Corporate HeadquartersCisco Systems, Inc.170 West Tasman DriveSan Jose, CA 95134-1706USAhttp://www.cisco.comTel: 408 526-4000800 553-NETS (6387)Fax:
ContentsxUser Guide for Cisco Secure ACS for Windows Server78-16592-01Configuring BBSM RADIUS Settings for a User Group 6-51Configuring Custom RADIUS
Chapter 3 Interface ConfigurationInterface Design Concepts3-2User Guide for Cisco Secure ACS for Windows Server78-16592-01• Protocol Configurati
3-3User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 3 Interface ConfigurationUser Data Configuration OptionsUser Data Config
Chapter 3 Interface ConfigurationAdvanced Options3-4User Guide for Cisco Secure ACS for Windows Server78-16592-01Restarting Cisco Secure ACS-rel
3-5User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 3 Interface ConfigurationAdvanced Options• User-Level Network Access Res
Chapter 3 Interface ConfigurationAdvanced Options3-6User Guide for Cisco Secure ACS for Windows Server78-16592-01• RDBMS Synchronization—When se
3-7User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 3 Interface ConfigurationProtocol Configuration Options for TACACS+advan
Chapter 3 Interface ConfigurationProtocol Configuration Options for TACACS+3-8User Guide for Cisco Secure ACS for Windows Server78-16592-01Note
3-9User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 3 Interface ConfigurationProtocol Configuration Options for TACACS+–Disp
Chapter 3 Interface ConfigurationProtocol Configuration Options for TACACS+3-10User Guide for Cisco Secure ACS for Windows Server78-16592-01To c
3-11User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 3 Interface ConfigurationProtocol Configuration Options for RADIUSThe s
xiUser Guide for Cisco Secure ACS for Windows Server78-16592-01ContentsConfiguring Device-Management Command Authorization for a User7-30Configuring
Chapter 3 Interface ConfigurationProtocol Configuration Options for RADIUS3-12User Guide for Cisco Secure ACS for Windows Server78-16592-01Table
3-13User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 3 Interface ConfigurationProtocol Configuration Options for RADIUSTip Y
Chapter 3 Interface ConfigurationProtocol Configuration Options for RADIUS3-14User Guide for Cisco Secure ACS for Windows Server78-16592-01selec
3-15User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 3 Interface ConfigurationProtocol Configuration Options for RADIUSSessi
Chapter 3 Interface ConfigurationProtocol Configuration Options for RADIUS3-16User Guide for Cisco Secure ACS for Windows Server78-16592-01appea
3-17User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 3 Interface ConfigurationProtocol Configuration Options for RADIUSStep
Chapter 3 Interface ConfigurationProtocol Configuration Options for RADIUS3-18User Guide for Cisco Secure ACS for Windows Server78-16592-01Step
CHAPTER 4-1User Guide for Cisco Secure ACS for Windows Server78-16592-014Network ConfigurationThis chapter details concepts and procedures for configu
Chapter 4 Network ConfigurationAbout Distributed Systems4-2User Guide for Cisco Secure ACS for Windows Server78-16592-01If you are using network
4-3User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 4 Network ConfigurationAbout Distributed Systems• CiscoSecure database r
ContentsxiiUser Guide for Cisco Secure ACS for Windows Server78-16592-01CHAPTER 8 System Configuration: Basic 8-1Service Control 8-1Determining the S
Chapter 4 Network ConfigurationProxy in Distributed Systems4-4User Guide for Cisco Secure ACS for Windows Server78-16592-01with one another. Eac
4-5User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 4 Network ConfigurationProxy in Distributed SystemsNote When a Cisco Sec
Chapter 4 Network ConfigurationProxy in Distributed Systems4-6User Guide for Cisco Secure ACS for Windows Server78-16592-01continues, in order,
4-7User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 4 Network ConfigurationProxy in Distributed SystemsBecause Mary works in
Chapter 4 Network ConfigurationNetwork Device Searches4-8User Guide for Cisco Secure ACS for Windows Server78-16592-01You can also choose to hav
4-9User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 4 Network ConfigurationNetwork Device Searchesor “m*”. Name-based search
Chapter 4 Network ConfigurationNetwork Device Searches4-10User Guide for Cisco Secure ACS for Windows Server78-16592-01Tip When you leave the Se
4-11User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 4 Network ConfigurationAAA Client ConfigurationStep 6 If you want to do
Chapter 4 Network ConfigurationAAA Client Configuration4-12User Guide for Cisco Secure ACS for Windows Server78-16592-01recommend that you adopt
4-13User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 4 Network ConfigurationAAA Client ConfigurationFor correct operation, t
xiiiUser Guide for Cisco Secure ACS for Windows Server78-16592-01ContentsEvent Logging 8-20Setting Up Event Logging 8-20VoIP Accounting Configuration
Chapter 4 Network ConfigurationAAA Client Configuration4-14User Guide for Cisco Secure ACS for Windows Server78-16592-01When an authentication r
4-15User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 4 Network ConfigurationAAA Client Configurationattributes. If the AAA c
Chapter 4 Network ConfigurationAAA Client Configuration4-16User Guide for Cisco Secure ACS for Windows Server78-16592-01• Replace RADIUS Port in
4-17User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 4 Network ConfigurationAAA Client ConfigurationStep 2 Do one of the fol
Chapter 4 Network ConfigurationAAA Client Configuration4-18User Guide for Cisco Secure ACS for Windows Server78-16592-01Step 7 From the Authenti
4-19User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 4 Network ConfigurationAAA Client ConfigurationTip If you want to save
Chapter 4 Network ConfigurationAAA Client Configuration4-20User Guide for Cisco Secure ACS for Windows Server78-16592-01Step 2 Do one of the fol
4-21User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 4 Network ConfigurationAAA Server ConfigurationDeleting a AAA ClientTo
Chapter 4 Network ConfigurationAAA Server Configuration4-22User Guide for Cisco Secure ACS for Windows Server78-16592-01To configure distributed
4-23User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 4 Network ConfigurationAAA Server ConfigurationNote After you submit th
ContentsxivUser Guide for Cisco Secure ACS for Windows Server78-16592-01RDBMS Synchronization Components 9-29About CSDBSync 9-29About the accountActi
Chapter 4 Network ConfigurationAAA Server Configuration4-24User Guide for Cisco Secure ACS for Windows Server78-16592-01–Cisco Secure ACS—Select
4-25User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 4 Network ConfigurationAAA Server ConfigurationTo add and configure a A
Chapter 4 Network ConfigurationAAA Server Configuration4-26User Guide for Cisco Secure ACS for Windows Server78-16592-01Step 9 From the Traffic
4-27User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 4 Network ConfigurationAAA Server ConfigurationTo edit a AAA server, fo
Chapter 4 Network ConfigurationNetwork Device Group Configuration4-28User Guide for Cisco Secure ACS for Windows Server78-16592-01Deleting a AAA
4-29User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 4 Network ConfigurationNetwork Device Group ConfigurationCisco Secure A
Chapter 4 Network ConfigurationNetwork Device Group Configuration4-30User Guide for Cisco Secure ACS for Windows Server78-16592-01Tip If the Net
4-31User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 4 Network ConfigurationNetwork Device Group ConfigurationTip If the Net
Chapter 4 Network ConfigurationNetwork Device Group Configuration4-32User Guide for Cisco Secure ACS for Windows Server78-16592-01Renaming a Net
4-33User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 4 Network ConfigurationNetwork Device Group ConfigurationTip It may be
xvUser Guide for Cisco Secure ACS for Windows Server78-16592-01ContentsEAP-TLS Authentication 10-2About the EAP-TLS Protocol 10-3EAP-TLS and Cisco Se
Chapter 4 Network ConfigurationProxy Distribution Table Configuration4-34User Guide for Cisco Secure ACS for Windows Server78-16592-01Proxy Dist
4-35User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 4 Network ConfigurationProxy Distribution Table Configurationcharacter
Chapter 4 Network ConfigurationProxy Distribution Table Configuration4-36User Guide for Cisco Secure ACS for Windows Server78-16592-01Tip You ca
4-37User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 4 Network ConfigurationProxy Distribution Table ConfigurationStep 1 In
Chapter 4 Network ConfigurationProxy Distribution Table Configuration4-38User Guide for Cisco Secure ACS for Windows Server78-16592-01Deleting a
CHAPTER 5-1User Guide for Cisco Secure ACS for Windows Server78-16592-015Shared Profile ComponentsThis chapter addresses the Cisco Secure ACS for Wind
Chapter 5 Shared Profile ComponentsNetwork Access Filters5-2User Guide for Cisco Secure ACS for Windows Server78-16592-01named shared profile co
5-3User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 5 Shared Profile ComponentsNetwork Access Filters• NAFs in shared networ
Chapter 5 Shared Profile ComponentsNetwork Access Filters5-4User Guide for Cisco Secure ACS for Windows Server78-16592-01Step 3 Click Add.The Ne
5-5User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 5 Shared Profile ComponentsNetwork Access FiltersTip You can also remove
ContentsxviUser Guide for Cisco Secure ACS for Windows Server78-16592-01Generating a Certificate Signing Request 10-45Using Self-Signed Certificates
Chapter 5 Shared Profile ComponentsNetwork Access Filters5-6User Guide for Cisco Secure ACS for Windows Server78-16592-01Caution If you change t
5-7User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 5 Shared Profile ComponentsDownloadable IP ACLsNote Restarting the servi
Chapter 5 Shared Profile ComponentsDownloadable IP ACLs5-8User Guide for Cisco Secure ACS for Windows Server78-16592-01This section contains the
5-9User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 5 Shared Profile ComponentsDownloadable IP ACLsACL to each applicable us
Chapter 5 Shared Profile ComponentsDownloadable IP ACLs5-10User Guide for Cisco Secure ACS for Windows Server78-16592-01Examples of Cisco device
5-11User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 5 Shared Profile ComponentsDownloadable IP ACLsTo add a downloadable IP
Chapter 5 Shared Profile ComponentsDownloadable IP ACLs5-12User Guide for Cisco Secure ACS for Windows Server78-16592-01Step 9 To save the ACL c
5-13User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 5 Shared Profile ComponentsDownloadable IP ACLsEditing a Downloadable I
Chapter 5 Shared Profile ComponentsNetwork Access Restrictions5-14User Guide for Cisco Secure ACS for Windows Server78-16592-01Cisco Secure ACS
5-15User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 5 Shared Profile ComponentsNetwork Access RestrictionsThis section cont
xviiUser Guide for Cisco Secure ACS for Windows Server78-16592-01ContentsConfiguring an ODBC Log 11-23Remote Logging 11-26About Remote Logging 11-26I
Chapter 5 Shared Profile ComponentsNetwork Access Restrictions5-16User Guide for Cisco Secure ACS for Windows Server78-16592-01the client. For t
5-17User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 5 Shared Profile ComponentsNetwork Access RestrictionsAbout IP-based NA
Chapter 5 Shared Profile ComponentsNetwork Access Restrictions5-18User Guide for Cisco Secure ACS for Windows Server78-16592-01About Non-IP-base
5-19User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 5 Shared Profile ComponentsNetwork Access Restrictions• If you are usin
Chapter 5 Shared Profile ComponentsNetwork Access Restrictions5-20User Guide for Cisco Secure ACS for Windows Server78-16592-01To add a shared N
5-21User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 5 Shared Profile ComponentsNetwork Access RestrictionsNote The total nu
Chapter 5 Shared Profile ComponentsNetwork Access Restrictions5-22User Guide for Cisco Secure ACS for Windows Server78-16592-01d. To specify the
5-23User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 5 Shared Profile ComponentsNetwork Access RestrictionsEditing a Shared
Chapter 5 Shared Profile ComponentsNetwork Access Restrictions5-24User Guide for Cisco Secure ACS for Windows Server78-16592-01Step 7 To edit a
5-25User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 5 Shared Profile ComponentsCommand Authorization SetsTo delete a shared
ContentsxviiiUser Guide for Cisco Secure ACS for Windows Server78-16592-01CHAPTER 13 User Databases 13-1CiscoSecure User Database 13-2About the Cisco
Chapter 5 Shared Profile ComponentsCommand Authorization Sets5-26User Guide for Cisco Secure ACS for Windows Server78-16592-01About Command Auth
5-27User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 5 Shared Profile ComponentsCommand Authorization SetsTo offer fine-grai
Chapter 5 Shared Profile ComponentsCommand Authorization Sets5-28User Guide for Cisco Secure ACS for Windows Server78-16592-01Cisco Secure ACS h
5-29User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 5 Shared Profile ComponentsCommand Authorization Sets• Device Managemen
Chapter 5 Shared Profile ComponentsCommand Authorization Sets5-30User Guide for Cisco Secure ACS for Windows Server78-16592-01For example, if a
5-31User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 5 Shared Profile ComponentsCommand Authorization SetsTo permit/deny com
Chapter 5 Shared Profile ComponentsCommand Authorization Sets5-32User Guide for Cisco Secure ACS for Windows Server78-16592-01Step 6 If Cisco Se
5-33User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 5 Shared Profile ComponentsCommand Authorization Setsc. Click Add Comma
Chapter 5 Shared Profile ComponentsCommand Authorization Sets5-34User Guide for Cisco Secure ACS for Windows Server78-16592-01Step 3 From the Na
5-35User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 5 Shared Profile ComponentsCommand Authorization SetsDeleting a Command
xixUser Guide for Cisco Secure ACS for Windows Server78-16592-01ContentsGeneric LDAP 13-32Cisco Secure ACS Authentication Process with a Generic LDAP
Chapter 5 Shared Profile ComponentsCommand Authorization Sets5-36User Guide for Cisco Secure ACS for Windows Server78-16592-01
CHAPTER 6-1User Guide for Cisco Secure ACS for Windows Server78-16592-016User Group ManagementThis chapter provides information about setting up and m
Chapter 6 User Group ManagementAbout User Group Setup Features and Functions6-2User Guide for Cisco Secure ACS for Windows Server78-16592-01Abou
6-3User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 6 User Group ManagementBasic User Group SettingsIf you have configured C
Chapter 6 User Group ManagementBasic User Group Settings6-4User Guide for Cisco Secure ACS for Windows Server78-16592-01Group DisablementYou per
6-5User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 6 User Group ManagementBasic User Group SettingsPerform this procedure t
Chapter 6 User Group ManagementBasic User Group Settings6-6User Guide for Cisco Secure ACS for Windows Server78-16592-01To define the times duri
6-7User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 6 User Group ManagementBasic User Group SettingsSetting Callback Options
Chapter 6 User Group ManagementBasic User Group Settings6-8User Guide for Cisco Secure ACS for Windows Server78-16592-01Step 5 To continue speci
