Guide for Cisco Secure ACS for Windows Server78-16592-01Note To hide or d

Strany 220

7-51User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 7 User ManagementAdvanced User Authentication SettingsSetting Juniper R

Strany 221

Chapter 7 User ManagementAdvanced User Authentication Settings7-52User Guide for Cisco Secure ACS for Windows Server78-16592-01For more informat

Strany 222

7-53User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 7 User ManagementAdvanced User Authentication SettingsStep 2 Before con

Strany 223

iiiUser Guide for Cisco Secure ACS for Windows Server78-16592-01CONTENTSPreface xxixAudience xxixOrganization xxixConventions xxxiProduct Documentati

Strany 224

PrefaceOrganizationxxxUser Guide for Cisco Secure ACS for Windows Server78-16592-01• Chapter 5, “Shared Profile Components”—Concepts and procedures re

Strany 225

Chapter 7 User ManagementUser Management7-54User Guide for Cisco Secure ACS for Windows Server78-16592-01To configure and enable custom RADIUS a

Strany 226

7-55User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 7 User ManagementUser Management• Deleting a User Account, page 7-57• R

Strany 227 - User Group

Chapter 7 User ManagementUser Management7-56User Guide for Cisco Secure ACS for Windows Server78-16592-01Tip You can use wildcard characters (*)

Strany 228

7-57User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 7 User ManagementUser ManagementStep 3 Click Add/Edit.The User Setup Ed

Strany 229

Chapter 7 User ManagementUser Management7-58User Guide for Cisco Secure ACS for Windows Server78-16592-01Step 3 Click Add/Edit.Step 4 At the bot

Strany 230

7-59User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 7 User ManagementUser ManagementStep 5 Click Submit at the bottom of th

Strany 231

Chapter 7 User ManagementUser Management7-60User Guide for Cisco Secure ACS for Windows Server78-16592-01Note If the user authenticates with a W

Strany 232

CHAPTER 8-1User Guide for Cisco Secure ACS for Windows Server78-16592-018System Configuration: BasicThis chapter addresses the basic features found in

Strany 233 - Ascend-Remote-Addr

Chapter 8 System Configuration: BasicService Control8-2User Guide for Cisco Secure ACS for Windows Server78-16592-01Tip You can configure Cisco

Strany 234

8-3User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 8 System Configuration: BasicLoggingStep 1 In the navigation bar, click

Strany 235

xxxiUser Guide for Cisco Secure ACS for Windows Server78-16592-01PrefaceConventions• Appendix A, “Troubleshooting”—How to identify and solve certain p

Strany 236

Chapter 8 System Configuration: BasicDate Format Control8-4User Guide for Cisco Secure ACS for Windows Server78-16592-01report generated on July

Strany 237

8-5User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 8 System Configuration: BasicLocal Password ManagementLocal Password Man

Strany 238

Chapter 8 System Configuration: BasicLocal Password Management8-6User Guide for Cisco Secure ACS for Windows Server78-16592-01–Upon remote user

Strany 239

8-7User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 8 System Configuration: BasicLocal Password ManagementConfiguring Local

Strany 240

Chapter 8 System Configuration: BasicLocal Password Management8-8User Guide for Cisco Secure ACS for Windows Server78-16592-01d. If you want Cis

Strany 241

8-9User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 8 System Configuration: BasicCisco Secure ACS BackupCisco Secure ACS Bac

Strany 242

Chapter 8 System Configuration: BasicCisco Secure ACS Backup8-10User Guide for Cisco Secure ACS for Windows Server78-16592-01where drive is the

Strany 243

8-11User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 8 System Configuration: BasicCisco Secure ACS BackupBackup OptionsThe A

Strany 244 - Group Setting Management

Chapter 8 System Configuration: BasicCisco Secure ACS Backup8-12User Guide for Cisco Secure ACS for Windows Server78-16592-01Step 2 Click ACS Ba

Strany 245 - Renaming a User Group

8-13User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 8 System Configuration: BasicCisco Secure ACS BackupTip Clicking times

Strany 246

PrefaceProduct DocumentationxxxiiUser Guide for Cisco Secure ACS for Windows Server78-16592-01Tip Identifies information to help you get the most bene

Strany 247 - User Management

Chapter 8 System Configuration: BasicCisco Secure ACS System Restore8-14User Guide for Cisco Secure ACS for Windows Server78-16592-01Cisco Secur

Strany 248 - About User Databases

8-15User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 8 System Configuration: BasicCisco Secure ACS System Restorehard drive.

Strany 249 - Basic User Setup Options

Chapter 8 System Configuration: BasicCisco Secure ACS System Restore8-16User Guide for Cisco Secure ACS for Windows Server78-16592-01Reports of

Strany 250 - Adding a Basic User Account

8-17User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 8 System Configuration: BasicCisco Secure ACS Active Service Management

Strany 251

Chapter 8 System Configuration: BasicCisco Secure ACS Active Service Management8-18User Guide for Cisco Secure ACS for Windows Server78-16592-01

Strany 252

8-19User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 8 System Configuration: BasicCisco Secure ACS Active Service Management

Strany 253

Chapter 8 System Configuration: BasicCisco Secure ACS Active Service Management8-20User Guide for Cisco Secure ACS for Windows Server78-16592-01

Strany 254 - Assigning a User to a Group

8-21User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 8 System Configuration: BasicVoIP Accounting Configurationc. In the SMT

Strany 255 - Setting User Callback Option

Chapter 8 System Configuration: BasicVoIP Accounting Configuration8-22User Guide for Cisco Secure ACS for Windows Server78-16592-01To configure

Strany 256

CHAPTER 9-1User Guide for Cisco Secure ACS for Windows Server78-16592-019System Configuration: AdvancedThis chapter addresses the CiscoSecure Database

Strany 257

xxxiiiUser Guide for Cisco Secure ACS for Windows Server78-16592-01PrefaceRelated DocumentationRelated DocumentationNote We sometimes update the print

Strany 258

Chapter 9 System Configuration: AdvancedCiscoSecure Database Replication9-2User Guide for Cisco Secure ACS for Windows Server78-16592-01• Replic

Strany 259

9-3User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 9 System Configuration: AdvancedCiscoSecure Database Replication• IP poo

Strany 260

Chapter 9 System Configuration: AdvancedCiscoSecure Database Replication9-4User Guide for Cisco Secure ACS for Windows Server78-16592-01be runni

Strany 261

9-5User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 9 System Configuration: AdvancedCiscoSecure Database Replicationc. The p

Strany 262

Chapter 9 System Configuration: AdvancedCiscoSecure Database Replication9-6User Guide for Cisco Secure ACS for Windows Server78-16592-01c. The s

Strany 263

9-7User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 9 System Configuration: AdvancedCiscoSecure Database ReplicationReplicat

Strany 264

Chapter 9 System Configuration: AdvancedCiscoSecure Database Replication9-8User Guide for Cisco Secure ACS for Windows Server78-16592-01–In its

Strany 265

9-9User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 9 System Configuration: AdvancedCiscoSecure Database Replication• A seco

Strany 266

Chapter 9 System Configuration: AdvancedCiscoSecure Database Replication9-10User Guide for Cisco Secure ACS for Windows Server78-16592-01of sett

Strany 267

9-11User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 9 System Configuration: AdvancedCiscoSecure Database ReplicationFor mor

Strany 268

PrefaceRelated DocumentationxxxivUser Guide for Cisco Secure ACS for Windows Server78-16592-01Table 2 describes a set of white papers about Cisco Secu

Strany 269 - TACACS+ Settings (User)

Chapter 9 System Configuration: AdvancedCiscoSecure Database Replication9-12User Guide for Cisco Secure ACS for Windows Server78-16592-01Note If

Strany 270

9-13User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 9 System Configuration: AdvancedCiscoSecure Database Replication–Manual

Strany 271

Chapter 9 System Configuration: AdvancedCiscoSecure Database Replication9-14User Guide for Cisco Secure ACS for Windows Server78-16592-01Note Th

Strany 272

9-15User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 9 System Configuration: AdvancedCiscoSecure Database ReplicationInbound

Strany 273

Chapter 9 System Configuration: AdvancedCiscoSecure Database Replication9-16User Guide for Cisco Secure ACS for Windows Server78-16592-01To impl

Strany 274

9-17User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 9 System Configuration: AdvancedCiscoSecure Database ReplicationConfigu

Strany 275

Chapter 9 System Configuration: AdvancedCiscoSecure Database Replication9-18User Guide for Cisco Secure ACS for Windows Server78-16592-01Step 4

Strany 276

9-19User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 9 System Configuration: AdvancedCiscoSecure Database ReplicationNote Fo

Strany 277

Chapter 9 System Configuration: AdvancedCiscoSecure Database Replication9-20User Guide for Cisco Secure ACS for Windows Server78-16592-01Note If

Strany 278

9-21User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 9 System Configuration: AdvancedCiscoSecure Database ReplicationNote Re

Strany 279

xxxvUser Guide for Cisco Secure ACS for Windows Server78-16592-01PrefaceObtaining DocumentationObtaining DocumentationCisco documentation and addition

Strany 280

Chapter 9 System Configuration: AdvancedCiscoSecure Database Replication9-22User Guide for Cisco Secure ACS for Windows Server78-16592-01Note If

Strany 281

9-23User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 9 System Configuration: AdvancedCiscoSecure Database ReplicationTip Cli

Strany 282

Chapter 9 System Configuration: AdvancedCiscoSecure Database Replication9-24User Guide for Cisco Secure ACS for Windows Server78-16592-01c. Repe

Strany 283 - RADIUS Attributes

9-25User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 9 System Configuration: AdvancedRDBMS SynchronizationDatabase Replicati

Strany 284

Chapter 9 System Configuration: AdvancedRDBMS Synchronization9-26User Guide for Cisco Secure ACS for Windows Server78-16592-01–Synchronization P

Strany 285

9-27User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 9 System Configuration: AdvancedRDBMS SynchronizationUsersAmong the use

Strany 286

Chapter 9 System Configuration: AdvancedRDBMS Synchronization9-28User Guide for Cisco Secure ACS for Windows Server78-16592-01• Specifying outbo

Strany 287

9-29User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 9 System Configuration: AdvancedRDBMS SynchronizationNote If you intend

Strany 288

Chapter 9 System Configuration: AdvancedRDBMS Synchronization9-30User Guide for Cisco Secure ACS for Windows Server78-16592-01Figure 9-2 RDBMS S

Strany 289

9-31User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 9 System Configuration: AdvancedRDBMS SynchronizationAbout the accountA

Strany 290

PrefaceDocumentation FeedbackxxxviUser Guide for Cisco Secure ACS for Windows Server78-16592-01Cisco.comYou can access the most current Cisco document

Strany 291

Chapter 9 System Configuration: AdvancedRDBMS Synchronization9-32User Guide for Cisco Secure ACS for Windows Server78-16592-01• Oracle 7—Contain

Strany 292

9-33User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 9 System Configuration: AdvancedRDBMS SynchronizationReplaying transact

Strany 293

Chapter 9 System Configuration: AdvancedRDBMS Synchronization9-34User Guide for Cisco Secure ACS for Windows Server78-16592-01implementation. If

Strany 294

9-35User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 9 System Configuration: AdvancedRDBMS SynchronizationStep 7 Schedule RD

Strany 295

Chapter 9 System Configuration: AdvancedRDBMS Synchronization9-36User Guide for Cisco Secure ACS for Windows Server78-16592-01Preparing for CSV-

Strany 296

9-37User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 9 System Configuration: AdvancedRDBMS Synchronizationnet start CSDBSync

Strany 297

Chapter 9 System Configuration: AdvancedRDBMS Synchronization9-38User Guide for Cisco Secure ACS for Windows Server78-16592-01Step 6 Complete th

Strany 298

9-39User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 9 System Configuration: AdvancedRDBMS Synchronization• Password—Specifi

Strany 299

Chapter 9 System Configuration: AdvancedRDBMS Synchronization9-40User Guide for Cisco Secure ACS for Windows Server78-16592-01For more informati

Strany 300

9-41User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 9 System Configuration: AdvancedRDBMS SynchronizationNote You do not ha

Strany 301 - Finding a User

xxxviiUser Guide for Cisco Secure ACS for Windows Server78-16592-01PrefaceObtaining Technical AssistanceYou can submit comments by using the response

Strany 302 - Disabling a User Account

Chapter 9 System Configuration: AdvancedRDBMS Synchronization9-42User Guide for Cisco Secure ACS for Windows Server78-16592-01Note For more info

Strany 303 - Deleting a User Account

9-43User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 9 System Configuration: AdvancedRDBMS SynchronizationNote For more info

