Cisco 3.3 User Manual

Browse online or download User Manual for Computers Cisco 3.3. Cisco 3.3 User Manual

  • Download
  • Add to my manuals
  • Print
  • Page
    / 860
  • Table of contents
  • TROUBLESHOOTING
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 0
Corporate Headquarters
Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134-1706
USA
http://www.cisco.com
Tel: 408 526-4000
800 553-NETS (6387)
Fax: 408 526-4100
User Guide for Cisco Secure ACS for
Windows Server
Version 3.3
May 2004
Customer Order Number: DOC-7816592=
Text Part Number: 78-16592-01
Page view 0
1 2 3 4 5 6 ... 859 860

Summary of Contents

Page 1 - Windows Server

Corporate HeadquartersCisco Systems, Inc.170 West Tasman DriveSan Jose, CA 95134-1706USAhttp://www.cisco.comTel: 408 526-4000800 553-NETS (6387)Fax:

Page 2

ContentsxUser Guide for Cisco Secure ACS for Windows Server78-16592-01Configuring BBSM RADIUS Settings for a User Group 6-51Configuring Custom RADIUS

Page 3 - CONTENTS

Chapter 3 Interface ConfigurationInterface Design Concepts3-2User Guide for Cisco Secure ACS for Windows Server78-16592-01• Protocol Configurati

Page 4

3-3User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 3 Interface ConfigurationUser Data Configuration OptionsUser Data Config

Page 5

Chapter 3 Interface ConfigurationAdvanced Options3-4User Guide for Cisco Secure ACS for Windows Server78-16592-01Restarting Cisco Secure ACS-rel

Page 6 - 4 Network Configuration 4-1

3-5User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 3 Interface ConfigurationAdvanced Options• User-Level Network Access Res

Page 7

Chapter 3 Interface ConfigurationAdvanced Options3-6User Guide for Cisco Secure ACS for Windows Server78-16592-01• RDBMS Synchronization—When se

Page 8 - 6 User Group Management 6-1

3-7User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 3 Interface ConfigurationProtocol Configuration Options for TACACS+advan

Page 9

Chapter 3 Interface ConfigurationProtocol Configuration Options for TACACS+3-8User Guide for Cisco Secure ACS for Windows Server78-16592-01Note

Page 10 - 7 User Management 7-1

3-9User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 3 Interface ConfigurationProtocol Configuration Options for TACACS+–Disp

Page 11 - Contents

Chapter 3 Interface ConfigurationProtocol Configuration Options for TACACS+3-10User Guide for Cisco Secure ACS for Windows Server78-16592-01To c

Page 12

3-11User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 3 Interface ConfigurationProtocol Configuration Options for RADIUSThe s

Page 13

xiUser Guide for Cisco Secure ACS for Windows Server78-16592-01ContentsConfiguring Device-Management Command Authorization for a User7-30Configuring

Page 14

Chapter 3 Interface ConfigurationProtocol Configuration Options for RADIUS3-12User Guide for Cisco Secure ACS for Windows Server78-16592-01Table

Page 15

3-13User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 3 Interface ConfigurationProtocol Configuration Options for RADIUSTip Y

Page 16 - 11 Logs and Reports 11-1

Chapter 3 Interface ConfigurationProtocol Configuration Options for RADIUS3-14User Guide for Cisco Secure ACS for Windows Server78-16592-01selec

Page 17

3-15User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 3 Interface ConfigurationProtocol Configuration Options for RADIUSSessi

Page 18 - 13 User Databases 13-1

Chapter 3 Interface ConfigurationProtocol Configuration Options for RADIUS3-16User Guide for Cisco Secure ACS for Windows Server78-16592-01appea

Page 19

3-17User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 3 Interface ConfigurationProtocol Configuration Options for RADIUSStep

Page 20

Chapter 3 Interface ConfigurationProtocol Configuration Options for RADIUS3-18User Guide for Cisco Secure ACS for Windows Server78-16592-01Step

Page 21 - 15 Unknown User Policy 15-1

CHAPTER 4-1User Guide for Cisco Secure ACS for Windows Server78-16592-014Network ConfigurationThis chapter details concepts and procedures for configu

Page 22

Chapter 4 Network ConfigurationAbout Distributed Systems4-2User Guide for Cisco Secure ACS for Windows Server78-16592-01If you are using network

Page 23 - C RADIUS Attributes C-1

4-3User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 4 Network ConfigurationAbout Distributed Systems• CiscoSecure database r

Page 24 - D CSUtil Database Utility D-1

ContentsxiiUser Guide for Cisco Secure ACS for Windows Server78-16592-01CHAPTER 8 System Configuration: Basic 8-1Service Control 8-1Determining the S

Page 25

Chapter 4 Network ConfigurationProxy in Distributed Systems4-4User Guide for Cisco Secure ACS for Windows Server78-16592-01with one another. Eac

Page 26 - G Internal Architecture G-1

4-5User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 4 Network ConfigurationProxy in Distributed SystemsNote When a Cisco Sec

Page 27

Chapter 4 Network ConfigurationProxy in Distributed Systems4-6User Guide for Cisco Secure ACS for Windows Server78-16592-01continues, in order,

Page 28

4-7User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 4 Network ConfigurationProxy in Distributed SystemsBecause Mary works in

Page 29 - Organization

Chapter 4 Network ConfigurationNetwork Device Searches4-8User Guide for Cisco Secure ACS for Windows Server78-16592-01You can also choose to hav

Page 30

4-9User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 4 Network ConfigurationNetwork Device Searchesor “m*”. Name-based search

Page 31 - Conventions

Chapter 4 Network ConfigurationNetwork Device Searches4-10User Guide for Cisco Secure ACS for Windows Server78-16592-01Tip When you leave the Se

Page 32 - Product Documentation

4-11User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 4 Network ConfigurationAAA Client ConfigurationStep 6 If you want to do

Page 33 - Related Documentation

Chapter 4 Network ConfigurationAAA Client Configuration4-12User Guide for Cisco Secure ACS for Windows Server78-16592-01recommend that you adopt

Page 34 - Table 2 Related Documentation

4-13User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 4 Network ConfigurationAAA Client ConfigurationFor correct operation, t

Page 35 - Obtaining Documentation

xiiiUser Guide for Cisco Secure ACS for Windows Server78-16592-01ContentsEvent Logging 8-20Setting Up Event Logging 8-20VoIP Accounting Configuration

Page 36 - Documentation Feedback

Chapter 4 Network ConfigurationAAA Client Configuration4-14User Guide for Cisco Secure ACS for Windows Server78-16592-01When an authentication r

Page 37 - Submitting a Service Request

4-15User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 4 Network ConfigurationAAA Client Configurationattributes. If the AAA c

Page 38

Chapter 4 Network ConfigurationAAA Client Configuration4-16User Guide for Cisco Secure ACS for Windows Server78-16592-01• Replace RADIUS Port in

Page 39

4-17User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 4 Network ConfigurationAAA Client ConfigurationStep 2 Do one of the fol

Page 40

Chapter 4 Network ConfigurationAAA Client Configuration4-18User Guide for Cisco Secure ACS for Windows Server78-16592-01Step 7 From the Authenti

Page 41 - Overview

4-19User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 4 Network ConfigurationAAA Client ConfigurationTip If you want to save

Page 42 - The Cisco Secure ACS Paradigm

Chapter 4 Network ConfigurationAAA Client Configuration4-20User Guide for Cisco Secure ACS for Windows Server78-16592-01Step 2 Do one of the fol

Page 43 - Chapter 1 Overview

4-21User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 4 Network ConfigurationAAA Server ConfigurationDeleting a AAA ClientTo

Page 44

Chapter 4 Network ConfigurationAAA Server Configuration4-22User Guide for Cisco Secure ACS for Windows Server78-16592-01To configure distributed

Page 45

4-23User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 4 Network ConfigurationAAA Server ConfigurationNote After you submit th

Page 46 - • Administration, page 1-23

ContentsxivUser Guide for Cisco Secure ACS for Windows Server78-16592-01RDBMS Synchronization Components 9-29About CSDBSync 9-29About the accountActi

Page 47

Chapter 4 Network ConfigurationAAA Server Configuration4-24User Guide for Cisco Secure ACS for Windows Server78-16592-01–Cisco Secure ACS—Select

Page 48 - Authentication

4-25User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 4 Network ConfigurationAAA Server ConfigurationTo add and configure a A

Page 49 - Authentication Considerations

Chapter 4 Network ConfigurationAAA Server Configuration4-26User Guide for Cisco Secure ACS for Windows Server78-16592-01Step 9 From the Traffic

Page 50

4-27User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 4 Network ConfigurationAAA Server ConfigurationTo edit a AAA server, fo

Page 51 - Passwords

Chapter 4 Network ConfigurationNetwork Device Group Configuration4-28User Guide for Cisco Secure ACS for Windows Server78-16592-01Deleting a AAA

Page 52 - Comparing PAP, CHAP, and ARAP

4-29User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 4 Network ConfigurationNetwork Device Group ConfigurationCisco Secure A

Page 53 - EAP Support

Chapter 4 Network ConfigurationNetwork Device Group Configuration4-30User Guide for Cisco Secure ACS for Windows Server78-16592-01Tip If the Net

Page 54 - Basic Password Configurations

4-31User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 4 Network ConfigurationNetwork Device Group ConfigurationTip If the Net

Page 55 - Password Aging

Chapter 4 Network ConfigurationNetwork Device Group Configuration4-32User Guide for Cisco Secure ACS for Windows Server78-16592-01Renaming a Net

Page 56 - User-Changeable Passwords

4-33User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 4 Network ConfigurationNetwork Device Group ConfigurationTip It may be

Page 57 - Authorization

xvUser Guide for Cisco Secure ACS for Windows Server78-16592-01ContentsEAP-TLS Authentication 10-2About the EAP-TLS Protocol 10-3EAP-TLS and Cisco Se

Page 58 - Dynamic Usage Quotas

Chapter 4 Network ConfigurationProxy Distribution Table Configuration4-34User Guide for Cisco Secure ACS for Windows Server78-16592-01Proxy Dist

Page 59

4-35User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 4 Network ConfigurationProxy Distribution Table Configurationcharacter

Page 60

Chapter 4 Network ConfigurationProxy Distribution Table Configuration4-36User Guide for Cisco Secure ACS for Windows Server78-16592-01Tip You ca

Page 61

4-37User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 4 Network ConfigurationProxy Distribution Table ConfigurationStep 1 In

Page 62 - Accounting

Chapter 4 Network ConfigurationProxy Distribution Table Configuration4-38User Guide for Cisco Secure ACS for Windows Server78-16592-01Deleting a

Page 63 - Administration

CHAPTER 5-1User Guide for Cisco Secure ACS for Windows Server78-16592-015Shared Profile ComponentsThis chapter addresses the Cisco Secure ACS for Wind

Page 64 - Network Device Groups

Chapter 5 Shared Profile ComponentsNetwork Access Filters5-2User Guide for Cisco Secure ACS for Windows Server78-16592-01named shared profile co

Page 65

5-3User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 5 Shared Profile ComponentsNetwork Access Filters• NAFs in shared networ

Page 66 - HTML Interface Security

Chapter 5 Shared Profile ComponentsNetwork Access Filters5-4User Guide for Cisco Secure ACS for Windows Server78-16592-01Step 3 Click Add.The Ne

Page 67 - HTML Interface Layout

5-5User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 5 Shared Profile ComponentsNetwork Access FiltersTip You can also remove

Page 68

ContentsxviUser Guide for Cisco Secure ACS for Windows Server78-16592-01Generating a Certificate Signing Request 10-45Using Self-Signed Certificates

Page 69

Chapter 5 Shared Profile ComponentsNetwork Access Filters5-6User Guide for Cisco Secure ACS for Windows Server78-16592-01Caution If you change t

Page 70

5-7User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 5 Shared Profile ComponentsDownloadable IP ACLsNote Restarting the servi

Page 71

Chapter 5 Shared Profile ComponentsDownloadable IP ACLs5-8User Guide for Cisco Secure ACS for Windows Server78-16592-01This section contains the

Page 72 - Accessing the HTML Interface

5-9User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 5 Shared Profile ComponentsDownloadable IP ACLsACL to each applicable us

Page 73

Chapter 5 Shared Profile ComponentsDownloadable IP ACLs5-10User Guide for Cisco Secure ACS for Windows Server78-16592-01Examples of Cisco device

Page 74 - Using Online Help

5-11User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 5 Shared Profile ComponentsDownloadable IP ACLsTo add a downloadable IP

Page 75

Chapter 5 Shared Profile ComponentsDownloadable IP ACLs5-12User Guide for Cisco Secure ACS for Windows Server78-16592-01Step 9 To save the ACL c

Page 76

5-13User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 5 Shared Profile ComponentsDownloadable IP ACLsEditing a Downloadable I

Page 77 - Deployment Considerations

Chapter 5 Shared Profile ComponentsNetwork Access Restrictions5-14User Guide for Cisco Secure ACS for Windows Server78-16592-01Cisco Secure ACS

Page 78 - System Requirements

5-15User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 5 Shared Profile ComponentsNetwork Access RestrictionsThis section cont

Page 79

xviiUser Guide for Cisco Secure ACS for Windows Server78-16592-01ContentsConfiguring an ODBC Log 11-23Remote Logging 11-26About Remote Logging 11-26I

Page 80 - Network and Port Requirements

Chapter 5 Shared Profile ComponentsNetwork Access Restrictions5-16User Guide for Cisco Secure ACS for Windows Server78-16592-01the client. For t

Page 81

5-17User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 5 Shared Profile ComponentsNetwork Access RestrictionsAbout IP-based NA

Page 82 - Network Topology

Chapter 5 Shared Profile ComponentsNetwork Access Restrictions5-18User Guide for Cisco Secure ACS for Windows Server78-16592-01About Non-IP-base

Page 83

5-19User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 5 Shared Profile ComponentsNetwork Access Restrictions• If you are usin

Page 84

Chapter 5 Shared Profile ComponentsNetwork Access Restrictions5-20User Guide for Cisco Secure ACS for Windows Server78-16592-01To add a shared N

Page 85 - Wireless Network

5-21User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 5 Shared Profile ComponentsNetwork Access RestrictionsNote The total nu

Page 86 - Cisco Aironet AP

Chapter 5 Shared Profile ComponentsNetwork Access Restrictions5-22User Guide for Cisco Secure ACS for Windows Server78-16592-01d. To specify the

Page 87

5-23User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 5 Shared Profile ComponentsNetwork Access RestrictionsEditing a Shared

Page 88 - Remote Access using VPN

Chapter 5 Shared Profile ComponentsNetwork Access Restrictions5-24User Guide for Cisco Secure ACS for Windows Server78-16592-01Step 7 To edit a

Page 89 - Network WAN

5-25User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 5 Shared Profile ComponentsCommand Authorization SetsTo delete a shared

Page 90 - Remote Access Policy

ContentsxviiiUser Guide for Cisco Secure ACS for Windows Server78-16592-01CHAPTER 13 User Databases 13-1CiscoSecure User Database 13-2About the Cisco

Page 91 - Administrative Access Policy

Chapter 5 Shared Profile ComponentsCommand Authorization Sets5-26User Guide for Cisco Secure ACS for Windows Server78-16592-01About Command Auth

Page 92

5-27User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 5 Shared Profile ComponentsCommand Authorization SetsTo offer fine-grai

Page 93

Chapter 5 Shared Profile ComponentsCommand Authorization Sets5-28User Guide for Cisco Secure ACS for Windows Server78-16592-01Cisco Secure ACS h

Page 94 - Database

5-29User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 5 Shared Profile ComponentsCommand Authorization Sets• Device Managemen

Page 95 - Suggested Deployment Sequence

Chapter 5 Shared Profile ComponentsCommand Authorization Sets5-30User Guide for Cisco Secure ACS for Windows Server78-16592-01For example, if a

Page 96

5-31User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 5 Shared Profile ComponentsCommand Authorization SetsTo permit/deny com

Page 97

Chapter 5 Shared Profile ComponentsCommand Authorization Sets5-32User Guide for Cisco Secure ACS for Windows Server78-16592-01Step 6 If Cisco Se

Page 98

5-33User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 5 Shared Profile ComponentsCommand Authorization Setsc. Click Add Comma

Page 99 - Interface Configuration

Chapter 5 Shared Profile ComponentsCommand Authorization Sets5-34User Guide for Cisco Secure ACS for Windows Server78-16592-01Step 3 From the Na

Page 100 - Interface Design Concepts

5-35User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 5 Shared Profile ComponentsCommand Authorization SetsDeleting a Command