6-9User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 6 User Group ManagementBasic User Group SettingsNote When an authenticat
THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOM
ContentsxxUser Guide for Cisco Secure ACS for Windows Server78-16592-01PAP Procedure Output 13-65CHAP/MS-CHAP/ARAP Authentication Procedure Input 13-
Chapter 6 User Group ManagementBasic User Group Settings6-10User Guide for Cisco Secure ACS for Windows Server78-16592-01Step 4 To define and ap
6-11User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 6 User Group ManagementBasic User Group SettingsStep 5 To permit or den
Chapter 6 User Group ManagementBasic User Group Settings6-12User Guide for Cisco Secure ACS for Windows Server78-16592-01Note The total number o
6-13User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 6 User Group ManagementBasic User Group SettingsNote A session is any t
Chapter 6 User Group ManagementBasic User Group Settings6-14User Guide for Cisco Secure ACS for Windows Server78-16592-01Step 6 To continue spec
6-15User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 6 User Group ManagementBasic User Group Settingsnetwork fails, the quot
Chapter 6 User Group ManagementConfiguration-specific User Group Settings6-16User Guide for Cisco Secure ACS for Windows Server78-16592-01Note U
6-17User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 6 User Group ManagementConfiguration-specific User Group Settings• To c
Chapter 6 User Group ManagementConfiguration-specific User Group Settings6-18User Guide for Cisco Secure ACS for Windows Server78-16592-01Settin
6-19User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 6 User Group ManagementConfiguration-specific User Group SettingsStep 4
xxiUser Guide for Cisco Secure ACS for Windows Server78-16592-01ContentsNAC Databases 14-10About NAC Databases 14-10About NAC Credentials and Attribu
Chapter 6 User Group ManagementConfiguration-specific User Group Settings6-20User Guide for Cisco Secure ACS for Windows Server78-16592-01Note T
6-21User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 6 User Group ManagementConfiguration-specific User Group SettingsEnabli
Chapter 6 User Group ManagementConfiguration-specific User Group Settings6-22User Guide for Cisco Secure ACS for Windows Server78-16592-01the ca
6-23User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 6 User Group ManagementConfiguration-specific User Group Settingsand di
Chapter 6 User Group ManagementConfiguration-specific User Group Settings6-24User Guide for Cisco Secure ACS for Windows Server78-16592-01reques
6-25User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 6 User Group ManagementConfiguration-specific User Group SettingsTo set
Chapter 6 User Group ManagementConfiguration-specific User Group Settings6-26User Guide for Cisco Secure ACS for Windows Server78-16592-01Step 8
6-27User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 6 User Group ManagementConfiguration-specific User Group SettingsTip Fo
Chapter 6 User Group ManagementConfiguration-specific User Group Settings6-28User Guide for Cisco Secure ACS for Windows Server78-16592-01–Users
6-29User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 6 User Group ManagementConfiguration-specific User Group Settings• Assi
ContentsxxiiUser Guide for Cisco Secure ACS for Windows Server78-16592-01Performance of Unknown User Authentication 15-8Added Authentication Latency
Chapter 6 User Group ManagementConfiguration-specific User Group Settings6-30User Guide for Cisco Secure ACS for Windows Server78-16592-01Step 5
6-31User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 6 User Group ManagementConfiguration-specific User Group SettingsStep 6
Chapter 6 User Group ManagementConfiguration-specific User Group Settings6-32User Guide for Cisco Secure ACS for Windows Server78-16592-01To emp
6-33User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 6 User Group ManagementConfiguration-specific User Group SettingsConfig
Chapter 6 User Group ManagementConfiguration-specific User Group Settings6-34User Guide for Cisco Secure ACS for Windows Server78-16592-01Step 6
6-35User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 6 User Group ManagementConfiguration-specific User Group SettingsTip To
Chapter 6 User Group ManagementConfiguration-specific User Group Settings6-36User Guide for Cisco Secure ACS for Windows Server78-16592-01Step 3
6-37User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 6 User Group ManagementConfiguration-specific User Group SettingsConfig
Chapter 6 User Group ManagementConfiguration-specific User Group Settings6-38User Guide for Cisco Secure ACS for Windows Server78-16592-01Step 5
6-39User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 6 User Group ManagementConfiguration-specific User Group SettingsTo con
xxiiiUser Guide for Cisco Secure ACS for Windows Server78-16592-01ContentsNAC Group Mapping 16-13Configuring NAC Group Mapping 16-13RADIUS-Based Grou
Chapter 6 User Group ManagementConfiguration-specific User Group Settings6-40User Guide for Cisco Secure ACS for Windows Server78-16592-01Config
6-41User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 6 User Group ManagementConfiguration-specific User Group SettingsStep 3
Chapter 6 User Group ManagementConfiguration-specific User Group Settings6-42User Guide for Cisco Secure ACS for Windows Server78-16592-01The Ci
6-43User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 6 User Group ManagementConfiguration-specific User Group SettingsStep 7
Chapter 6 User Group ManagementConfiguration-specific User Group Settings6-44User Guide for Cisco Secure ACS for Windows Server78-16592-01Step 3
6-45User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 6 User Group ManagementConfiguration-specific User Group SettingsCisco
Chapter 6 User Group ManagementConfiguration-specific User Group Settings6-46User Guide for Cisco Secure ACS for Windows Server78-16592-01Config
6-47User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 6 User Group ManagementConfiguration-specific User Group SettingsStep 5
Chapter 6 User Group ManagementConfiguration-specific User Group Settings6-48User Guide for Cisco Secure ACS for Windows Server78-16592-01The fo
6-49User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 6 User Group ManagementConfiguration-specific User Group SettingsNote T
ContentsxxivUser Guide for Cisco Secure ACS for Windows Server78-16592-01Cisco VPN 3000 Concentrator Dictionary of RADIUS VSAs C-9Cisco VPN 5000 Conc
Chapter 6 User Group ManagementConfiguration-specific User Group Settings6-50User Guide for Cisco Secure ACS for Windows Server78-16592-01Step 2
6-51User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 6 User Group ManagementConfiguration-specific User Group SettingsTo con
Chapter 6 User Group ManagementConfiguration-specific User Group Settings6-52User Guide for Cisco Secure ACS for Windows Server78-16592-01Note T
6-53User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 6 User Group ManagementConfiguration-specific User Group SettingsConfig
Chapter 6 User Group ManagementGroup Setting Management6-54User Guide for Cisco Secure ACS for Windows Server78-16592-01Step 6 To save the group
6-55User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 6 User Group ManagementGroup Setting ManagementResetting Usage Quota Co
Chapter 6 User Group ManagementGroup Setting Management6-56User Guide for Cisco Secure ACS for Windows Server78-16592-01Step 5 Click Submit.Note
CHAPTER 7-1User Guide for Cisco Secure ACS for Windows Server78-16592-017User ManagementThis chapter provides information about setting up and managin
Chapter 7 User ManagementAbout User Databases7-2User Guide for Cisco Secure ACS for Windows Server78-16592-01 From within the User Setup section
7-3User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 7 User ManagementBasic User Setup Options• Windows Database—Authenticate
xxvUser Guide for Cisco Secure ACS for Windows Server78-16592-01ContentsADD_NAS Statements D-21DEL_NAS Statements D-23Import File Example D-24Exporti
Chapter 7 User ManagementBasic User Setup Options7-4User Guide for Cisco Secure ACS for Windows Server78-16592-01This section contains the follo
7-5User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 7 User ManagementBasic User Setup OptionsStep 4 Make sure that the Acco
Chapter 7 User ManagementBasic User Setup Options7-6User Guide for Cisco Secure ACS for Windows Server78-16592-01Tip For lengthy account configu
7-7User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 7 User ManagementBasic User Setup OptionsSetting a Separate CHAP/MS-CHAP
Chapter 7 User ManagementBasic User Setup Options7-8User Guide for Cisco Secure ACS for Windows Server78-16592-01Assigning a User to a GroupA us
7-9User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 7 User ManagementBasic User Setup OptionsSetting User Callback OptionCal
Chapter 7 User ManagementBasic User Setup Options7-10User Guide for Cisco Secure ACS for Windows Server78-16592-01Step 3 Do one of the following
7-11User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 7 User ManagementBasic User Setup Options• Assigned by AAA client pool—
Chapter 7 User ManagementBasic User Setup Options7-12User Guide for Cisco Secure ACS for Windows Server78-16592-01Typically, you define (shared)
7-13User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 7 User ManagementBasic User Setup OptionsStep 2 To apply a previously c
ContentsxxviUser Guide for Cisco Secure ACS for Windows Server78-16592-01APPENDIX E VPDN Processing E-1VPDN Process E-1APPENDIX F RDBMS Synchronizati
Chapter 7 User ManagementBasic User Setup Options7-14User Guide for Cisco Secure ACS for Windows Server78-16592-01c. Select or enter the informa
7-15User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 7 User ManagementBasic User Setup Optionsc. Complete the following boxe
Chapter 7 User ManagementBasic User Setup Options7-16User Guide for Cisco Secure ACS for Windows Server78-16592-01d. Click enter.The information
7-17User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 7 User ManagementBasic User Setup OptionsTo set max sessions options fo
Chapter 7 User ManagementBasic User Setup Options7-18User Guide for Cisco Secure ACS for Windows Server78-16592-01Setting User Usage Quotas Opti
7-19User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 7 User ManagementBasic User Setup Optionswith ISDN, the quota is not up
Chapter 7 User ManagementBasic User Setup Options7-20User Guide for Cisco Secure ACS for Windows Server78-16592-01c. Select the period for which
7-21User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 7 User ManagementBasic User Setup Optionsb. Select the Disable account
Chapter 7 User ManagementAdvanced User Authentication Settings7-22User Guide for Cisco Secure ACS for Windows Server78-16592-01To assign a downl
7-23User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 7 User ManagementAdvanced User Authentication Settings• RADIUS Attribut
xxviiUser Guide for Cisco Secure ACS for Windows Server78-16592-01ContentsCSMon G-4Monitoring G-5Recording G-6Notification G-7Response G-7CSTacacs an
Chapter 7 User ManagementAdvanced User Authentication Settings7-24User Guide for Cisco Secure ACS for Windows Server78-16592-01Configuring TACAC
7-25User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 7 User ManagementAdvanced User Authentication SettingsBefore You Begin•
Chapter 7 User ManagementAdvanced User Authentication Settings7-26User Guide for Cisco Secure ACS for Windows Server78-16592-01Step 6 Do one of
7-27User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 7 User ManagementAdvanced User Authentication SettingsTo specify shell
Chapter 7 User ManagementAdvanced User Authentication Settings7-28User Guide for Cisco Secure ACS for Windows Server78-16592-01Step 7 To define
7-29User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 7 User ManagementAdvanced User Authentication SettingsConfiguring a PIX
Chapter 7 User ManagementAdvanced User Authentication Settings7-30User Guide for Cisco Secure ACS for Windows Server78-16592-01Step 4 To assign
7-31User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 7 User ManagementAdvanced User Authentication Settings• Assign a device
Chapter 7 User ManagementAdvanced User Authentication Settings7-32User Guide for Cisco Secure ACS for Windows Server78-16592-01Step 5 To assign
7-33User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 7 User ManagementAdvanced User Authentication SettingsStep 3 To allow T
ContentsxxviiiUser Guide for Cisco Secure ACS for Windows Server78-16592-01
Chapter 7 User ManagementAdvanced User Authentication Settings7-34User Guide for Cisco Secure ACS for Windows Server78-16592-01Note This is the
7-35User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 7 User ManagementAdvanced User Authentication SettingsStep 4 If you sel
Chapter 7 User ManagementAdvanced User Authentication Settings7-36User Guide for Cisco Secure ACS for Windows Server78-16592-01To set the option
7-37User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 7 User ManagementAdvanced User Authentication SettingsSetting TACACS+ O
Chapter 7 User ManagementAdvanced User Authentication Settings7-38User Guide for Cisco Secure ACS for Windows Server78-16592-01This section cont
7-39User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 7 User ManagementAdvanced User Authentication SettingsNote For a list a
Chapter 7 User ManagementAdvanced User Authentication Settings7-40User Guide for Cisco Secure ACS for Windows Server78-16592-01replace the assoc
7-41User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 7 User ManagementAdvanced User Authentication SettingsSetting Cisco Air
Chapter 7 User ManagementAdvanced User Authentication Settings7-42User Guide for Cisco Secure ACS for Windows Server78-16592-01To configure and
7-43User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 7 User ManagementAdvanced User Authentication SettingsSetting Ascend RA
xxixUser Guide for Cisco Secure ACS for Windows Server78-16592-01PrefaceThis document will help you configure and use Cisco Secure Access Control Serv
Chapter 7 User ManagementAdvanced User Authentication Settings7-44User Guide for Cisco Secure ACS for Windows Server78-16592-01For more informat
7-45User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 7 User ManagementAdvanced User Authentication SettingsNote To hide or d
Chapter 7 User ManagementAdvanced User Authentication Settings7-46User Guide for Cisco Secure ACS for Windows Server78-16592-01Setting Cisco VPN
7-47User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 7 User ManagementAdvanced User Authentication SettingsStep 3 In the Cis
Chapter 7 User ManagementAdvanced User Authentication Settings7-48User Guide for Cisco Secure ACS for Windows Server78-16592-01The Microsoft RAD
7-49User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 7 User ManagementAdvanced User Authentication SettingsStep 3 In the Mic
Chapter 7 User ManagementAdvanced User Authentication Settings7-50User Guide for Cisco Secure ACS for Windows Server78-16592-01Note To hide or d
7-51User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 7 User ManagementAdvanced User Authentication SettingsSetting Juniper R
Chapter 7 User ManagementAdvanced User Authentication Settings7-52User Guide for Cisco Secure ACS for Windows Server78-16592-01For more informat
7-53User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 7 User ManagementAdvanced User Authentication SettingsStep 2 Before con