Strany 304

Chapter 9 System Configuration: AdvancedIP Pools Server9-44User Guide for Cisco Secure ACS for Windows Server78-16592-01Step 2 Click RDBMS Synch

Strany 305

9-45User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 9 System Configuration: AdvancedIP Pools Serveryou enable this feature,

Strany 306 - Saving User Settings

Chapter 9 System Configuration: AdvancedIP Pools Server9-46User Guide for Cisco Secure ACS for Windows Server78-16592-01You can determine whethe

Strany 307 - System Configuration: Basic

9-47User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 9 System Configuration: AdvancedIP Pools ServerRefreshing the AAA Serve

Strany 308 - Service Control

Chapter 9 System Configuration: AdvancedIP Pools Server9-48User Guide for Cisco Secure ACS for Windows Server78-16592-01Note All addresses in an

Strany 309 - Date Format Control

9-49User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 9 System Configuration: AdvancedIP Pools ServerNote All addresses in an

Strany 310

Chapter 9 System Configuration: AdvancedIP Pools Server9-50User Guide for Cisco Secure ACS for Windows Server78-16592-01The name pool table appe

Strany 311 - Local Password Management

9-51User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 9 System Configuration: AdvancedIP Pools Address RecoveryStep 4 Click D

Strany 312

PrefaceObtaining Technical AssistancexxxviiiUser Guide for Cisco Secure ACS for Windows Server78-16592-01recommended solutions. If your issue is not r

Strany 313

Chapter 9 System Configuration: AdvancedIP Pools Address Recovery9-52User Guide for Cisco Secure ACS for Windows Server78-16592-01Cisco Secure A

Strany 314

CHAPTER 10-1User Guide for Cisco Secure ACS for Windows Server78-16592-0110System Configuration: Authentication and CertificatesThis chapter addresses

Strany 315 - Cisco Secure ACS Backup

Chapter 10 System Configuration: Authentication and CertificatesAbout Certification and EAP Protocols10-2User Guide for Cisco Secure ACS for Win

Strany 316 - Components Backed Up

10-3User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 10 System Configuration: Authentication and CertificatesAbout Certifica

Strany 317 - Backup Options

Chapter 10 System Configuration: Authentication and CertificatesAbout Certification and EAP Protocols10-4User Guide for Cisco Secure ACS for Win

Strany 318

10-5User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 10 System Configuration: Authentication and CertificatesAbout Certifica

Strany 319

Chapter 10 System Configuration: Authentication and CertificatesAbout Certification and EAP Protocols10-6User Guide for Cisco Secure ACS for Win

Strany 320

10-7User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 10 System Configuration: Authentication and CertificatesAbout Certifica

Strany 321 - Components Restored

Chapter 10 System Configuration: Authentication and CertificatesAbout Certification and EAP Protocols10-8User Guide for Cisco Secure ACS for Win

Strany 322 - Step 2 Click ACS Restore

10-9User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 10 System Configuration: Authentication and CertificatesAbout Certifica

Strany 323 - System Monitoring

xxxixUser Guide for Cisco Secure ACS for Windows Server78-16592-01PrefaceObtaining Additional Publications and InformationObtaining Additional Publica

Strany 324 - System Monitoring Options

Chapter 10 System Configuration: Authentication and CertificatesAbout Certification and EAP Protocols10-10User Guide for Cisco Secure ACS for Wi

Strany 325 - Setting Up System Monitoring

10-11User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 10 System Configuration: Authentication and CertificatesAbout Certific

Strany 326 - Event Logging

Chapter 10 System Configuration: Authentication and CertificatesAbout Certification and EAP Protocols10-12User Guide for Cisco Secure ACS for Wi

Strany 327 - VoIP Accounting Configuration

10-13User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 10 System Configuration: Authentication and CertificatesAbout Certific

Strany 328 - Step 4 Click Submit

Chapter 10 System Configuration: Authentication and CertificatesAbout Certification and EAP Protocols10-14User Guide for Cisco Secure ACS for Wi

Strany 329

10-15User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 10 System Configuration: Authentication and CertificatesAbout Certific

Strany 330

Chapter 10 System Configuration: Authentication and CertificatesAbout Certification and EAP Protocols10-16User Guide for Cisco Secure ACS for Wi

Strany 331

10-17User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 10 System Configuration: Authentication and CertificatesAbout Certific

Strany 332 - Replication Process

Chapter 10 System Configuration: Authentication and CertificatesAbout Certification and EAP Protocols10-18User Guide for Cisco Secure ACS for Wi

Strany 333

10-19User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 10 System Configuration: Authentication and CertificatesAbout Certific

Strany 334

ContentsivUser Guide for Cisco Secure ACS for Windows Server78-16592-01AAA Protocols—TACACS+ and RADIUS 1-6TACACS+ 1-7RADIUS 1-7Authentication 1-8Aut

Strany 335 - Replication Frequency

PrefaceObtaining Additional Publications and InformationxlUser Guide for Cisco Secure ACS for Windows Server78-16592-01• Internet Protocol Journal is

Strany 336

Chapter 10 System Configuration: Authentication and CertificatesAbout Certification and EAP Protocols10-20User Guide for Cisco Secure ACS for Wi

Strany 337

10-21User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 10 System Configuration: Authentication and CertificatesAbout Certific

Strany 338 - Database Replication Logging

Chapter 10 System Configuration: Authentication and CertificatesAbout Certification and EAP Protocols10-22User Guide for Cisco Secure ACS for Wi

Strany 339 - Replication Options

10-23User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 10 System Configuration: Authentication and CertificatesAbout Certific

Strany 340 - Outbound Replication Options

Chapter 10 System Configuration: Authentication and CertificatesAbout Certification and EAP Protocols10-24User Guide for Cisco Secure ACS for Wi

Strany 341

10-25User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 10 System Configuration: Authentication and CertificatesAbout Certific

Strany 342

Chapter 10 System Configuration: Authentication and CertificatesGlobal Authentication Setup10-26User Guide for Cisco Secure ACS for Windows Serv

Strany 343 - Cisco Secure ACSes

10-27User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 10 System Configuration: Authentication and CertificatesGlobal Authent

Strany 344

Chapter 10 System Configuration: Authentication and CertificatesGlobal Authentication Setup10-28User Guide for Cisco Secure ACS for Windows Serv

Strany 345

10-29User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 10 System Configuration: Authentication and CertificatesGlobal Authent

Strany 346

CHAPTER1-1User Guide for Cisco Secure ACS for Windows Server78-16592-011OverviewThis chapter provides an overview of Cisco Secure ACS for Windows Serv

Strany 347 - Replicating Immediately

Chapter 10 System Configuration: Authentication and CertificatesGlobal Authentication Setup10-30User Guide for Cisco Secure ACS for Windows Serv

Strany 348

10-31User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 10 System Configuration: Authentication and CertificatesGlobal Authent

Strany 349 - Scheduling Replication

Chapter 10 System Configuration: Authentication and CertificatesGlobal Authentication Setup10-32User Guide for Cisco Secure ACS for Windows Serv

Strany 350

10-33User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 10 System Configuration: Authentication and CertificatesGlobal Authent

Strany 351

Chapter 10 System Configuration: Authentication and CertificatesCisco Secure ACS Certificate Setup10-34User Guide for Cisco Secure ACS for Windo

Strany 352

10-35User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 10 System Configuration: Authentication and CertificatesCisco Secure A

Strany 353 - RDBMS Synchronization

Chapter 10 System Configuration: Authentication and CertificatesCisco Secure ACS Certificate Setup10-36User Guide for Cisco Secure ACS for Windo

Strany 354 - About RDBMS Synchronization

10-37User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 10 System Configuration: Authentication and CertificatesCisco Secure A

Strany 355 - User Groups

Chapter 10 System Configuration: Authentication and CertificatesCisco Secure ACS Certificate Setup10-38User Guide for Cisco Secure ACS for Windo

Strany 356

10-39User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 10 System Configuration: Authentication and CertificatesCisco Secure A

Strany 357 - About CSDBSync

Chapter 1 OverviewThe Cisco Secure ACS Paradigm1-2User Guide for Cisco Secure ACS for Windows Server78-16592-01–Accessing the HTML Interface, pag

Strany 358

Chapter 10 System Configuration: Authentication and CertificatesCisco Secure ACS Certificate Setup10-40User Guide for Cisco Secure ACS for Windo

Strany 359

10-41User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 10 System Configuration: Authentication and CertificatesCisco Secure A

Strany 360

Chapter 10 System Configuration: Authentication and CertificatesCisco Secure ACS Certificate Setup10-42User Guide for Cisco Secure ACS for Windo

Strany 361

10-43User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 10 System Configuration: Authentication and CertificatesCisco Secure A

Strany 362

Chapter 10 System Configuration: Authentication and CertificatesCisco Secure ACS Certificate Setup10-44User Guide for Cisco Secure ACS for Windo

Strany 363

10-45User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 10 System Configuration: Authentication and CertificatesCisco Secure A

Strany 364

Chapter 10 System Configuration: Authentication and CertificatesCisco Secure ACS Certificate Setup10-46User Guide for Cisco Secure ACS for Windo

Strany 365 - Synchronization

10-47User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 10 System Configuration: Authentication and CertificatesCisco Secure A

Strany 366 - RDBMS Synchronization Options

Chapter 10 System Configuration: Authentication and CertificatesCisco Secure ACS Certificate Setup10-48User Guide for Cisco Secure ACS for Windo

Strany 367

10-49User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 10 System Configuration: Authentication and CertificatesCisco Secure A

Strany 368

1-3User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 1 OverviewCisco Secure ACS Specificationsservices that ensure a secure en

Strany 369

Chapter 10 System Configuration: Authentication and CertificatesCisco Secure ACS Certificate Setup10-50User Guide for Cisco Secure ACS for Windo

Strany 370

10-51User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 10 System Configuration: Authentication and CertificatesCisco Secure A

Strany 371

Chapter 10 System Configuration: Authentication and CertificatesCisco Secure ACS Certificate Setup10-52User Guide for Cisco Secure ACS for Windo

Strany 372 - IP Pools Server

CHAPTER 11-1User Guide for Cisco Secure ACS for Windows Server78-16592-0111Logs and ReportsCisco Secure ACS for Windows Server produces a variety of l

Strany 373

Chapter 11 Logs and ReportsLogging Formats11-2User Guide for Cisco Secure ACS for Windows Server78-16592-01Logging FormatsCisco Secure ACS logs

Strany 374

11-3User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 11 Logs and ReportsSpecial Logging AttributesThe content of these attri

Strany 375 - Adding a New IP Pool

Chapter 11 Logs and ReportsNAC Attributes in Logs11-4User Guide for Cisco Secure ACS for Windows Server78-16592-01Note Cisco Secure ACS cannot d

Strany 376 - Editing an IP Pool Definition

11-5User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 11 Logs and ReportsUpdate Packets in Accounting LogsPosture validation

Strany 377 - Resetting an IP Pool

Chapter 11 Logs and ReportsAbout Cisco Secure ACS Logs and Reports11-6User Guide for Cisco Secure ACS for Windows Server78-16592-01About Cisco S

Strany 378 - Deleting an IP Pool

11-7User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 11 Logs and ReportsAbout Cisco Secure ACS Logs and ReportsTable 11-1 Ac

Strany 379 - IP Pools Address Recovery

Chapter 1 OverviewCisco Secure ACS Specifications1-4User Guide for Cisco Secure ACS for Windows Server78-16592-01• Maximum users supported by the

Strany 380

Chapter 11 Logs and ReportsAbout Cisco Secure ACS Logs and Reports11-8User Guide for Cisco Secure ACS for Windows Server78-16592-01Failed Attemp

Strany 381

11-9User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 11 Logs and ReportsAbout Cisco Secure ACS Logs and ReportsDynamic Admin

Strany 382 - EAP-TLS Authentication

Chapter 11 Logs and ReportsAbout Cisco Secure ACS Logs and Reports11-10User Guide for Cisco Secure ACS for Windows Server78-16592-01Viewing the

Strany 383 - About the EAP-TLS Protocol

11-11User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 11 Logs and ReportsAbout Cisco Secure ACS Logs and ReportsTip You can

Strany 384 - EAP-TLS and Cisco Secure ACS

Chapter 11 Logs and ReportsAbout Cisco Secure ACS Logs and Reports11-12User Guide for Cisco Secure ACS for Windows Server78-16592-01Note Deletin

Strany 385

11-13User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 11 Logs and ReportsAbout Cisco Secure ACS Logs and ReportsFor more inf