Page 101 - Defining New User Data Fields

xixUser Guide for Cisco Secure ACS for Windows Server78-16592-01ContentsGeneric LDAP 13-32Cisco Secure ACS Authentication Process with a Generic LDAP

Page 102 - Advanced Options

Chapter 5 Shared Profile ComponentsCommand Authorization Sets5-36User Guide for Cisco Secure ACS for Windows Server78-16592-01

Page 103 - 78-16592-01

CHAPTER 6-1User Guide for Cisco Secure ACS for Windows Server78-16592-016User Group ManagementThis chapter provides information about setting up and m

Page 104 - Interface

Chapter 6 User Group ManagementAbout User Group Setup Features and Functions6-2User Guide for Cisco Secure ACS for Windows Server78-16592-01Abou

Page 105

6-3User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 6 User Group ManagementBasic User Group SettingsIf you have configured C

Page 106

Chapter 6 User Group ManagementBasic User Group Settings6-4User Guide for Cisco Secure ACS for Windows Server78-16592-01Group DisablementYou per

Page 107 - Setting Options for TACACS+

6-5User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 6 User Group ManagementBasic User Group SettingsPerform this procedure t

Page 108

Chapter 6 User Group ManagementBasic User Group Settings6-6User Guide for Cisco Secure ACS for Windows Server78-16592-01To define the times duri

Page 109

6-7User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 6 User Group ManagementBasic User Group SettingsSetting Callback Options

Page 110

Chapter 6 User Group ManagementBasic User Group Settings6-8User Guide for Cisco Secure ACS for Windows Server78-16592-01Step 5 To continue speci

Page 111

6-9User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 6 User Group ManagementBasic User Group SettingsNote When an authenticat

Page 112

THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOM

Page 113

ContentsxxUser Guide for Cisco Secure ACS for Windows Server78-16592-01PAP Procedure Output 13-65CHAP/MS-CHAP/ARAP Authentication Procedure Input 13-

Page 114 - Attributes

Chapter 6 User Group ManagementBasic User Group Settings6-10User Guide for Cisco Secure ACS for Windows Server78-16592-01Step 4 To define and ap

Page 115

6-11User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 6 User Group ManagementBasic User Group SettingsStep 5 To permit or den

Page 116

Chapter 6 User Group ManagementBasic User Group Settings6-12User Guide for Cisco Secure ACS for Windows Server78-16592-01Note The total number o

Page 117 - Network Configuration

6-13User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 6 User Group ManagementBasic User Group SettingsNote A session is any t

Page 118 - About Distributed Systems

Chapter 6 User Group ManagementBasic User Group Settings6-14User Guide for Cisco Secure ACS for Windows Server78-16592-01Step 6 To continue spec

Page 119

6-15User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 6 User Group ManagementBasic User Group Settingsnetwork fails, the quot

Page 120 - Proxy in Distributed Systems

Chapter 6 User Group ManagementConfiguration-specific User Group Settings6-16User Guide for Cisco Secure ACS for Windows Server78-16592-01Note U

Page 121 - Fallback on Failed Connection

6-17User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 6 User Group ManagementConfiguration-specific User Group Settings• To c

Page 122 - Proxy in an Enterprise

Chapter 6 User Group ManagementConfiguration-specific User Group Settings6-18User Guide for Cisco Secure ACS for Windows Server78-16592-01Settin

Page 123 - • Log them locally

6-19User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 6 User Group ManagementConfiguration-specific User Group SettingsStep 4

Page 124 - Network Device Searches

xxiUser Guide for Cisco Secure ACS for Windows Server78-16592-01ContentsNAC Databases 14-10About NAC Databases 14-10About NAC Credentials and Attribu

Page 125 - Searching for Network Devices

Chapter 6 User Group ManagementConfiguration-specific User Group Settings6-20User Guide for Cisco Secure ACS for Windows Server78-16592-01Note T

Page 126

6-21User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 6 User Group ManagementConfiguration-specific User Group SettingsEnabli

Page 127 - AAA Client Configuration

Chapter 6 User Group ManagementConfiguration-specific User Group Settings6-22User Guide for Cisco Secure ACS for Windows Server78-16592-01the ca

Page 128

6-23User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 6 User Group ManagementConfiguration-specific User Group Settingsand di

Page 129

Chapter 6 User Group ManagementConfiguration-specific User Group Settings6-24User Guide for Cisco Secure ACS for Windows Server78-16592-01reques

Page 130

6-25User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 6 User Group ManagementConfiguration-specific User Group SettingsTo set

Page 131

Chapter 6 User Group ManagementConfiguration-specific User Group Settings6-26User Guide for Cisco Secure ACS for Windows Server78-16592-01Step 8

Page 132 - Adding a AAA Client

6-27User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 6 User Group ManagementConfiguration-specific User Group SettingsTip Fo

Page 133

Chapter 6 User Group ManagementConfiguration-specific User Group Settings6-28User Guide for Cisco Secure ACS for Windows Server78-16592-01–Users

Page 134

6-29User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 6 User Group ManagementConfiguration-specific User Group Settings• Assi

Page 135 - Editing a AAA Client

ContentsxxiiUser Guide for Cisco Secure ACS for Windows Server78-16592-01Performance of Unknown User Authentication 15-8Added Authentication Latency

Page 136

Chapter 6 User Group ManagementConfiguration-specific User Group Settings6-30User Guide for Cisco Secure ACS for Windows Server78-16592-01Step 5

Page 137 - AAA Server Configuration

6-31User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 6 User Group ManagementConfiguration-specific User Group SettingsStep 6

Page 138

Chapter 6 User Group ManagementConfiguration-specific User Group Settings6-32User Guide for Cisco Secure ACS for Windows Server78-16592-01To emp

Page 139

6-33User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 6 User Group ManagementConfiguration-specific User Group SettingsConfig

Page 140 - Adding a AAA Server

Chapter 6 User Group ManagementConfiguration-specific User Group Settings6-34User Guide for Cisco Secure ACS for Windows Server78-16592-01Step 6

Page 141

6-35User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 6 User Group ManagementConfiguration-specific User Group SettingsTip To

Page 142 - Editing a AAA Server

Chapter 6 User Group ManagementConfiguration-specific User Group Settings6-36User Guide for Cisco Secure ACS for Windows Server78-16592-01Step 3

Page 143

6-37User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 6 User Group ManagementConfiguration-specific User Group SettingsConfig

Page 144 - Deleting a AAA Server

Chapter 6 User Group ManagementConfiguration-specific User Group Settings6-38User Guide for Cisco Secure ACS for Windows Server78-16592-01Step 5

Page 145 - Adding a Network Device Group

6-39User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 6 User Group ManagementConfiguration-specific User Group SettingsTo con

Page 146

xxiiiUser Guide for Cisco Secure ACS for Windows Server78-16592-01ContentsNAC Group Mapping 16-13Configuring NAC Group Mapping 16-13RADIUS-Based Grou

Page 147

Chapter 6 User Group ManagementConfiguration-specific User Group Settings6-40User Guide for Cisco Secure ACS for Windows Server78-16592-01Config

Page 148

6-41User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 6 User Group ManagementConfiguration-specific User Group SettingsStep 3

Page 149

Chapter 6 User Group ManagementConfiguration-specific User Group Settings6-42User Guide for Cisco Secure ACS for Windows Server78-16592-01The Ci

Page 150

6-43User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 6 User Group ManagementConfiguration-specific User Group SettingsStep 7

Page 151

Chapter 6 User Group ManagementConfiguration-specific User Group Settings6-44User Guide for Cisco Secure ACS for Windows Server78-16592-01Step 3

Page 152

6-45User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 6 User Group ManagementConfiguration-specific User Group SettingsCisco

Page 153

Chapter 6 User Group ManagementConfiguration-specific User Group Settings6-46User Guide for Cisco Secure ACS for Windows Server78-16592-01Config

Page 154 - Step 4 Click OK

6-47User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 6 User Group ManagementConfiguration-specific User Group SettingsStep 5

Page 155 - Shared Profile Components

Chapter 6 User Group ManagementConfiguration-specific User Group Settings6-48User Guide for Cisco Secure ACS for Windows Server78-16592-01The fo

Page 156 - Network Access Filters

6-49User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 6 User Group ManagementConfiguration-specific User Group SettingsNote T

Page 157

ContentsxxivUser Guide for Cisco Secure ACS for Windows Server78-16592-01Cisco VPN 3000 Concentrator Dictionary of RADIUS VSAs C-9Cisco VPN 5000 Conc

Page 158

Chapter 6 User Group ManagementConfiguration-specific User Group Settings6-50User Guide for Cisco Secure ACS for Windows Server78-16592-01Step 2

Page 159

6-51User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 6 User Group ManagementConfiguration-specific User Group SettingsTo con

Page 160

Chapter 6 User Group ManagementConfiguration-specific User Group Settings6-52User Guide for Cisco Secure ACS for Windows Server78-16592-01Note T

Page 161 - Downloadable IP ACLs

6-53User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 6 User Group ManagementConfiguration-specific User Group SettingsConfig

Page 162 - About Downloadable IP ACLs

Chapter 6 User Group ManagementGroup Setting Management6-54User Guide for Cisco Secure ACS for Windows Server78-16592-01Step 6 To save the group

Page 163

6-55User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 6 User Group ManagementGroup Setting ManagementResetting Usage Quota Co

Page 164 - Adding a Downloadable IP ACL

Chapter 6 User Group ManagementGroup Setting Management6-56User Guide for Cisco Secure ACS for Windows Server78-16592-01Step 5 Click Submit.Note

Page 165

CHAPTER 7-1User Guide for Cisco Secure ACS for Windows Server78-16592-017User ManagementThis chapter provides information about setting up and managin

Page 166

Chapter 7 User ManagementAbout User Databases7-2User Guide for Cisco Secure ACS for Windows Server78-16592-01 From within the User Setup section

Page 167 - Editing a Downloadable IP ACL

7-3User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 7 User ManagementBasic User Setup Options• Windows Database—Authenticate

Page 168 - Network Access Restrictions

xxvUser Guide for Cisco Secure ACS for Windows Server78-16592-01ContentsADD_NAS Statements D-21DEL_NAS Statements D-23Import File Example D-24Exporti

Page 169

Chapter 7 User ManagementBasic User Setup Options7-4User Guide for Cisco Secure ACS for Windows Server78-16592-01This section contains the follo

Page 170

7-5User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 7 User ManagementBasic User Setup OptionsStep 4 Make sure that the Acco

Page 171 - About IP-based NAR Filters

Chapter 7 User ManagementBasic User Setup Options7-6User Guide for Cisco Secure ACS for Windows Server78-16592-01Tip For lengthy account configu

Page 172

7-7User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 7 User ManagementBasic User Setup OptionsSetting a Separate CHAP/MS-CHAP

Page 173

Chapter 7 User ManagementBasic User Setup Options7-8User Guide for Cisco Secure ACS for Windows Server78-16592-01Assigning a User to a GroupA us

Page 174

7-9User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 7 User ManagementBasic User Setup OptionsSetting User Callback OptionCal

Page 175

Chapter 7 User ManagementBasic User Setup Options7-10User Guide for Cisco Secure ACS for Windows Server78-16592-01Step 3 Do one of the following

Page 176

7-11User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 7 User ManagementBasic User Setup Options• Assigned by AAA client pool—

Page 177

Chapter 7 User ManagementBasic User Setup Options7-12User Guide for Cisco Secure ACS for Windows Server78-16592-01Typically, you define (shared)

Page 178

7-13User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 7 User ManagementBasic User Setup OptionsStep 2 To apply a previously c

Page 179 - Command Authorization Sets

ContentsxxviUser Guide for Cisco Secure ACS for Windows Server78-16592-01APPENDIX E VPDN Processing E-1VPDN Process E-1APPENDIX F RDBMS Synchronizati

Page 180

Chapter 7 User ManagementBasic User Setup Options7-14User Guide for Cisco Secure ACS for Windows Server78-16592-01c. Select or enter the informa

Page 181

7-15User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 7 User ManagementBasic User Setup Optionsc. Complete the following boxe

Page 182

Chapter 7 User ManagementBasic User Setup Options7-16User Guide for Cisco Secure ACS for Windows Server78-16592-01d. Click enter.The information

Page 183

7-17User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 7 User ManagementBasic User Setup OptionsTo set max sessions options fo

Page 184 - About Pattern Matching

Chapter 7 User ManagementBasic User Setup Options7-18User Guide for Cisco Secure ACS for Windows Server78-16592-01Setting User Usage Quotas Opti

Page 185

7-19User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 7 User ManagementBasic User Setup Optionswith ISDN, the quota is not up

Page 186

Chapter 7 User ManagementBasic User Setup Options7-20User Guide for Cisco Secure ACS for Windows Server78-16592-01c. Select the period for which

Page 187

7-21User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 7 User ManagementBasic User Setup Optionsb. Select the Disable account

Page 188

Chapter 7 User ManagementAdvanced User Authentication Settings7-22User Guide for Cisco Secure ACS for Windows Server78-16592-01To assign a downl

Page 189 - Step 4 Click Delete

7-23User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 7 User ManagementAdvanced User Authentication Settings• RADIUS Attribut

Page 190

xxviiUser Guide for Cisco Secure ACS for Windows Server78-16592-01ContentsCSMon G-4Monitoring G-5Recording G-6Notification G-7Response G-7CSTacacs an

Page 191 - User Group Management

Chapter 7 User ManagementAdvanced User Authentication Settings7-24User Guide for Cisco Secure ACS for Windows Server78-16592-01Configuring TACAC

Page 192 - Group TACACS+ Settings

7-25User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 7 User ManagementAdvanced User Authentication SettingsBefore You Begin•

Page 193 - Basic User Group Settings

Chapter 7 User ManagementAdvanced User Authentication Settings7-26User Guide for Cisco Secure ACS for Windows Server78-16592-01Step 6 Do one of

Page 194 - Group Disablement

7-27User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 7 User ManagementAdvanced User Authentication SettingsTo specify shell

Page 195

Chapter 7 User ManagementAdvanced User Authentication Settings7-28User Guide for Cisco Secure ACS for Windows Server78-16592-01Step 7 To define

Page 196

7-29User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 7 User ManagementAdvanced User Authentication SettingsConfiguring a PIX

Page 197

Chapter 7 User ManagementAdvanced User Authentication Settings7-30User Guide for Cisco Secure ACS for Windows Server78-16592-01Step 4 To assign

Page 198

7-31User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 7 User ManagementAdvanced User Authentication Settings• Assign a device

Page 199

Chapter 7 User ManagementAdvanced User Authentication Settings7-32User Guide for Cisco Secure ACS for Windows Server78-16592-01Step 5 To assign

Page 200

7-33User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 7 User ManagementAdvanced User Authentication SettingsStep 3 To allow T

Page 201

ContentsxxviiiUser Guide for Cisco Secure ACS for Windows Server78-16592-01

Page 202

Chapter 7 User ManagementAdvanced User Authentication Settings7-34User Guide for Cisco Secure ACS for Windows Server78-16592-01Note This is the

Page 203

7-35User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 7 User ManagementAdvanced User Authentication SettingsStep 4 If you sel

Page 204

Chapter 7 User ManagementAdvanced User Authentication Settings7-36User Guide for Cisco Secure ACS for Windows Server78-16592-01To set the option

Page 205

7-37User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 7 User ManagementAdvanced User Authentication SettingsSetting TACACS+ O

Page 206

Chapter 7 User ManagementAdvanced User Authentication Settings7-38User Guide for Cisco Secure ACS for Windows Server78-16592-01This section cont

Page 207

7-39User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 7 User ManagementAdvanced User Authentication SettingsNote For a list a

Page 208

Chapter 7 User ManagementAdvanced User Authentication Settings7-40User Guide for Cisco Secure ACS for Windows Server78-16592-01replace the assoc

Page 209

7-41User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 7 User ManagementAdvanced User Authentication SettingsSetting Cisco Air

Page 210

Chapter 7 User ManagementAdvanced User Authentication Settings7-42User Guide for Cisco Secure ACS for Windows Server78-16592-01To configure and

Page 211

7-43User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 7 User ManagementAdvanced User Authentication SettingsSetting Ascend RA

Page 212

xxixUser Guide for Cisco Secure ACS for Windows Server78-16592-01PrefaceThis document will help you configure and use Cisco Secure Access Control Serv

Page 213

Chapter 7 User ManagementAdvanced User Authentication Settings7-44User Guide for Cisco Secure ACS for Windows Server78-16592-01For more informat

Page 214

7-45User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 7 User ManagementAdvanced User Authentication SettingsNote To hide or d