iiiUser Guide for Cisco Secure ACS for Windows Server78-16592-01CONTENTSPreface xxixAudience xxixOrganization xxixConventions xxxiProduct Documentati
PrefaceOrganizationxxxUser Guide for Cisco Secure ACS for Windows Server78-16592-01• Chapter 5, “Shared Profile Components”—Concepts and procedures re
Chapter 7 User ManagementUser Management7-54User Guide for Cisco Secure ACS for Windows Server78-16592-01To configure and enable custom RADIUS a
7-55User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 7 User ManagementUser Management• Deleting a User Account, page 7-57• R
Chapter 7 User ManagementUser Management7-56User Guide for Cisco Secure ACS for Windows Server78-16592-01Tip You can use wildcard characters (*)
7-57User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 7 User ManagementUser ManagementStep 3 Click Add/Edit.The User Setup Ed
Chapter 7 User ManagementUser Management7-58User Guide for Cisco Secure ACS for Windows Server78-16592-01Step 3 Click Add/Edit.Step 4 At the bot
7-59User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 7 User ManagementUser ManagementStep 5 Click Submit at the bottom of th
Chapter 7 User ManagementUser Management7-60User Guide for Cisco Secure ACS for Windows Server78-16592-01Note If the user authenticates with a W
CHAPTER 8-1User Guide for Cisco Secure ACS for Windows Server78-16592-018System Configuration: BasicThis chapter addresses the basic features found in
Chapter 8 System Configuration: BasicService Control8-2User Guide for Cisco Secure ACS for Windows Server78-16592-01Tip You can configure Cisco
8-3User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 8 System Configuration: BasicLoggingStep 1 In the navigation bar, click
xxxiUser Guide for Cisco Secure ACS for Windows Server78-16592-01PrefaceConventions• Appendix A, “Troubleshooting”—How to identify and solve certain p
Chapter 8 System Configuration: BasicDate Format Control8-4User Guide for Cisco Secure ACS for Windows Server78-16592-01report generated on July
8-5User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 8 System Configuration: BasicLocal Password ManagementLocal Password Man
Chapter 8 System Configuration: BasicLocal Password Management8-6User Guide for Cisco Secure ACS for Windows Server78-16592-01–Upon remote user
8-7User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 8 System Configuration: BasicLocal Password ManagementConfiguring Local
Chapter 8 System Configuration: BasicLocal Password Management8-8User Guide for Cisco Secure ACS for Windows Server78-16592-01d. If you want Cis
8-9User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 8 System Configuration: BasicCisco Secure ACS BackupCisco Secure ACS Bac
Chapter 8 System Configuration: BasicCisco Secure ACS Backup8-10User Guide for Cisco Secure ACS for Windows Server78-16592-01where drive is the
8-11User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 8 System Configuration: BasicCisco Secure ACS BackupBackup OptionsThe A
Chapter 8 System Configuration: BasicCisco Secure ACS Backup8-12User Guide for Cisco Secure ACS for Windows Server78-16592-01Step 2 Click ACS Ba
8-13User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 8 System Configuration: BasicCisco Secure ACS BackupTip Clicking times
PrefaceProduct DocumentationxxxiiUser Guide for Cisco Secure ACS for Windows Server78-16592-01Tip Identifies information to help you get the most bene
Chapter 8 System Configuration: BasicCisco Secure ACS System Restore8-14User Guide for Cisco Secure ACS for Windows Server78-16592-01Cisco Secur
8-15User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 8 System Configuration: BasicCisco Secure ACS System Restorehard drive.
Chapter 8 System Configuration: BasicCisco Secure ACS System Restore8-16User Guide for Cisco Secure ACS for Windows Server78-16592-01Reports of
8-17User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 8 System Configuration: BasicCisco Secure ACS Active Service Management
Chapter 8 System Configuration: BasicCisco Secure ACS Active Service Management8-18User Guide for Cisco Secure ACS for Windows Server78-16592-01
8-19User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 8 System Configuration: BasicCisco Secure ACS Active Service Management
Chapter 8 System Configuration: BasicCisco Secure ACS Active Service Management8-20User Guide for Cisco Secure ACS for Windows Server78-16592-01
8-21User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 8 System Configuration: BasicVoIP Accounting Configurationc. In the SMT
Chapter 8 System Configuration: BasicVoIP Accounting Configuration8-22User Guide for Cisco Secure ACS for Windows Server78-16592-01To configure
CHAPTER 9-1User Guide for Cisco Secure ACS for Windows Server78-16592-019System Configuration: AdvancedThis chapter addresses the CiscoSecure Database
xxxiiiUser Guide for Cisco Secure ACS for Windows Server78-16592-01PrefaceRelated DocumentationRelated DocumentationNote We sometimes update the print
Chapter 9 System Configuration: AdvancedCiscoSecure Database Replication9-2User Guide for Cisco Secure ACS for Windows Server78-16592-01• Replic
9-3User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 9 System Configuration: AdvancedCiscoSecure Database Replication• IP poo
Chapter 9 System Configuration: AdvancedCiscoSecure Database Replication9-4User Guide for Cisco Secure ACS for Windows Server78-16592-01be runni
9-5User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 9 System Configuration: AdvancedCiscoSecure Database Replicationc. The p
Chapter 9 System Configuration: AdvancedCiscoSecure Database Replication9-6User Guide for Cisco Secure ACS for Windows Server78-16592-01c. The s
9-7User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 9 System Configuration: AdvancedCiscoSecure Database ReplicationReplicat
Chapter 9 System Configuration: AdvancedCiscoSecure Database Replication9-8User Guide for Cisco Secure ACS for Windows Server78-16592-01–In its
9-9User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 9 System Configuration: AdvancedCiscoSecure Database Replication• A seco
Chapter 9 System Configuration: AdvancedCiscoSecure Database Replication9-10User Guide for Cisco Secure ACS for Windows Server78-16592-01of sett
9-11User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 9 System Configuration: AdvancedCiscoSecure Database ReplicationFor mor
PrefaceRelated DocumentationxxxivUser Guide for Cisco Secure ACS for Windows Server78-16592-01Table 2 describes a set of white papers about Cisco Secu
Chapter 9 System Configuration: AdvancedCiscoSecure Database Replication9-12User Guide for Cisco Secure ACS for Windows Server78-16592-01Note If
9-13User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 9 System Configuration: AdvancedCiscoSecure Database Replication–Manual
Chapter 9 System Configuration: AdvancedCiscoSecure Database Replication9-14User Guide for Cisco Secure ACS for Windows Server78-16592-01Note Th
9-15User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 9 System Configuration: AdvancedCiscoSecure Database ReplicationInbound
Chapter 9 System Configuration: AdvancedCiscoSecure Database Replication9-16User Guide for Cisco Secure ACS for Windows Server78-16592-01To impl
9-17User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 9 System Configuration: AdvancedCiscoSecure Database ReplicationConfigu
Chapter 9 System Configuration: AdvancedCiscoSecure Database Replication9-18User Guide for Cisco Secure ACS for Windows Server78-16592-01Step 4
9-19User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 9 System Configuration: AdvancedCiscoSecure Database ReplicationNote Fo
Chapter 9 System Configuration: AdvancedCiscoSecure Database Replication9-20User Guide for Cisco Secure ACS for Windows Server78-16592-01Note If
9-21User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 9 System Configuration: AdvancedCiscoSecure Database ReplicationNote Re
xxxvUser Guide for Cisco Secure ACS for Windows Server78-16592-01PrefaceObtaining DocumentationObtaining DocumentationCisco documentation and addition
Chapter 9 System Configuration: AdvancedCiscoSecure Database Replication9-22User Guide for Cisco Secure ACS for Windows Server78-16592-01Note If
9-23User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 9 System Configuration: AdvancedCiscoSecure Database ReplicationTip Cli
Chapter 9 System Configuration: AdvancedCiscoSecure Database Replication9-24User Guide for Cisco Secure ACS for Windows Server78-16592-01c. Repe
9-25User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 9 System Configuration: AdvancedRDBMS SynchronizationDatabase Replicati
Chapter 9 System Configuration: AdvancedRDBMS Synchronization9-26User Guide for Cisco Secure ACS for Windows Server78-16592-01–Synchronization P
9-27User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 9 System Configuration: AdvancedRDBMS SynchronizationUsersAmong the use
Chapter 9 System Configuration: AdvancedRDBMS Synchronization9-28User Guide for Cisco Secure ACS for Windows Server78-16592-01• Specifying outbo
9-29User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 9 System Configuration: AdvancedRDBMS SynchronizationNote If you intend
Chapter 9 System Configuration: AdvancedRDBMS Synchronization9-30User Guide for Cisco Secure ACS for Windows Server78-16592-01Figure 9-2 RDBMS S
9-31User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 9 System Configuration: AdvancedRDBMS SynchronizationAbout the accountA
PrefaceDocumentation FeedbackxxxviUser Guide for Cisco Secure ACS for Windows Server78-16592-01Cisco.comYou can access the most current Cisco document
Chapter 9 System Configuration: AdvancedRDBMS Synchronization9-32User Guide for Cisco Secure ACS for Windows Server78-16592-01• Oracle 7—Contain
9-33User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 9 System Configuration: AdvancedRDBMS SynchronizationReplaying transact
Chapter 9 System Configuration: AdvancedRDBMS Synchronization9-34User Guide for Cisco Secure ACS for Windows Server78-16592-01implementation. If
9-35User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 9 System Configuration: AdvancedRDBMS SynchronizationStep 7 Schedule RD
Chapter 9 System Configuration: AdvancedRDBMS Synchronization9-36User Guide for Cisco Secure ACS for Windows Server78-16592-01Preparing for CSV-
9-37User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 9 System Configuration: AdvancedRDBMS Synchronizationnet start CSDBSync
Chapter 9 System Configuration: AdvancedRDBMS Synchronization9-38User Guide for Cisco Secure ACS for Windows Server78-16592-01Step 6 Complete th
9-39User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 9 System Configuration: AdvancedRDBMS Synchronization• Password—Specifi
Chapter 9 System Configuration: AdvancedRDBMS Synchronization9-40User Guide for Cisco Secure ACS for Windows Server78-16592-01For more informati
9-41User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 9 System Configuration: AdvancedRDBMS SynchronizationNote You do not ha
xxxviiUser Guide for Cisco Secure ACS for Windows Server78-16592-01PrefaceObtaining Technical AssistanceYou can submit comments by using the response
Chapter 9 System Configuration: AdvancedRDBMS Synchronization9-42User Guide for Cisco Secure ACS for Windows Server78-16592-01Note For more info
9-43User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 9 System Configuration: AdvancedRDBMS SynchronizationNote For more info
Chapter 9 System Configuration: AdvancedIP Pools Server9-44User Guide for Cisco Secure ACS for Windows Server78-16592-01Step 2 Click RDBMS Synch
9-45User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 9 System Configuration: AdvancedIP Pools Serveryou enable this feature,
Chapter 9 System Configuration: AdvancedIP Pools Server9-46User Guide for Cisco Secure ACS for Windows Server78-16592-01You can determine whethe
9-47User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 9 System Configuration: AdvancedIP Pools ServerRefreshing the AAA Serve
Chapter 9 System Configuration: AdvancedIP Pools Server9-48User Guide for Cisco Secure ACS for Windows Server78-16592-01Note All addresses in an
9-49User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 9 System Configuration: AdvancedIP Pools ServerNote All addresses in an
Chapter 9 System Configuration: AdvancedIP Pools Server9-50User Guide for Cisco Secure ACS for Windows Server78-16592-01The name pool table appe
9-51User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 9 System Configuration: AdvancedIP Pools Address RecoveryStep 4 Click D
PrefaceObtaining Technical AssistancexxxviiiUser Guide for Cisco Secure ACS for Windows Server78-16592-01recommended solutions. If your issue is not r
Chapter 9 System Configuration: AdvancedIP Pools Address Recovery9-52User Guide for Cisco Secure ACS for Windows Server78-16592-01Cisco Secure A
CHAPTER 10-1User Guide for Cisco Secure ACS for Windows Server78-16592-0110System Configuration: Authentication and CertificatesThis chapter addresses
Chapter 10 System Configuration: Authentication and CertificatesAbout Certification and EAP Protocols10-2User Guide for Cisco Secure ACS for Win
10-3User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 10 System Configuration: Authentication and CertificatesAbout Certifica
Chapter 10 System Configuration: Authentication and CertificatesAbout Certification and EAP Protocols10-4User Guide for Cisco Secure ACS for Win
10-5User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 10 System Configuration: Authentication and CertificatesAbout Certifica
Chapter 10 System Configuration: Authentication and CertificatesAbout Certification and EAP Protocols10-6User Guide for Cisco Secure ACS for Win
10-7User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 10 System Configuration: Authentication and CertificatesAbout Certifica
Chapter 10 System Configuration: Authentication and CertificatesAbout Certification and EAP Protocols10-8User Guide for Cisco Secure ACS for Win
10-9User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 10 System Configuration: Authentication and CertificatesAbout Certifica
xxxixUser Guide for Cisco Secure ACS for Windows Server78-16592-01PrefaceObtaining Additional Publications and InformationObtaining Additional Publica
Chapter 10 System Configuration: Authentication and CertificatesAbout Certification and EAP Protocols10-10User Guide for Cisco Secure ACS for Wi
10-11User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 10 System Configuration: Authentication and CertificatesAbout Certific
Chapter 10 System Configuration: Authentication and CertificatesAbout Certification and EAP Protocols10-12User Guide for Cisco Secure ACS for Wi
10-13User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 10 System Configuration: Authentication and CertificatesAbout Certific
Chapter 10 System Configuration: Authentication and CertificatesAbout Certification and EAP Protocols10-14User Guide for Cisco Secure ACS for Wi
10-15User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 10 System Configuration: Authentication and CertificatesAbout Certific
Chapter 10 System Configuration: Authentication and CertificatesAbout Certification and EAP Protocols10-16User Guide for Cisco Secure ACS for Wi
10-17User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 10 System Configuration: Authentication and CertificatesAbout Certific