Strany 386 - EAP-TLS Limitations

Chapter 11 Logs and ReportsAbout Cisco Secure ACS Logs and Reports11-14User Guide for Cisco Secure ACS for Windows Server78-16592-01Configuring

Strany 387

11-15User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 11 Logs and ReportsWorking with CSV LogsStep 4 To generate a new Admin

Strany 388 - PEAP Authentication

Chapter 11 Logs and ReportsWorking with CSV Logs11-16User Guide for Cisco Secure ACS for Windows Server78-16592-01Older files are named in the f

Strany 389 - PEAP and Cisco Secure ACS

11-17User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 11 Logs and ReportsWorking with CSV LogsEnabling or Disabling a CSV Lo

Strany 390

1-5User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 1 OverviewAAA Server Functions and ConceptsWhen you install Cisco Secure

Strany 391

Chapter 11 Logs and ReportsWorking with CSV Logs11-18User Guide for Cisco Secure ACS for Windows Server78-16592-01Viewing a CSV ReportWhen you s

Strany 392 - Enabling PEAP Authentication

11-19User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 11 Logs and ReportsWorking with CSV LogsTip To check for newer informa

Strany 393 - EAP-FAST Authentication

Chapter 11 Logs and ReportsWorking with CSV Logs11-20User Guide for Cisco Secure ACS for Windows Server78-16592-01• CSV file location—You can sp

Strany 394

11-21User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 11 Logs and ReportsWorking with ODBC LogsStep 7 To generate a new CSV

Strany 395 - About Master Keys

Chapter 11 Logs and ReportsWorking with ODBC Logs11-22User Guide for Cisco Secure ACS for Windows Server78-16592-01Preparing for ODBC LoggingTo

Strany 396

11-23User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 11 Logs and ReportsWorking with ODBC LogsStep 3 Click Add.Step 4 Selec

Strany 397 - About PACs

Chapter 11 Logs and ReportsWorking with ODBC Logs11-24User Guide for Cisco Secure ACS for Windows Server78-16592-01To configure an ODBC log, fol

Strany 398 - Automatic PAC Provisioning

11-25User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 11 Logs and ReportsWorking with ODBC LogsNote The user must have suffi

Strany 399

Chapter 11 Logs and ReportsRemote Logging11-26User Guide for Cisco Secure ACS for Windows Server78-16592-01c. Click the name of the ODBC log you

Strany 400 - Manual PAC Provisioning

11-27User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 11 Logs and ReportsRemote Logginggenerates the accounting logs in the

Strany 401 - Master Key and PAC TTLs

Chapter 1 OverviewAAA Server Functions and Concepts1-6User Guide for Cisco Secure ACS for Windows Server78-16592-01• Authorization, page 1-17• Ac

Strany 402 - Replication and EAP-FAST

Chapter 11 Logs and ReportsRemote Logging11-28User Guide for Cisco Secure ACS for Windows Server78-16592-01b. Add to the AAA Servers table each

Strany 403

11-29User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 11 Logs and ReportsRemote Loggingbehavior enables you to configure one

Strany 404

Chapter 11 Logs and ReportsRemote Logging11-30User Guide for Cisco Secure ACS for Windows Server78-16592-01Step 5 Select the applicable remote l

Strany 405 - Enabling EAP-FAST

11-31User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 11 Logs and ReportsService LogsStep 8 Click Submit.Cisco Secure ACS sa

Strany 406 - Global Authentication Setup

Chapter 11 Logs and ReportsService Logs11-32User Guide for Cisco Secure ACS for Windows Server78-16592-01Services LoggedCisco Secure ACS generat

Strany 407

11-33User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 11 Logs and ReportsService LogsConfiguring Service LogsYou can configu

Strany 408

Chapter 11 Logs and ReportsService Logs11-34User Guide for Cisco Secure ACS for Windows Server78-16592-01Step 3 To disable the service log file,

Strany 409

CHAPTER 12-1User Guide for Cisco Secure ACS for Windows Server78-16592-0112Administrators and Administrative PolicyThis chapter addresses the Cisco Se

Strany 410

Chapter 12 Administrators and Administrative PolicyAdministrator Accounts12-2User Guide for Cisco Secure ACS for Windows Server78-16592-01About

Strany 411

12-3User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 12 Administrators and Administrative PolicyAdministrator AccountsAdmini

Strany 412

1-7User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 1 OverviewAAA Server Functions and ConceptsTACACS+Cisco Secure ACS confor

Strany 413

Chapter 12 Administrators and Administrative PolicyAdministrator Accounts12-4User Guide for Cisco Secure ACS for Windows Server78-16592-01Note A

Strany 414

12-5User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 12 Administrators and Administrative PolicyAdministrator Accounts–VoIP

Strany 415

Chapter 12 Administrators and Administrative PolicyAdministrator Accounts12-6User Guide for Cisco Secure ACS for Windows Server78-16592-01–ACS B

Strany 416

12-7User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 12 Administrators and Administrative PolicyAdministrator AccountsAll pr

Strany 417

Chapter 12 Administrators and Administrative PolicyAdministrator Accounts12-8User Guide for Cisco Secure ACS for Windows Server78-16592-01Note Y

Strany 418

12-9User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 12 Administrators and Administrative PolicyAdministrator AccountsNote I

Strany 419

Chapter 12 Administrators and Administrative PolicyAdministrator Accounts12-10User Guide for Cisco Secure ACS for Windows Server78-16592-01Step

Strany 420

12-11User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 12 Administrators and Administrative PolicyAccess PolicyDeleting an Ad

Strany 421

Chapter 12 Administrators and Administrative PolicyAccess Policy12-12User Guide for Cisco Secure ACS for Windows Server78-16592-01Access Policy

Strany 422

12-13User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 12 Administrators and Administrative PolicyAccess PolicyCisco Secure A

Strany 423

Chapter 1 OverviewAAA Server Functions and Concepts1-8User Guide for Cisco Secure ACS for Windows Server78-16592-01• RFC 2868• RFC 2869The ports

Strany 424

Chapter 12 Administrators and Administrative PolicyAccess Policy12-14User Guide for Cisco Secure ACS for Windows Server78-16592-01Setting Up Acc

Strany 425 - Step 5 Click Delete

12-15User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 12 Administrators and Administrative PolicyAccess Policyb. For each IP

Strany 426

Chapter 12 Administrators and Administrative PolicySession Policy12-16User Guide for Cisco Secure ACS for Windows Server78-16592-01Session Polic

Strany 427

12-17User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 12 Administrators and Administrative PolicySession Policy• Respond to

Strany 428

Chapter 12 Administrators and Administrative PolicyAudit Policy12-18User Guide for Cisco Secure ACS for Windows Server78-16592-01Step 5 Set the

Strany 429

CHAPTER 13-1User Guide for Cisco Secure ACS for Windows Server78-16592-0113User DatabasesCisco Secure ACS for Windows Server authenticates users again

Strany 430

Chapter 13 User DatabasesCiscoSecure User Database13-2User Guide for Cisco Secure ACS for Windows Server78-16592-01• Token Server User Databases

Strany 431

13-3User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 13 User DatabasesCiscoSecure User DatabaseUser Import and CreationThere

Strany 432

Chapter 13 User DatabasesAbout External User Databases13-4User Guide for Cisco Secure ACS for Windows Server78-16592-01Cisco Secure ACS. Any use

Strany 433 - Logs and Reports

13-5User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 13 User DatabasesAbout External User DatabasesFor Cisco Secure ACS to i

Strany 434 - Special Logging Attributes

1-9User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 1 OverviewAAA Server Functions and ConceptsThere is a fundamental implici

Strany 435

Chapter 13 User DatabasesAbout External User Databases13-6User Guide for Cisco Secure ACS for Windows Server78-16592-01• By Unknown User Policy—

Strany 436 - NAC Attributes in Logs

13-7User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 13 User DatabasesWindows User DatabaseWindows User DatabaseYou can conf

Strany 437

Chapter 13 User DatabasesWindows User Database13-8User Guide for Cisco Secure ACS for Windows Server78-16592-01What’s Supported with Windows Use

Strany 438 - Accounting Logs

13-9User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 13 User DatabasesWindows User DatabaseAuthentication with Windows User

Strany 439

Chapter 13 User DatabasesWindows User Database13-10User Guide for Cisco Secure ACS for Windows Server78-16592-01but no trust relationship is est

Strany 440

13-11User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 13 User DatabasesWindows User DatabaseWindows Dial-up Networking Clien

Strany 441

Chapter 13 User DatabasesWindows User Database13-12User Guide for Cisco Secure ACS for Windows Server78-16592-01To determine the format of a use

Strany 442 - Step 2 Click Logged-in Users

13-13User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 13 User DatabasesWindows User DatabaseNon-domain-qualified UsernamesCi

Strany 443 - Deleting Logged-in Users

Chapter 13 User DatabasesWindows User Database13-14User Guide for Cisco Secure ACS for Windows Server78-16592-01Note If your Domain List contain

Strany 444

13-15User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 13 User DatabasesWindows User DatabaseIf the authentication protocol u

Strany 445 - Cisco Secure ACS System Logs

vUser Guide for Cisco Secure ACS for Windows Server78-16592-01ContentsAdministrative Sessions through a NAT Gateway 1-31Accessing the HTML Interface

Strany 446

Chapter 1 OverviewAAA Server Functions and Concepts1-10User Guide for Cisco Secure ACS for Windows Server78-16592-01Authentication and User Datab

Strany 447 - Working with CSV Logs

Chapter 13 User DatabasesWindows User Database13-16User Guide for Cisco Secure ACS for Windows Server78-16592-01EAP-TLS Domain StrippingIf you u

Strany 448 - CSV Log File Locations

13-17User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 13 User DatabasesWindows User DatabaseWhen machine authentication is e

Strany 449

Chapter 13 User DatabasesWindows User Database13-18User Guide for Cisco Secure ACS for Windows Server78-16592-01Cisco Secure ACS supports both E

Strany 450 - Viewing a CSV Report

13-19User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 13 User DatabasesWindows User Databasethat was added to the local mach

Strany 451 - Configuring a CSV Log

Chapter 13 User DatabasesWindows User Database13-20User Guide for Cisco Secure ACS for Windows Server78-16592-01–Calling-Station-Id value not fo

Strany 452

13-21User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 13 User DatabasesWindows User DatabaseClient operating systems support

Strany 453 - Working with ODBC Logs

Chapter 13 User DatabasesWindows User Database13-22User Guide for Cisco Secure ACS for Windows Server78-16592-01d. On the Protected EAP Properti

Strany 454 - Preparing for ODBC Logging

13-23User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 13 User DatabasesWindows User DatabaseNote End-user client computers a

Strany 455 - Configuring an ODBC Log

Chapter 13 User DatabasesWindows User Database13-24User Guide for Cisco Secure ACS for Windows Server78-16592-01Cisco Secure ACS allows you to c

Strany 456

13-25User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 13 User DatabasesWindows User DatabaseUser-Changeable Passwords with W

Strany 457

1-11User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 1 OverviewAAA Server Functions and ConceptsTable 1-3 specifies EAP authe

Strany 458 - Remote Logging

Chapter 13 User DatabasesWindows User Database13-26User Guide for Cisco Secure ACS for Windows Server78-16592-01Preparing Users for Authenticati

Strany 459

13-27User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 13 User DatabasesWindows User DatabaseTip Windows dialin permission is

Strany 460 - Remote Logging Options

Chapter 13 User DatabasesWindows User Database13-28User Guide for Cisco Secure ACS for Windows Server78-16592-01Note The check boxes under MS CH

Strany 461

13-29User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 13 User DatabasesWindows User Database• EAP-TLS and PEAP machine authe

Strany 462

Chapter 13 User DatabasesWindows User Database13-30User Guide for Cisco Secure ACS for Windows Server78-16592-01Note If you do not change the va

Strany 463 - Service Logs

13-31User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 13 User DatabasesWindows User DatabaseStep 3 Click Windows Database.If

Strany 464 - Services Logged

Chapter 13 User DatabasesGeneric LDAP13-32User Guide for Cisco Secure ACS for Windows Server78-16592-01Step 7 Click Submit.Cisco Secure ACS save

Strany 465 - Configuring Service Logs

13-33User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 13 User DatabasesGeneric LDAP• LDAP Failover, page 13-36• LDAP Configu

Strany 466

Chapter 13 User DatabasesGeneric LDAP13-34User Guide for Cisco Secure ACS for Windows Server78-16592-01For each LDAP instance, you can add or le

Strany 467 - Administrator Accounts

13-35User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 13 User DatabasesGeneric LDAPIf you choose to make use of domain filte