Page 215

Chapter 7 User ManagementAdvanced User Authentication Settings7-46User Guide for Cisco Secure ACS for Windows Server78-16592-01Setting Cisco VPN

Page 216

7-47User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 7 User ManagementAdvanced User Authentication SettingsStep 3 In the Cis

Page 217

Chapter 7 User ManagementAdvanced User Authentication Settings7-48User Guide for Cisco Secure ACS for Windows Server78-16592-01The Microsoft RAD

Page 218

7-49User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 7 User ManagementAdvanced User Authentication SettingsStep 3 In the Mic

Page 219

Chapter 7 User ManagementAdvanced User Authentication Settings7-50User Guide for Cisco Secure ACS for Windows Server78-16592-01Note To hide or d

Page 220

7-51User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 7 User ManagementAdvanced User Authentication SettingsSetting Juniper R

Page 221

Chapter 7 User ManagementAdvanced User Authentication Settings7-52User Guide for Cisco Secure ACS for Windows Server78-16592-01For more informat

Page 222

7-53User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 7 User ManagementAdvanced User Authentication SettingsStep 2 Before con

Page 223

iiiUser Guide for Cisco Secure ACS for Windows Server78-16592-01CONTENTSPreface xxixAudience xxixOrganization xxixConventions xxxiProduct Documentati

Page 224

PrefaceOrganizationxxxUser Guide for Cisco Secure ACS for Windows Server78-16592-01• Chapter 5, “Shared Profile Components”—Concepts and procedures re

Page 225

Chapter 7 User ManagementUser Management7-54User Guide for Cisco Secure ACS for Windows Server78-16592-01To configure and enable custom RADIUS a

Page 226

7-55User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 7 User ManagementUser Management• Deleting a User Account, page 7-57• R

Page 227 - User Group

Chapter 7 User ManagementUser Management7-56User Guide for Cisco Secure ACS for Windows Server78-16592-01Tip You can use wildcard characters (*)

Page 228

7-57User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 7 User ManagementUser ManagementStep 3 Click Add/Edit.The User Setup Ed

Page 229

Chapter 7 User ManagementUser Management7-58User Guide for Cisco Secure ACS for Windows Server78-16592-01Step 3 Click Add/Edit.Step 4 At the bot

Page 230

7-59User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 7 User ManagementUser ManagementStep 5 Click Submit at the bottom of th

Page 231

Chapter 7 User ManagementUser Management7-60User Guide for Cisco Secure ACS for Windows Server78-16592-01Note If the user authenticates with a W

Page 232

CHAPTER 8-1User Guide for Cisco Secure ACS for Windows Server78-16592-018System Configuration: BasicThis chapter addresses the basic features found in

Page 233 - Ascend-Remote-Addr

Chapter 8 System Configuration: BasicService Control8-2User Guide for Cisco Secure ACS for Windows Server78-16592-01Tip You can configure Cisco

Page 234

8-3User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 8 System Configuration: BasicLoggingStep 1 In the navigation bar, click

Page 235

xxxiUser Guide for Cisco Secure ACS for Windows Server78-16592-01PrefaceConventions• Appendix A, “Troubleshooting”—How to identify and solve certain p

Page 236

Chapter 8 System Configuration: BasicDate Format Control8-4User Guide for Cisco Secure ACS for Windows Server78-16592-01report generated on July

Page 237

8-5User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 8 System Configuration: BasicLocal Password ManagementLocal Password Man

Page 238

Chapter 8 System Configuration: BasicLocal Password Management8-6User Guide for Cisco Secure ACS for Windows Server78-16592-01–Upon remote user

Page 239

8-7User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 8 System Configuration: BasicLocal Password ManagementConfiguring Local

Page 240

Chapter 8 System Configuration: BasicLocal Password Management8-8User Guide for Cisco Secure ACS for Windows Server78-16592-01d. If you want Cis

Page 241

8-9User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 8 System Configuration: BasicCisco Secure ACS BackupCisco Secure ACS Bac

Page 242

Chapter 8 System Configuration: BasicCisco Secure ACS Backup8-10User Guide for Cisco Secure ACS for Windows Server78-16592-01where drive is the

Page 243

8-11User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 8 System Configuration: BasicCisco Secure ACS BackupBackup OptionsThe A

Page 244 - Group Setting Management

Chapter 8 System Configuration: BasicCisco Secure ACS Backup8-12User Guide for Cisco Secure ACS for Windows Server78-16592-01Step 2 Click ACS Ba

Page 245 - Renaming a User Group

8-13User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 8 System Configuration: BasicCisco Secure ACS BackupTip Clicking times

Page 246

PrefaceProduct DocumentationxxxiiUser Guide for Cisco Secure ACS for Windows Server78-16592-01Tip Identifies information to help you get the most bene

Page 247 - User Management

Chapter 8 System Configuration: BasicCisco Secure ACS System Restore8-14User Guide for Cisco Secure ACS for Windows Server78-16592-01Cisco Secur

Page 248 - About User Databases

8-15User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 8 System Configuration: BasicCisco Secure ACS System Restorehard drive.

Page 249 - Basic User Setup Options

Chapter 8 System Configuration: BasicCisco Secure ACS System Restore8-16User Guide for Cisco Secure ACS for Windows Server78-16592-01Reports of

Page 250 - Adding a Basic User Account

8-17User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 8 System Configuration: BasicCisco Secure ACS Active Service Management

Page 251

Chapter 8 System Configuration: BasicCisco Secure ACS Active Service Management8-18User Guide for Cisco Secure ACS for Windows Server78-16592-01

Page 252

8-19User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 8 System Configuration: BasicCisco Secure ACS Active Service Management

Page 253

Chapter 8 System Configuration: BasicCisco Secure ACS Active Service Management8-20User Guide for Cisco Secure ACS for Windows Server78-16592-01

Page 254 - Assigning a User to a Group

8-21User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 8 System Configuration: BasicVoIP Accounting Configurationc. In the SMT

Page 255 - Setting User Callback Option

Chapter 8 System Configuration: BasicVoIP Accounting Configuration8-22User Guide for Cisco Secure ACS for Windows Server78-16592-01To configure

Page 256

CHAPTER 9-1User Guide for Cisco Secure ACS for Windows Server78-16592-019System Configuration: AdvancedThis chapter addresses the CiscoSecure Database

Page 257

xxxiiiUser Guide for Cisco Secure ACS for Windows Server78-16592-01PrefaceRelated DocumentationRelated DocumentationNote We sometimes update the print

Page 258

Chapter 9 System Configuration: AdvancedCiscoSecure Database Replication9-2User Guide for Cisco Secure ACS for Windows Server78-16592-01• Replic

Page 259

9-3User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 9 System Configuration: AdvancedCiscoSecure Database Replication• IP poo

Page 260

Chapter 9 System Configuration: AdvancedCiscoSecure Database Replication9-4User Guide for Cisco Secure ACS for Windows Server78-16592-01be runni

Page 261

9-5User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 9 System Configuration: AdvancedCiscoSecure Database Replicationc. The p

Page 262

Chapter 9 System Configuration: AdvancedCiscoSecure Database Replication9-6User Guide for Cisco Secure ACS for Windows Server78-16592-01c. The s

Page 263

9-7User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 9 System Configuration: AdvancedCiscoSecure Database ReplicationReplicat

Page 264

Chapter 9 System Configuration: AdvancedCiscoSecure Database Replication9-8User Guide for Cisco Secure ACS for Windows Server78-16592-01–In its

Page 265

9-9User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 9 System Configuration: AdvancedCiscoSecure Database Replication• A seco

Page 266

Chapter 9 System Configuration: AdvancedCiscoSecure Database Replication9-10User Guide for Cisco Secure ACS for Windows Server78-16592-01of sett

Page 267

9-11User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 9 System Configuration: AdvancedCiscoSecure Database ReplicationFor mor

Page 268

PrefaceRelated DocumentationxxxivUser Guide for Cisco Secure ACS for Windows Server78-16592-01Table 2 describes a set of white papers about Cisco Secu

Page 269 - TACACS+ Settings (User)

Chapter 9 System Configuration: AdvancedCiscoSecure Database Replication9-12User Guide for Cisco Secure ACS for Windows Server78-16592-01Note If

Page 270

9-13User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 9 System Configuration: AdvancedCiscoSecure Database Replication–Manual

Page 271

Chapter 9 System Configuration: AdvancedCiscoSecure Database Replication9-14User Guide for Cisco Secure ACS for Windows Server78-16592-01Note Th

Page 272

9-15User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 9 System Configuration: AdvancedCiscoSecure Database ReplicationInbound

Page 273

Chapter 9 System Configuration: AdvancedCiscoSecure Database Replication9-16User Guide for Cisco Secure ACS for Windows Server78-16592-01To impl

Page 274

9-17User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 9 System Configuration: AdvancedCiscoSecure Database ReplicationConfigu

Page 275

Chapter 9 System Configuration: AdvancedCiscoSecure Database Replication9-18User Guide for Cisco Secure ACS for Windows Server78-16592-01Step 4

Page 276

9-19User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 9 System Configuration: AdvancedCiscoSecure Database ReplicationNote Fo

Page 277

Chapter 9 System Configuration: AdvancedCiscoSecure Database Replication9-20User Guide for Cisco Secure ACS for Windows Server78-16592-01Note If

Page 278

9-21User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 9 System Configuration: AdvancedCiscoSecure Database ReplicationNote Re

Page 279

xxxvUser Guide for Cisco Secure ACS for Windows Server78-16592-01PrefaceObtaining DocumentationObtaining DocumentationCisco documentation and addition

Page 280

Chapter 9 System Configuration: AdvancedCiscoSecure Database Replication9-22User Guide for Cisco Secure ACS for Windows Server78-16592-01Note If

Page 281

9-23User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 9 System Configuration: AdvancedCiscoSecure Database ReplicationTip Cli

Page 282

Chapter 9 System Configuration: AdvancedCiscoSecure Database Replication9-24User Guide for Cisco Secure ACS for Windows Server78-16592-01c. Repe

Page 283 - RADIUS Attributes

9-25User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 9 System Configuration: AdvancedRDBMS SynchronizationDatabase Replicati

Page 284

Chapter 9 System Configuration: AdvancedRDBMS Synchronization9-26User Guide for Cisco Secure ACS for Windows Server78-16592-01–Synchronization P

Page 285

9-27User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 9 System Configuration: AdvancedRDBMS SynchronizationUsersAmong the use

Page 286

Chapter 9 System Configuration: AdvancedRDBMS Synchronization9-28User Guide for Cisco Secure ACS for Windows Server78-16592-01• Specifying outbo

Page 287

9-29User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 9 System Configuration: AdvancedRDBMS SynchronizationNote If you intend

Page 288

Chapter 9 System Configuration: AdvancedRDBMS Synchronization9-30User Guide for Cisco Secure ACS for Windows Server78-16592-01Figure 9-2 RDBMS S

Page 289

9-31User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 9 System Configuration: AdvancedRDBMS SynchronizationAbout the accountA

Page 290

PrefaceDocumentation FeedbackxxxviUser Guide for Cisco Secure ACS for Windows Server78-16592-01Cisco.comYou can access the most current Cisco document

Page 291

Chapter 9 System Configuration: AdvancedRDBMS Synchronization9-32User Guide for Cisco Secure ACS for Windows Server78-16592-01• Oracle 7—Contain

Page 292

9-33User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 9 System Configuration: AdvancedRDBMS SynchronizationReplaying transact

Page 293

Chapter 9 System Configuration: AdvancedRDBMS Synchronization9-34User Guide for Cisco Secure ACS for Windows Server78-16592-01implementation. If

Page 294

9-35User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 9 System Configuration: AdvancedRDBMS SynchronizationStep 7 Schedule RD

Page 295

Chapter 9 System Configuration: AdvancedRDBMS Synchronization9-36User Guide for Cisco Secure ACS for Windows Server78-16592-01Preparing for CSV-

Page 296

9-37User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 9 System Configuration: AdvancedRDBMS Synchronizationnet start CSDBSync

Page 297

Chapter 9 System Configuration: AdvancedRDBMS Synchronization9-38User Guide for Cisco Secure ACS for Windows Server78-16592-01Step 6 Complete th

Page 298

9-39User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 9 System Configuration: AdvancedRDBMS Synchronization• Password—Specifi

Page 299

Chapter 9 System Configuration: AdvancedRDBMS Synchronization9-40User Guide for Cisco Secure ACS for Windows Server78-16592-01For more informati

Page 300

9-41User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 9 System Configuration: AdvancedRDBMS SynchronizationNote You do not ha

Page 301 - Finding a User

xxxviiUser Guide for Cisco Secure ACS for Windows Server78-16592-01PrefaceObtaining Technical AssistanceYou can submit comments by using the response

Page 302 - Disabling a User Account

Chapter 9 System Configuration: AdvancedRDBMS Synchronization9-42User Guide for Cisco Secure ACS for Windows Server78-16592-01Note For more info

Page 303 - Deleting a User Account

9-43User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 9 System Configuration: AdvancedRDBMS SynchronizationNote For more info

Page 304

Chapter 9 System Configuration: AdvancedIP Pools Server9-44User Guide for Cisco Secure ACS for Windows Server78-16592-01Step 2 Click RDBMS Synch

Page 305

9-45User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 9 System Configuration: AdvancedIP Pools Serveryou enable this feature,

Page 306 - Saving User Settings

Chapter 9 System Configuration: AdvancedIP Pools Server9-46User Guide for Cisco Secure ACS for Windows Server78-16592-01You can determine whethe

Page 307 - System Configuration: Basic

9-47User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 9 System Configuration: AdvancedIP Pools ServerRefreshing the AAA Serve

Page 308 - Service Control

Chapter 9 System Configuration: AdvancedIP Pools Server9-48User Guide for Cisco Secure ACS for Windows Server78-16592-01Note All addresses in an

Page 309 - Date Format Control

9-49User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 9 System Configuration: AdvancedIP Pools ServerNote All addresses in an

Page 310

Chapter 9 System Configuration: AdvancedIP Pools Server9-50User Guide for Cisco Secure ACS for Windows Server78-16592-01The name pool table appe

Page 311 - Local Password Management

9-51User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 9 System Configuration: AdvancedIP Pools Address RecoveryStep 4 Click D

Page 312

PrefaceObtaining Technical AssistancexxxviiiUser Guide for Cisco Secure ACS for Windows Server78-16592-01recommended solutions. If your issue is not r

Page 313

Chapter 9 System Configuration: AdvancedIP Pools Address Recovery9-52User Guide for Cisco Secure ACS for Windows Server78-16592-01Cisco Secure A

Page 314

CHAPTER 10-1User Guide for Cisco Secure ACS for Windows Server78-16592-0110System Configuration: Authentication and CertificatesThis chapter addresses

Page 315 - Cisco Secure ACS Backup

Chapter 10 System Configuration: Authentication and CertificatesAbout Certification and EAP Protocols10-2User Guide for Cisco Secure ACS for Win

Page 316 - Components Backed Up

10-3User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 10 System Configuration: Authentication and CertificatesAbout Certifica

Page 317 - Backup Options

Chapter 10 System Configuration: Authentication and CertificatesAbout Certification and EAP Protocols10-4User Guide for Cisco Secure ACS for Win

Page 318

10-5User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 10 System Configuration: Authentication and CertificatesAbout Certifica

Page 319

Chapter 10 System Configuration: Authentication and CertificatesAbout Certification and EAP Protocols10-6User Guide for Cisco Secure ACS for Win

Page 320

10-7User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 10 System Configuration: Authentication and CertificatesAbout Certifica

Page 321 - Components Restored

Chapter 10 System Configuration: Authentication and CertificatesAbout Certification and EAP Protocols10-8User Guide for Cisco Secure ACS for Win

Page 322 - Step 2 Click ACS Restore

10-9User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 10 System Configuration: Authentication and CertificatesAbout Certifica

Page 323 - System Monitoring

xxxixUser Guide for Cisco Secure ACS for Windows Server78-16592-01PrefaceObtaining Additional Publications and InformationObtaining Additional Publica

Page 324 - System Monitoring Options

Chapter 10 System Configuration: Authentication and CertificatesAbout Certification and EAP Protocols10-10User Guide for Cisco Secure ACS for Wi

Page 325 - Setting Up System Monitoring

10-11User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 10 System Configuration: Authentication and CertificatesAbout Certific

Page 326 - Event Logging

Chapter 10 System Configuration: Authentication and CertificatesAbout Certification and EAP Protocols10-12User Guide for Cisco Secure ACS for Wi

