Cisco 3.3 Uživatelský manuál Strana 124

  • Stažení
  • Přidat do mých příruček
  • Tisk
  • Strana
    / 860
  • Tabulka s obsahem
  • ŘEŠENÍ PROBLÉMŮ
  • KNIHY
  • Hodnocené. / 5. Na základě hodnocení zákazníků
Zobrazit stránku 123
Chapter 4 Network Configuration
Network Device Searches
4-8
User Guide for Cisco Secure ACS for Windows Server
78-16592-01
You can also choose to have Voice-over-IP (VoIP) accounting information logged
remotely, either appended to the RADIUS Accounting log, in a separate VoIP
Accounting log, or both.
Other Features Enabled by System Distribution
Beyond basic proxy and fallback features, configuring a Cisco Secure ACS to
interact with distributed systems enables several other features that are beyond the
scope of this chapter. These features include the following:
Replication—For more information, see CiscoSecure Database Replication,
page 9-1.
RDBMS synchronization—For more information, see RDBMS
Synchronization, page 9-25.
Remote and centralized logging—For more information, see Remote
Logging, page 11-26.
Network Device Searches
You can search for any network device configured in the Network Configuration
section of the Cisco Secure ACS HTML interface.
This section contains the following topics:
Network Device Search Criteria, page 4-8
Searching for Network Devices, page 4-9
Network Device Search Criteria
You can specify search criteria for network device searches. Cisco Secure ACS
provides the following search criteria:
Name—The name assigned to the network device in Cisco Secure ACS. You
can use asterisks (*) as wildcard characters. For example, if you wanted to
find all devices with names starting with the letter M, you would enter “M*”
Zobrazit stránku 123
1 2 ... 119 120 121 122 123 124 125 126 127 128 129 ... 859 860

Komentáře k této Příručce

Žádné komentáře