Strany 468 - About Administrator Accounts

Chapter 1 OverviewAAA Server Functions and Concepts1-12User Guide for Cisco Secure ACS for Windows Server78-16592-01• PEAP(EAP-GTC)• PEAP(EAP-MSC

Strany 469 - Administrator Privileges

Chapter 13 User DatabasesGeneric LDAP13-36User Guide for Cisco Secure ACS for Windows Server78-16592-01Note With this option, Cisco Secure ACS s

Strany 470

13-37User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 13 User DatabasesGeneric LDAPUnsuccessful Previous Authentication with

Strany 471

Chapter 13 User DatabasesGeneric LDAP13-38User Guide for Cisco Secure ACS for Windows Server78-16592-01This table contains the following options

Strany 472

13-39User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 13 User DatabasesGeneric LDAP–Strip domain before submitting username

Strany 473

Chapter 13 User DatabasesGeneric LDAP13-40User Guide for Cisco Secure ACS for Windows Server78-16592-01For example, if the delimiter character i

Strany 474

13-41User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 13 User DatabasesGeneric LDAP–UserObjectType—The name of the attribute

Strany 475

Chapter 13 User DatabasesGeneric LDAP13-42User Guide for Cisco Secure ACS for Windows Server78-16592-01–Port—The TCP/IP port number on which the

Strany 476

13-43User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 13 User DatabasesGeneric LDAP–Admin DN—The DN of the administrator; th

Strany 477 - Access Policy

Chapter 13 User DatabasesGeneric LDAP13-44User Guide for Cisco Secure ACS for Windows Server78-16592-01To configure Cisco Secure ACS to use the

Strany 478 - Access Policy Options

13-45User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 13 User DatabasesGeneric LDAPStep 8 If you want to limit authenticatio

Strany 479

1-13User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 1 OverviewAAA Server Functions and Concepts• ARAP—Uses a two-way challen

Strany 480 - Setting Up Access Policy

Chapter 13 User DatabasesGeneric LDAP13-46User Guide for Cisco Secure ACS for Windows Server78-16592-01Note For information about domain filteri

Strany 481

13-47User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 13 User DatabasesGeneric LDAPStep 13 In the User Object Class box, typ

Strany 482 - Session Policy

Chapter 13 User DatabasesGeneric LDAP13-48User Guide for Cisco Secure ACS for Windows Server78-16592-01Step 20 For the Primary LDAP Server and S

Strany 483 - Setting Up Session Policy

13-49User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 13 User DatabasesNovell NDS DatabaseFor example:uid=joesmith,ou=member

Strany 484 - Audit Policy

Chapter 13 User DatabasesNovell NDS Database13-50User Guide for Cisco Secure ACS for Windows Server78-16592-01About Novell NDS User DatabasesCis

Strany 485 - User Databases

13-51User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 13 User DatabasesNovell NDS DatabaseFor users to authenticate against

Strany 486 - CiscoSecure User Database

Chapter 13 User DatabasesNovell NDS Database13-52User Guide for Cisco Secure ACS for Windows Server78-16592-01Novell NDS External User Database

Strany 487 - User Import and Creation

13-53User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 13 User DatabasesNovell NDS DatabaseNote If the administrator username

Strany 488 - About External User Databases

Chapter 13 User DatabasesNovell NDS Database13-54User Guide for Cisco Secure ACS for Windows Server78-16592-01Before You BeginThe Novell Request

Strany 489

13-55User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 13 User DatabasesODBC DatabaseFor more information about the content o

Strany 490 - External user

Chapter 1 OverviewAAA Server Functions and Concepts1-14User Guide for Cisco Secure ACS for Windows Server78-16592-01• EAP-FAST—EAP Flexible Authe

Strany 491 - Windows User Database

Chapter 13 User DatabasesODBC Database13-56User Guide for Cisco Secure ACS for Windows Server78-16592-01ACS to authenticate against an ODBC-comp

Strany 492

13-57User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 13 User DatabasesODBC Database• EAP-TLS Authentication Procedure Input

Strany 493 - Trust Relationships

Chapter 13 User DatabasesODBC Database13-58User Guide for Cisco Secure ACS for Windows Server78-16592-01• Group Mapping for Unknown Users—Cisco

Strany 494

13-59User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 13 User DatabasesODBC DatabaseCisco Secure ACS grants authorization ba

Strany 495

Chapter 13 User DatabasesODBC Database13-60User Guide for Cisco Secure ACS for Windows Server78-16592-01Step 4 Write the stored procedures inten

Strany 496

13-61User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 13 User DatabasesODBC DatabaseThe Cisco Secure ACS product CD provides

Strany 497

Chapter 13 User DatabasesODBC Database13-62User Guide for Cisco Secure ACS for Windows Server78-16592-01will default to case sensitive, whereas

Strany 498 - UPN Usernames

13-63User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 13 User DatabasesODBC DatabaseGRANT EXECUTE ON dbo.CSNTAuthUserPap TO

Strany 499

Chapter 13 User DatabasesODBC Database13-64User Guide for Cisco Secure ACS for Windows Server78-16592-01Sample Routine for Generating an EAP-TLS

Strany 500 - Machine Authentication

13-65User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 13 User DatabasesODBC DatabaseThe input names are for guidance only. P

Strany 501

1-15User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 1 OverviewAAA Server Functions and Concepts• Outbound passwords—The TACA

Strany 502

Chapter 13 User DatabasesODBC Database13-66User Guide for Cisco Secure ACS for Windows Server78-16592-01Note If the ODBC database returns data i

Strany 503 - Machine Access Restrictions

13-67User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 13 User DatabasesODBC DatabaseThe CSNTGroup and CSNTacctInfo fields ar

Strany 504

Chapter 13 User DatabasesODBC Database13-68User Guide for Cisco Secure ACS for Windows Server78-16592-01Note Because Cisco Secure ACS performs a

Strany 505

13-69User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 13 User DatabasesODBC DatabaseThe CSNTGroup and CSNTacctInfo fields ar

Strany 506

Chapter 13 User DatabasesODBC Database13-70User Guide for Cisco Secure ACS for Windows Server78-16592-01Configuring a System Data Source Name fo

Strany 507

13-71User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 13 User DatabasesODBC DatabaseStep 10 Close the ODBC Data Source Admin

Strany 508

Chapter 13 User DatabasesODBC Database13-72User Guide for Cisco Secure ACS for Windows Server78-16592-01Step 6 From the System DSN list, select

Strany 509

13-73User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 13 User DatabasesODBC DatabaseStep 11 From the DSN Procedure Type list

Strany 510

Chapter 13 User DatabasesODBC Database13-74User Guide for Cisco Secure ACS for Windows Server78-16592-01Note If you enabled CHAP/MS-CHAP/ARAP au

Strany 511

13-75User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 13 User DatabasesLEAP Proxy RADIUS Server DatabaseLEAP Proxy RADIUS Se

Strany 512

Chapter 1 OverviewAAA Server Functions and Concepts1-16User Guide for Cisco Secure ACS for Windows Server78-16592-01For information on the requir

Strany 513

Chapter 13 User DatabasesLEAP Proxy RADIUS Server Database13-76User Guide for Cisco Secure ACS for Windows Server78-16592-01Configuring a LEAP P

Strany 514

13-77User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 13 User DatabasesLEAP Proxy RADIUS Server DatabaseStep 7 In the follow

Strany 515

Chapter 13 User DatabasesToken Server User Databases13-78User Guide for Cisco Secure ACS for Windows Server78-16592-01Token Server User Database

Strany 516 - Generic LDAP

13-79User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 13 User DatabasesToken Server User DatabasesFor RSA SecurID, Cisco Sec

Strany 517 - Multiple LDAP Instances

Chapter 13 User DatabasesToken Server User Databases13-80User Guide for Cisco Secure ACS for Windows Server78-16592-01About RADIUS-Enabled Token

Strany 518 - Domain Filtering

13-81User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 13 User DatabasesToken Server User DatabasesCisco Secure ACS expects t

Strany 519

Chapter 13 User DatabasesToken Server User Databases13-82User Guide for Cisco Secure ACS for Windows Server78-16592-01c. Click Submit.Cisco Secu

Strany 520 - LDAP Failover

13-83User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 13 User DatabasesToken Server User Databases• Timeout (seconds):—The n

Strany 521 - LDAP Configuration Options

Chapter 13 User DatabasesToken Server User Databases13-84User Guide for Cisco Secure ACS for Windows Server78-16592-01Note You should only use t

Strany 522

13-85User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 13 User DatabasesToken Server User DatabasesConfiguring an RSA SecurID

Strany 523

1-17User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 1 OverviewAAA Server Functions and Concepts• Configurable character stri

Strany 524

Chapter 13 User DatabasesDeleting an External User Database Configuration13-86User Guide for Cisco Secure ACS for Windows Server78-16592-01Step

Strany 525

13-87User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 13 User DatabasesDeleting an External User Database ConfigurationStep

Strany 526

Chapter 13 User DatabasesDeleting an External User Database Configuration13-88User Guide for Cisco Secure ACS for Windows Server78-16592-01

Strany 527

CHAPTER 14-1User Guide for Cisco Secure ACS for Windows Server78-16592-0114Network Admission ControlNAC enables you to control the degree of access pe

Strany 528

Chapter 14 Network Admission ControlAbout Network Admission Control14-2User Guide for Cisco Secure ACS for Windows Server78-16592-01NAC AAA Comp

Strany 529

14-3User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 14 Network Admission ControlAbout Network Admission ControlPosture Vali

Strany 530

Chapter 14 Network Admission ControlAbout Network Admission Control14-4User Guide for Cisco Secure ACS for Windows Server78-16592-016. Cisco Sec

Strany 531

14-5User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 14 Network Admission ControlImplementing Network Admission ControlFrom

Strany 532

Chapter 14 Network Admission ControlImplementing Network Admission Control14-6User Guide for Cisco Secure ACS for Windows Server78-16592-01To im

Strany 533 - Novell NDS Database

14-7User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 14 Network Admission ControlImplementing Network Admission ControlStep

Strany 534

Chapter 1 OverviewAAA Server Functions and Concepts1-18User Guide for Cisco Secure ACS for Windows Server78-16592-01This section contains the fol

Strany 535 - User Contexts

Chapter 14 Network Admission ControlImplementing Network Admission Control14-8User Guide for Cisco Secure ACS for Windows Server78-16592-01b. Cr

Strany 536

14-9User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 14 Network Admission ControlImplementing Network Admission Controlb. (O

Strany 537

Chapter 14 Network Admission ControlNAC Databases14-10User Guide for Cisco Secure ACS for Windows Server78-16592-01NAC DatabasesThis section con

Strany 538

14-11User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 14 Network Admission ControlNAC Databasesmandatory credential types. T

Strany 539 - ODBC Database

Chapter 14 Network Admission ControlNAC Databases14-12User Guide for Cisco Secure ACS for Windows Server78-16592-01Cisco Secure ACS communicates

Strany 540

14-13User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 14 Network Admission ControlNAC Databases–Name—Displays the policy nam

Strany 541

Chapter 14 Network Admission ControlNAC Databases14-14User Guide for Cisco Secure ACS for Windows Server78-16592-01Configuring a NAC DatabaseThi

Strany 542 - External User Database

14-15User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 14 Network Admission ControlNAC DatabasesStep 6 Click Configure.Cautio

Strany 543 - Relational Database

Chapter 14 Network Admission ControlNAC Policies14-16User Guide for Cisco Secure ACS for Windows Server78-16592-01b. If you need to create a pol

Strany 544

14-17User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 14 Network Admission ControlNAC PoliciesPolicies are reusable; that is

Strany 545 - Type Definitions

1-19User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 1 OverviewAAA Server Functions and ConceptsQuotas can be either absolute

Strany 546 - Procedure

Chapter 14 Network Admission ControlNAC Policies14-18User Guide for Cisco Secure ACS for Windows Server78-16592-01About Local PoliciesLocal poli

Strany 547

14-19User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 14 Network Admission ControlNAC PoliciesAbout Rules, Rule Elements, an

Strany 548

Chapter 14 Network Admission ControlNAC Policies14-20User Guide for Cisco Secure ACS for Windows Server78-16592-01• unsigned integer—The attribu

Strany 549 - PAP Procedure Output

14-21User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 14 Network Admission ControlNAC PoliciesThe following are the operator

Strany 550

Chapter 14 Network Admission ControlNAC Policies14-22User Guide for Cisco Secure ACS for Windows Server78-16592-01–$ (dollar)—The $ operator mat

Strany 551

14-23User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 14 Network Admission ControlNAC Policies• Description—Specifies a text

Strany 552 - EAP-TLS Procedure Output

Chapter 14 Network Admission ControlNAC Policies14-24User Guide for Cisco Secure ACS for Windows Server78-16592-01Note Under Default Rule, the m

Strany 553 - Result Codes

14-25User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 14 Network Admission ControlNAC Policiesappear in the Attribute list.