Page 327 - VoIP Accounting Configuration

10-13User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 10 System Configuration: Authentication and CertificatesAbout Certific

Page 328 - Step 4 Click Submit

Chapter 10 System Configuration: Authentication and CertificatesAbout Certification and EAP Protocols10-14User Guide for Cisco Secure ACS for Wi

Page 329

10-15User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 10 System Configuration: Authentication and CertificatesAbout Certific

Page 330

Chapter 10 System Configuration: Authentication and CertificatesAbout Certification and EAP Protocols10-16User Guide for Cisco Secure ACS for Wi

Page 331

10-17User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 10 System Configuration: Authentication and CertificatesAbout Certific

Page 332 - Replication Process

Chapter 10 System Configuration: Authentication and CertificatesAbout Certification and EAP Protocols10-18User Guide for Cisco Secure ACS for Wi

Page 333

10-19User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 10 System Configuration: Authentication and CertificatesAbout Certific

Page 334

ContentsivUser Guide for Cisco Secure ACS for Windows Server78-16592-01AAA Protocols—TACACS+ and RADIUS 1-6TACACS+ 1-7RADIUS 1-7Authentication 1-8Aut

Page 335 - Replication Frequency

PrefaceObtaining Additional Publications and InformationxlUser Guide for Cisco Secure ACS for Windows Server78-16592-01• Internet Protocol Journal is

Page 336

Chapter 10 System Configuration: Authentication and CertificatesAbout Certification and EAP Protocols10-20User Guide for Cisco Secure ACS for Wi

Page 337

10-21User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 10 System Configuration: Authentication and CertificatesAbout Certific

Page 338 - Database Replication Logging

Chapter 10 System Configuration: Authentication and CertificatesAbout Certification and EAP Protocols10-22User Guide for Cisco Secure ACS for Wi

Page 339 - Replication Options

10-23User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 10 System Configuration: Authentication and CertificatesAbout Certific

Page 340 - Outbound Replication Options

Chapter 10 System Configuration: Authentication and CertificatesAbout Certification and EAP Protocols10-24User Guide for Cisco Secure ACS for Wi

Page 341

10-25User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 10 System Configuration: Authentication and CertificatesAbout Certific

Page 342

Chapter 10 System Configuration: Authentication and CertificatesGlobal Authentication Setup10-26User Guide for Cisco Secure ACS for Windows Serv

Page 343 - Cisco Secure ACSes

10-27User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 10 System Configuration: Authentication and CertificatesGlobal Authent

Page 344

Chapter 10 System Configuration: Authentication and CertificatesGlobal Authentication Setup10-28User Guide for Cisco Secure ACS for Windows Serv

Page 345

10-29User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 10 System Configuration: Authentication and CertificatesGlobal Authent

Page 346

CHAPTER1-1User Guide for Cisco Secure ACS for Windows Server78-16592-011OverviewThis chapter provides an overview of Cisco Secure ACS for Windows Serv

Page 347 - Replicating Immediately

Chapter 10 System Configuration: Authentication and CertificatesGlobal Authentication Setup10-30User Guide for Cisco Secure ACS for Windows Serv

Page 348

10-31User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 10 System Configuration: Authentication and CertificatesGlobal Authent

Page 349 - Scheduling Replication

Chapter 10 System Configuration: Authentication and CertificatesGlobal Authentication Setup10-32User Guide for Cisco Secure ACS for Windows Serv

Page 350

10-33User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 10 System Configuration: Authentication and CertificatesGlobal Authent

Page 351

Chapter 10 System Configuration: Authentication and CertificatesCisco Secure ACS Certificate Setup10-34User Guide for Cisco Secure ACS for Windo

Page 352

10-35User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 10 System Configuration: Authentication and CertificatesCisco Secure A

Page 353 - RDBMS Synchronization

Chapter 10 System Configuration: Authentication and CertificatesCisco Secure ACS Certificate Setup10-36User Guide for Cisco Secure ACS for Windo

Page 354 - About RDBMS Synchronization

10-37User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 10 System Configuration: Authentication and CertificatesCisco Secure A

Page 355 - User Groups

Chapter 10 System Configuration: Authentication and CertificatesCisco Secure ACS Certificate Setup10-38User Guide for Cisco Secure ACS for Windo

Page 356

10-39User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 10 System Configuration: Authentication and CertificatesCisco Secure A

Page 357 - About CSDBSync

Chapter 1 OverviewThe Cisco Secure ACS Paradigm1-2User Guide for Cisco Secure ACS for Windows Server78-16592-01–Accessing the HTML Interface, pag

Page 358

Chapter 10 System Configuration: Authentication and CertificatesCisco Secure ACS Certificate Setup10-40User Guide for Cisco Secure ACS for Windo

Page 359

10-41User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 10 System Configuration: Authentication and CertificatesCisco Secure A

Page 360

Chapter 10 System Configuration: Authentication and CertificatesCisco Secure ACS Certificate Setup10-42User Guide for Cisco Secure ACS for Windo

Page 361

10-43User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 10 System Configuration: Authentication and CertificatesCisco Secure A

Page 362

Chapter 10 System Configuration: Authentication and CertificatesCisco Secure ACS Certificate Setup10-44User Guide for Cisco Secure ACS for Windo

Page 363

10-45User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 10 System Configuration: Authentication and CertificatesCisco Secure A

Page 364

Chapter 10 System Configuration: Authentication and CertificatesCisco Secure ACS Certificate Setup10-46User Guide for Cisco Secure ACS for Windo

Page 365 - Synchronization

10-47User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 10 System Configuration: Authentication and CertificatesCisco Secure A

Page 366 - RDBMS Synchronization Options

Chapter 10 System Configuration: Authentication and CertificatesCisco Secure ACS Certificate Setup10-48User Guide for Cisco Secure ACS for Windo

Page 367

10-49User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 10 System Configuration: Authentication and CertificatesCisco Secure A

Page 368

1-3User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 1 OverviewCisco Secure ACS Specificationsservices that ensure a secure en

Page 369

Chapter 10 System Configuration: Authentication and CertificatesCisco Secure ACS Certificate Setup10-50User Guide for Cisco Secure ACS for Windo

Page 370

10-51User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 10 System Configuration: Authentication and CertificatesCisco Secure A

Page 371

Chapter 10 System Configuration: Authentication and CertificatesCisco Secure ACS Certificate Setup10-52User Guide for Cisco Secure ACS for Windo

Page 372 - IP Pools Server

CHAPTER 11-1User Guide for Cisco Secure ACS for Windows Server78-16592-0111Logs and ReportsCisco Secure ACS for Windows Server produces a variety of l

Page 373

Chapter 11 Logs and ReportsLogging Formats11-2User Guide for Cisco Secure ACS for Windows Server78-16592-01Logging FormatsCisco Secure ACS logs

Page 374

11-3User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 11 Logs and ReportsSpecial Logging AttributesThe content of these attri

Page 375 - Adding a New IP Pool

Chapter 11 Logs and ReportsNAC Attributes in Logs11-4User Guide for Cisco Secure ACS for Windows Server78-16592-01Note Cisco Secure ACS cannot d

Page 376 - Editing an IP Pool Definition

11-5User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 11 Logs and ReportsUpdate Packets in Accounting LogsPosture validation

Page 377 - Resetting an IP Pool

Chapter 11 Logs and ReportsAbout Cisco Secure ACS Logs and Reports11-6User Guide for Cisco Secure ACS for Windows Server78-16592-01About Cisco S

Page 378 - Deleting an IP Pool

11-7User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 11 Logs and ReportsAbout Cisco Secure ACS Logs and ReportsTable 11-1 Ac

Page 379 - IP Pools Address Recovery

Chapter 1 OverviewCisco Secure ACS Specifications1-4User Guide for Cisco Secure ACS for Windows Server78-16592-01• Maximum users supported by the

Page 380

Chapter 11 Logs and ReportsAbout Cisco Secure ACS Logs and Reports11-8User Guide for Cisco Secure ACS for Windows Server78-16592-01Failed Attemp

Page 381

11-9User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 11 Logs and ReportsAbout Cisco Secure ACS Logs and ReportsDynamic Admin

Page 382 - EAP-TLS Authentication

Chapter 11 Logs and ReportsAbout Cisco Secure ACS Logs and Reports11-10User Guide for Cisco Secure ACS for Windows Server78-16592-01Viewing the

Page 383 - About the EAP-TLS Protocol

11-11User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 11 Logs and ReportsAbout Cisco Secure ACS Logs and ReportsTip You can

Page 384 - EAP-TLS and Cisco Secure ACS

Chapter 11 Logs and ReportsAbout Cisco Secure ACS Logs and Reports11-12User Guide for Cisco Secure ACS for Windows Server78-16592-01Note Deletin

Page 385

11-13User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 11 Logs and ReportsAbout Cisco Secure ACS Logs and ReportsFor more inf

Page 386 - EAP-TLS Limitations

Chapter 11 Logs and ReportsAbout Cisco Secure ACS Logs and Reports11-14User Guide for Cisco Secure ACS for Windows Server78-16592-01Configuring

Page 387

11-15User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 11 Logs and ReportsWorking with CSV LogsStep 4 To generate a new Admin

Page 388 - PEAP Authentication

Chapter 11 Logs and ReportsWorking with CSV Logs11-16User Guide for Cisco Secure ACS for Windows Server78-16592-01Older files are named in the f

Page 389 - PEAP and Cisco Secure ACS

11-17User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 11 Logs and ReportsWorking with CSV LogsEnabling or Disabling a CSV Lo

Page 390

1-5User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 1 OverviewAAA Server Functions and ConceptsWhen you install Cisco Secure

Page 391

Chapter 11 Logs and ReportsWorking with CSV Logs11-18User Guide for Cisco Secure ACS for Windows Server78-16592-01Viewing a CSV ReportWhen you s

Page 392 - Enabling PEAP Authentication

11-19User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 11 Logs and ReportsWorking with CSV LogsTip To check for newer informa

Page 393 - EAP-FAST Authentication

Chapter 11 Logs and ReportsWorking with CSV Logs11-20User Guide for Cisco Secure ACS for Windows Server78-16592-01• CSV file location—You can sp

Page 394

11-21User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 11 Logs and ReportsWorking with ODBC LogsStep 7 To generate a new CSV

Page 395 - About Master Keys

Chapter 11 Logs and ReportsWorking with ODBC Logs11-22User Guide for Cisco Secure ACS for Windows Server78-16592-01Preparing for ODBC LoggingTo

Page 396

11-23User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 11 Logs and ReportsWorking with ODBC LogsStep 3 Click Add.Step 4 Selec

Page 397 - About PACs

Chapter 11 Logs and ReportsWorking with ODBC Logs11-24User Guide for Cisco Secure ACS for Windows Server78-16592-01To configure an ODBC log, fol

Page 398 - Automatic PAC Provisioning

11-25User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 11 Logs and ReportsWorking with ODBC LogsNote The user must have suffi

Page 399

Chapter 11 Logs and ReportsRemote Logging11-26User Guide for Cisco Secure ACS for Windows Server78-16592-01c. Click the name of the ODBC log you

Page 400 - Manual PAC Provisioning

11-27User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 11 Logs and ReportsRemote Logginggenerates the accounting logs in the

Page 401 - Master Key and PAC TTLs

Chapter 1 OverviewAAA Server Functions and Concepts1-6User Guide for Cisco Secure ACS for Windows Server78-16592-01• Authorization, page 1-17• Ac

Page 402 - Replication and EAP-FAST

Chapter 11 Logs and ReportsRemote Logging11-28User Guide for Cisco Secure ACS for Windows Server78-16592-01b. Add to the AAA Servers table each

Page 403

11-29User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 11 Logs and ReportsRemote Loggingbehavior enables you to configure one

Page 404

Chapter 11 Logs and ReportsRemote Logging11-30User Guide for Cisco Secure ACS for Windows Server78-16592-01Step 5 Select the applicable remote l

Page 405 - Enabling EAP-FAST

11-31User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 11 Logs and ReportsService LogsStep 8 Click Submit.Cisco Secure ACS sa

Page 406 - Global Authentication Setup

Chapter 11 Logs and ReportsService Logs11-32User Guide for Cisco Secure ACS for Windows Server78-16592-01Services LoggedCisco Secure ACS generat

Page 407

11-33User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 11 Logs and ReportsService LogsConfiguring Service LogsYou can configu

Page 408

Chapter 11 Logs and ReportsService Logs11-34User Guide for Cisco Secure ACS for Windows Server78-16592-01Step 3 To disable the service log file,

Page 409

CHAPTER 12-1User Guide for Cisco Secure ACS for Windows Server78-16592-0112Administrators and Administrative PolicyThis chapter addresses the Cisco Se

Page 410

Chapter 12 Administrators and Administrative PolicyAdministrator Accounts12-2User Guide for Cisco Secure ACS for Windows Server78-16592-01About

Page 411

12-3User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 12 Administrators and Administrative PolicyAdministrator AccountsAdmini

Page 412

1-7User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 1 OverviewAAA Server Functions and ConceptsTACACS+Cisco Secure ACS confor

Page 413

Chapter 12 Administrators and Administrative PolicyAdministrator Accounts12-4User Guide for Cisco Secure ACS for Windows Server78-16592-01Note A

Page 414

12-5User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 12 Administrators and Administrative PolicyAdministrator Accounts–VoIP

Page 415

Chapter 12 Administrators and Administrative PolicyAdministrator Accounts12-6User Guide for Cisco Secure ACS for Windows Server78-16592-01–ACS B

Page 416

12-7User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 12 Administrators and Administrative PolicyAdministrator AccountsAll pr

Page 417

Chapter 12 Administrators and Administrative PolicyAdministrator Accounts12-8User Guide for Cisco Secure ACS for Windows Server78-16592-01Note Y

Page 418

12-9User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 12 Administrators and Administrative PolicyAdministrator AccountsNote I

Page 419

Chapter 12 Administrators and Administrative PolicyAdministrator Accounts12-10User Guide for Cisco Secure ACS for Windows Server78-16592-01Step

Page 420

12-11User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 12 Administrators and Administrative PolicyAccess PolicyDeleting an Ad

Page 421

Chapter 12 Administrators and Administrative PolicyAccess Policy12-12User Guide for Cisco Secure ACS for Windows Server78-16592-01Access Policy

Page 422

12-13User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 12 Administrators and Administrative PolicyAccess PolicyCisco Secure A

Page 423

Chapter 1 OverviewAAA Server Functions and Concepts1-8User Guide for Cisco Secure ACS for Windows Server78-16592-01• RFC 2868• RFC 2869The ports

Page 424

Chapter 12 Administrators and Administrative PolicyAccess Policy12-14User Guide for Cisco Secure ACS for Windows Server78-16592-01Setting Up Acc

Page 425 - Step 5 Click Delete

12-15User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 12 Administrators and Administrative PolicyAccess Policyb. For each IP

Page 426

Chapter 12 Administrators and Administrative PolicySession Policy12-16User Guide for Cisco Secure ACS for Windows Server78-16592-01Session Polic

Page 427

12-17User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 12 Administrators and Administrative PolicySession Policy• Respond to

Page 428

Chapter 12 Administrators and Administrative PolicyAudit Policy12-18User Guide for Cisco Secure ACS for Windows Server78-16592-01Step 5 Set the

Page 429

CHAPTER 13-1User Guide for Cisco Secure ACS for Windows Server78-16592-0113User DatabasesCisco Secure ACS for Windows Server authenticates users again

Page 430

Chapter 13 User DatabasesCiscoSecure User Database13-2User Guide for Cisco Secure ACS for Windows Server78-16592-01• Token Server User Databases

Page 431

13-3User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 13 User DatabasesCiscoSecure User DatabaseUser Import and CreationThere

Page 432

Chapter 13 User DatabasesAbout External User Databases13-4User Guide for Cisco Secure ACS for Windows Server78-16592-01Cisco Secure ACS. Any use

Page 433 - Logs and Reports

13-5User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 13 User DatabasesAbout External User DatabasesFor Cisco Secure ACS to i

Page 434 - Special Logging Attributes

1-9User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 1 OverviewAAA Server Functions and ConceptsThere is a fundamental implici

Page 435

Chapter 13 User DatabasesAbout External User Databases13-6User Guide for Cisco Secure ACS for Windows Server78-16592-01• By Unknown User Policy—

Page 436 - NAC Attributes in Logs

13-7User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 13 User DatabasesWindows User DatabaseWindows User DatabaseYou can conf

Page 437

Chapter 13 User DatabasesWindows User Database13-8User Guide for Cisco Secure ACS for Windows Server78-16592-01What’s Supported with Windows Use