Chapter 10 System Configuration: Authentication and CertificatesAbout Certification and EAP Protocols10-18User Guide for Cisco Secure ACS for Wi
10-19User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 10 System Configuration: Authentication and CertificatesAbout Certific
ContentsivUser Guide for Cisco Secure ACS for Windows Server78-16592-01AAA Protocols—TACACS+ and RADIUS 1-6TACACS+ 1-7RADIUS 1-7Authentication 1-8Aut
PrefaceObtaining Additional Publications and InformationxlUser Guide for Cisco Secure ACS for Windows Server78-16592-01• Internet Protocol Journal is
Chapter 10 System Configuration: Authentication and CertificatesAbout Certification and EAP Protocols10-20User Guide for Cisco Secure ACS for Wi
10-21User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 10 System Configuration: Authentication and CertificatesAbout Certific
Chapter 10 System Configuration: Authentication and CertificatesAbout Certification and EAP Protocols10-22User Guide for Cisco Secure ACS for Wi
10-23User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 10 System Configuration: Authentication and CertificatesAbout Certific
Chapter 10 System Configuration: Authentication and CertificatesAbout Certification and EAP Protocols10-24User Guide for Cisco Secure ACS for Wi
10-25User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 10 System Configuration: Authentication and CertificatesAbout Certific
Chapter 10 System Configuration: Authentication and CertificatesGlobal Authentication Setup10-26User Guide for Cisco Secure ACS for Windows Serv
10-27User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 10 System Configuration: Authentication and CertificatesGlobal Authent
Chapter 10 System Configuration: Authentication and CertificatesGlobal Authentication Setup10-28User Guide for Cisco Secure ACS for Windows Serv
10-29User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 10 System Configuration: Authentication and CertificatesGlobal Authent
CHAPTER1-1User Guide for Cisco Secure ACS for Windows Server78-16592-011OverviewThis chapter provides an overview of Cisco Secure ACS for Windows Serv
Chapter 10 System Configuration: Authentication and CertificatesGlobal Authentication Setup10-30User Guide for Cisco Secure ACS for Windows Serv
10-31User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 10 System Configuration: Authentication and CertificatesGlobal Authent
Chapter 10 System Configuration: Authentication and CertificatesGlobal Authentication Setup10-32User Guide for Cisco Secure ACS for Windows Serv
10-33User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 10 System Configuration: Authentication and CertificatesGlobal Authent
Chapter 10 System Configuration: Authentication and CertificatesCisco Secure ACS Certificate Setup10-34User Guide for Cisco Secure ACS for Windo
10-35User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 10 System Configuration: Authentication and CertificatesCisco Secure A
Chapter 10 System Configuration: Authentication and CertificatesCisco Secure ACS Certificate Setup10-36User Guide for Cisco Secure ACS for Windo
10-37User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 10 System Configuration: Authentication and CertificatesCisco Secure A
Chapter 10 System Configuration: Authentication and CertificatesCisco Secure ACS Certificate Setup10-38User Guide for Cisco Secure ACS for Windo
10-39User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 10 System Configuration: Authentication and CertificatesCisco Secure A
Chapter 1 OverviewThe Cisco Secure ACS Paradigm1-2User Guide for Cisco Secure ACS for Windows Server78-16592-01–Accessing the HTML Interface, pag
Chapter 10 System Configuration: Authentication and CertificatesCisco Secure ACS Certificate Setup10-40User Guide for Cisco Secure ACS for Windo
10-41User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 10 System Configuration: Authentication and CertificatesCisco Secure A
Chapter 10 System Configuration: Authentication and CertificatesCisco Secure ACS Certificate Setup10-42User Guide for Cisco Secure ACS for Windo
10-43User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 10 System Configuration: Authentication and CertificatesCisco Secure A
Chapter 10 System Configuration: Authentication and CertificatesCisco Secure ACS Certificate Setup10-44User Guide for Cisco Secure ACS for Windo
10-45User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 10 System Configuration: Authentication and CertificatesCisco Secure A
Chapter 10 System Configuration: Authentication and CertificatesCisco Secure ACS Certificate Setup10-46User Guide for Cisco Secure ACS for Windo
10-47User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 10 System Configuration: Authentication and CertificatesCisco Secure A
Chapter 10 System Configuration: Authentication and CertificatesCisco Secure ACS Certificate Setup10-48User Guide for Cisco Secure ACS for Windo
10-49User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 10 System Configuration: Authentication and CertificatesCisco Secure A
1-3User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 1 OverviewCisco Secure ACS Specificationsservices that ensure a secure en
Chapter 10 System Configuration: Authentication and CertificatesCisco Secure ACS Certificate Setup10-50User Guide for Cisco Secure ACS for Windo
10-51User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 10 System Configuration: Authentication and CertificatesCisco Secure A
Chapter 10 System Configuration: Authentication and CertificatesCisco Secure ACS Certificate Setup10-52User Guide for Cisco Secure ACS for Windo
CHAPTER 11-1User Guide for Cisco Secure ACS for Windows Server78-16592-0111Logs and ReportsCisco Secure ACS for Windows Server produces a variety of l
Chapter 11 Logs and ReportsLogging Formats11-2User Guide for Cisco Secure ACS for Windows Server78-16592-01Logging FormatsCisco Secure ACS logs
11-3User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 11 Logs and ReportsSpecial Logging AttributesThe content of these attri
Chapter 11 Logs and ReportsNAC Attributes in Logs11-4User Guide for Cisco Secure ACS for Windows Server78-16592-01Note Cisco Secure ACS cannot d
11-5User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 11 Logs and ReportsUpdate Packets in Accounting LogsPosture validation
Chapter 11 Logs and ReportsAbout Cisco Secure ACS Logs and Reports11-6User Guide for Cisco Secure ACS for Windows Server78-16592-01About Cisco S
11-7User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 11 Logs and ReportsAbout Cisco Secure ACS Logs and ReportsTable 11-1 Ac
Chapter 1 OverviewCisco Secure ACS Specifications1-4User Guide for Cisco Secure ACS for Windows Server78-16592-01• Maximum users supported by the
Chapter 11 Logs and ReportsAbout Cisco Secure ACS Logs and Reports11-8User Guide for Cisco Secure ACS for Windows Server78-16592-01Failed Attemp
11-9User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 11 Logs and ReportsAbout Cisco Secure ACS Logs and ReportsDynamic Admin
Chapter 11 Logs and ReportsAbout Cisco Secure ACS Logs and Reports11-10User Guide for Cisco Secure ACS for Windows Server78-16592-01Viewing the
11-11User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 11 Logs and ReportsAbout Cisco Secure ACS Logs and ReportsTip You can
Chapter 11 Logs and ReportsAbout Cisco Secure ACS Logs and Reports11-12User Guide for Cisco Secure ACS for Windows Server78-16592-01Note Deletin
11-13User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 11 Logs and ReportsAbout Cisco Secure ACS Logs and ReportsFor more inf
Chapter 11 Logs and ReportsAbout Cisco Secure ACS Logs and Reports11-14User Guide for Cisco Secure ACS for Windows Server78-16592-01Configuring
11-15User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 11 Logs and ReportsWorking with CSV LogsStep 4 To generate a new Admin
Chapter 11 Logs and ReportsWorking with CSV Logs11-16User Guide for Cisco Secure ACS for Windows Server78-16592-01Older files are named in the f
11-17User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 11 Logs and ReportsWorking with CSV LogsEnabling or Disabling a CSV Lo
1-5User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 1 OverviewAAA Server Functions and ConceptsWhen you install Cisco Secure
Chapter 11 Logs and ReportsWorking with CSV Logs11-18User Guide for Cisco Secure ACS for Windows Server78-16592-01Viewing a CSV ReportWhen you s
11-19User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 11 Logs and ReportsWorking with CSV LogsTip To check for newer informa
Chapter 11 Logs and ReportsWorking with CSV Logs11-20User Guide for Cisco Secure ACS for Windows Server78-16592-01• CSV file location—You can sp
11-21User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 11 Logs and ReportsWorking with ODBC LogsStep 7 To generate a new CSV
Chapter 11 Logs and ReportsWorking with ODBC Logs11-22User Guide for Cisco Secure ACS for Windows Server78-16592-01Preparing for ODBC LoggingTo
11-23User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 11 Logs and ReportsWorking with ODBC LogsStep 3 Click Add.Step 4 Selec
Chapter 11 Logs and ReportsWorking with ODBC Logs11-24User Guide for Cisco Secure ACS for Windows Server78-16592-01To configure an ODBC log, fol
11-25User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 11 Logs and ReportsWorking with ODBC LogsNote The user must have suffi
Chapter 11 Logs and ReportsRemote Logging11-26User Guide for Cisco Secure ACS for Windows Server78-16592-01c. Click the name of the ODBC log you
11-27User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 11 Logs and ReportsRemote Logginggenerates the accounting logs in the
Chapter 1 OverviewAAA Server Functions and Concepts1-6User Guide for Cisco Secure ACS for Windows Server78-16592-01• Authorization, page 1-17• Ac
Chapter 11 Logs and ReportsRemote Logging11-28User Guide for Cisco Secure ACS for Windows Server78-16592-01b. Add to the AAA Servers table each
11-29User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 11 Logs and ReportsRemote Loggingbehavior enables you to configure one
Chapter 11 Logs and ReportsRemote Logging11-30User Guide for Cisco Secure ACS for Windows Server78-16592-01Step 5 Select the applicable remote l
11-31User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 11 Logs and ReportsService LogsStep 8 Click Submit.Cisco Secure ACS sa
Chapter 11 Logs and ReportsService Logs11-32User Guide for Cisco Secure ACS for Windows Server78-16592-01Services LoggedCisco Secure ACS generat
11-33User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 11 Logs and ReportsService LogsConfiguring Service LogsYou can configu
Chapter 11 Logs and ReportsService Logs11-34User Guide for Cisco Secure ACS for Windows Server78-16592-01Step 3 To disable the service log file,
CHAPTER 12-1User Guide for Cisco Secure ACS for Windows Server78-16592-0112Administrators and Administrative PolicyThis chapter addresses the Cisco Se
Chapter 12 Administrators and Administrative PolicyAdministrator Accounts12-2User Guide for Cisco Secure ACS for Windows Server78-16592-01About
12-3User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 12 Administrators and Administrative PolicyAdministrator AccountsAdmini
1-7User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 1 OverviewAAA Server Functions and ConceptsTACACS+Cisco Secure ACS confor
Chapter 12 Administrators and Administrative PolicyAdministrator Accounts12-4User Guide for Cisco Secure ACS for Windows Server78-16592-01Note A
12-5User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 12 Administrators and Administrative PolicyAdministrator Accounts–VoIP
Chapter 12 Administrators and Administrative PolicyAdministrator Accounts12-6User Guide for Cisco Secure ACS for Windows Server78-16592-01–ACS B
12-7User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 12 Administrators and Administrative PolicyAdministrator AccountsAll pr
Chapter 12 Administrators and Administrative PolicyAdministrator Accounts12-8User Guide for Cisco Secure ACS for Windows Server78-16592-01Note Y
12-9User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 12 Administrators and Administrative PolicyAdministrator AccountsNote I
Chapter 12 Administrators and Administrative PolicyAdministrator Accounts12-10User Guide for Cisco Secure ACS for Windows Server78-16592-01Step
12-11User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 12 Administrators and Administrative PolicyAccess PolicyDeleting an Ad
Chapter 12 Administrators and Administrative PolicyAccess Policy12-12User Guide for Cisco Secure ACS for Windows Server78-16592-01Access Policy
12-13User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 12 Administrators and Administrative PolicyAccess PolicyCisco Secure A
Chapter 1 OverviewAAA Server Functions and Concepts1-8User Guide for Cisco Secure ACS for Windows Server78-16592-01• RFC 2868• RFC 2869The ports
Chapter 12 Administrators and Administrative PolicyAccess Policy12-14User Guide for Cisco Secure ACS for Windows Server78-16592-01Setting Up Acc
12-15User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 12 Administrators and Administrative PolicyAccess Policyb. For each IP
Chapter 12 Administrators and Administrative PolicySession Policy12-16User Guide for Cisco Secure ACS for Windows Server78-16592-01Session Polic
12-17User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 12 Administrators and Administrative PolicySession Policy• Respond to
Chapter 12 Administrators and Administrative PolicyAudit Policy12-18User Guide for Cisco Secure ACS for Windows Server78-16592-01Step 5 Set the
CHAPTER 13-1User Guide for Cisco Secure ACS for Windows Server78-16592-0113User DatabasesCisco Secure ACS for Windows Server authenticates users again
Chapter 13 User DatabasesCiscoSecure User Database13-2User Guide for Cisco Secure ACS for Windows Server78-16592-01• Token Server User Databases
13-3User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 13 User DatabasesCiscoSecure User DatabaseUser Import and CreationThere
Chapter 13 User DatabasesAbout External User Databases13-4User Guide for Cisco Secure ACS for Windows Server78-16592-01Cisco Secure ACS. Any use
13-5User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 13 User DatabasesAbout External User DatabasesFor Cisco Secure ACS to i
1-9User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 1 OverviewAAA Server Functions and ConceptsThere is a fundamental implici
Chapter 13 User DatabasesAbout External User Databases13-6User Guide for Cisco Secure ACS for Windows Server78-16592-01• By Unknown User Policy—
13-7User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 13 User DatabasesWindows User DatabaseWindows User DatabaseYou can conf
Chapter 13 User DatabasesWindows User Database13-8User Guide for Cisco Secure ACS for Windows Server78-16592-01What’s Supported with Windows Use
13-9User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 13 User DatabasesWindows User DatabaseAuthentication with Windows User
Chapter 13 User DatabasesWindows User Database13-10User Guide for Cisco Secure ACS for Windows Server78-16592-01but no trust relationship is est
13-11User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 13 User DatabasesWindows User DatabaseWindows Dial-up Networking Clien
Chapter 13 User DatabasesWindows User Database13-12User Guide for Cisco Secure ACS for Windows Server78-16592-01To determine the format of a use
13-13User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 13 User DatabasesWindows User DatabaseNon-domain-qualified UsernamesCi