Strany 554

Chapter 14 Network Admission ControlNAC Policies14-26User Guide for Cisco Secure ACS for Windows Server78-16592-01b. Click Database Configuratio

Strany 555

14-27User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 14 Network Admission ControlNAC PoliciesTip If you want to change a ru

Strany 556

ContentsviUser Guide for Cisco Secure ACS for Windows Server78-16592-01CHAPTER 3 Interface Configuration 3-1Interface Design Concepts 3-2User-to-Grou

Strany 557

Chapter 1 OverviewAAA Server Functions and Concepts1-20User Guide for Cisco Secure ACS for Windows Server78-16592-01AAA client that uses TACACS+.

Strany 558

Chapter 14 Network Admission ControlNAC Policies14-28User Guide for Cisco Secure ACS for Windows Server78-16592-01When Cisco Secure ACS applies

Strany 559

14-29User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 14 Network Admission ControlNAC PoliciesCisco Secure ACS evaluates a p

Strany 560

Chapter 14 Network Admission ControlNAC Policies14-30User Guide for Cisco Secure ACS for Windows Server78-16592-01ACS cannot reach the primary s

Strany 561

14-31User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 14 Network Admission ControlNAC Policies–Password—Specifies the passwo

Strany 562 - Token Server User Databases

Chapter 14 Network Admission ControlNAC Policies14-32User Guide for Cisco Secure ACS for Windows Server78-16592-01• Forwarding Credential Types—

Strany 563 - RADIUS-Enabled Token Servers

14-33User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 14 Network Admission ControlNAC Policiesd. Under Credential Validation

Strany 564

Chapter 14 Network Admission ControlNAC Policies14-34User Guide for Cisco Secure ACS for Windows Server78-16592-01The Select External Policies p

Strany 565

14-35User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 14 Network Admission ControlNAC PoliciesTip If the policy you want to

Strany 566

Chapter 14 Network Admission ControlNAC Policies14-36User Guide for Cisco Secure ACS for Windows Server78-16592-01Deleting a PolicyBefore You Be

Strany 567

14-37User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 14 Network Admission ControlNAC PoliciesStep 5 Click Delete Policy.Ste

Strany 568 - RSA SecurID Token Servers

1-21User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 1 OverviewAAA Server Functions and ConceptsOther Authorization-Related F

Strany 569

Chapter 14 Network Admission ControlNAC Policies14-38User Guide for Cisco Secure ACS for Windows Server78-16592-01

Strany 570

CHAPTER 15-1User Guide for Cisco Secure ACS for Windows Server78-16592-0115Unknown User PolicyAfter you have configured at least one database in the E

Strany 571

Chapter 15 Unknown User PolicyKnown, Unknown, and Discovered Users15-2User Guide for Cisco Secure ACS for Windows Server78-16592-01• Posture Val

Strany 572

15-3User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 15 Unknown User PolicyKnown, Unknown, and Discovered UsersCisco Secure

Strany 573 - Network Admission Control

Chapter 15 Unknown User PolicyAuthentication and Unknown Users15-4User Guide for Cisco Secure ACS for Windows Server78-16592-01–Authentication—T

Strany 574 - NAC AAA Components

15-5User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 15 Unknown User PolicyAuthentication and Unknown UsersThe Unknown User

Strany 575 - Posture Validation

Chapter 15 Unknown User PolicyAuthentication and Unknown Users15-6User Guide for Cisco Secure ACS for Windows Server78-16592-01Note Because user

Strany 576 - Posture Tokens

15-7User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 15 Unknown User PolicyAuthentication and Unknown Userswith various Wind

Strany 577

Chapter 15 Unknown User PolicyAuthentication and Unknown Users15-8User Guide for Cisco Secure ACS for Windows Server78-16592-01Note If your netw

Strany 578

15-9User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 15 Unknown User PolicyAuthentication and Unknown UsersAdded Authenticat

Strany 579

Chapter 1 OverviewAAA Server Functions and Concepts1-22User Guide for Cisco Secure ACS for Windows Server78-16592-01AccountingAAA clients use the

Strany 580

Chapter 15 Unknown User PolicyPosture Validation and the Unknown User Policy15-10User Guide for Cisco Secure ACS for Windows Server78-16592-01Po

Strany 581

15-11User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 15 Unknown User PolicyPosture Validation and the Unknown User PolicyCr

Strany 582 - NAC Databases

Chapter 15 Unknown User PolicyPosture Validation and the Unknown User Policy15-12User Guide for Cisco Secure ACS for Windows Server78-16592-01No

Strany 583

15-13User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 15 Unknown User PolicyAuthorization of Unknown UsersAuthorization of U

Strany 584

Chapter 15 Unknown User PolicyDatabase Search Order15-14User Guide for Cisco Secure ACS for Windows Server78-16592-01• External Databases—Of the

Strany 585 - Policy Selection Options

15-15User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 15 Unknown User PolicyDatabase Search Order• Posture validation—The Un

Strany 586 - Configuring a NAC Database

Chapter 15 Unknown User PolicyConfiguring the Unknown User Policy15-16User Guide for Cisco Secure ACS for Windows Server78-16592-01Tip If you cr

Strany 587

15-17User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 15 Unknown User PolicyDisabling Unknown User AuthenticationNote For mo

Strany 588 - NAC Policies

Chapter 15 Unknown User PolicyDisabling Unknown User Authentication15-18User Guide for Cisco Secure ACS for Windows Server78-16592-01

Strany 589 - Local Policies

CHAPTER 16-1User Guide for Cisco Secure ACS for Windows Server78-16592-0116User Group Mapping and SpecificationThis chapter provides information about

Strany 590 - About Local Policies

1-23User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 1 OverviewAAA Server Functions and ConceptsAdministrationTo configure, m

Strany 591 - NAC Attribute Data Types

Chapter 16 User Group Mapping and SpecificationGroup Mapping by External User Database16-2User Guide for Cisco Secure ACS for Windows Server78-1

Strany 592 - Rule Operators

16-3User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 16 User Group Mapping and SpecificationGroup Mapping by External User D

Strany 593

Chapter 16 User Group Mapping and SpecificationGroup Mapping by Group Set Membership16-4User Guide for Cisco Secure ACS for Windows Server78-165

Strany 594

16-5User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 16 User Group Mapping and SpecificationGroup Mapping by Group Set Membe

Strany 595

Chapter 16 User Group Mapping and SpecificationGroup Mapping by Group Set Membership16-6User Guide for Cisco Secure ACS for Windows Server78-165

Strany 596 - Rule Configuration Options

16-7User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 16 User Group Mapping and SpecificationGroup Mapping by Group Set Membe

Strany 597 - Creating a Local Policy

Chapter 16 User Group Mapping and SpecificationGroup Mapping by Group Set Membership16-8User Guide for Cisco Secure ACS for Windows Server78-165

Strany 598

16-9User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 16 User Group Mapping and SpecificationGroup Mapping by Group Set Membe

Strany 599

Chapter 16 User Group Mapping and SpecificationGroup Mapping by Group Set Membership16-10User Guide for Cisco Secure ACS for Windows Server78-16

Strany 600 - External Policies

16-11User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 16 User Group Mapping and SpecificationGroup Mapping by Group Set Memb

Strany 601

Chapter 1 OverviewAAA Server Functions and Concepts1-24User Guide for Cisco Secure ACS for Windows Server78-16592-01For information about configu

Strany 602

Chapter 16 User Group Mapping and SpecificationGroup Mapping by Group Set Membership16-12User Guide for Cisco Secure ACS for Windows Server78-16

Strany 603

16-13User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 16 User Group Mapping and SpecificationNAC Group MappingThe Order mapp

Strany 604 - Creating an External Policy

Chapter 16 User Group Mapping and SpecificationRADIUS-Based Group Specification16-14User Guide for Cisco Secure ACS for Windows Server78-16592-0

Strany 605

16-15User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 16 User Group Mapping and SpecificationRADIUS-Based Group Specificatio

Strany 606 - Editing a Policy

Chapter 16 User Group Mapping and SpecificationRADIUS-Based Group Specification16-16User Guide for Cisco Secure ACS for Windows Server78-16592-0

Strany 607

A-1User Guide for Cisco Secure ACS for Windows Server78-16592-01APPENDIXATroubleshootingThis appendix provides information about certain basic proble

Strany 608 - Deleting a Policy

Appendix A TroubleshootingAdministration IssuesA-2User Guide for Cisco Secure ACS for Windows Server78-16592-01Administration IssuesCondition Re

Strany 609 - Step 6 Click Submit

A-3User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix A TroubleshootingAdministration IssuesAdministrator configured for even

Strany 610

Appendix A TroubleshootingBrowser IssuesA-4User Guide for Cisco Secure ACS for Windows Server78-16592-01Browser IssuesCondition Recovery ActionT

Strany 611 - Unknown User Policy

A-5User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix A TroubleshootingCisco IOS IssuesCisco IOS IssuesCondition Recovery Act

Strany 612

1-25User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 1 OverviewCisco Secure ACS HTML Interface• CSMonitor service, providing

Strany 613

Appendix A TroubleshootingCisco IOS IssuesA-6User Guide for Cisco Secure ACS for Windows Server78-16592-01Under EXEC Commands, Cisco IOS command

Strany 614

A-7User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix A TroubleshootingDatabase IssuesDatabase IssuesCondition Recovery Actio

Strany 615

Appendix A TroubleshootingDatabase IssuesA-8User Guide for Cisco Secure ACS for Windows Server78-16592-01External databases not operating proper

Strany 616

A-9User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix A TroubleshootingDatabase IssuesUnable to authenticate against the Nove

Strany 617 - \username. The

Appendix A TroubleshootingDial-in Connection IssuesA-10User Guide for Cisco Secure ACS for Windows Server78-16592-01Dial-in Connection IssuesCon

Strany 618

A-11User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix A TroubleshootingDial-in Connection IssuesA dial-in user cannot connec

Strany 619 - Added Authentication Latency

Appendix A TroubleshootingDial-in Connection IssuesA-12User Guide for Cisco Secure ACS for Windows Server78-16592-01A dial-in user cannot connec

Strany 620 - :username

A-13User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix A TroubleshootingDial-in Connection IssuesA dial-in user cannot connec

Strany 621

Appendix A TroubleshootingDebug IssuesA-14User Guide for Cisco Secure ACS for Windows Server78-16592-01Debug IssuesCondition Recovery ActionWhen

Strany 622

A-15User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix A TroubleshootingProxy IssuesProxy IssuesCondition Recovery ActionProx

Strany 623 - Unknown User Policy Options

Chapter 1 OverviewCisco Secure ACS HTML Interface1-26User Guide for Cisco Secure ACS for Windows Server78-16592-01This section contains the follo

Strany 624 - Database Search Order

Appendix A TroubleshootingInstallation and Upgrade IssuesA-16User Guide for Cisco Secure ACS for Windows Server78-16592-01Installation and Upgra

Strany 625

A-17User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix A TroubleshootingReport IssuesReport IssuesCondition Recovery ActionTh

Strany 626

Appendix A TroubleshootingReport IssuesA-18User Guide for Cisco Secure ACS for Windows Server78-16592-01The Logged in Users report works with so

Strany 627

A-19User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix A TroubleshootingThird-Party Server IssuesThird-Party Server IssuesCon

Strany 628

Appendix A TroubleshootingUser Authentication IssuesA-20User Guide for Cisco Secure ACS for Windows Server78-16592-01User Authentication IssuesC

Strany 629 - Specification

A-21User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix A TroubleshootingUser Authentication IssuesAuthentication fails; the e

Strany 630

Appendix A TroubleshootingTACACS+ and RADIUS Attribute IssuesA-22User Guide for Cisco Secure ACS for Windows Server78-16592-01TACACS+ and RADIUS

Strany 631

B-1User Guide for Cisco Secure ACS for Windows Server78-16592-01APPENDIXBTACACS+ Attribute-Value PairsCisco Secure Access Control Server (ACS) for Wi

Strany 632 - • Generic LDAP

Appendix B TACACS+ Attribute-Value PairsCisco IOS AV Pair DictionaryB-2User Guide for Cisco Secure ACS for Windows Server78-16592-01TACACS+ AV P

Strany 633 - Group Mapping Order

B-3User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix B TACACS+ Attribute-Value PairsCisco IOS AV Pair Dictionary• ip-address