Page 438 - Accounting Logs

13-9User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 13 User DatabasesWindows User DatabaseAuthentication with Windows User

Page 439

Chapter 13 User DatabasesWindows User Database13-10User Guide for Cisco Secure ACS for Windows Server78-16592-01but no trust relationship is est

Page 440

13-11User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 13 User DatabasesWindows User DatabaseWindows Dial-up Networking Clien

Page 441

Chapter 13 User DatabasesWindows User Database13-12User Guide for Cisco Secure ACS for Windows Server78-16592-01To determine the format of a use

Page 442 - Step 2 Click Logged-in Users

13-13User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 13 User DatabasesWindows User DatabaseNon-domain-qualified UsernamesCi

Page 443 - Deleting Logged-in Users

Chapter 13 User DatabasesWindows User Database13-14User Guide for Cisco Secure ACS for Windows Server78-16592-01Note If your Domain List contain

Page 444

13-15User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 13 User DatabasesWindows User DatabaseIf the authentication protocol u

Page 445 - Cisco Secure ACS System Logs

vUser Guide for Cisco Secure ACS for Windows Server78-16592-01ContentsAdministrative Sessions through a NAT Gateway 1-31Accessing the HTML Interface

Page 446

Chapter 1 OverviewAAA Server Functions and Concepts1-10User Guide for Cisco Secure ACS for Windows Server78-16592-01Authentication and User Datab

Page 447 - Working with CSV Logs

Chapter 13 User DatabasesWindows User Database13-16User Guide for Cisco Secure ACS for Windows Server78-16592-01EAP-TLS Domain StrippingIf you u

Page 448 - CSV Log File Locations

13-17User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 13 User DatabasesWindows User DatabaseWhen machine authentication is e

Page 449

Chapter 13 User DatabasesWindows User Database13-18User Guide for Cisco Secure ACS for Windows Server78-16592-01Cisco Secure ACS supports both E

Page 450 - Viewing a CSV Report

13-19User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 13 User DatabasesWindows User Databasethat was added to the local mach

Page 451 - Configuring a CSV Log

Chapter 13 User DatabasesWindows User Database13-20User Guide for Cisco Secure ACS for Windows Server78-16592-01–Calling-Station-Id value not fo

Page 452

13-21User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 13 User DatabasesWindows User DatabaseClient operating systems support

Page 453 - Working with ODBC Logs

Chapter 13 User DatabasesWindows User Database13-22User Guide for Cisco Secure ACS for Windows Server78-16592-01d. On the Protected EAP Properti

Page 454 - Preparing for ODBC Logging

13-23User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 13 User DatabasesWindows User DatabaseNote End-user client computers a

Page 455 - Configuring an ODBC Log

Chapter 13 User DatabasesWindows User Database13-24User Guide for Cisco Secure ACS for Windows Server78-16592-01Cisco Secure ACS allows you to c

Page 456

13-25User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 13 User DatabasesWindows User DatabaseUser-Changeable Passwords with W

Page 457

1-11User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 1 OverviewAAA Server Functions and ConceptsTable 1-3 specifies EAP authe

Page 458 - Remote Logging

Chapter 13 User DatabasesWindows User Database13-26User Guide for Cisco Secure ACS for Windows Server78-16592-01Preparing Users for Authenticati

Page 459

13-27User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 13 User DatabasesWindows User DatabaseTip Windows dialin permission is

Page 460 - Remote Logging Options

Chapter 13 User DatabasesWindows User Database13-28User Guide for Cisco Secure ACS for Windows Server78-16592-01Note The check boxes under MS CH

Page 461

13-29User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 13 User DatabasesWindows User Database• EAP-TLS and PEAP machine authe

Page 462

Chapter 13 User DatabasesWindows User Database13-30User Guide for Cisco Secure ACS for Windows Server78-16592-01Note If you do not change the va

Page 463 - Service Logs

13-31User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 13 User DatabasesWindows User DatabaseStep 3 Click Windows Database.If

Page 464 - Services Logged

Chapter 13 User DatabasesGeneric LDAP13-32User Guide for Cisco Secure ACS for Windows Server78-16592-01Step 7 Click Submit.Cisco Secure ACS save

Page 465 - Configuring Service Logs

13-33User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 13 User DatabasesGeneric LDAP• LDAP Failover, page 13-36• LDAP Configu

Page 466

Chapter 13 User DatabasesGeneric LDAP13-34User Guide for Cisco Secure ACS for Windows Server78-16592-01For each LDAP instance, you can add or le

Page 467 - Administrator Accounts

13-35User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 13 User DatabasesGeneric LDAPIf you choose to make use of domain filte

Page 468 - About Administrator Accounts

Chapter 1 OverviewAAA Server Functions and Concepts1-12User Guide for Cisco Secure ACS for Windows Server78-16592-01• PEAP(EAP-GTC)• PEAP(EAP-MSC

Page 469 - Administrator Privileges

Chapter 13 User DatabasesGeneric LDAP13-36User Guide for Cisco Secure ACS for Windows Server78-16592-01Note With this option, Cisco Secure ACS s

Page 470

13-37User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 13 User DatabasesGeneric LDAPUnsuccessful Previous Authentication with

Page 471

Chapter 13 User DatabasesGeneric LDAP13-38User Guide for Cisco Secure ACS for Windows Server78-16592-01This table contains the following options

Page 472

13-39User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 13 User DatabasesGeneric LDAP–Strip domain before submitting username

Page 473

Chapter 13 User DatabasesGeneric LDAP13-40User Guide for Cisco Secure ACS for Windows Server78-16592-01For example, if the delimiter character i

Page 474

13-41User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 13 User DatabasesGeneric LDAP–UserObjectType—The name of the attribute

Page 475

Chapter 13 User DatabasesGeneric LDAP13-42User Guide for Cisco Secure ACS for Windows Server78-16592-01–Port—The TCP/IP port number on which the

Page 476

13-43User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 13 User DatabasesGeneric LDAP–Admin DN—The DN of the administrator; th

Page 477 - Access Policy

Chapter 13 User DatabasesGeneric LDAP13-44User Guide for Cisco Secure ACS for Windows Server78-16592-01To configure Cisco Secure ACS to use the

Page 478 - Access Policy Options

13-45User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 13 User DatabasesGeneric LDAPStep 8 If you want to limit authenticatio

Page 479

1-13User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 1 OverviewAAA Server Functions and Concepts• ARAP—Uses a two-way challen

Page 480 - Setting Up Access Policy

Chapter 13 User DatabasesGeneric LDAP13-46User Guide for Cisco Secure ACS for Windows Server78-16592-01Note For information about domain filteri

Page 481

13-47User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 13 User DatabasesGeneric LDAPStep 13 In the User Object Class box, typ

Page 482 - Session Policy

Chapter 13 User DatabasesGeneric LDAP13-48User Guide for Cisco Secure ACS for Windows Server78-16592-01Step 20 For the Primary LDAP Server and S

Page 483 - Setting Up Session Policy

13-49User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 13 User DatabasesNovell NDS DatabaseFor example:uid=joesmith,ou=member

Page 484 - Audit Policy

Chapter 13 User DatabasesNovell NDS Database13-50User Guide for Cisco Secure ACS for Windows Server78-16592-01About Novell NDS User DatabasesCis

Page 485 - User Databases

13-51User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 13 User DatabasesNovell NDS DatabaseFor users to authenticate against

Page 486 - CiscoSecure User Database

Chapter 13 User DatabasesNovell NDS Database13-52User Guide for Cisco Secure ACS for Windows Server78-16592-01Novell NDS External User Database

Page 487 - User Import and Creation

13-53User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 13 User DatabasesNovell NDS DatabaseNote If the administrator username

Page 488 - About External User Databases

Chapter 13 User DatabasesNovell NDS Database13-54User Guide for Cisco Secure ACS for Windows Server78-16592-01Before You BeginThe Novell Request

Page 489

13-55User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 13 User DatabasesODBC DatabaseFor more information about the content o

Page 490 - External user

Chapter 1 OverviewAAA Server Functions and Concepts1-14User Guide for Cisco Secure ACS for Windows Server78-16592-01• EAP-FAST—EAP Flexible Authe

Page 491 - Windows User Database

Chapter 13 User DatabasesODBC Database13-56User Guide for Cisco Secure ACS for Windows Server78-16592-01ACS to authenticate against an ODBC-comp

Page 492

13-57User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 13 User DatabasesODBC Database• EAP-TLS Authentication Procedure Input

Page 493 - Trust Relationships

Chapter 13 User DatabasesODBC Database13-58User Guide for Cisco Secure ACS for Windows Server78-16592-01• Group Mapping for Unknown Users—Cisco

Page 494

13-59User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 13 User DatabasesODBC DatabaseCisco Secure ACS grants authorization ba

Page 495

Chapter 13 User DatabasesODBC Database13-60User Guide for Cisco Secure ACS for Windows Server78-16592-01Step 4 Write the stored procedures inten

Page 496

13-61User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 13 User DatabasesODBC DatabaseThe Cisco Secure ACS product CD provides

Page 497

Chapter 13 User DatabasesODBC Database13-62User Guide for Cisco Secure ACS for Windows Server78-16592-01will default to case sensitive, whereas

Page 498 - UPN Usernames

13-63User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 13 User DatabasesODBC DatabaseGRANT EXECUTE ON dbo.CSNTAuthUserPap TO

Page 499

Chapter 13 User DatabasesODBC Database13-64User Guide for Cisco Secure ACS for Windows Server78-16592-01Sample Routine for Generating an EAP-TLS

Page 500 - Machine Authentication

13-65User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 13 User DatabasesODBC DatabaseThe input names are for guidance only. P

Page 501

1-15User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 1 OverviewAAA Server Functions and Concepts• Outbound passwords—The TACA

Page 502

Chapter 13 User DatabasesODBC Database13-66User Guide for Cisco Secure ACS for Windows Server78-16592-01Note If the ODBC database returns data i

Page 503 - Machine Access Restrictions

13-67User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 13 User DatabasesODBC DatabaseThe CSNTGroup and CSNTacctInfo fields ar

Page 504

Chapter 13 User DatabasesODBC Database13-68User Guide for Cisco Secure ACS for Windows Server78-16592-01Note Because Cisco Secure ACS performs a

Page 505

13-69User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 13 User DatabasesODBC DatabaseThe CSNTGroup and CSNTacctInfo fields ar

Page 506

Chapter 13 User DatabasesODBC Database13-70User Guide for Cisco Secure ACS for Windows Server78-16592-01Configuring a System Data Source Name fo

Page 507

13-71User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 13 User DatabasesODBC DatabaseStep 10 Close the ODBC Data Source Admin

Page 508

Chapter 13 User DatabasesODBC Database13-72User Guide for Cisco Secure ACS for Windows Server78-16592-01Step 6 From the System DSN list, select

Page 509

13-73User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 13 User DatabasesODBC DatabaseStep 11 From the DSN Procedure Type list

Page 510

Chapter 13 User DatabasesODBC Database13-74User Guide for Cisco Secure ACS for Windows Server78-16592-01Note If you enabled CHAP/MS-CHAP/ARAP au

Page 511

13-75User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 13 User DatabasesLEAP Proxy RADIUS Server DatabaseLEAP Proxy RADIUS Se

Page 512

Chapter 1 OverviewAAA Server Functions and Concepts1-16User Guide for Cisco Secure ACS for Windows Server78-16592-01For information on the requir

Page 513

Chapter 13 User DatabasesLEAP Proxy RADIUS Server Database13-76User Guide for Cisco Secure ACS for Windows Server78-16592-01Configuring a LEAP P

Page 514

13-77User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 13 User DatabasesLEAP Proxy RADIUS Server DatabaseStep 7 In the follow

Page 515

Chapter 13 User DatabasesToken Server User Databases13-78User Guide for Cisco Secure ACS for Windows Server78-16592-01Token Server User Database

Page 516 - Generic LDAP

13-79User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 13 User DatabasesToken Server User DatabasesFor RSA SecurID, Cisco Sec

Page 517 - Multiple LDAP Instances

Chapter 13 User DatabasesToken Server User Databases13-80User Guide for Cisco Secure ACS for Windows Server78-16592-01About RADIUS-Enabled Token

Page 518 - Domain Filtering

13-81User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 13 User DatabasesToken Server User DatabasesCisco Secure ACS expects t

Page 519

Chapter 13 User DatabasesToken Server User Databases13-82User Guide for Cisco Secure ACS for Windows Server78-16592-01c. Click Submit.Cisco Secu

Page 520 - LDAP Failover

13-83User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 13 User DatabasesToken Server User Databases• Timeout (seconds):—The n

Page 521 - LDAP Configuration Options

Chapter 13 User DatabasesToken Server User Databases13-84User Guide for Cisco Secure ACS for Windows Server78-16592-01Note You should only use t

Page 522

13-85User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 13 User DatabasesToken Server User DatabasesConfiguring an RSA SecurID

Page 523

1-17User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 1 OverviewAAA Server Functions and Concepts• Configurable character stri

Page 524

Chapter 13 User DatabasesDeleting an External User Database Configuration13-86User Guide for Cisco Secure ACS for Windows Server78-16592-01Step

Page 525

13-87User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 13 User DatabasesDeleting an External User Database ConfigurationStep

Page 526

Chapter 13 User DatabasesDeleting an External User Database Configuration13-88User Guide for Cisco Secure ACS for Windows Server78-16592-01

Page 527

CHAPTER 14-1User Guide for Cisco Secure ACS for Windows Server78-16592-0114Network Admission ControlNAC enables you to control the degree of access pe

Page 528

Chapter 14 Network Admission ControlAbout Network Admission Control14-2User Guide for Cisco Secure ACS for Windows Server78-16592-01NAC AAA Comp

Page 529

14-3User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 14 Network Admission ControlAbout Network Admission ControlPosture Vali

Page 530

Chapter 14 Network Admission ControlAbout Network Admission Control14-4User Guide for Cisco Secure ACS for Windows Server78-16592-016. Cisco Sec

Page 531

14-5User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 14 Network Admission ControlImplementing Network Admission ControlFrom

Page 532

Chapter 14 Network Admission ControlImplementing Network Admission Control14-6User Guide for Cisco Secure ACS for Windows Server78-16592-01To im

Page 533 - Novell NDS Database

14-7User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 14 Network Admission ControlImplementing Network Admission ControlStep

Page 534

Chapter 1 OverviewAAA Server Functions and Concepts1-18User Guide for Cisco Secure ACS for Windows Server78-16592-01This section contains the fol

Page 535 - User Contexts

Chapter 14 Network Admission ControlImplementing Network Admission Control14-8User Guide for Cisco Secure ACS for Windows Server78-16592-01b. Cr

Page 536

14-9User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 14 Network Admission ControlImplementing Network Admission Controlb. (O

Page 537

Chapter 14 Network Admission ControlNAC Databases14-10User Guide for Cisco Secure ACS for Windows Server78-16592-01NAC DatabasesThis section con

Page 538

14-11User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 14 Network Admission ControlNAC Databasesmandatory credential types. T

Page 539 - ODBC Database

Chapter 14 Network Admission ControlNAC Databases14-12User Guide for Cisco Secure ACS for Windows Server78-16592-01Cisco Secure ACS communicates

Page 540

14-13User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 14 Network Admission ControlNAC Databases–Name—Displays the policy nam

Page 541

Chapter 14 Network Admission ControlNAC Databases14-14User Guide for Cisco Secure ACS for Windows Server78-16592-01Configuring a NAC DatabaseThi

Page 542 - External User Database

14-15User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 14 Network Admission ControlNAC DatabasesStep 6 Click Configure.Cautio

Page 543 - Relational Database

Chapter 14 Network Admission ControlNAC Policies14-16User Guide for Cisco Secure ACS for Windows Server78-16592-01b. If you need to create a pol

Page 544

14-17User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 14 Network Admission ControlNAC PoliciesPolicies are reusable; that is

Page 545 - Type Definitions

1-19User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 1 OverviewAAA Server Functions and ConceptsQuotas can be either absolute

Page 546 - Procedure

Chapter 14 Network Admission ControlNAC Policies14-18User Guide for Cisco Secure ACS for Windows Server78-16592-01About Local PoliciesLocal poli

Page 547

14-19User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 14 Network Admission ControlNAC PoliciesAbout Rules, Rule Elements, an

Page 548

Chapter 14 Network Admission ControlNAC Policies14-20User Guide for Cisco Secure ACS for Windows Server78-16592-01• unsigned integer—The attribu

Page 549 - PAP Procedure Output

14-21User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 14 Network Admission ControlNAC PoliciesThe following are the operator

Page 550

Chapter 14 Network Admission ControlNAC Policies14-22User Guide for Cisco Secure ACS for Windows Server78-16592-01–$ (dollar)—The $ operator mat

Page 551

14-23User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 14 Network Admission ControlNAC Policies• Description—Specifies a text

Page 552 - EAP-TLS Procedure Output

Chapter 14 Network Admission ControlNAC Policies14-24User Guide for Cisco Secure ACS for Windows Server78-16592-01Note Under Default Rule, the m

Page 553 - Result Codes

14-25User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 14 Network Admission ControlNAC Policiesappear in the Attribute list.