Chapter 13 User DatabasesWindows User Database13-14User Guide for Cisco Secure ACS for Windows Server78-16592-01Note If your Domain List contain
13-15User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 13 User DatabasesWindows User DatabaseIf the authentication protocol u
vUser Guide for Cisco Secure ACS for Windows Server78-16592-01ContentsAdministrative Sessions through a NAT Gateway 1-31Accessing the HTML Interface
Chapter 1 OverviewAAA Server Functions and Concepts1-10User Guide for Cisco Secure ACS for Windows Server78-16592-01Authentication and User Datab
Chapter 13 User DatabasesWindows User Database13-16User Guide for Cisco Secure ACS for Windows Server78-16592-01EAP-TLS Domain StrippingIf you u
13-17User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 13 User DatabasesWindows User DatabaseWhen machine authentication is e
Chapter 13 User DatabasesWindows User Database13-18User Guide for Cisco Secure ACS for Windows Server78-16592-01Cisco Secure ACS supports both E
13-19User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 13 User DatabasesWindows User Databasethat was added to the local mach
Chapter 13 User DatabasesWindows User Database13-20User Guide for Cisco Secure ACS for Windows Server78-16592-01–Calling-Station-Id value not fo
13-21User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 13 User DatabasesWindows User DatabaseClient operating systems support
Chapter 13 User DatabasesWindows User Database13-22User Guide for Cisco Secure ACS for Windows Server78-16592-01d. On the Protected EAP Properti
13-23User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 13 User DatabasesWindows User DatabaseNote End-user client computers a
Chapter 13 User DatabasesWindows User Database13-24User Guide for Cisco Secure ACS for Windows Server78-16592-01Cisco Secure ACS allows you to c
13-25User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 13 User DatabasesWindows User DatabaseUser-Changeable Passwords with W
1-11User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 1 OverviewAAA Server Functions and ConceptsTable 1-3 specifies EAP authe
Chapter 13 User DatabasesWindows User Database13-26User Guide for Cisco Secure ACS for Windows Server78-16592-01Preparing Users for Authenticati
13-27User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 13 User DatabasesWindows User DatabaseTip Windows dialin permission is
Chapter 13 User DatabasesWindows User Database13-28User Guide for Cisco Secure ACS for Windows Server78-16592-01Note The check boxes under MS CH
13-29User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 13 User DatabasesWindows User Database• EAP-TLS and PEAP machine authe
Chapter 13 User DatabasesWindows User Database13-30User Guide for Cisco Secure ACS for Windows Server78-16592-01Note If you do not change the va
13-31User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 13 User DatabasesWindows User DatabaseStep 3 Click Windows Database.If
Chapter 13 User DatabasesGeneric LDAP13-32User Guide for Cisco Secure ACS for Windows Server78-16592-01Step 7 Click Submit.Cisco Secure ACS save
13-33User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 13 User DatabasesGeneric LDAP• LDAP Failover, page 13-36• LDAP Configu
Chapter 13 User DatabasesGeneric LDAP13-34User Guide for Cisco Secure ACS for Windows Server78-16592-01For each LDAP instance, you can add or le
13-35User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 13 User DatabasesGeneric LDAPIf you choose to make use of domain filte
Chapter 1 OverviewAAA Server Functions and Concepts1-12User Guide for Cisco Secure ACS for Windows Server78-16592-01• PEAP(EAP-GTC)• PEAP(EAP-MSC
Chapter 13 User DatabasesGeneric LDAP13-36User Guide for Cisco Secure ACS for Windows Server78-16592-01Note With this option, Cisco Secure ACS s
13-37User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 13 User DatabasesGeneric LDAPUnsuccessful Previous Authentication with
Chapter 13 User DatabasesGeneric LDAP13-38User Guide for Cisco Secure ACS for Windows Server78-16592-01This table contains the following options
13-39User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 13 User DatabasesGeneric LDAP–Strip domain before submitting username
Chapter 13 User DatabasesGeneric LDAP13-40User Guide for Cisco Secure ACS for Windows Server78-16592-01For example, if the delimiter character i
13-41User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 13 User DatabasesGeneric LDAP–UserObjectType—The name of the attribute
Chapter 13 User DatabasesGeneric LDAP13-42User Guide for Cisco Secure ACS for Windows Server78-16592-01–Port—The TCP/IP port number on which the
13-43User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 13 User DatabasesGeneric LDAP–Admin DN—The DN of the administrator; th
Chapter 13 User DatabasesGeneric LDAP13-44User Guide for Cisco Secure ACS for Windows Server78-16592-01To configure Cisco Secure ACS to use the
13-45User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 13 User DatabasesGeneric LDAPStep 8 If you want to limit authenticatio
1-13User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 1 OverviewAAA Server Functions and Concepts• ARAP—Uses a two-way challen
Chapter 13 User DatabasesGeneric LDAP13-46User Guide for Cisco Secure ACS for Windows Server78-16592-01Note For information about domain filteri
13-47User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 13 User DatabasesGeneric LDAPStep 13 In the User Object Class box, typ
Chapter 13 User DatabasesGeneric LDAP13-48User Guide for Cisco Secure ACS for Windows Server78-16592-01Step 20 For the Primary LDAP Server and S
13-49User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 13 User DatabasesNovell NDS DatabaseFor example:uid=joesmith,ou=member
Chapter 13 User DatabasesNovell NDS Database13-50User Guide for Cisco Secure ACS for Windows Server78-16592-01About Novell NDS User DatabasesCis
13-51User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 13 User DatabasesNovell NDS DatabaseFor users to authenticate against
Chapter 13 User DatabasesNovell NDS Database13-52User Guide for Cisco Secure ACS for Windows Server78-16592-01Novell NDS External User Database
13-53User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 13 User DatabasesNovell NDS DatabaseNote If the administrator username
Chapter 13 User DatabasesNovell NDS Database13-54User Guide for Cisco Secure ACS for Windows Server78-16592-01Before You BeginThe Novell Request
13-55User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 13 User DatabasesODBC DatabaseFor more information about the content o
Chapter 1 OverviewAAA Server Functions and Concepts1-14User Guide for Cisco Secure ACS for Windows Server78-16592-01• EAP-FAST—EAP Flexible Authe
Chapter 13 User DatabasesODBC Database13-56User Guide for Cisco Secure ACS for Windows Server78-16592-01ACS to authenticate against an ODBC-comp
13-57User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 13 User DatabasesODBC Database• EAP-TLS Authentication Procedure Input
Chapter 13 User DatabasesODBC Database13-58User Guide for Cisco Secure ACS for Windows Server78-16592-01• Group Mapping for Unknown Users—Cisco
13-59User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 13 User DatabasesODBC DatabaseCisco Secure ACS grants authorization ba
Chapter 13 User DatabasesODBC Database13-60User Guide for Cisco Secure ACS for Windows Server78-16592-01Step 4 Write the stored procedures inten
13-61User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 13 User DatabasesODBC DatabaseThe Cisco Secure ACS product CD provides
Chapter 13 User DatabasesODBC Database13-62User Guide for Cisco Secure ACS for Windows Server78-16592-01will default to case sensitive, whereas
13-63User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 13 User DatabasesODBC DatabaseGRANT EXECUTE ON dbo.CSNTAuthUserPap TO
Chapter 13 User DatabasesODBC Database13-64User Guide for Cisco Secure ACS for Windows Server78-16592-01Sample Routine for Generating an EAP-TLS
13-65User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 13 User DatabasesODBC DatabaseThe input names are for guidance only. P
1-15User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 1 OverviewAAA Server Functions and Concepts• Outbound passwords—The TACA
Chapter 13 User DatabasesODBC Database13-66User Guide for Cisco Secure ACS for Windows Server78-16592-01Note If the ODBC database returns data i
13-67User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 13 User DatabasesODBC DatabaseThe CSNTGroup and CSNTacctInfo fields ar
Chapter 13 User DatabasesODBC Database13-68User Guide for Cisco Secure ACS for Windows Server78-16592-01Note Because Cisco Secure ACS performs a
13-69User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 13 User DatabasesODBC DatabaseThe CSNTGroup and CSNTacctInfo fields ar
Chapter 13 User DatabasesODBC Database13-70User Guide for Cisco Secure ACS for Windows Server78-16592-01Configuring a System Data Source Name fo
13-71User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 13 User DatabasesODBC DatabaseStep 10 Close the ODBC Data Source Admin
Chapter 13 User DatabasesODBC Database13-72User Guide for Cisco Secure ACS for Windows Server78-16592-01Step 6 From the System DSN list, select
13-73User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 13 User DatabasesODBC DatabaseStep 11 From the DSN Procedure Type list
Chapter 13 User DatabasesODBC Database13-74User Guide for Cisco Secure ACS for Windows Server78-16592-01Note If you enabled CHAP/MS-CHAP/ARAP au
13-75User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 13 User DatabasesLEAP Proxy RADIUS Server DatabaseLEAP Proxy RADIUS Se
Chapter 1 OverviewAAA Server Functions and Concepts1-16User Guide for Cisco Secure ACS for Windows Server78-16592-01For information on the requir
Chapter 13 User DatabasesLEAP Proxy RADIUS Server Database13-76User Guide for Cisco Secure ACS for Windows Server78-16592-01Configuring a LEAP P
13-77User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 13 User DatabasesLEAP Proxy RADIUS Server DatabaseStep 7 In the follow
Chapter 13 User DatabasesToken Server User Databases13-78User Guide for Cisco Secure ACS for Windows Server78-16592-01Token Server User Database
13-79User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 13 User DatabasesToken Server User DatabasesFor RSA SecurID, Cisco Sec
Chapter 13 User DatabasesToken Server User Databases13-80User Guide for Cisco Secure ACS for Windows Server78-16592-01About RADIUS-Enabled Token
13-81User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 13 User DatabasesToken Server User DatabasesCisco Secure ACS expects t
Chapter 13 User DatabasesToken Server User Databases13-82User Guide for Cisco Secure ACS for Windows Server78-16592-01c. Click Submit.Cisco Secu
13-83User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 13 User DatabasesToken Server User Databases• Timeout (seconds):—The n
Chapter 13 User DatabasesToken Server User Databases13-84User Guide for Cisco Secure ACS for Windows Server78-16592-01Note You should only use t
13-85User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 13 User DatabasesToken Server User DatabasesConfiguring an RSA SecurID
1-17User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 1 OverviewAAA Server Functions and Concepts• Configurable character stri
Chapter 13 User DatabasesDeleting an External User Database Configuration13-86User Guide for Cisco Secure ACS for Windows Server78-16592-01Step
13-87User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 13 User DatabasesDeleting an External User Database ConfigurationStep
Chapter 13 User DatabasesDeleting an External User Database Configuration13-88User Guide for Cisco Secure ACS for Windows Server78-16592-01
CHAPTER 14-1User Guide for Cisco Secure ACS for Windows Server78-16592-0114Network Admission ControlNAC enables you to control the degree of access pe
Chapter 14 Network Admission ControlAbout Network Admission Control14-2User Guide for Cisco Secure ACS for Windows Server78-16592-01NAC AAA Comp
14-3User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 14 Network Admission ControlAbout Network Admission ControlPosture Vali
Chapter 14 Network Admission ControlAbout Network Admission Control14-4User Guide for Cisco Secure ACS for Windows Server78-16592-016. Cisco Sec
14-5User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 14 Network Admission ControlImplementing Network Admission ControlFrom
Chapter 14 Network Admission ControlImplementing Network Admission Control14-6User Guide for Cisco Secure ACS for Windows Server78-16592-01To im
14-7User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 14 Network Admission ControlImplementing Network Admission ControlStep
Chapter 1 OverviewAAA Server Functions and Concepts1-18User Guide for Cisco Secure ACS for Windows Server78-16592-01This section contains the fol
Chapter 14 Network Admission ControlImplementing Network Admission Control14-8User Guide for Cisco Secure ACS for Windows Server78-16592-01b. Cr
14-9User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 14 Network Admission ControlImplementing Network Admission Controlb. (O
Chapter 14 Network Admission ControlNAC Databases14-10User Guide for Cisco Secure ACS for Windows Server78-16592-01NAC DatabasesThis section con
14-11User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 14 Network Admission ControlNAC Databasesmandatory credential types. T
Chapter 14 Network Admission ControlNAC Databases14-12User Guide for Cisco Secure ACS for Windows Server78-16592-01Cisco Secure ACS communicates
14-13User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 14 Network Admission ControlNAC Databases–Name—Displays the policy nam
Chapter 14 Network Admission ControlNAC Databases14-14User Guide for Cisco Secure ACS for Windows Server78-16592-01Configuring a NAC DatabaseThi
14-15User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 14 Network Admission ControlNAC DatabasesStep 6 Click Configure.Cautio
Chapter 14 Network Admission ControlNAC Policies14-16User Guide for Cisco Secure ACS for Windows Server78-16592-01b. If you need to create a pol
14-17User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 14 Network Admission ControlNAC PoliciesPolicies are reusable; that is
1-19User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 1 OverviewAAA Server Functions and ConceptsQuotas can be either absolute
Chapter 14 Network Admission ControlNAC Policies14-18User Guide for Cisco Secure ACS for Windows Server78-16592-01About Local PoliciesLocal poli
14-19User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 14 Network Admission ControlNAC PoliciesAbout Rules, Rule Elements, an
Chapter 14 Network Admission ControlNAC Policies14-20User Guide for Cisco Secure ACS for Windows Server78-16592-01• unsigned integer—The attribu
14-21User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 14 Network Admission ControlNAC PoliciesThe following are the operator
Chapter 14 Network Admission ControlNAC Policies14-22User Guide for Cisco Secure ACS for Windows Server78-16592-01–$ (dollar)—The $ operator mat
14-23User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 14 Network Admission ControlNAC Policies• Description—Specifies a text
Chapter 14 Network Admission ControlNAC Policies14-24User Guide for Cisco Secure ACS for Windows Server78-16592-01Note Under Default Rule, the m
14-25User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 14 Network Admission ControlNAC Policiesappear in the Attribute list.