Strany 634

1-27User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 1 OverviewCisco Secure ACS HTML InterfaceAdministrative sessions timeout

Strany 635

Appendix B TACACS+ Attribute-Value PairsCisco IOS AV Pair DictionaryB-4User Guide for Cisco Secure ACS for Windows Server78-16592-01• wins-serve

Strany 636

B-5User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix B TACACS+ Attribute-Value PairsCisco IOS AV Pair Dictionary• protocol•

Strany 637

Appendix B TACACS+ Attribute-Value PairsCisco IOS AV Pair DictionaryB-6User Guide for Cisco Secure ACS for Windows Server78-16592-01

Strany 638

C-1User Guide for Cisco Secure ACS for Windows Server78-16592-01APPENDIXCRADIUS AttributesCisco Secure Access Control Server (ACS) for Windows Server

Strany 639

Appendix C RADIUS AttributesCisco IOS Dictionary of RADIUS AV PairsC-2User Guide for Cisco Secure ACS for Windows Server78-16592-013. In the pro

Strany 640

C-3User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix C RADIUS AttributesCisco IOS Dictionary of RADIUS AV PairsNote If you s

Strany 641 - NAC Group Mapping

Appendix C RADIUS AttributesCisco IOS Dictionary of RADIUS AV PairsC-4User Guide for Cisco Secure ACS for Windows Server78-16592-0113 Framed-Com

Strany 642

C-5User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix C RADIUS AttributesCisco IOS/PIX Dictionary of RADIUS VSAsCisco IOS/PIX

Strany 643

Appendix C RADIUS AttributesCisco IOS/PIX Dictionary of RADIUS VSAsC-6User Guide for Cisco Secure ACS for Windows Server78-16592-0124 cisco-h323

Strany 644

C-7User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix C RADIUS AttributesAbout the cisco-av-pair RADUIS AttributeAbout the ci

Strany 645 - Troubleshooting

Chapter 1 OverviewCisco Secure ACS HTML Interface1-28User Guide for Cisco Secure ACS for Windows Server78-16592-01advanced features such as datab

Strany 646 - Administration Issues

Appendix C RADIUS AttributesAbout the cisco-av-pair RADUIS AttributeC-8User Guide for Cisco Secure ACS for Windows Server78-16592-01In IOS, supp

Strany 647

C-9User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix C RADIUS AttributesCisco VPN 3000 Concentrator Dictionary of RADIUS VSA

Strany 648 - Browser Issues

Appendix C RADIUS AttributesCisco VPN 3000 Concentrator Dictionary of RADIUS VSAsC-10User Guide for Cisco Secure ACS for Windows Server78-16592-

Strany 649 - Cisco IOS Issues

C-11User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix C RADIUS AttributesCisco VPN 3000 Concentrator Dictionary of RADIUS VS

Strany 650

Appendix C RADIUS AttributesCisco VPN 3000 Concentrator Dictionary of RADIUS VSAsC-12User Guide for Cisco Secure ACS for Windows Server78-16592-

Strany 651 - Database Issues

C-13User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix C RADIUS AttributesCisco VPN 5000 Concentrator Dictionary of RADIUS VS

Strany 652

Appendix C RADIUS AttributesCisco Building Broadband Service Manager Dictionary of RADIUS VSAC-14User Guide for Cisco Secure ACS for Windows Ser

Strany 653

C-15User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix C RADIUS AttributesIETF Dictionary of RADIUS AV Pairs5 NAS-Port Physic

Strany 654 - Dial-in Connection Issues

Appendix C RADIUS AttributesIETF Dictionary of RADIUS AV PairsC-16User Guide for Cisco Secure ACS for Windows Server78-16592-016 Service-Type Ty

Strany 655

C-17User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix C RADIUS AttributesIETF Dictionary of RADIUS AV Pairs10 Framed-Routing

Strany 656

1-29User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 1 OverviewCisco Secure ACS HTML Interface–Online Help—Displays basic hel

Strany 657

Appendix C RADIUS AttributesIETF Dictionary of RADIUS AV PairsC-18User Guide for Cisco Secure ACS for Windows Server78-16592-0115 Login-Service

Strany 658 - Debug Issues

C-19User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix C RADIUS AttributesIETF Dictionary of RADIUS AV Pairs24 State Allows S

Strany 659 - Proxy Issues

Appendix C RADIUS AttributesIETF Dictionary of RADIUS AV PairsC-20User Guide for Cisco Secure ACS for Windows Server78-16592-0128 Idle-Timeout M

Strany 660 - MaxSessions Issues

C-21User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix C RADIUS AttributesIETF Dictionary of RADIUS AV Pairs34 Login-LAT-Serv

Strany 661 - Report Issues

Appendix C RADIUS AttributesIETF Dictionary of RADIUS AV PairsC-22User Guide for Cisco Secure ACS for Windows Server78-16592-0144 Acct-Session-I

Strany 662

C-23User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix C RADIUS AttributesIETF Dictionary of RADIUS AV Pairs49 Acct-Terminate

Strany 663 - Third-Party Server Issues

Appendix C RADIUS AttributesIETF Dictionary of RADIUS AV PairsC-24User Guide for Cisco Secure ACS for Windows Server78-16592-0152 Acct-Input-Gig

Strany 664 - User Authentication Issues

C-25User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix C RADIUS AttributesIETF Dictionary of RADIUS AV Pairs66 Tunnel-Client-

Strany 665 - • If you have RADIUS/TACACS

Appendix C RADIUS AttributesIETF Dictionary of RADIUS AV PairsC-26User Guide for Cisco Secure ACS for Windows Server78-16592-0181 Tunnel-Private

Strany 666 - Note Some attributes are not

C-27User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix C RADIUS AttributesIETF Dictionary of RADIUS AV Pairs193 Pre-Output-Pa

Strany 667 - TACACS+ Attribute-Value Pairs

viiUser Guide for Cisco Secure ACS for Windows Server78-16592-01ContentsAAA Client Configuration 4-11AAA Client Configuration Options 4-11Adding a AA

Strany 668 - TACACS+ AV Pairs

Chapter 1 OverviewCisco Secure ACS HTML Interface1-30User Guide for Cisco Secure ACS for Windows Server78-16592-01If SSL is enabled and you do no

Strany 669 - Cisco IOS AV Pair Dictionary

Appendix C RADIUS AttributesMicrosoft MPPE Dictionary of RADIUS VSAsC-28User Guide for Cisco Secure ACS for Windows Server78-16592-01Microsoft M

Strany 670 - TACACS+ Accounting AV Pairs

C-29User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix C RADIUS AttributesMicrosoft MPPE Dictionary of RADIUS VSAs5MS-CHAP-LM

Strany 671

Appendix C RADIUS AttributesMicrosoft MPPE Dictionary of RADIUS VSAsC-30User Guide for Cisco Secure ACS for Windows Server78-16592-0112 MS-CHAP-

Strany 672

C-31User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix C RADIUS AttributesAscend Dictionary of RADIUS AV PairsAscend Dictiona

Strany 673

Appendix C RADIUS AttributesAscend Dictionary of RADIUS AV PairsC-32User Guide for Cisco Secure ACS for Windows Server78-16592-016 Service-Type

Strany 674

C-33User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix C RADIUS AttributesAscend Dictionary of RADIUS AV Pairs44 Acct-Session

Strany 675

Appendix C RADIUS AttributesAscend Dictionary of RADIUS AV PairsC-34User Guide for Cisco Secure ACS for Windows Server78-16592-01112 Ascend-CBCP

Strany 676

C-35User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix C RADIUS AttributesAscend Dictionary of RADIUS AV Pairs128 Ascend-Shar

Strany 677

Appendix C RADIUS AttributesAscend Dictionary of RADIUS AV PairsC-36User Guide for Cisco Secure ACS for Windows Server78-16592-01145 Ascend-Assi

Strany 678

C-37User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix C RADIUS AttributesAscend Dictionary of RADIUS AV PairsFrame Datalink

Strany 679

1-31User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 1 OverviewCisco Secure ACS HTML InterfaceAlso, IP filtering of proxied a

Strany 680

Appendix C RADIUS AttributesAscend Dictionary of RADIUS AV PairsC-38User Guide for Cisco Secure ACS for Windows Server78-16592-01170 Ascend-TS-I

Strany 681

C-39User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix C RADIUS AttributesAscend Dictionary of RADIUS AV Pairs185 Ascend-Home

Strany 682

Appendix C RADIUS AttributesAscend Dictionary of RADIUS AV PairsC-40User Guide for Cisco Secure ACS for Windows Server78-16592-01205 Ascend-Menu

Strany 683

C-41User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix C RADIUS AttributesAscend Dictionary of RADIUS AV Pairs221 Ascend-FR-D

Strany 684

Appendix C RADIUS AttributesAscend Dictionary of RADIUS AV PairsC-42User Guide for Cisco Secure ACS for Windows Server78-16592-01238 Ascend-Seco

Strany 685

C-43User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix C RADIUS AttributesNortel Dictionary of RADIUS VSAsNortel Dictionary o

Strany 686 - Dictionary of RADIUS VSA

Appendix C RADIUS AttributesJuniper Dictionary of RADIUS VSAsC-44User Guide for Cisco Secure ACS for Windows Server78-16592-01Juniper Dictionary

Strany 687

D-1User Guide for Cisco Secure ACS for Windows Server78-16592-01APPENDIXDCSUtil Database UtilityThis appendix details the Cisco Secure Access Control

Strany 688

Appendix D CSUtil Database UtilityLocation of CSUtil.exe and Related FilesD-2User Guide for Cisco Secure ACS for Windows Server78-16592-01• Expo

Strany 689

D-3User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix D CSUtil Database UtilityCSUtil.exe OptionsNote Most CSUtil.exe options

Strany 690

Chapter 1 OverviewCisco Secure ACS HTML Interface1-32User Guide for Cisco Secure ACS for Windows Server78-16592-01If Cisco Secure ACS is behind a

Strany 691

Appendix D CSUtil Database UtilityCSUtil.exe OptionsD-4User Guide for Cisco Secure ACS for Windows Server78-16592-01• -i—Import user or AAA clie

Strany 692

D-5User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix D CSUtil Database UtilityDisplaying Command-Line Syntax• -listUDV—List

Strany 693

Appendix D CSUtil Database UtilityBacking Up Cisco Secure ACS with CSUtil.exeD-6User Guide for Cisco Secure ACS for Windows Server78-16592-01Bac

Strany 694

D-7User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix D CSUtil Database UtilityRestoring Cisco Secure ACS with CSUtil.exeRest

Strany 695

Appendix D CSUtil Database UtilityCreating a CiscoSecure User DatabaseD-8User Guide for Cisco Secure ACS for Windows Server78-16592-01• To resto

Strany 696

D-9User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix D CSUtil Database UtilityCreating a CiscoSecure User DatabaseTo create

Strany 697

Appendix D CSUtil Database UtilityCreating a Cisco Secure ACS Database Dump FileD-10User Guide for Cisco Secure ACS for Windows Server78-16592-0

Strany 698

D-11User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix D CSUtil Database UtilityLoading the Cisco Secure ACS Database from a

Strany 699

Appendix D CSUtil Database UtilityCompacting the CiscoSecure User DatabaseD-12User Guide for Cisco Secure ACS for Windows Server78-16592-01Step

Strany 700 - • Ascend

D-13User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix D CSUtil Database UtilityCompacting the CiscoSecure User DatabaseCompa

Strany 701

1-33User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 1 OverviewCisco Secure ACS HTML InterfaceStep 2 In the Address or Locati

Strany 702 - Note The MS-CHAP-MPPE-Keys

Appendix D CSUtil Database UtilityUser and AAA Client Import OptionD-14User Guide for Cisco Secure ACS for Windows Server78-16592-01If you do no

Strany 703

D-15User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix D CSUtil Database UtilityUser and AAA Client Import OptionImporting Us

Strany 704

Appendix D CSUtil Database UtilityUser and AAA Client Import OptionD-16User Guide for Cisco Secure ACS for Windows Server78-16592-01b. To start

Strany 705

D-17User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix D CSUtil Database UtilityUser and AAA Client Import OptionAbout User a

Strany 706

Appendix D CSUtil Database UtilityUser and AAA Client Import OptionD-18User Guide for Cisco Secure ACS for Windows Server78-16592-01ADD Statemen

Strany 707

D-19User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix D CSUtil Database UtilityUser and AAA Client Import OptionFor example,

Strany 708

Appendix D CSUtil Database UtilityUser and AAA Client Import OptionD-20User Guide for Cisco Secure ACS for Windows Server78-16592-01Table D-3 UP