Page 554

Chapter 14 Network Admission ControlNAC Policies14-26User Guide for Cisco Secure ACS for Windows Server78-16592-01b. Click Database Configuratio

Page 555

14-27User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 14 Network Admission ControlNAC PoliciesTip If you want to change a ru

Page 556

ContentsviUser Guide for Cisco Secure ACS for Windows Server78-16592-01CHAPTER 3 Interface Configuration 3-1Interface Design Concepts 3-2User-to-Grou

Page 557

Chapter 1 OverviewAAA Server Functions and Concepts1-20User Guide for Cisco Secure ACS for Windows Server78-16592-01AAA client that uses TACACS+.

Page 558

Chapter 14 Network Admission ControlNAC Policies14-28User Guide for Cisco Secure ACS for Windows Server78-16592-01When Cisco Secure ACS applies

Page 559

14-29User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 14 Network Admission ControlNAC PoliciesCisco Secure ACS evaluates a p

Page 560

Chapter 14 Network Admission ControlNAC Policies14-30User Guide for Cisco Secure ACS for Windows Server78-16592-01ACS cannot reach the primary s

Page 561

14-31User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 14 Network Admission ControlNAC Policies–Password—Specifies the passwo

Page 562 - Token Server User Databases

Chapter 14 Network Admission ControlNAC Policies14-32User Guide for Cisco Secure ACS for Windows Server78-16592-01• Forwarding Credential Types—

Page 563 - RADIUS-Enabled Token Servers

14-33User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 14 Network Admission ControlNAC Policiesd. Under Credential Validation

Page 564

Chapter 14 Network Admission ControlNAC Policies14-34User Guide for Cisco Secure ACS for Windows Server78-16592-01The Select External Policies p

Page 565

14-35User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 14 Network Admission ControlNAC PoliciesTip If the policy you want to

Page 566

Chapter 14 Network Admission ControlNAC Policies14-36User Guide for Cisco Secure ACS for Windows Server78-16592-01Deleting a PolicyBefore You Be

Page 567

14-37User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 14 Network Admission ControlNAC PoliciesStep 5 Click Delete Policy.Ste

Page 568 - RSA SecurID Token Servers

1-21User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 1 OverviewAAA Server Functions and ConceptsOther Authorization-Related F

Page 569

Chapter 14 Network Admission ControlNAC Policies14-38User Guide for Cisco Secure ACS for Windows Server78-16592-01

Page 570

CHAPTER 15-1User Guide for Cisco Secure ACS for Windows Server78-16592-0115Unknown User PolicyAfter you have configured at least one database in the E

Page 571

Chapter 15 Unknown User PolicyKnown, Unknown, and Discovered Users15-2User Guide for Cisco Secure ACS for Windows Server78-16592-01• Posture Val

Page 572

15-3User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 15 Unknown User PolicyKnown, Unknown, and Discovered UsersCisco Secure

Page 573 - Network Admission Control

Chapter 15 Unknown User PolicyAuthentication and Unknown Users15-4User Guide for Cisco Secure ACS for Windows Server78-16592-01–Authentication—T

Page 574 - NAC AAA Components

15-5User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 15 Unknown User PolicyAuthentication and Unknown UsersThe Unknown User

Page 575 - Posture Validation

Chapter 15 Unknown User PolicyAuthentication and Unknown Users15-6User Guide for Cisco Secure ACS for Windows Server78-16592-01Note Because user

Page 576 - Posture Tokens

15-7User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 15 Unknown User PolicyAuthentication and Unknown Userswith various Wind

Page 577

Chapter 15 Unknown User PolicyAuthentication and Unknown Users15-8User Guide for Cisco Secure ACS for Windows Server78-16592-01Note If your netw

Page 578

15-9User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 15 Unknown User PolicyAuthentication and Unknown UsersAdded Authenticat

Page 579

Chapter 1 OverviewAAA Server Functions and Concepts1-22User Guide for Cisco Secure ACS for Windows Server78-16592-01AccountingAAA clients use the

Page 580

Chapter 15 Unknown User PolicyPosture Validation and the Unknown User Policy15-10User Guide for Cisco Secure ACS for Windows Server78-16592-01Po

Page 581

15-11User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 15 Unknown User PolicyPosture Validation and the Unknown User PolicyCr

Page 582 - NAC Databases

Chapter 15 Unknown User PolicyPosture Validation and the Unknown User Policy15-12User Guide for Cisco Secure ACS for Windows Server78-16592-01No

Page 583

15-13User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 15 Unknown User PolicyAuthorization of Unknown UsersAuthorization of U

Page 584

Chapter 15 Unknown User PolicyDatabase Search Order15-14User Guide for Cisco Secure ACS for Windows Server78-16592-01• External Databases—Of the

Page 585 - Policy Selection Options

15-15User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 15 Unknown User PolicyDatabase Search Order• Posture validation—The Un

Page 586 - Configuring a NAC Database

Chapter 15 Unknown User PolicyConfiguring the Unknown User Policy15-16User Guide for Cisco Secure ACS for Windows Server78-16592-01Tip If you cr

Page 587

15-17User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 15 Unknown User PolicyDisabling Unknown User AuthenticationNote For mo

Page 588 - NAC Policies

Chapter 15 Unknown User PolicyDisabling Unknown User Authentication15-18User Guide for Cisco Secure ACS for Windows Server78-16592-01

Page 589 - Local Policies

CHAPTER 16-1User Guide for Cisco Secure ACS for Windows Server78-16592-0116User Group Mapping and SpecificationThis chapter provides information about

Page 590 - About Local Policies

1-23User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 1 OverviewAAA Server Functions and ConceptsAdministrationTo configure, m

Page 591 - NAC Attribute Data Types

Chapter 16 User Group Mapping and SpecificationGroup Mapping by External User Database16-2User Guide for Cisco Secure ACS for Windows Server78-1

Page 592 - Rule Operators

16-3User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 16 User Group Mapping and SpecificationGroup Mapping by External User D

Page 593

Chapter 16 User Group Mapping and SpecificationGroup Mapping by Group Set Membership16-4User Guide for Cisco Secure ACS for Windows Server78-165

Page 594

16-5User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 16 User Group Mapping and SpecificationGroup Mapping by Group Set Membe

Page 595

Chapter 16 User Group Mapping and SpecificationGroup Mapping by Group Set Membership16-6User Guide for Cisco Secure ACS for Windows Server78-165

Page 596 - Rule Configuration Options

16-7User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 16 User Group Mapping and SpecificationGroup Mapping by Group Set Membe

Page 597 - Creating a Local Policy

Chapter 16 User Group Mapping and SpecificationGroup Mapping by Group Set Membership16-8User Guide for Cisco Secure ACS for Windows Server78-165

Page 598

16-9User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 16 User Group Mapping and SpecificationGroup Mapping by Group Set Membe

Page 599

Chapter 16 User Group Mapping and SpecificationGroup Mapping by Group Set Membership16-10User Guide for Cisco Secure ACS for Windows Server78-16

Page 600 - External Policies

16-11User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 16 User Group Mapping and SpecificationGroup Mapping by Group Set Memb

Page 601

Chapter 1 OverviewAAA Server Functions and Concepts1-24User Guide for Cisco Secure ACS for Windows Server78-16592-01For information about configu

Page 602

Chapter 16 User Group Mapping and SpecificationGroup Mapping by Group Set Membership16-12User Guide for Cisco Secure ACS for Windows Server78-16

Page 603

16-13User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 16 User Group Mapping and SpecificationNAC Group MappingThe Order mapp

Page 604 - Creating an External Policy

Chapter 16 User Group Mapping and SpecificationRADIUS-Based Group Specification16-14User Guide for Cisco Secure ACS for Windows Server78-16592-0

Page 605

16-15User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 16 User Group Mapping and SpecificationRADIUS-Based Group Specificatio

Page 606 - Editing a Policy

Chapter 16 User Group Mapping and SpecificationRADIUS-Based Group Specification16-16User Guide for Cisco Secure ACS for Windows Server78-16592-0

Page 607

A-1User Guide for Cisco Secure ACS for Windows Server78-16592-01APPENDIXATroubleshootingThis appendix provides information about certain basic proble

Page 608 - Deleting a Policy

Appendix A TroubleshootingAdministration IssuesA-2User Guide for Cisco Secure ACS for Windows Server78-16592-01Administration IssuesCondition Re

Page 609 - Step 6 Click Submit

A-3User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix A TroubleshootingAdministration IssuesAdministrator configured for even

Page 610

Appendix A TroubleshootingBrowser IssuesA-4User Guide for Cisco Secure ACS for Windows Server78-16592-01Browser IssuesCondition Recovery ActionT

Page 611 - Unknown User Policy

A-5User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix A TroubleshootingCisco IOS IssuesCisco IOS IssuesCondition Recovery Act

Page 612

1-25User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 1 OverviewCisco Secure ACS HTML Interface• CSMonitor service, providing

Page 613

Appendix A TroubleshootingCisco IOS IssuesA-6User Guide for Cisco Secure ACS for Windows Server78-16592-01Under EXEC Commands, Cisco IOS command

Page 614

A-7User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix A TroubleshootingDatabase IssuesDatabase IssuesCondition Recovery Actio

Page 615

Appendix A TroubleshootingDatabase IssuesA-8User Guide for Cisco Secure ACS for Windows Server78-16592-01External databases not operating proper

Page 616

A-9User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix A TroubleshootingDatabase IssuesUnable to authenticate against the Nove

Page 617 - \username. The

Appendix A TroubleshootingDial-in Connection IssuesA-10User Guide for Cisco Secure ACS for Windows Server78-16592-01Dial-in Connection IssuesCon

Page 618

A-11User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix A TroubleshootingDial-in Connection IssuesA dial-in user cannot connec

Page 619 - Added Authentication Latency

Appendix A TroubleshootingDial-in Connection IssuesA-12User Guide for Cisco Secure ACS for Windows Server78-16592-01A dial-in user cannot connec

Page 620 - :username

A-13User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix A TroubleshootingDial-in Connection IssuesA dial-in user cannot connec

Page 621

Appendix A TroubleshootingDebug IssuesA-14User Guide for Cisco Secure ACS for Windows Server78-16592-01Debug IssuesCondition Recovery ActionWhen

Page 622

A-15User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix A TroubleshootingProxy IssuesProxy IssuesCondition Recovery ActionProx

Page 623 - Unknown User Policy Options

Chapter 1 OverviewCisco Secure ACS HTML Interface1-26User Guide for Cisco Secure ACS for Windows Server78-16592-01This section contains the follo

Page 624 - Database Search Order

Appendix A TroubleshootingInstallation and Upgrade IssuesA-16User Guide for Cisco Secure ACS for Windows Server78-16592-01Installation and Upgra

Page 625

A-17User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix A TroubleshootingReport IssuesReport IssuesCondition Recovery ActionTh

Page 626

Appendix A TroubleshootingReport IssuesA-18User Guide for Cisco Secure ACS for Windows Server78-16592-01The Logged in Users report works with so

Page 627

A-19User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix A TroubleshootingThird-Party Server IssuesThird-Party Server IssuesCon

Page 628

Appendix A TroubleshootingUser Authentication IssuesA-20User Guide for Cisco Secure ACS for Windows Server78-16592-01User Authentication IssuesC

Page 629 - Specification

A-21User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix A TroubleshootingUser Authentication IssuesAuthentication fails; the e

Page 630

Appendix A TroubleshootingTACACS+ and RADIUS Attribute IssuesA-22User Guide for Cisco Secure ACS for Windows Server78-16592-01TACACS+ and RADIUS

Page 631

B-1User Guide for Cisco Secure ACS for Windows Server78-16592-01APPENDIXBTACACS+ Attribute-Value PairsCisco Secure Access Control Server (ACS) for Wi

Page 632 - • Generic LDAP

Appendix B TACACS+ Attribute-Value PairsCisco IOS AV Pair DictionaryB-2User Guide for Cisco Secure ACS for Windows Server78-16592-01TACACS+ AV P

Page 633 - Group Mapping Order

B-3User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix B TACACS+ Attribute-Value PairsCisco IOS AV Pair Dictionary• ip-address

Page 634

1-27User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 1 OverviewCisco Secure ACS HTML InterfaceAdministrative sessions timeout

Page 635

Appendix B TACACS+ Attribute-Value PairsCisco IOS AV Pair DictionaryB-4User Guide for Cisco Secure ACS for Windows Server78-16592-01• wins-serve

Page 636

B-5User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix B TACACS+ Attribute-Value PairsCisco IOS AV Pair Dictionary• protocol•

Page 637

Appendix B TACACS+ Attribute-Value PairsCisco IOS AV Pair DictionaryB-6User Guide for Cisco Secure ACS for Windows Server78-16592-01

Page 638

C-1User Guide for Cisco Secure ACS for Windows Server78-16592-01APPENDIXCRADIUS AttributesCisco Secure Access Control Server (ACS) for Windows Server

Page 639

Appendix C RADIUS AttributesCisco IOS Dictionary of RADIUS AV PairsC-2User Guide for Cisco Secure ACS for Windows Server78-16592-013. In the pro

Page 640

C-3User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix C RADIUS AttributesCisco IOS Dictionary of RADIUS AV PairsNote If you s

Page 641 - NAC Group Mapping

Appendix C RADIUS AttributesCisco IOS Dictionary of RADIUS AV PairsC-4User Guide for Cisco Secure ACS for Windows Server78-16592-0113 Framed-Com

Page 642

C-5User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix C RADIUS AttributesCisco IOS/PIX Dictionary of RADIUS VSAsCisco IOS/PIX

Page 643

Appendix C RADIUS AttributesCisco IOS/PIX Dictionary of RADIUS VSAsC-6User Guide for Cisco Secure ACS for Windows Server78-16592-0124 cisco-h323

Page 644

C-7User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix C RADIUS AttributesAbout the cisco-av-pair RADUIS AttributeAbout the ci

Page 645 - Troubleshooting

Chapter 1 OverviewCisco Secure ACS HTML Interface1-28User Guide for Cisco Secure ACS for Windows Server78-16592-01advanced features such as datab

Page 646 - Administration Issues

Appendix C RADIUS AttributesAbout the cisco-av-pair RADUIS AttributeC-8User Guide for Cisco Secure ACS for Windows Server78-16592-01In IOS, supp

Page 647

C-9User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix C RADIUS AttributesCisco VPN 3000 Concentrator Dictionary of RADIUS VSA

Page 648 - Browser Issues

Appendix C RADIUS AttributesCisco VPN 3000 Concentrator Dictionary of RADIUS VSAsC-10User Guide for Cisco Secure ACS for Windows Server78-16592-

Page 649 - Cisco IOS Issues

C-11User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix C RADIUS AttributesCisco VPN 3000 Concentrator Dictionary of RADIUS VS

Page 650

Appendix C RADIUS AttributesCisco VPN 3000 Concentrator Dictionary of RADIUS VSAsC-12User Guide for Cisco Secure ACS for Windows Server78-16592-

Page 651 - Database Issues

C-13User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix C RADIUS AttributesCisco VPN 5000 Concentrator Dictionary of RADIUS VS

Page 652

Appendix C RADIUS AttributesCisco Building Broadband Service Manager Dictionary of RADIUS VSAC-14User Guide for Cisco Secure ACS for Windows Ser

Page 653

C-15User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix C RADIUS AttributesIETF Dictionary of RADIUS AV Pairs5 NAS-Port Physic

Page 654 - Dial-in Connection Issues

Appendix C RADIUS AttributesIETF Dictionary of RADIUS AV PairsC-16User Guide for Cisco Secure ACS for Windows Server78-16592-016 Service-Type Ty

Page 655

C-17User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix C RADIUS AttributesIETF Dictionary of RADIUS AV Pairs10 Framed-Routing

Page 656

1-29User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 1 OverviewCisco Secure ACS HTML Interface–Online Help—Displays basic hel

Page 657

Appendix C RADIUS AttributesIETF Dictionary of RADIUS AV PairsC-18User Guide for Cisco Secure ACS for Windows Server78-16592-0115 Login-Service