Chapter 14 Network Admission ControlNAC Policies14-26User Guide for Cisco Secure ACS for Windows Server78-16592-01b. Click Database Configuratio
14-27User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 14 Network Admission ControlNAC PoliciesTip If you want to change a ru
ContentsviUser Guide for Cisco Secure ACS for Windows Server78-16592-01CHAPTER 3 Interface Configuration 3-1Interface Design Concepts 3-2User-to-Grou
Chapter 1 OverviewAAA Server Functions and Concepts1-20User Guide for Cisco Secure ACS for Windows Server78-16592-01AAA client that uses TACACS+.
Chapter 14 Network Admission ControlNAC Policies14-28User Guide for Cisco Secure ACS for Windows Server78-16592-01When Cisco Secure ACS applies
14-29User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 14 Network Admission ControlNAC PoliciesCisco Secure ACS evaluates a p
Chapter 14 Network Admission ControlNAC Policies14-30User Guide for Cisco Secure ACS for Windows Server78-16592-01ACS cannot reach the primary s
14-31User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 14 Network Admission ControlNAC Policies–Password—Specifies the passwo
Chapter 14 Network Admission ControlNAC Policies14-32User Guide for Cisco Secure ACS for Windows Server78-16592-01• Forwarding Credential Types—
14-33User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 14 Network Admission ControlNAC Policiesd. Under Credential Validation
Chapter 14 Network Admission ControlNAC Policies14-34User Guide for Cisco Secure ACS for Windows Server78-16592-01The Select External Policies p
14-35User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 14 Network Admission ControlNAC PoliciesTip If the policy you want to
Chapter 14 Network Admission ControlNAC Policies14-36User Guide for Cisco Secure ACS for Windows Server78-16592-01Deleting a PolicyBefore You Be
14-37User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 14 Network Admission ControlNAC PoliciesStep 5 Click Delete Policy.Ste
1-21User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 1 OverviewAAA Server Functions and ConceptsOther Authorization-Related F
Chapter 14 Network Admission ControlNAC Policies14-38User Guide for Cisco Secure ACS for Windows Server78-16592-01
CHAPTER 15-1User Guide for Cisco Secure ACS for Windows Server78-16592-0115Unknown User PolicyAfter you have configured at least one database in the E
Chapter 15 Unknown User PolicyKnown, Unknown, and Discovered Users15-2User Guide for Cisco Secure ACS for Windows Server78-16592-01• Posture Val
15-3User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 15 Unknown User PolicyKnown, Unknown, and Discovered UsersCisco Secure
Chapter 15 Unknown User PolicyAuthentication and Unknown Users15-4User Guide for Cisco Secure ACS for Windows Server78-16592-01–Authentication—T
15-5User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 15 Unknown User PolicyAuthentication and Unknown UsersThe Unknown User
Chapter 15 Unknown User PolicyAuthentication and Unknown Users15-6User Guide for Cisco Secure ACS for Windows Server78-16592-01Note Because user
15-7User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 15 Unknown User PolicyAuthentication and Unknown Userswith various Wind
Chapter 15 Unknown User PolicyAuthentication and Unknown Users15-8User Guide for Cisco Secure ACS for Windows Server78-16592-01Note If your netw
15-9User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 15 Unknown User PolicyAuthentication and Unknown UsersAdded Authenticat
Chapter 1 OverviewAAA Server Functions and Concepts1-22User Guide for Cisco Secure ACS for Windows Server78-16592-01AccountingAAA clients use the
Chapter 15 Unknown User PolicyPosture Validation and the Unknown User Policy15-10User Guide for Cisco Secure ACS for Windows Server78-16592-01Po
15-11User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 15 Unknown User PolicyPosture Validation and the Unknown User PolicyCr
Chapter 15 Unknown User PolicyPosture Validation and the Unknown User Policy15-12User Guide for Cisco Secure ACS for Windows Server78-16592-01No
15-13User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 15 Unknown User PolicyAuthorization of Unknown UsersAuthorization of U
Chapter 15 Unknown User PolicyDatabase Search Order15-14User Guide for Cisco Secure ACS for Windows Server78-16592-01• External Databases—Of the
15-15User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 15 Unknown User PolicyDatabase Search Order• Posture validation—The Un
Chapter 15 Unknown User PolicyConfiguring the Unknown User Policy15-16User Guide for Cisco Secure ACS for Windows Server78-16592-01Tip If you cr
15-17User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 15 Unknown User PolicyDisabling Unknown User AuthenticationNote For mo
Chapter 15 Unknown User PolicyDisabling Unknown User Authentication15-18User Guide for Cisco Secure ACS for Windows Server78-16592-01
CHAPTER 16-1User Guide for Cisco Secure ACS for Windows Server78-16592-0116User Group Mapping and SpecificationThis chapter provides information about
1-23User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 1 OverviewAAA Server Functions and ConceptsAdministrationTo configure, m
Chapter 16 User Group Mapping and SpecificationGroup Mapping by External User Database16-2User Guide for Cisco Secure ACS for Windows Server78-1
16-3User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 16 User Group Mapping and SpecificationGroup Mapping by External User D
Chapter 16 User Group Mapping and SpecificationGroup Mapping by Group Set Membership16-4User Guide for Cisco Secure ACS for Windows Server78-165
16-5User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 16 User Group Mapping and SpecificationGroup Mapping by Group Set Membe
Chapter 16 User Group Mapping and SpecificationGroup Mapping by Group Set Membership16-6User Guide for Cisco Secure ACS for Windows Server78-165
16-7User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 16 User Group Mapping and SpecificationGroup Mapping by Group Set Membe
Chapter 16 User Group Mapping and SpecificationGroup Mapping by Group Set Membership16-8User Guide for Cisco Secure ACS for Windows Server78-165
16-9User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 16 User Group Mapping and SpecificationGroup Mapping by Group Set Membe
Chapter 16 User Group Mapping and SpecificationGroup Mapping by Group Set Membership16-10User Guide for Cisco Secure ACS for Windows Server78-16
16-11User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 16 User Group Mapping and SpecificationGroup Mapping by Group Set Memb
Chapter 1 OverviewAAA Server Functions and Concepts1-24User Guide for Cisco Secure ACS for Windows Server78-16592-01For information about configu
Chapter 16 User Group Mapping and SpecificationGroup Mapping by Group Set Membership16-12User Guide for Cisco Secure ACS for Windows Server78-16
16-13User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 16 User Group Mapping and SpecificationNAC Group MappingThe Order mapp
Chapter 16 User Group Mapping and SpecificationRADIUS-Based Group Specification16-14User Guide for Cisco Secure ACS for Windows Server78-16592-0
16-15User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 16 User Group Mapping and SpecificationRADIUS-Based Group Specificatio
Chapter 16 User Group Mapping and SpecificationRADIUS-Based Group Specification16-16User Guide for Cisco Secure ACS for Windows Server78-16592-0
A-1User Guide for Cisco Secure ACS for Windows Server78-16592-01APPENDIXATroubleshootingThis appendix provides information about certain basic proble
Appendix A TroubleshootingAdministration IssuesA-2User Guide for Cisco Secure ACS for Windows Server78-16592-01Administration IssuesCondition Re
A-3User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix A TroubleshootingAdministration IssuesAdministrator configured for even
Appendix A TroubleshootingBrowser IssuesA-4User Guide for Cisco Secure ACS for Windows Server78-16592-01Browser IssuesCondition Recovery ActionT
A-5User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix A TroubleshootingCisco IOS IssuesCisco IOS IssuesCondition Recovery Act
1-25User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 1 OverviewCisco Secure ACS HTML Interface• CSMonitor service, providing
Appendix A TroubleshootingCisco IOS IssuesA-6User Guide for Cisco Secure ACS for Windows Server78-16592-01Under EXEC Commands, Cisco IOS command
A-7User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix A TroubleshootingDatabase IssuesDatabase IssuesCondition Recovery Actio
Appendix A TroubleshootingDatabase IssuesA-8User Guide for Cisco Secure ACS for Windows Server78-16592-01External databases not operating proper
A-9User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix A TroubleshootingDatabase IssuesUnable to authenticate against the Nove
Appendix A TroubleshootingDial-in Connection IssuesA-10User Guide for Cisco Secure ACS for Windows Server78-16592-01Dial-in Connection IssuesCon
A-11User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix A TroubleshootingDial-in Connection IssuesA dial-in user cannot connec
Appendix A TroubleshootingDial-in Connection IssuesA-12User Guide for Cisco Secure ACS for Windows Server78-16592-01A dial-in user cannot connec
A-13User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix A TroubleshootingDial-in Connection IssuesA dial-in user cannot connec
Appendix A TroubleshootingDebug IssuesA-14User Guide for Cisco Secure ACS for Windows Server78-16592-01Debug IssuesCondition Recovery ActionWhen
A-15User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix A TroubleshootingProxy IssuesProxy IssuesCondition Recovery ActionProx
Chapter 1 OverviewCisco Secure ACS HTML Interface1-26User Guide for Cisco Secure ACS for Windows Server78-16592-01This section contains the follo
Appendix A TroubleshootingInstallation and Upgrade IssuesA-16User Guide for Cisco Secure ACS for Windows Server78-16592-01Installation and Upgra
A-17User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix A TroubleshootingReport IssuesReport IssuesCondition Recovery ActionTh
Appendix A TroubleshootingReport IssuesA-18User Guide for Cisco Secure ACS for Windows Server78-16592-01The Logged in Users report works with so
A-19User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix A TroubleshootingThird-Party Server IssuesThird-Party Server IssuesCon
Appendix A TroubleshootingUser Authentication IssuesA-20User Guide for Cisco Secure ACS for Windows Server78-16592-01User Authentication IssuesC
A-21User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix A TroubleshootingUser Authentication IssuesAuthentication fails; the e
Appendix A TroubleshootingTACACS+ and RADIUS Attribute IssuesA-22User Guide for Cisco Secure ACS for Windows Server78-16592-01TACACS+ and RADIUS
B-1User Guide for Cisco Secure ACS for Windows Server78-16592-01APPENDIXBTACACS+ Attribute-Value PairsCisco Secure Access Control Server (ACS) for Wi
Appendix B TACACS+ Attribute-Value PairsCisco IOS AV Pair DictionaryB-2User Guide for Cisco Secure ACS for Windows Server78-16592-01TACACS+ AV P
B-3User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix B TACACS+ Attribute-Value PairsCisco IOS AV Pair Dictionary• ip-address
1-27User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 1 OverviewCisco Secure ACS HTML InterfaceAdministrative sessions timeout
Appendix B TACACS+ Attribute-Value PairsCisco IOS AV Pair DictionaryB-4User Guide for Cisco Secure ACS for Windows Server78-16592-01• wins-serve
B-5User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix B TACACS+ Attribute-Value PairsCisco IOS AV Pair Dictionary• protocol•
Appendix B TACACS+ Attribute-Value PairsCisco IOS AV Pair DictionaryB-6User Guide for Cisco Secure ACS for Windows Server78-16592-01
C-1User Guide for Cisco Secure ACS for Windows Server78-16592-01APPENDIXCRADIUS AttributesCisco Secure Access Control Server (ACS) for Windows Server
Appendix C RADIUS AttributesCisco IOS Dictionary of RADIUS AV PairsC-2User Guide for Cisco Secure ACS for Windows Server78-16592-013. In the pro
C-3User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix C RADIUS AttributesCisco IOS Dictionary of RADIUS AV PairsNote If you s
Appendix C RADIUS AttributesCisco IOS Dictionary of RADIUS AV PairsC-4User Guide for Cisco Secure ACS for Windows Server78-16592-0113 Framed-Com
C-5User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix C RADIUS AttributesCisco IOS/PIX Dictionary of RADIUS VSAsCisco IOS/PIX
Appendix C RADIUS AttributesCisco IOS/PIX Dictionary of RADIUS VSAsC-6User Guide for Cisco Secure ACS for Windows Server78-16592-0124 cisco-h323
C-7User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix C RADIUS AttributesAbout the cisco-av-pair RADUIS AttributeAbout the ci
Chapter 1 OverviewCisco Secure ACS HTML Interface1-28User Guide for Cisco Secure ACS for Windows Server78-16592-01advanced features such as datab
Appendix C RADIUS AttributesAbout the cisco-av-pair RADUIS AttributeC-8User Guide for Cisco Secure ACS for Windows Server78-16592-01In IOS, supp
C-9User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix C RADIUS AttributesCisco VPN 3000 Concentrator Dictionary of RADIUS VSA
Appendix C RADIUS AttributesCisco VPN 3000 Concentrator Dictionary of RADIUS VSAsC-10User Guide for Cisco Secure ACS for Windows Server78-16592-
C-11User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix C RADIUS AttributesCisco VPN 3000 Concentrator Dictionary of RADIUS VS
Appendix C RADIUS AttributesCisco VPN 3000 Concentrator Dictionary of RADIUS VSAsC-12User Guide for Cisco Secure ACS for Windows Server78-16592-