Strany 709

D-21User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix D CSUtil Database UtilityUser and AAA Client Import OptionFor example,

Strany 710

Appendix D CSUtil Database UtilityUser and AAA Client Import OptionD-22User Guide for Cisco Secure ACS for Windows Server78-16592-01Table D-5 AD

Strany 711

D-23User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix D CSUtil Database UtilityUser and AAA Client Import OptionFor example,

Strany 712

Chapter 1 OverviewCisco Secure ACS HTML Interface1-34User Guide for Cisco Secure ACS for Windows Server78-16592-01Using Online HelpOnline help is

Strany 713

Appendix D CSUtil Database UtilityExporting User List to a Text FileD-24User Guide for Cisco Secure ACS for Windows Server78-16592-01Import File

Strany 714

D-25User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix D CSUtil Database UtilityExporting Group Information to a Text FileSte

Strany 715 - Table C-9 Nortel RADIUS VSAs

Appendix D CSUtil Database UtilityExporting Registry Information to a Text FileD-26User Guide for Cisco Secure ACS for Windows Server78-16592-01

Strany 716

D-27User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix D CSUtil Database UtilityDecoding Error NumbersCSUtil.exe exports Wind

Strany 717 - CSUtil Database Utility

Appendix D CSUtil Database UtilityRecalculating CRC ValuesD-28User Guide for Cisco Secure ACS for Windows Server78-16592-01Step 2 Type:CSUtil.ex

Strany 718 - CSUtil.exe Syntax

D-29User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix D CSUtil Database UtilityUser-Defined RADIUS Vendors and VSA SetsAbout

Strany 719 - CSUtil.exe Options

Appendix D CSUtil Database UtilityUser-Defined RADIUS Vendors and VSA SetsD-30User Guide for Cisco Secure ACS for Windows Server78-16592-01Befor

Strany 720

D-31User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix D CSUtil Database UtilityUser-Defined RADIUS Vendors and VSA SetsNote

Strany 721 - CSUtil.exe -x

Appendix D CSUtil Database UtilityUser-Defined RADIUS Vendors and VSA SetsD-32User Guide for Cisco Secure ACS for Windows Server78-16592-01Step

Strany 722 - Step 2 Type:

D-33User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix D CSUtil Database UtilityUser-Defined RADIUS Vendors and VSA SetsStep

Strany 723

1-35User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 1 OverviewCisco Secure ACS HTML InterfaceTo access online documentation,

Strany 724 - CSUtil.exe -r config filename

Appendix D CSUtil Database UtilityUser-Defined RADIUS Vendors and VSA SetsD-34User Guide for Cisco Secure ACS for Windows Server78-16592-01Step

Strany 725

D-35User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix D CSUtil Database UtilityUser-Defined RADIUS Vendors and VSA SetsVendo

Strany 726 - Step 3 Type:

Appendix D CSUtil Database UtilityUser-Defined RADIUS Vendors and VSA SetsD-36User Guide for Cisco Secure ACS for Windows Server78-16592-01For e

Strany 727 - Dump File

D-37User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix D CSUtil Database UtilityUser-Defined RADIUS Vendors and VSA SetsTable

Strany 728

Appendix D CSUtil Database UtilityUser-Defined RADIUS Vendors and VSA SetsD-38User Guide for Cisco Secure ACS for Windows Server78-16592-01For e

Strany 729

D-39User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix D CSUtil Database UtilityUser-Defined RADIUS Vendors and VSA SetsFor e

Strany 730

Appendix D CSUtil Database UtilityPAC File GenerationD-40User Guide for Cisco Secure ACS for Windows Server78-16592-01VSA 2=widget-admin-interfa

Strany 731

D-41User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix D CSUtil Database UtilityPAC File GenerationPAC File Options and Examp

Strany 732

Appendix D CSUtil Database UtilityPAC File GenerationD-42User Guide for Cisco Secure ACS for Windows Server78-16592-01–-f list—CSUtil.exe genera

Strany 733 - ONLINE or OFFLINE Statement

D-43User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix D CSUtil Database UtilityPAC File GenerationGenerating PAC FilesNote I

Strany 734 - ADD Statements

Chapter 1 OverviewCisco Secure ACS HTML Interface1-36User Guide for Cisco Secure ACS for Windows Server78-16592-01

Strany 735 - UPDATE Statements

Appendix D CSUtil Database UtilityPosture Validation AttributesD-44User Guide for Cisco Secure ACS for Windows Server78-16592-01If you specified

Strany 736

D-45User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix D CSUtil Database UtilityPosture Validation AttributesExample D-1 show

Strany 737 - ADD_NAS Statements

Appendix D CSUtil Database UtilityPosture Validation AttributesD-46User Guide for Cisco Secure ACS for Windows Server78-16592-01Vendor IDs have

Strany 738

D-47User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix D CSUtil Database UtilityPosture Validation Attributes• attribute-name

Strany 739 - DEL_NAS Statements

Appendix D CSUtil Database UtilityPosture Validation AttributesD-48User Guide for Cisco Secure ACS for Windows Server78-16592-01–date–version–oc

Strany 740 - Import File Example

D-49User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix D CSUtil Database UtilityPosture Validation Attributes• To preserve th

Strany 741

Appendix D CSUtil Database UtilityPosture Validation AttributesD-50User Guide for Cisco Secure ACS for Windows Server78-16592-01Tip When you spe

Strany 742

D-51User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix D CSUtil Database UtilityPosture Validation AttributesDeleting a Postu

Strany 743 - Decoding Error Numbers

Appendix D CSUtil Database UtilityPosture Validation AttributesD-52User Guide for Cisco Secure ACS for Windows Server78-16592-01CSUtil v3.3, Cop

Strany 744 - Recalculating CRC Values

D-53User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix D CSUtil Database UtilityPosture Validation Attributesattribute-name=A

Strany 745

CHAPTER 2-1User Guide for Cisco Secure ACS for Windows Server78-16592-012Deployment ConsiderationsDeployment of Cisco Secure ACS for Windows Server ca

Strany 746

Appendix D CSUtil Database UtilityPosture Validation AttributesD-54User Guide for Cisco Secure ACS for Windows Server78-16592-01application-name

Strany 747

D-55User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix D CSUtil Database UtilityPosture Validation Attributesvendor-name=Cisc

Strany 748 - Listing Custom RADIUS Vendors

Appendix D CSUtil Database UtilityPosture Validation AttributesD-56User Guide for Cisco Secure ACS for Windows Server78-16592-01[attr#15]vendor-

Strany 749

D-57User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix D CSUtil Database UtilityPosture Validation Attributesattribute-type=u

Strany 750 - RADIUS Vendor/VSA Import File

Appendix D CSUtil Database UtilityPosture Validation AttributesD-58User Guide for Cisco Secure ACS for Windows Server78-16592-01attribute-name=S

Strany 751 - Vendor and VSA Set Definition

D-59User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix D CSUtil Database UtilityPosture Validation Attributesapplication-name

Strany 752 - Attribute Definition

Appendix D CSUtil Database UtilityPosture Validation AttributesD-60User Guide for Cisco Secure ACS for Windows Server78-16592-01vendor-name=NAIa

Strany 753

D-61User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix D CSUtil Database UtilityPosture Validation Attributes[attr#39]vendor-

Strany 754 - Enumeration Definition

Appendix D CSUtil Database UtilityPosture Validation AttributesD-62User Guide for Cisco Secure ACS for Windows Server78-16592-01attribute-type=v

Strany 755

D-63User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix D CSUtil Database UtilityPosture Validation Attributesattribute-name=A

Strany 756 - PAC File Generation

Chapter 2 Deployment ConsiderationsBasic Deployment Requirements for Cisco Secure ACS2-2User Guide for Cisco Secure ACS for Windows Server78-165

Strany 757 - PAC File Options and Examples

Appendix D CSUtil Database UtilityPosture Validation AttributesD-64User Guide for Cisco Secure ACS for Windows Server78-16592-01

Strany 758

E-1User Guide for Cisco Secure ACS for Windows Server78-16592-01APPENDIXEVPDN ProcessingCisco Secure ACS for Windows Server supports authentication f

Strany 759 - Generating PAC Files

Appendix E VPDN ProcessingVPDN ProcessE-2User Guide for Cisco Secure ACS for Windows Server78-16592-01Figure E-1 VPDN User Dials In2. If VPDN is

Strany 760 - Posture Validation Attributes

E-3User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix E VPDN ProcessingVPDN ProcessFigure E-3 Authorization of Domain FailsIf

Strany 761

Appendix E VPDN ProcessingVPDN ProcessE-4User Guide for Cisco Secure ACS for Windows Server78-16592-01Figure E-5 HG Authenticates Tunnel with AC

Strany 762

E-5User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix E VPDN ProcessingVPDN ProcessFigure E-7 NAS Authenticates Tunnel with A

Strany 763

Appendix E VPDN ProcessingVPDN ProcessE-6User Guide for Cisco Secure ACS for Windows Server78-16592-01Figure E-9 HG Uses ACS to Authenticate Use

Strany 764

F-1User Guide for Cisco Secure ACS for Windows Server78-16592-01APPENDIXFRDBMS Synchronization Import DefinitionsRDBMS synchronization import definit

Strany 765 - CSUtil.exe -addavp filename

Appendix F RDBMS Synchronization Import DefinitionsaccountActions SpecificationF-2User Guide for Cisco Secure ACS for Windows Server78-16592-01a

Strany 766

F-3User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix F RDBMS Synchronization Import DefinitionsaccountActions Specificationa

Strany 767 - CSUtil.exe -delavp vendor-ID

2-3User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 2 Deployment ConsiderationsBasic Deployment Requirements for Cisco Secur

Strany 768

Appendix F RDBMS Synchronization Import DefinitionsAction CodesF-4User Guide for Cisco Secure ACS for Windows Server78-16592-01accountActions Pr

Strany 769

F-5User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix F RDBMS Synchronization Import DefinitionsAction CodesIf an action can

Strany 770

Appendix F RDBMS Synchronization Import DefinitionsAction CodesF-6User Guide for Cisco Secure ACS for Windows Server78-16592-01Table F-2 Action

Strany 771

F-7User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix F RDBMS Synchronization Import DefinitionsAction CodesAction Codes for

Strany 772

Appendix F RDBMS Synchronization Import DefinitionsAction CodesF-8User Guide for Cisco Secure ACS for Windows Server78-16592-01105 SET_T+_ENABLE

Strany 773

F-9User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix F RDBMS Synchronization Import DefinitionsAction Codes108 SET_PASS_TYPE

Strany 774

Appendix F RDBMS Synchronization Import DefinitionsAction CodesF-10User Guide for Cisco Secure ACS for Windows Server78-16592-01110 ADD_PASS_STA

Strany 775

F-11User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix F RDBMS Synchronization Import DefinitionsAction Codes115 SET_MAX_SESS

Strany 776

Appendix F RDBMS Synchronization Import DefinitionsAction CodesF-12User Guide for Cisco Secure ACS for Windows Server78-16592-01261 DISABLE_QUOT

Strany 777

F-13User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix F RDBMS Synchronization Import DefinitionsAction Codes270 SET_DCS_TYPE

Strany 778

ContentsviiiUser Guide for Cisco Secure ACS for Windows Server78-16592-01Deleting a Network Access Filter 5-7Downloadable IP ACLs 5-7About Downloadab

Strany 779

Chapter 2 Deployment ConsiderationsBasic Deployment Requirements for Cisco Secure ACS2-4User Guide for Cisco Secure ACS for Windows Server78-165

Strany 780

Appendix F RDBMS Synchronization Import DefinitionsAction CodesF-14User Guide for Cisco Secure ACS for Windows Server78-16592-01Action Codes for

Strany 781 - VPDN Processing

F-15User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix F RDBMS Synchronization Import DefinitionsAction CodesTransactions usi

Strany 782 - VPDN Process

Appendix F RDBMS Synchronization Import DefinitionsAction CodesF-16User Guide for Cisco Secure ACS for Windows Server78-16592-01123 ADD_DIAL_ACC

Strany 783

F-17User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix F RDBMS Synchronization Import DefinitionsAction Codes140 SET_TODDOW_A

Strany 784

Appendix F RDBMS Synchronization Import DefinitionsAction CodesF-18User Guide for Cisco Secure ACS for Windows Server78-16592-01150 SET_STATIC_I

Strany 785

F-19User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix F RDBMS Synchronization Import DefinitionsAction CodesAction Codes for