Page 658 - Debug Issues

C-19User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix C RADIUS AttributesIETF Dictionary of RADIUS AV Pairs24 State Allows S

Page 659 - Proxy Issues

Appendix C RADIUS AttributesIETF Dictionary of RADIUS AV PairsC-20User Guide for Cisco Secure ACS for Windows Server78-16592-0128 Idle-Timeout M

Page 660 - MaxSessions Issues

C-21User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix C RADIUS AttributesIETF Dictionary of RADIUS AV Pairs34 Login-LAT-Serv

Page 661 - Report Issues

Appendix C RADIUS AttributesIETF Dictionary of RADIUS AV PairsC-22User Guide for Cisco Secure ACS for Windows Server78-16592-0144 Acct-Session-I

Page 662

C-23User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix C RADIUS AttributesIETF Dictionary of RADIUS AV Pairs49 Acct-Terminate

Page 663 - Third-Party Server Issues

Appendix C RADIUS AttributesIETF Dictionary of RADIUS AV PairsC-24User Guide for Cisco Secure ACS for Windows Server78-16592-0152 Acct-Input-Gig

Page 664 - User Authentication Issues

C-25User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix C RADIUS AttributesIETF Dictionary of RADIUS AV Pairs66 Tunnel-Client-

Page 665 - • If you have RADIUS/TACACS

Appendix C RADIUS AttributesIETF Dictionary of RADIUS AV PairsC-26User Guide for Cisco Secure ACS for Windows Server78-16592-0181 Tunnel-Private

Page 666 - Note Some attributes are not

C-27User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix C RADIUS AttributesIETF Dictionary of RADIUS AV Pairs193 Pre-Output-Pa

Page 667 - TACACS+ Attribute-Value Pairs

viiUser Guide for Cisco Secure ACS for Windows Server78-16592-01ContentsAAA Client Configuration 4-11AAA Client Configuration Options 4-11Adding a AA

Page 668 - TACACS+ AV Pairs

Chapter 1 OverviewCisco Secure ACS HTML Interface1-30User Guide for Cisco Secure ACS for Windows Server78-16592-01If SSL is enabled and you do no

Page 669 - Cisco IOS AV Pair Dictionary

Appendix C RADIUS AttributesMicrosoft MPPE Dictionary of RADIUS VSAsC-28User Guide for Cisco Secure ACS for Windows Server78-16592-01Microsoft M

Page 670 - TACACS+ Accounting AV Pairs

C-29User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix C RADIUS AttributesMicrosoft MPPE Dictionary of RADIUS VSAs5MS-CHAP-LM

Page 671

Appendix C RADIUS AttributesMicrosoft MPPE Dictionary of RADIUS VSAsC-30User Guide for Cisco Secure ACS for Windows Server78-16592-0112 MS-CHAP-

Page 672

C-31User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix C RADIUS AttributesAscend Dictionary of RADIUS AV PairsAscend Dictiona

Page 673

Appendix C RADIUS AttributesAscend Dictionary of RADIUS AV PairsC-32User Guide for Cisco Secure ACS for Windows Server78-16592-016 Service-Type

Page 674

C-33User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix C RADIUS AttributesAscend Dictionary of RADIUS AV Pairs44 Acct-Session

Page 675

Appendix C RADIUS AttributesAscend Dictionary of RADIUS AV PairsC-34User Guide for Cisco Secure ACS for Windows Server78-16592-01112 Ascend-CBCP

Page 676

C-35User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix C RADIUS AttributesAscend Dictionary of RADIUS AV Pairs128 Ascend-Shar

Page 677

Appendix C RADIUS AttributesAscend Dictionary of RADIUS AV PairsC-36User Guide for Cisco Secure ACS for Windows Server78-16592-01145 Ascend-Assi

Page 678

C-37User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix C RADIUS AttributesAscend Dictionary of RADIUS AV PairsFrame Datalink

Page 679

1-31User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 1 OverviewCisco Secure ACS HTML InterfaceAlso, IP filtering of proxied a

Page 680

Appendix C RADIUS AttributesAscend Dictionary of RADIUS AV PairsC-38User Guide for Cisco Secure ACS for Windows Server78-16592-01170 Ascend-TS-I

Page 681

C-39User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix C RADIUS AttributesAscend Dictionary of RADIUS AV Pairs185 Ascend-Home

Page 682

Appendix C RADIUS AttributesAscend Dictionary of RADIUS AV PairsC-40User Guide for Cisco Secure ACS for Windows Server78-16592-01205 Ascend-Menu

Page 683

C-41User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix C RADIUS AttributesAscend Dictionary of RADIUS AV Pairs221 Ascend-FR-D

Page 684

Appendix C RADIUS AttributesAscend Dictionary of RADIUS AV PairsC-42User Guide for Cisco Secure ACS for Windows Server78-16592-01238 Ascend-Seco

Page 685

C-43User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix C RADIUS AttributesNortel Dictionary of RADIUS VSAsNortel Dictionary o

Page 686 - Dictionary of RADIUS VSA

Appendix C RADIUS AttributesJuniper Dictionary of RADIUS VSAsC-44User Guide for Cisco Secure ACS for Windows Server78-16592-01Juniper Dictionary

Page 687

D-1User Guide for Cisco Secure ACS for Windows Server78-16592-01APPENDIXDCSUtil Database UtilityThis appendix details the Cisco Secure Access Control

Page 688

Appendix D CSUtil Database UtilityLocation of CSUtil.exe and Related FilesD-2User Guide for Cisco Secure ACS for Windows Server78-16592-01• Expo

Page 689

D-3User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix D CSUtil Database UtilityCSUtil.exe OptionsNote Most CSUtil.exe options

Page 690

Chapter 1 OverviewCisco Secure ACS HTML Interface1-32User Guide for Cisco Secure ACS for Windows Server78-16592-01If Cisco Secure ACS is behind a

Page 691

Appendix D CSUtil Database UtilityCSUtil.exe OptionsD-4User Guide for Cisco Secure ACS for Windows Server78-16592-01• -i—Import user or AAA clie

Page 692

D-5User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix D CSUtil Database UtilityDisplaying Command-Line Syntax• -listUDV—List

Page 693

Appendix D CSUtil Database UtilityBacking Up Cisco Secure ACS with CSUtil.exeD-6User Guide for Cisco Secure ACS for Windows Server78-16592-01Bac

Page 694

D-7User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix D CSUtil Database UtilityRestoring Cisco Secure ACS with CSUtil.exeRest

Page 695

Appendix D CSUtil Database UtilityCreating a CiscoSecure User DatabaseD-8User Guide for Cisco Secure ACS for Windows Server78-16592-01• To resto

Page 696

D-9User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix D CSUtil Database UtilityCreating a CiscoSecure User DatabaseTo create

Page 697

Appendix D CSUtil Database UtilityCreating a Cisco Secure ACS Database Dump FileD-10User Guide for Cisco Secure ACS for Windows Server78-16592-0

Page 698

D-11User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix D CSUtil Database UtilityLoading the Cisco Secure ACS Database from a

Page 699

Appendix D CSUtil Database UtilityCompacting the CiscoSecure User DatabaseD-12User Guide for Cisco Secure ACS for Windows Server78-16592-01Step

Page 700 - • Ascend

D-13User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix D CSUtil Database UtilityCompacting the CiscoSecure User DatabaseCompa

Page 701

1-33User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 1 OverviewCisco Secure ACS HTML InterfaceStep 2 In the Address or Locati

Page 702 - Note The MS-CHAP-MPPE-Keys

Appendix D CSUtil Database UtilityUser and AAA Client Import OptionD-14User Guide for Cisco Secure ACS for Windows Server78-16592-01If you do no

Page 703

D-15User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix D CSUtil Database UtilityUser and AAA Client Import OptionImporting Us

Page 704

Appendix D CSUtil Database UtilityUser and AAA Client Import OptionD-16User Guide for Cisco Secure ACS for Windows Server78-16592-01b. To start

Page 705

D-17User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix D CSUtil Database UtilityUser and AAA Client Import OptionAbout User a

Page 706

Appendix D CSUtil Database UtilityUser and AAA Client Import OptionD-18User Guide for Cisco Secure ACS for Windows Server78-16592-01ADD Statemen

Page 707

D-19User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix D CSUtil Database UtilityUser and AAA Client Import OptionFor example,

Page 708

Appendix D CSUtil Database UtilityUser and AAA Client Import OptionD-20User Guide for Cisco Secure ACS for Windows Server78-16592-01Table D-3 UP

Page 709

D-21User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix D CSUtil Database UtilityUser and AAA Client Import OptionFor example,

Page 710

Appendix D CSUtil Database UtilityUser and AAA Client Import OptionD-22User Guide for Cisco Secure ACS for Windows Server78-16592-01Table D-5 AD

Page 711

D-23User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix D CSUtil Database UtilityUser and AAA Client Import OptionFor example,

Page 712

Chapter 1 OverviewCisco Secure ACS HTML Interface1-34User Guide for Cisco Secure ACS for Windows Server78-16592-01Using Online HelpOnline help is

Page 713

Appendix D CSUtil Database UtilityExporting User List to a Text FileD-24User Guide for Cisco Secure ACS for Windows Server78-16592-01Import File

Page 714

D-25User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix D CSUtil Database UtilityExporting Group Information to a Text FileSte

Page 715 - Table C-9 Nortel RADIUS VSAs

Appendix D CSUtil Database UtilityExporting Registry Information to a Text FileD-26User Guide for Cisco Secure ACS for Windows Server78-16592-01

Page 716

D-27User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix D CSUtil Database UtilityDecoding Error NumbersCSUtil.exe exports Wind

Page 717 - CSUtil Database Utility

Appendix D CSUtil Database UtilityRecalculating CRC ValuesD-28User Guide for Cisco Secure ACS for Windows Server78-16592-01Step 2 Type:CSUtil.ex

Page 718 - CSUtil.exe Syntax

D-29User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix D CSUtil Database UtilityUser-Defined RADIUS Vendors and VSA SetsAbout

Page 719 - CSUtil.exe Options

Appendix D CSUtil Database UtilityUser-Defined RADIUS Vendors and VSA SetsD-30User Guide for Cisco Secure ACS for Windows Server78-16592-01Befor

Page 720

D-31User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix D CSUtil Database UtilityUser-Defined RADIUS Vendors and VSA SetsNote

Page 721 - CSUtil.exe -x

Appendix D CSUtil Database UtilityUser-Defined RADIUS Vendors and VSA SetsD-32User Guide for Cisco Secure ACS for Windows Server78-16592-01Step

Page 722 - Step 2 Type:

D-33User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix D CSUtil Database UtilityUser-Defined RADIUS Vendors and VSA SetsStep

Page 723

1-35User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 1 OverviewCisco Secure ACS HTML InterfaceTo access online documentation,

Page 724 - CSUtil.exe -r config filename

Appendix D CSUtil Database UtilityUser-Defined RADIUS Vendors and VSA SetsD-34User Guide for Cisco Secure ACS for Windows Server78-16592-01Step

Page 725

D-35User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix D CSUtil Database UtilityUser-Defined RADIUS Vendors and VSA SetsVendo

Page 726 - Step 3 Type:

Appendix D CSUtil Database UtilityUser-Defined RADIUS Vendors and VSA SetsD-36User Guide for Cisco Secure ACS for Windows Server78-16592-01For e

Page 727 - Dump File

D-37User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix D CSUtil Database UtilityUser-Defined RADIUS Vendors and VSA SetsTable

Page 728

Appendix D CSUtil Database UtilityUser-Defined RADIUS Vendors and VSA SetsD-38User Guide for Cisco Secure ACS for Windows Server78-16592-01For e

Page 729

D-39User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix D CSUtil Database UtilityUser-Defined RADIUS Vendors and VSA SetsFor e

Page 730

Appendix D CSUtil Database UtilityPAC File GenerationD-40User Guide for Cisco Secure ACS for Windows Server78-16592-01VSA 2=widget-admin-interfa

Page 731

D-41User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix D CSUtil Database UtilityPAC File GenerationPAC File Options and Examp

Page 732

Appendix D CSUtil Database UtilityPAC File GenerationD-42User Guide for Cisco Secure ACS for Windows Server78-16592-01–-f list—CSUtil.exe genera

Page 733 - ONLINE or OFFLINE Statement

D-43User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix D CSUtil Database UtilityPAC File GenerationGenerating PAC FilesNote I

Page 734 - ADD Statements

Chapter 1 OverviewCisco Secure ACS HTML Interface1-36User Guide for Cisco Secure ACS for Windows Server78-16592-01

Page 735 - UPDATE Statements

Appendix D CSUtil Database UtilityPosture Validation AttributesD-44User Guide for Cisco Secure ACS for Windows Server78-16592-01If you specified

Page 736

D-45User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix D CSUtil Database UtilityPosture Validation AttributesExample D-1 show

Page 737 - ADD_NAS Statements

Appendix D CSUtil Database UtilityPosture Validation AttributesD-46User Guide for Cisco Secure ACS for Windows Server78-16592-01Vendor IDs have

Page 738

D-47User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix D CSUtil Database UtilityPosture Validation Attributes• attribute-name

Page 739 - DEL_NAS Statements

Appendix D CSUtil Database UtilityPosture Validation AttributesD-48User Guide for Cisco Secure ACS for Windows Server78-16592-01–date–version–oc

Page 740 - Import File Example

D-49User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix D CSUtil Database UtilityPosture Validation Attributes• To preserve th

Page 741

Appendix D CSUtil Database UtilityPosture Validation AttributesD-50User Guide for Cisco Secure ACS for Windows Server78-16592-01Tip When you spe

Page 742

D-51User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix D CSUtil Database UtilityPosture Validation AttributesDeleting a Postu

Page 743 - Decoding Error Numbers

Appendix D CSUtil Database UtilityPosture Validation AttributesD-52User Guide for Cisco Secure ACS for Windows Server78-16592-01CSUtil v3.3, Cop

Page 744 - Recalculating CRC Values

D-53User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix D CSUtil Database UtilityPosture Validation Attributesattribute-name=A

Page 745

CHAPTER 2-1User Guide for Cisco Secure ACS for Windows Server78-16592-012Deployment ConsiderationsDeployment of Cisco Secure ACS for Windows Server ca

Page 746

Appendix D CSUtil Database UtilityPosture Validation AttributesD-54User Guide for Cisco Secure ACS for Windows Server78-16592-01application-name

Page 747

D-55User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix D CSUtil Database UtilityPosture Validation Attributesvendor-name=Cisc

Page 748 - Listing Custom RADIUS Vendors

Appendix D CSUtil Database UtilityPosture Validation AttributesD-56User Guide for Cisco Secure ACS for Windows Server78-16592-01[attr#15]vendor-

Page 749

D-57User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix D CSUtil Database UtilityPosture Validation Attributesattribute-type=u

Page 750 - RADIUS Vendor/VSA Import File

Appendix D CSUtil Database UtilityPosture Validation AttributesD-58User Guide for Cisco Secure ACS for Windows Server78-16592-01attribute-name=S

Page 751 - Vendor and VSA Set Definition

D-59User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix D CSUtil Database UtilityPosture Validation Attributesapplication-name

Page 752 - Attribute Definition

Appendix D CSUtil Database UtilityPosture Validation AttributesD-60User Guide for Cisco Secure ACS for Windows Server78-16592-01vendor-name=NAIa

Page 753

D-61User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix D CSUtil Database UtilityPosture Validation Attributes[attr#39]vendor-

Page 754 - Enumeration Definition

Appendix D CSUtil Database UtilityPosture Validation AttributesD-62User Guide for Cisco Secure ACS for Windows Server78-16592-01attribute-type=v

Page 755

D-63User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix D CSUtil Database UtilityPosture Validation Attributesattribute-name=A

Page 756 - PAC File Generation

Chapter 2 Deployment ConsiderationsBasic Deployment Requirements for Cisco Secure ACS2-2User Guide for Cisco Secure ACS for Windows Server78-165

Page 757 - PAC File Options and Examples

Appendix D CSUtil Database UtilityPosture Validation AttributesD-64User Guide for Cisco Secure ACS for Windows Server78-16592-01

Page 758

E-1User Guide for Cisco Secure ACS for Windows Server78-16592-01APPENDIXEVPDN ProcessingCisco Secure ACS for Windows Server supports authentication f

Page 759 - Generating PAC Files

Appendix E VPDN ProcessingVPDN ProcessE-2User Guide for Cisco Secure ACS for Windows Server78-16592-01Figure E-1 VPDN User Dials In2. If VPDN is