C-13User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix C RADIUS AttributesCisco VPN 5000 Concentrator Dictionary of RADIUS VS
Appendix C RADIUS AttributesCisco Building Broadband Service Manager Dictionary of RADIUS VSAC-14User Guide for Cisco Secure ACS for Windows Ser
C-15User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix C RADIUS AttributesIETF Dictionary of RADIUS AV Pairs5 NAS-Port Physic
Appendix C RADIUS AttributesIETF Dictionary of RADIUS AV PairsC-16User Guide for Cisco Secure ACS for Windows Server78-16592-016 Service-Type Ty
C-17User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix C RADIUS AttributesIETF Dictionary of RADIUS AV Pairs10 Framed-Routing
1-29User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 1 OverviewCisco Secure ACS HTML Interface–Online Help—Displays basic hel
Appendix C RADIUS AttributesIETF Dictionary of RADIUS AV PairsC-18User Guide for Cisco Secure ACS for Windows Server78-16592-0115 Login-Service
C-19User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix C RADIUS AttributesIETF Dictionary of RADIUS AV Pairs24 State Allows S
Appendix C RADIUS AttributesIETF Dictionary of RADIUS AV PairsC-20User Guide for Cisco Secure ACS for Windows Server78-16592-0128 Idle-Timeout M
C-21User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix C RADIUS AttributesIETF Dictionary of RADIUS AV Pairs34 Login-LAT-Serv
Appendix C RADIUS AttributesIETF Dictionary of RADIUS AV PairsC-22User Guide for Cisco Secure ACS for Windows Server78-16592-0144 Acct-Session-I
C-23User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix C RADIUS AttributesIETF Dictionary of RADIUS AV Pairs49 Acct-Terminate
Appendix C RADIUS AttributesIETF Dictionary of RADIUS AV PairsC-24User Guide for Cisco Secure ACS for Windows Server78-16592-0152 Acct-Input-Gig
C-25User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix C RADIUS AttributesIETF Dictionary of RADIUS AV Pairs66 Tunnel-Client-
Appendix C RADIUS AttributesIETF Dictionary of RADIUS AV PairsC-26User Guide for Cisco Secure ACS for Windows Server78-16592-0181 Tunnel-Private
C-27User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix C RADIUS AttributesIETF Dictionary of RADIUS AV Pairs193 Pre-Output-Pa
viiUser Guide for Cisco Secure ACS for Windows Server78-16592-01ContentsAAA Client Configuration 4-11AAA Client Configuration Options 4-11Adding a AA
Chapter 1 OverviewCisco Secure ACS HTML Interface1-30User Guide for Cisco Secure ACS for Windows Server78-16592-01If SSL is enabled and you do no
Appendix C RADIUS AttributesMicrosoft MPPE Dictionary of RADIUS VSAsC-28User Guide for Cisco Secure ACS for Windows Server78-16592-01Microsoft M
C-29User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix C RADIUS AttributesMicrosoft MPPE Dictionary of RADIUS VSAs5MS-CHAP-LM
Appendix C RADIUS AttributesMicrosoft MPPE Dictionary of RADIUS VSAsC-30User Guide for Cisco Secure ACS for Windows Server78-16592-0112 MS-CHAP-
C-31User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix C RADIUS AttributesAscend Dictionary of RADIUS AV PairsAscend Dictiona
Appendix C RADIUS AttributesAscend Dictionary of RADIUS AV PairsC-32User Guide for Cisco Secure ACS for Windows Server78-16592-016 Service-Type
C-33User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix C RADIUS AttributesAscend Dictionary of RADIUS AV Pairs44 Acct-Session
Appendix C RADIUS AttributesAscend Dictionary of RADIUS AV PairsC-34User Guide for Cisco Secure ACS for Windows Server78-16592-01112 Ascend-CBCP
C-35User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix C RADIUS AttributesAscend Dictionary of RADIUS AV Pairs128 Ascend-Shar
Appendix C RADIUS AttributesAscend Dictionary of RADIUS AV PairsC-36User Guide for Cisco Secure ACS for Windows Server78-16592-01145 Ascend-Assi
C-37User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix C RADIUS AttributesAscend Dictionary of RADIUS AV PairsFrame Datalink
1-31User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 1 OverviewCisco Secure ACS HTML InterfaceAlso, IP filtering of proxied a
Appendix C RADIUS AttributesAscend Dictionary of RADIUS AV PairsC-38User Guide for Cisco Secure ACS for Windows Server78-16592-01170 Ascend-TS-I
C-39User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix C RADIUS AttributesAscend Dictionary of RADIUS AV Pairs185 Ascend-Home
Appendix C RADIUS AttributesAscend Dictionary of RADIUS AV PairsC-40User Guide for Cisco Secure ACS for Windows Server78-16592-01205 Ascend-Menu
C-41User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix C RADIUS AttributesAscend Dictionary of RADIUS AV Pairs221 Ascend-FR-D
Appendix C RADIUS AttributesAscend Dictionary of RADIUS AV PairsC-42User Guide for Cisco Secure ACS for Windows Server78-16592-01238 Ascend-Seco
C-43User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix C RADIUS AttributesNortel Dictionary of RADIUS VSAsNortel Dictionary o
Appendix C RADIUS AttributesJuniper Dictionary of RADIUS VSAsC-44User Guide for Cisco Secure ACS for Windows Server78-16592-01Juniper Dictionary
D-1User Guide for Cisco Secure ACS for Windows Server78-16592-01APPENDIXDCSUtil Database UtilityThis appendix details the Cisco Secure Access Control
Appendix D CSUtil Database UtilityLocation of CSUtil.exe and Related FilesD-2User Guide for Cisco Secure ACS for Windows Server78-16592-01• Expo
D-3User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix D CSUtil Database UtilityCSUtil.exe OptionsNote Most CSUtil.exe options
Chapter 1 OverviewCisco Secure ACS HTML Interface1-32User Guide for Cisco Secure ACS for Windows Server78-16592-01If Cisco Secure ACS is behind a
Appendix D CSUtil Database UtilityCSUtil.exe OptionsD-4User Guide for Cisco Secure ACS for Windows Server78-16592-01• -i—Import user or AAA clie
D-5User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix D CSUtil Database UtilityDisplaying Command-Line Syntax• -listUDV—List
Appendix D CSUtil Database UtilityBacking Up Cisco Secure ACS with CSUtil.exeD-6User Guide for Cisco Secure ACS for Windows Server78-16592-01Bac
D-7User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix D CSUtil Database UtilityRestoring Cisco Secure ACS with CSUtil.exeRest
Appendix D CSUtil Database UtilityCreating a CiscoSecure User DatabaseD-8User Guide for Cisco Secure ACS for Windows Server78-16592-01• To resto
D-9User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix D CSUtil Database UtilityCreating a CiscoSecure User DatabaseTo create
Appendix D CSUtil Database UtilityCreating a Cisco Secure ACS Database Dump FileD-10User Guide for Cisco Secure ACS for Windows Server78-16592-0
D-11User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix D CSUtil Database UtilityLoading the Cisco Secure ACS Database from a
Appendix D CSUtil Database UtilityCompacting the CiscoSecure User DatabaseD-12User Guide for Cisco Secure ACS for Windows Server78-16592-01Step
D-13User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix D CSUtil Database UtilityCompacting the CiscoSecure User DatabaseCompa
1-33User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 1 OverviewCisco Secure ACS HTML InterfaceStep 2 In the Address or Locati
Appendix D CSUtil Database UtilityUser and AAA Client Import OptionD-14User Guide for Cisco Secure ACS for Windows Server78-16592-01If you do no
D-15User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix D CSUtil Database UtilityUser and AAA Client Import OptionImporting Us
Appendix D CSUtil Database UtilityUser and AAA Client Import OptionD-16User Guide for Cisco Secure ACS for Windows Server78-16592-01b. To start
D-17User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix D CSUtil Database UtilityUser and AAA Client Import OptionAbout User a
Appendix D CSUtil Database UtilityUser and AAA Client Import OptionD-18User Guide for Cisco Secure ACS for Windows Server78-16592-01ADD Statemen
D-19User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix D CSUtil Database UtilityUser and AAA Client Import OptionFor example,
Appendix D CSUtil Database UtilityUser and AAA Client Import OptionD-20User Guide for Cisco Secure ACS for Windows Server78-16592-01Table D-3 UP
D-21User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix D CSUtil Database UtilityUser and AAA Client Import OptionFor example,
Appendix D CSUtil Database UtilityUser and AAA Client Import OptionD-22User Guide for Cisco Secure ACS for Windows Server78-16592-01Table D-5 AD
D-23User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix D CSUtil Database UtilityUser and AAA Client Import OptionFor example,
Chapter 1 OverviewCisco Secure ACS HTML Interface1-34User Guide for Cisco Secure ACS for Windows Server78-16592-01Using Online HelpOnline help is
Appendix D CSUtil Database UtilityExporting User List to a Text FileD-24User Guide for Cisco Secure ACS for Windows Server78-16592-01Import File
D-25User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix D CSUtil Database UtilityExporting Group Information to a Text FileSte
Appendix D CSUtil Database UtilityExporting Registry Information to a Text FileD-26User Guide for Cisco Secure ACS for Windows Server78-16592-01
D-27User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix D CSUtil Database UtilityDecoding Error NumbersCSUtil.exe exports Wind
Appendix D CSUtil Database UtilityRecalculating CRC ValuesD-28User Guide for Cisco Secure ACS for Windows Server78-16592-01Step 2 Type:CSUtil.ex
D-29User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix D CSUtil Database UtilityUser-Defined RADIUS Vendors and VSA SetsAbout
Appendix D CSUtil Database UtilityUser-Defined RADIUS Vendors and VSA SetsD-30User Guide for Cisco Secure ACS for Windows Server78-16592-01Befor
D-31User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix D CSUtil Database UtilityUser-Defined RADIUS Vendors and VSA SetsNote
Appendix D CSUtil Database UtilityUser-Defined RADIUS Vendors and VSA SetsD-32User Guide for Cisco Secure ACS for Windows Server78-16592-01Step
D-33User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix D CSUtil Database UtilityUser-Defined RADIUS Vendors and VSA SetsStep
1-35User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 1 OverviewCisco Secure ACS HTML InterfaceTo access online documentation,
Appendix D CSUtil Database UtilityUser-Defined RADIUS Vendors and VSA SetsD-34User Guide for Cisco Secure ACS for Windows Server78-16592-01Step
D-35User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix D CSUtil Database UtilityUser-Defined RADIUS Vendors and VSA SetsVendo
Appendix D CSUtil Database UtilityUser-Defined RADIUS Vendors and VSA SetsD-36User Guide for Cisco Secure ACS for Windows Server78-16592-01For e
D-37User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix D CSUtil Database UtilityUser-Defined RADIUS Vendors and VSA SetsTable
Appendix D CSUtil Database UtilityUser-Defined RADIUS Vendors and VSA SetsD-38User Guide for Cisco Secure ACS for Windows Server78-16592-01For e
D-39User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix D CSUtil Database UtilityUser-Defined RADIUS Vendors and VSA SetsFor e
Appendix D CSUtil Database UtilityPAC File GenerationD-40User Guide for Cisco Secure ACS for Windows Server78-16592-01VSA 2=widget-admin-interfa
D-41User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix D CSUtil Database UtilityPAC File GenerationPAC File Options and Examp
Appendix D CSUtil Database UtilityPAC File GenerationD-42User Guide for Cisco Secure ACS for Windows Server78-16592-01–-f list—CSUtil.exe genera
D-43User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix D CSUtil Database UtilityPAC File GenerationGenerating PAC FilesNote I
Chapter 1 OverviewCisco Secure ACS HTML Interface1-36User Guide for Cisco Secure ACS for Windows Server78-16592-01
Appendix D CSUtil Database UtilityPosture Validation AttributesD-44User Guide for Cisco Secure ACS for Windows Server78-16592-01If you specified
D-45User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix D CSUtil Database UtilityPosture Validation AttributesExample D-1 show
Appendix D CSUtil Database UtilityPosture Validation AttributesD-46User Guide for Cisco Secure ACS for Windows Server78-16592-01Vendor IDs have
D-47User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix D CSUtil Database UtilityPosture Validation Attributes• attribute-name
Appendix D CSUtil Database UtilityPosture Validation AttributesD-48User Guide for Cisco Secure ACS for Windows Server78-16592-01–date–version–oc
D-49User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix D CSUtil Database UtilityPosture Validation Attributes• To preserve th
Appendix D CSUtil Database UtilityPosture Validation AttributesD-50User Guide for Cisco Secure ACS for Windows Server78-16592-01Tip When you spe
D-51User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix D CSUtil Database UtilityPosture Validation AttributesDeleting a Postu
Appendix D CSUtil Database UtilityPosture Validation AttributesD-52User Guide for Cisco Secure ACS for Windows Server78-16592-01CSUtil v3.3, Cop
D-53User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix D CSUtil Database UtilityPosture Validation Attributesattribute-name=A
CHAPTER 2-1User Guide for Cisco Secure ACS for Windows Server78-16592-012Deployment ConsiderationsDeployment of Cisco Secure ACS for Windows Server ca
Appendix D CSUtil Database UtilityPosture Validation AttributesD-54User Guide for Cisco Secure ACS for Windows Server78-16592-01application-name