Strany 786 - Figure E-10

Appendix F RDBMS Synchronization Import DefinitionsAction CodesF-20User Guide for Cisco Secure ACS for Windows Server78-16592-01163 ADD_RADIUS_

Strany 787 - Definitions

F-21User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix F RDBMS Synchronization Import DefinitionsAction Codes170 ADD_TACACS_S

Strany 788

Appendix F RDBMS Synchronization Import DefinitionsAction CodesF-22User Guide for Cisco Secure ACS for Windows Server78-16592-01172 ADD_TACACS_A

Strany 789

F-23User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix F RDBMS Synchronization Import DefinitionsAction Codes174 ADD_IOS_COMM

Strany 790 - Action Codes

2-5User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 2 Deployment ConsiderationsBasic Deployment Requirements for Cisco Secur

Strany 791

Appendix F RDBMS Synchronization Import DefinitionsAction CodesF-24User Guide for Cisco Secure ACS for Windows Server78-16592-01176 ADD_IOS_COMM

Strany 792

F-25User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix F RDBMS Synchronization Import DefinitionsAction CodesAction Codes for

Strany 793

Appendix F RDBMS Synchronization Import DefinitionsAction CodesF-26User Guide for Cisco Secure ACS for Windows Server78-16592-01Table F-6 Action

Strany 794

F-27User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix F RDBMS Synchronization Import DefinitionsAction Codes221 SET_NAS_FLAG

Strany 795

Appendix F RDBMS Synchronization Import DefinitionsAction CodesF-28User Guide for Cisco Secure ACS for Windows Server78-16592-01233 SET_AAA_TRAF

Strany 796

F-29User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix F RDBMS Synchronization Import DefinitionsAction Codes250 ADD_NDG VN C

Strany 797

Appendix F RDBMS Synchronization Import DefinitionsAction CodesF-30User Guide for Cisco Secure ACS for Windows Server78-16592-01351 DEL_UDV V1 R

Strany 798

F-31User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix F RDBMS Synchronization Import DefinitionsAction Codes353 SET_VSA_PROF

Strany 799 - PIX Shell (pixshell)

Appendix F RDBMS Synchronization Import DefinitionsCisco Secure ACS Attributes and Action CodesF-32User Guide for Cisco Secure ACS for Windows S

Strany 800

F-33User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix F RDBMS Synchronization Import DefinitionsCisco Secure ACS Attributes

Strany 801 - NAS01,tty0,0898-69696969

Chapter 2 Deployment ConsiderationsBasic Deployment Factors for Cisco Secure ACS2-6User Guide for Cisco Secure ACS for Windows Server78-16592-01

Strany 802

Appendix F RDBMS Synchronization Import DefinitionsCisco Secure ACS Attributes and Action CodesF-34User Guide for Cisco Secure ACS for Windows S

Strany 803

F-35User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix F RDBMS Synchronization Import DefinitionsCisco Secure ACS Attributes

Strany 804

Appendix F RDBMS Synchronization Import DefinitionsAn Example of accountActionsF-36User Guide for Cisco Secure ACS for Windows Server78-16592-01

Strany 805 - User Settings

F-37User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix F RDBMS Synchronization Import DefinitionsAn Example of accountActions

Strany 806

Appendix F RDBMS Synchronization Import DefinitionsAn Example of accountActionsF-38User Guide for Cisco Secure ACS for Windows Server78-16592-01

Strany 807

G-1User Guide for Cisco Secure ACS for Windows Server78-16592-01APPENDIXGInternal ArchitectureThis chapter describes the Cisco Secure ACS for Windows

Strany 808

Appendix G Internal ArchitectureWindows RegistryG-2User Guide for Cisco Secure ACS for Windows Server78-16592-01• CSMon• CSTacacs• CSRadiusYou c

Strany 809

G-3User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix G Internal ArchitectureCSAuthin the HTTP Port Allocation feature, you s

Strany 810

Appendix G Internal ArchitectureCSDBSyncG-4User Guide for Cisco Secure ACS for Windows Server78-16592-01password-aging information. The authoriz

Strany 811

G-5User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix G Internal ArchitectureCSMonNote CSMon is not intended as a replacement

Strany 812

2-7User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 2 Deployment ConsiderationsBasic Deployment Factors for Cisco Secure ACS

Strany 813

Appendix G Internal ArchitectureCSMonG-6User Guide for Cisco Secure ACS for Windows Server78-16592-01build up a “picture” of expected response t

Strany 814

G-7User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix G Internal ArchitectureCSMonNotificationCSMon can be configured to noti

Strany 815

Appendix G Internal ArchitectureCSTacacs and CSRadiusG-8User Guide for Cisco Secure ACS for Windows Server78-16592-01If the event is a warning e

Strany 816

IN-1User Guide for Cisco Secure ACS for Windows Server78-16592-01INDEXAAAASee also AAA clientsSee also AAA serversdefinition1-2pools for IP address a

Strany 817

IndexIN-2User Guide for Cisco Secure ACS for Windows Server78-16592-01accountingSee also loggingoverview1-22ACLsSee downloadable IP ACLsaction codesf

Strany 818 - User-Specific Attributes

IN-3User Guide for Cisco Secure ACS for Windows Server78-16592-01Indexprotocol supported 1-11Architecture G-1ASCII/PAPcompatible databases1-10protoco

Strany 819

IndexIN-4User Guide for Cisco Secure ACS for Windows Server78-16592-01browsersSee also HTML interfacetroubleshootingA-4Ccached usersSee discovered us

Strany 820 - User-Defined Attributes

IN-5User Guide for Cisco Secure ACS for Windows Server78-16592-01IndexCisco Secure ACS backupsSee backupsCisco Secure ACS system restoreSee restoreCi

Strany 821 - Group-Specific Attributes

IndexIN-6User Guide for Cisco Secure ACS for Windows Server78-16592-01displaying syntax D-5import text file (example) D-24overview D-1CSV (comma-sepa

Strany 822 - An Example of accountActions

IN-7User Guide for Cisco Secure ACS for Windows Server78-16592-01IndexSee RADIUS user databasesSee RSA user databasesunknown users15-1user databases

Strany 823

Chapter 2 Deployment ConsiderationsBasic Deployment Factors for Cisco Secure ACS2-8User Guide for Cisco Secure ACS for Windows Server78-16592-01

Strany 824

IndexIN-8User Guide for Cisco Secure ACS for Windows Server78-16592-01Domain Listconfiguring13-30inadvertent user lockouts 13-14, 13-27overview 13-13

Strany 825 - Internal Architecture

IN-9User Guide for Cisco Secure ACS for Windows Server78-16592-01Indexenable password options for TACACS+ 7-35enable privilege options for groups 6-1

Strany 826 - Windows Registry

IndexIN-10User Guide for Cisco Secure ACS for Windows Server78-16592-01supported protocols 1-10Global Authentication Setup 10-33grant dial-in permiss

Strany 827

IN-11User Guide for Cisco Secure ACS for Windows Server78-16592-01IndexHelp 1-29host system state G-5HTML interfaceSee also Interface Configurationen

Strany 828 - CSDBSync

IndexIN-12User Guide for Cisco Secure ACS for Windows Server78-16592-01LDAPSee generic LDAP user databasesLEAP proxy RADIUS user databasesconfiguring

Strany 829 - Monitoring

IN-13User Guide for Cisco Secure ACS for Windows Server78-16592-01Indexloginsgreeting upon6-24password aging dependency 6-23logsSee loggingSee Report

Strany 830 - Recording

IndexIN-14User Guide for Cisco Secure ACS for Windows Server78-16592-01definition of 14-10group mapping 16-13implementing 14-5introduction 1-25loggin

Strany 831 - Response

IN-15User Guide for Cisco Secure ACS for Windows Server78-16592-01IndexNetwork Admission ControlSee NACnetwork configuration4-1network device groupsa

Strany 832 - CSTacacs and CSRadius

IndexIN-16User Guide for Cisco Secure ACS for Windows Server78-16592-01EAP-TLS 13-68PAP 13-65vs. group mappings 16-3PAP authentication sample procedu

Strany 833

IN-17User Guide for Cisco Secure ACS for Windows Server78-16592-01Indexoutbound passwords 1-15separate passwords 1-14single password 1-14token cachin

Strany 834

2-9User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 2 Deployment ConsiderationsBasic Deployment Factors for Cisco Secure ACS

Strany 835

IndexIN-18User Guide for Cisco Secure ACS for Windows Server78-16592-01PPP password aging 6-21privilegesSee administratorsprocessor utilizationG-5pro

Strany 836

IN-19User Guide for Cisco Secure ACS for Windows Server78-16592-01Indextoken servers 13-79troubleshooting A-22tunneling packets 4-18vs. TACACS+ 1-6RA

Strany 837

IndexIN-20User Guide for Cisco Secure ACS for Windows Server78-16592-01in User Setup 7-49supported attributes C-43overview C-1user-definedabout9-28,

Strany 838

IN-21User Guide for Cisco Secure ACS for Windows Server78-16592-01Indexexternal user databases 9-2frequency 9-7group mappings 9-2immediate 9-19implem

Strany 839

IndexIN-22User Guide for Cisco Secure ACS for Windows Server78-16592-01Ssearch order of external user databases 15-15security policies 2-15security p

Strany 840

IN-23User Guide for Cisco Secure ACS for Windows Server78-16592-01Indexoutput values 13-66result codes 13-69EAP-TLS authenticationconfiguring13-74inp

Strany 841

IndexIN-24User Guide for Cisco Secure ACS for Windows Server78-16592-01time-of-day access 3-8troubleshooting A-22vs. RADIUS 1-6TACACS+ Accounting log

Strany 842

IN-25User Guide for Cisco Secure ACS for Windows Server78-16592-01IndexRADIUS issues A-22report issues A-17TACACS+ issues A-22third-party server issu

Strany 843

IndexIN-26User Guide for Cisco Secure ACS for Windows Server78-16592-01callback options 7-9configuring 7-2configuring device management command autho

Strany 844

IN-27User Guide for Cisco Secure ACS for Windows Server78-16592-01IndexODBC 11-23CSV (comma-separated values) file directory11-16enablingODBC11-23VPD

Strany 845

Chapter 2 Deployment ConsiderationsBasic Deployment Factors for Cisco Secure ACS2-10User Guide for Cisco Secure ACS for Windows Server78-16592-0

Strany 846

IndexIN-28User Guide for Cisco Secure ACS for Windows Server78-16592-01passwords 1-11rejection mode 15-6request handling 15-6trust relationships 13-9

Strany 847

2-11User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 2 Deployment ConsiderationsBasic Deployment Factors for Cisco Secure AC

Strany 848

Chapter 2 Deployment ConsiderationsBasic Deployment Factors for Cisco Secure ACS2-12User Guide for Cisco Secure ACS for Windows Server78-16592-0

Strany 849

2-13User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 2 Deployment ConsiderationsBasic Deployment Factors for Cisco Secure AC

Strany 850

ixUser Guide for Cisco Secure ACS for Windows Server78-16592-01ContentsBasic User Group Settings 6-3Group Disablement 6-4Enabling VoIP Support for a

Strany 851

Chapter 2 Deployment ConsiderationsBasic Deployment Factors for Cisco Secure ACS2-14User Guide for Cisco Secure ACS for Windows Server78-16592-0

Strany 852

2-15User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 2 Deployment ConsiderationsBasic Deployment Factors for Cisco Secure AC

Strany 853

Chapter 2 Deployment ConsiderationsBasic Deployment Factors for Cisco Secure ACS2-16User Guide for Cisco Secure ACS for Windows Server78-16592-0

Strany 854

2-17User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 2 Deployment ConsiderationsBasic Deployment Factors for Cisco Secure AC

Strany 855

Chapter 2 Deployment ConsiderationsBasic Deployment Factors for Cisco Secure ACS2-18User Guide for Cisco Secure ACS for Windows Server78-16592-0

Strany 856

2-19User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 2 Deployment ConsiderationsSuggested Deployment SequenceNetwork Latency

Strany 857

Chapter 2 Deployment ConsiderationsSuggested Deployment Sequence2-20User Guide for Cisco Secure ACS for Windows Server78-16592-01For more inform

Strany 858

2-21User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 2 Deployment ConsiderationsSuggested Deployment SequenceAlong with the

Strany 859

Chapter 2 Deployment ConsiderationsSuggested Deployment Sequence2-22User Guide for Cisco Secure ACS for Windows Server78-16592-01

Strany 860

CHAPTER 3-1User Guide for Cisco Secure ACS for Windows Server78-16592-013Interface ConfigurationEase of use is the overriding design principle of the

Komentáře k této Příručce

Žádné komentáře