Page 760 - Posture Validation Attributes

E-3User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix E VPDN ProcessingVPDN ProcessFigure E-3 Authorization of Domain FailsIf

Page 761

Appendix E VPDN ProcessingVPDN ProcessE-4User Guide for Cisco Secure ACS for Windows Server78-16592-01Figure E-5 HG Authenticates Tunnel with AC

Page 762

E-5User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix E VPDN ProcessingVPDN ProcessFigure E-7 NAS Authenticates Tunnel with A

Page 763

Appendix E VPDN ProcessingVPDN ProcessE-6User Guide for Cisco Secure ACS for Windows Server78-16592-01Figure E-9 HG Uses ACS to Authenticate Use

Page 764

F-1User Guide for Cisco Secure ACS for Windows Server78-16592-01APPENDIXFRDBMS Synchronization Import DefinitionsRDBMS synchronization import definit

Page 765 - CSUtil.exe -addavp filename

Appendix F RDBMS Synchronization Import DefinitionsaccountActions SpecificationF-2User Guide for Cisco Secure ACS for Windows Server78-16592-01a

Page 766

F-3User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix F RDBMS Synchronization Import DefinitionsaccountActions Specificationa

Page 767 - CSUtil.exe -delavp vendor-ID

2-3User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 2 Deployment ConsiderationsBasic Deployment Requirements for Cisco Secur

Page 768

Appendix F RDBMS Synchronization Import DefinitionsAction CodesF-4User Guide for Cisco Secure ACS for Windows Server78-16592-01accountActions Pr

Page 769

F-5User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix F RDBMS Synchronization Import DefinitionsAction CodesIf an action can

Page 770

Appendix F RDBMS Synchronization Import DefinitionsAction CodesF-6User Guide for Cisco Secure ACS for Windows Server78-16592-01Table F-2 Action

Page 771

F-7User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix F RDBMS Synchronization Import DefinitionsAction CodesAction Codes for

Page 772

Appendix F RDBMS Synchronization Import DefinitionsAction CodesF-8User Guide for Cisco Secure ACS for Windows Server78-16592-01105 SET_T+_ENABLE

Page 773

F-9User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix F RDBMS Synchronization Import DefinitionsAction Codes108 SET_PASS_TYPE

Page 774

Appendix F RDBMS Synchronization Import DefinitionsAction CodesF-10User Guide for Cisco Secure ACS for Windows Server78-16592-01110 ADD_PASS_STA

Page 775

F-11User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix F RDBMS Synchronization Import DefinitionsAction Codes115 SET_MAX_SESS

Page 776

Appendix F RDBMS Synchronization Import DefinitionsAction CodesF-12User Guide for Cisco Secure ACS for Windows Server78-16592-01261 DISABLE_QUOT

Page 777

F-13User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix F RDBMS Synchronization Import DefinitionsAction Codes270 SET_DCS_TYPE

Page 778

ContentsviiiUser Guide for Cisco Secure ACS for Windows Server78-16592-01Deleting a Network Access Filter 5-7Downloadable IP ACLs 5-7About Downloadab

Page 779

Chapter 2 Deployment ConsiderationsBasic Deployment Requirements for Cisco Secure ACS2-4User Guide for Cisco Secure ACS for Windows Server78-165

Page 780

Appendix F RDBMS Synchronization Import DefinitionsAction CodesF-14User Guide for Cisco Secure ACS for Windows Server78-16592-01Action Codes for

Page 781 - VPDN Processing

F-15User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix F RDBMS Synchronization Import DefinitionsAction CodesTransactions usi

Page 782 - VPDN Process

Appendix F RDBMS Synchronization Import DefinitionsAction CodesF-16User Guide for Cisco Secure ACS for Windows Server78-16592-01123 ADD_DIAL_ACC

Page 783

F-17User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix F RDBMS Synchronization Import DefinitionsAction Codes140 SET_TODDOW_A

Page 784

Appendix F RDBMS Synchronization Import DefinitionsAction CodesF-18User Guide for Cisco Secure ACS for Windows Server78-16592-01150 SET_STATIC_I

Page 785

F-19User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix F RDBMS Synchronization Import DefinitionsAction CodesAction Codes for

Page 786 - Figure E-10

Appendix F RDBMS Synchronization Import DefinitionsAction CodesF-20User Guide for Cisco Secure ACS for Windows Server78-16592-01163 ADD_RADIUS_

Page 787 - Definitions

F-21User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix F RDBMS Synchronization Import DefinitionsAction Codes170 ADD_TACACS_S

Page 788

Appendix F RDBMS Synchronization Import DefinitionsAction CodesF-22User Guide for Cisco Secure ACS for Windows Server78-16592-01172 ADD_TACACS_A

Page 789

F-23User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix F RDBMS Synchronization Import DefinitionsAction Codes174 ADD_IOS_COMM

Page 790 - Action Codes

2-5User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 2 Deployment ConsiderationsBasic Deployment Requirements for Cisco Secur

Page 791

Appendix F RDBMS Synchronization Import DefinitionsAction CodesF-24User Guide for Cisco Secure ACS for Windows Server78-16592-01176 ADD_IOS_COMM

Page 792

F-25User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix F RDBMS Synchronization Import DefinitionsAction CodesAction Codes for

Page 793

Appendix F RDBMS Synchronization Import DefinitionsAction CodesF-26User Guide for Cisco Secure ACS for Windows Server78-16592-01Table F-6 Action

Page 794

F-27User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix F RDBMS Synchronization Import DefinitionsAction Codes221 SET_NAS_FLAG

Page 795

Appendix F RDBMS Synchronization Import DefinitionsAction CodesF-28User Guide for Cisco Secure ACS for Windows Server78-16592-01233 SET_AAA_TRAF

Page 796

F-29User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix F RDBMS Synchronization Import DefinitionsAction Codes250 ADD_NDG VN C

Page 797

Appendix F RDBMS Synchronization Import DefinitionsAction CodesF-30User Guide for Cisco Secure ACS for Windows Server78-16592-01351 DEL_UDV V1 R

Page 798

F-31User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix F RDBMS Synchronization Import DefinitionsAction Codes353 SET_VSA_PROF

Page 799 - PIX Shell (pixshell)

Appendix F RDBMS Synchronization Import DefinitionsCisco Secure ACS Attributes and Action CodesF-32User Guide for Cisco Secure ACS for Windows S

Page 800

F-33User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix F RDBMS Synchronization Import DefinitionsCisco Secure ACS Attributes

Page 801 - NAS01,tty0,0898-69696969

Chapter 2 Deployment ConsiderationsBasic Deployment Factors for Cisco Secure ACS2-6User Guide for Cisco Secure ACS for Windows Server78-16592-01

Page 802

Appendix F RDBMS Synchronization Import DefinitionsCisco Secure ACS Attributes and Action CodesF-34User Guide for Cisco Secure ACS for Windows S

Page 803

F-35User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix F RDBMS Synchronization Import DefinitionsCisco Secure ACS Attributes

Page 804

Appendix F RDBMS Synchronization Import DefinitionsAn Example of accountActionsF-36User Guide for Cisco Secure ACS for Windows Server78-16592-01

Page 805 - User Settings

F-37User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix F RDBMS Synchronization Import DefinitionsAn Example of accountActions

Page 806

Appendix F RDBMS Synchronization Import DefinitionsAn Example of accountActionsF-38User Guide for Cisco Secure ACS for Windows Server78-16592-01

Page 807

G-1User Guide for Cisco Secure ACS for Windows Server78-16592-01APPENDIXGInternal ArchitectureThis chapter describes the Cisco Secure ACS for Windows

Page 808

Appendix G Internal ArchitectureWindows RegistryG-2User Guide for Cisco Secure ACS for Windows Server78-16592-01• CSMon• CSTacacs• CSRadiusYou c

Page 809

G-3User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix G Internal ArchitectureCSAuthin the HTTP Port Allocation feature, you s

Page 810

Appendix G Internal ArchitectureCSDBSyncG-4User Guide for Cisco Secure ACS for Windows Server78-16592-01password-aging information. The authoriz

Page 811

G-5User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix G Internal ArchitectureCSMonNote CSMon is not intended as a replacement

Page 812

2-7User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 2 Deployment ConsiderationsBasic Deployment Factors for Cisco Secure ACS

Page 813

Appendix G Internal ArchitectureCSMonG-6User Guide for Cisco Secure ACS for Windows Server78-16592-01build up a “picture” of expected response t

Page 814

G-7User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix G Internal ArchitectureCSMonNotificationCSMon can be configured to noti

Page 815

Appendix G Internal ArchitectureCSTacacs and CSRadiusG-8User Guide for Cisco Secure ACS for Windows Server78-16592-01If the event is a warning e

Page 816

IN-1User Guide for Cisco Secure ACS for Windows Server78-16592-01INDEXAAAASee also AAA clientsSee also AAA serversdefinition1-2pools for IP address a

Page 817

IndexIN-2User Guide for Cisco Secure ACS for Windows Server78-16592-01accountingSee also loggingoverview1-22ACLsSee downloadable IP ACLsaction codesf

Page 818 - User-Specific Attributes

IN-3User Guide for Cisco Secure ACS for Windows Server78-16592-01Indexprotocol supported 1-11Architecture G-1ASCII/PAPcompatible databases1-10protoco

Page 819

IndexIN-4User Guide for Cisco Secure ACS for Windows Server78-16592-01browsersSee also HTML interfacetroubleshootingA-4Ccached usersSee discovered us

Page 820 - User-Defined Attributes

IN-5User Guide for Cisco Secure ACS for Windows Server78-16592-01IndexCisco Secure ACS backupsSee backupsCisco Secure ACS system restoreSee restoreCi

Page 821 - Group-Specific Attributes

IndexIN-6User Guide for Cisco Secure ACS for Windows Server78-16592-01displaying syntax D-5import text file (example) D-24overview D-1CSV (comma-sepa

Page 822 - An Example of accountActions

IN-7User Guide for Cisco Secure ACS for Windows Server78-16592-01IndexSee RADIUS user databasesSee RSA user databasesunknown users15-1user databases

Page 823

Chapter 2 Deployment ConsiderationsBasic Deployment Factors for Cisco Secure ACS2-8User Guide for Cisco Secure ACS for Windows Server78-16592-01

Page 824

IndexIN-8User Guide for Cisco Secure ACS for Windows Server78-16592-01Domain Listconfiguring13-30inadvertent user lockouts 13-14, 13-27overview 13-13

Page 825 - Internal Architecture

IN-9User Guide for Cisco Secure ACS for Windows Server78-16592-01Indexenable password options for TACACS+ 7-35enable privilege options for groups 6-1

Page 826 - Windows Registry

IndexIN-10User Guide for Cisco Secure ACS for Windows Server78-16592-01supported protocols 1-10Global Authentication Setup 10-33grant dial-in permiss

Page 827

IN-11User Guide for Cisco Secure ACS for Windows Server78-16592-01IndexHelp 1-29host system state G-5HTML interfaceSee also Interface Configurationen

Page 828 - CSDBSync

IndexIN-12User Guide for Cisco Secure ACS for Windows Server78-16592-01LDAPSee generic LDAP user databasesLEAP proxy RADIUS user databasesconfiguring

Page 829 - Monitoring

IN-13User Guide for Cisco Secure ACS for Windows Server78-16592-01Indexloginsgreeting upon6-24password aging dependency 6-23logsSee loggingSee Report

Page 830 - Recording

IndexIN-14User Guide for Cisco Secure ACS for Windows Server78-16592-01definition of 14-10group mapping 16-13implementing 14-5introduction 1-25loggin

Page 831 - Response

IN-15User Guide for Cisco Secure ACS for Windows Server78-16592-01IndexNetwork Admission ControlSee NACnetwork configuration4-1network device groupsa

Page 832 - CSTacacs and CSRadius

IndexIN-16User Guide for Cisco Secure ACS for Windows Server78-16592-01EAP-TLS 13-68PAP 13-65vs. group mappings 16-3PAP authentication sample procedu

Page 833

IN-17User Guide for Cisco Secure ACS for Windows Server78-16592-01Indexoutbound passwords 1-15separate passwords 1-14single password 1-14token cachin

Page 834

2-9User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 2 Deployment ConsiderationsBasic Deployment Factors for Cisco Secure ACS

Page 835

IndexIN-18User Guide for Cisco Secure ACS for Windows Server78-16592-01PPP password aging 6-21privilegesSee administratorsprocessor utilizationG-5pro

Page 836

IN-19User Guide for Cisco Secure ACS for Windows Server78-16592-01Indextoken servers 13-79troubleshooting A-22tunneling packets 4-18vs. TACACS+ 1-6RA

Page 837

IndexIN-20User Guide for Cisco Secure ACS for Windows Server78-16592-01in User Setup 7-49supported attributes C-43overview C-1user-definedabout9-28,

Page 838

IN-21User Guide for Cisco Secure ACS for Windows Server78-16592-01Indexexternal user databases 9-2frequency 9-7group mappings 9-2immediate 9-19implem

Page 839

IndexIN-22User Guide for Cisco Secure ACS for Windows Server78-16592-01Ssearch order of external user databases 15-15security policies 2-15security p

Page 840

IN-23User Guide for Cisco Secure ACS for Windows Server78-16592-01Indexoutput values 13-66result codes 13-69EAP-TLS authenticationconfiguring13-74inp

Page 841

IndexIN-24User Guide for Cisco Secure ACS for Windows Server78-16592-01time-of-day access 3-8troubleshooting A-22vs. RADIUS 1-6TACACS+ Accounting log

Page 842

IN-25User Guide for Cisco Secure ACS for Windows Server78-16592-01IndexRADIUS issues A-22report issues A-17TACACS+ issues A-22third-party server issu

Page 843

IndexIN-26User Guide for Cisco Secure ACS for Windows Server78-16592-01callback options 7-9configuring 7-2configuring device management command autho

Page 844

IN-27User Guide for Cisco Secure ACS for Windows Server78-16592-01IndexODBC 11-23CSV (comma-separated values) file directory11-16enablingODBC11-23VPD

Page 845

Chapter 2 Deployment ConsiderationsBasic Deployment Factors for Cisco Secure ACS2-10User Guide for Cisco Secure ACS for Windows Server78-16592-0

Page 846

IndexIN-28User Guide for Cisco Secure ACS for Windows Server78-16592-01passwords 1-11rejection mode 15-6request handling 15-6trust relationships 13-9

Page 847

2-11User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 2 Deployment ConsiderationsBasic Deployment Factors for Cisco Secure AC

Page 848

Chapter 2 Deployment ConsiderationsBasic Deployment Factors for Cisco Secure ACS2-12User Guide for Cisco Secure ACS for Windows Server78-16592-0

Page 849

2-13User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 2 Deployment ConsiderationsBasic Deployment Factors for Cisco Secure AC

Page 850

ixUser Guide for Cisco Secure ACS for Windows Server78-16592-01ContentsBasic User Group Settings 6-3Group Disablement 6-4Enabling VoIP Support for a

Page 851

Chapter 2 Deployment ConsiderationsBasic Deployment Factors for Cisco Secure ACS2-14User Guide for Cisco Secure ACS for Windows Server78-16592-0

Page 852

2-15User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 2 Deployment ConsiderationsBasic Deployment Factors for Cisco Secure AC

Page 853

Chapter 2 Deployment ConsiderationsBasic Deployment Factors for Cisco Secure ACS2-16User Guide for Cisco Secure ACS for Windows Server78-16592-0

Page 854

2-17User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 2 Deployment ConsiderationsBasic Deployment Factors for Cisco Secure AC

Page 855

Chapter 2 Deployment ConsiderationsBasic Deployment Factors for Cisco Secure ACS2-18User Guide for Cisco Secure ACS for Windows Server78-16592-0

Page 856

2-19User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 2 Deployment ConsiderationsSuggested Deployment SequenceNetwork Latency

Page 857

Chapter 2 Deployment ConsiderationsSuggested Deployment Sequence2-20User Guide for Cisco Secure ACS for Windows Server78-16592-01For more inform

Page 858

2-21User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 2 Deployment ConsiderationsSuggested Deployment SequenceAlong with the

Page 859

Chapter 2 Deployment ConsiderationsSuggested Deployment Sequence2-22User Guide for Cisco Secure ACS for Windows Server78-16592-01

Page 860

CHAPTER 3-1User Guide for Cisco Secure ACS for Windows Server78-16592-013Interface ConfigurationEase of use is the overriding design principle of the

Comments to this Manuals

No comments