D-55User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix D CSUtil Database UtilityPosture Validation Attributesvendor-name=Cisc
Appendix D CSUtil Database UtilityPosture Validation AttributesD-56User Guide for Cisco Secure ACS for Windows Server78-16592-01[attr#15]vendor-
D-57User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix D CSUtil Database UtilityPosture Validation Attributesattribute-type=u
Appendix D CSUtil Database UtilityPosture Validation AttributesD-58User Guide for Cisco Secure ACS for Windows Server78-16592-01attribute-name=S
D-59User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix D CSUtil Database UtilityPosture Validation Attributesapplication-name
Appendix D CSUtil Database UtilityPosture Validation AttributesD-60User Guide for Cisco Secure ACS for Windows Server78-16592-01vendor-name=NAIa
D-61User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix D CSUtil Database UtilityPosture Validation Attributes[attr#39]vendor-
Appendix D CSUtil Database UtilityPosture Validation AttributesD-62User Guide for Cisco Secure ACS for Windows Server78-16592-01attribute-type=v
D-63User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix D CSUtil Database UtilityPosture Validation Attributesattribute-name=A
Chapter 2 Deployment ConsiderationsBasic Deployment Requirements for Cisco Secure ACS2-2User Guide for Cisco Secure ACS for Windows Server78-165
Appendix D CSUtil Database UtilityPosture Validation AttributesD-64User Guide for Cisco Secure ACS for Windows Server78-16592-01
E-1User Guide for Cisco Secure ACS for Windows Server78-16592-01APPENDIXEVPDN ProcessingCisco Secure ACS for Windows Server supports authentication f
Appendix E VPDN ProcessingVPDN ProcessE-2User Guide for Cisco Secure ACS for Windows Server78-16592-01Figure E-1 VPDN User Dials In2. If VPDN is
E-3User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix E VPDN ProcessingVPDN ProcessFigure E-3 Authorization of Domain FailsIf
Appendix E VPDN ProcessingVPDN ProcessE-4User Guide for Cisco Secure ACS for Windows Server78-16592-01Figure E-5 HG Authenticates Tunnel with AC
E-5User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix E VPDN ProcessingVPDN ProcessFigure E-7 NAS Authenticates Tunnel with A
Appendix E VPDN ProcessingVPDN ProcessE-6User Guide for Cisco Secure ACS for Windows Server78-16592-01Figure E-9 HG Uses ACS to Authenticate Use
F-1User Guide for Cisco Secure ACS for Windows Server78-16592-01APPENDIXFRDBMS Synchronization Import DefinitionsRDBMS synchronization import definit
Appendix F RDBMS Synchronization Import DefinitionsaccountActions SpecificationF-2User Guide for Cisco Secure ACS for Windows Server78-16592-01a
F-3User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix F RDBMS Synchronization Import DefinitionsaccountActions Specificationa
2-3User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 2 Deployment ConsiderationsBasic Deployment Requirements for Cisco Secur
Appendix F RDBMS Synchronization Import DefinitionsAction CodesF-4User Guide for Cisco Secure ACS for Windows Server78-16592-01accountActions Pr
F-5User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix F RDBMS Synchronization Import DefinitionsAction CodesIf an action can
Appendix F RDBMS Synchronization Import DefinitionsAction CodesF-6User Guide for Cisco Secure ACS for Windows Server78-16592-01Table F-2 Action
F-7User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix F RDBMS Synchronization Import DefinitionsAction CodesAction Codes for
Appendix F RDBMS Synchronization Import DefinitionsAction CodesF-8User Guide for Cisco Secure ACS for Windows Server78-16592-01105 SET_T+_ENABLE
F-9User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix F RDBMS Synchronization Import DefinitionsAction Codes108 SET_PASS_TYPE
Appendix F RDBMS Synchronization Import DefinitionsAction CodesF-10User Guide for Cisco Secure ACS for Windows Server78-16592-01110 ADD_PASS_STA
F-11User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix F RDBMS Synchronization Import DefinitionsAction Codes115 SET_MAX_SESS
Appendix F RDBMS Synchronization Import DefinitionsAction CodesF-12User Guide for Cisco Secure ACS for Windows Server78-16592-01261 DISABLE_QUOT
F-13User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix F RDBMS Synchronization Import DefinitionsAction Codes270 SET_DCS_TYPE
ContentsviiiUser Guide for Cisco Secure ACS for Windows Server78-16592-01Deleting a Network Access Filter 5-7Downloadable IP ACLs 5-7About Downloadab
Chapter 2 Deployment ConsiderationsBasic Deployment Requirements for Cisco Secure ACS2-4User Guide for Cisco Secure ACS for Windows Server78-165
Appendix F RDBMS Synchronization Import DefinitionsAction CodesF-14User Guide for Cisco Secure ACS for Windows Server78-16592-01Action Codes for
F-15User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix F RDBMS Synchronization Import DefinitionsAction CodesTransactions usi
Appendix F RDBMS Synchronization Import DefinitionsAction CodesF-16User Guide for Cisco Secure ACS for Windows Server78-16592-01123 ADD_DIAL_ACC
F-17User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix F RDBMS Synchronization Import DefinitionsAction Codes140 SET_TODDOW_A
Appendix F RDBMS Synchronization Import DefinitionsAction CodesF-18User Guide for Cisco Secure ACS for Windows Server78-16592-01150 SET_STATIC_I
F-19User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix F RDBMS Synchronization Import DefinitionsAction CodesAction Codes for
Appendix F RDBMS Synchronization Import DefinitionsAction CodesF-20User Guide for Cisco Secure ACS for Windows Server78-16592-01163 ADD_RADIUS_
F-21User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix F RDBMS Synchronization Import DefinitionsAction Codes170 ADD_TACACS_S
Appendix F RDBMS Synchronization Import DefinitionsAction CodesF-22User Guide for Cisco Secure ACS for Windows Server78-16592-01172 ADD_TACACS_A
F-23User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix F RDBMS Synchronization Import DefinitionsAction Codes174 ADD_IOS_COMM
2-5User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 2 Deployment ConsiderationsBasic Deployment Requirements for Cisco Secur
Appendix F RDBMS Synchronization Import DefinitionsAction CodesF-24User Guide for Cisco Secure ACS for Windows Server78-16592-01176 ADD_IOS_COMM
F-25User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix F RDBMS Synchronization Import DefinitionsAction CodesAction Codes for
Appendix F RDBMS Synchronization Import DefinitionsAction CodesF-26User Guide for Cisco Secure ACS for Windows Server78-16592-01Table F-6 Action
F-27User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix F RDBMS Synchronization Import DefinitionsAction Codes221 SET_NAS_FLAG
Appendix F RDBMS Synchronization Import DefinitionsAction CodesF-28User Guide for Cisco Secure ACS for Windows Server78-16592-01233 SET_AAA_TRAF
F-29User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix F RDBMS Synchronization Import DefinitionsAction Codes250 ADD_NDG VN C
Appendix F RDBMS Synchronization Import DefinitionsAction CodesF-30User Guide for Cisco Secure ACS for Windows Server78-16592-01351 DEL_UDV V1 R
F-31User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix F RDBMS Synchronization Import DefinitionsAction Codes353 SET_VSA_PROF
Appendix F RDBMS Synchronization Import DefinitionsCisco Secure ACS Attributes and Action CodesF-32User Guide for Cisco Secure ACS for Windows S
F-33User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix F RDBMS Synchronization Import DefinitionsCisco Secure ACS Attributes
Chapter 2 Deployment ConsiderationsBasic Deployment Factors for Cisco Secure ACS2-6User Guide for Cisco Secure ACS for Windows Server78-16592-01
Appendix F RDBMS Synchronization Import DefinitionsCisco Secure ACS Attributes and Action CodesF-34User Guide for Cisco Secure ACS for Windows S
F-35User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix F RDBMS Synchronization Import DefinitionsCisco Secure ACS Attributes
Appendix F RDBMS Synchronization Import DefinitionsAn Example of accountActionsF-36User Guide for Cisco Secure ACS for Windows Server78-16592-01
F-37User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix F RDBMS Synchronization Import DefinitionsAn Example of accountActions
Appendix F RDBMS Synchronization Import DefinitionsAn Example of accountActionsF-38User Guide for Cisco Secure ACS for Windows Server78-16592-01
G-1User Guide for Cisco Secure ACS for Windows Server78-16592-01APPENDIXGInternal ArchitectureThis chapter describes the Cisco Secure ACS for Windows
Appendix G Internal ArchitectureWindows RegistryG-2User Guide for Cisco Secure ACS for Windows Server78-16592-01• CSMon• CSTacacs• CSRadiusYou c
G-3User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix G Internal ArchitectureCSAuthin the HTTP Port Allocation feature, you s
Appendix G Internal ArchitectureCSDBSyncG-4User Guide for Cisco Secure ACS for Windows Server78-16592-01password-aging information. The authoriz
G-5User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix G Internal ArchitectureCSMonNote CSMon is not intended as a replacement
2-7User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 2 Deployment ConsiderationsBasic Deployment Factors for Cisco Secure ACS
Appendix G Internal ArchitectureCSMonG-6User Guide for Cisco Secure ACS for Windows Server78-16592-01build up a “picture” of expected response t
G-7User Guide for Cisco Secure ACS for Windows Server78-16592-01Appendix G Internal ArchitectureCSMonNotificationCSMon can be configured to noti
Appendix G Internal ArchitectureCSTacacs and CSRadiusG-8User Guide for Cisco Secure ACS for Windows Server78-16592-01If the event is a warning e
IN-1User Guide for Cisco Secure ACS for Windows Server78-16592-01INDEXAAAASee also AAA clientsSee also AAA serversdefinition1-2pools for IP address a
IndexIN-2User Guide for Cisco Secure ACS for Windows Server78-16592-01accountingSee also loggingoverview1-22ACLsSee downloadable IP ACLsaction codesf
IN-3User Guide for Cisco Secure ACS for Windows Server78-16592-01Indexprotocol supported 1-11Architecture G-1ASCII/PAPcompatible databases1-10protoco
IndexIN-4User Guide for Cisco Secure ACS for Windows Server78-16592-01browsersSee also HTML interfacetroubleshootingA-4Ccached usersSee discovered us
IN-5User Guide for Cisco Secure ACS for Windows Server78-16592-01IndexCisco Secure ACS backupsSee backupsCisco Secure ACS system restoreSee restoreCi
IndexIN-6User Guide for Cisco Secure ACS for Windows Server78-16592-01displaying syntax D-5import text file (example) D-24overview D-1CSV (comma-sepa
IN-7User Guide for Cisco Secure ACS for Windows Server78-16592-01IndexSee RADIUS user databasesSee RSA user databasesunknown users15-1user databases
Chapter 2 Deployment ConsiderationsBasic Deployment Factors for Cisco Secure ACS2-8User Guide for Cisco Secure ACS for Windows Server78-16592-01
IndexIN-8User Guide for Cisco Secure ACS for Windows Server78-16592-01Domain Listconfiguring13-30inadvertent user lockouts 13-14, 13-27overview 13-13
IN-9User Guide for Cisco Secure ACS for Windows Server78-16592-01Indexenable password options for TACACS+ 7-35enable privilege options for groups 6-1
IndexIN-10User Guide for Cisco Secure ACS for Windows Server78-16592-01supported protocols 1-10Global Authentication Setup 10-33grant dial-in permiss
IN-11User Guide for Cisco Secure ACS for Windows Server78-16592-01IndexHelp 1-29host system state G-5HTML interfaceSee also Interface Configurationen
IndexIN-12User Guide for Cisco Secure ACS for Windows Server78-16592-01LDAPSee generic LDAP user databasesLEAP proxy RADIUS user databasesconfiguring
IN-13User Guide for Cisco Secure ACS for Windows Server78-16592-01Indexloginsgreeting upon6-24password aging dependency 6-23logsSee loggingSee Report
IndexIN-14User Guide for Cisco Secure ACS for Windows Server78-16592-01definition of 14-10group mapping 16-13implementing 14-5introduction 1-25loggin
IN-15User Guide for Cisco Secure ACS for Windows Server78-16592-01IndexNetwork Admission ControlSee NACnetwork configuration4-1network device groupsa
IndexIN-16User Guide for Cisco Secure ACS for Windows Server78-16592-01EAP-TLS 13-68PAP 13-65vs. group mappings 16-3PAP authentication sample procedu
IN-17User Guide for Cisco Secure ACS for Windows Server78-16592-01Indexoutbound passwords 1-15separate passwords 1-14single password 1-14token cachin
2-9User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 2 Deployment ConsiderationsBasic Deployment Factors for Cisco Secure ACS
IndexIN-18User Guide for Cisco Secure ACS for Windows Server78-16592-01PPP password aging 6-21privilegesSee administratorsprocessor utilizationG-5pro
IN-19User Guide for Cisco Secure ACS for Windows Server78-16592-01Indextoken servers 13-79troubleshooting A-22tunneling packets 4-18vs. TACACS+ 1-6RA
IndexIN-20User Guide for Cisco Secure ACS for Windows Server78-16592-01in User Setup 7-49supported attributes C-43overview C-1user-definedabout9-28,
IN-21User Guide for Cisco Secure ACS for Windows Server78-16592-01Indexexternal user databases 9-2frequency 9-7group mappings 9-2immediate 9-19implem
IndexIN-22User Guide for Cisco Secure ACS for Windows Server78-16592-01Ssearch order of external user databases 15-15security policies 2-15security p
IN-23User Guide for Cisco Secure ACS for Windows Server78-16592-01Indexoutput values 13-66result codes 13-69EAP-TLS authenticationconfiguring13-74inp
IndexIN-24User Guide for Cisco Secure ACS for Windows Server78-16592-01time-of-day access 3-8troubleshooting A-22vs. RADIUS 1-6TACACS+ Accounting log
IN-25User Guide for Cisco Secure ACS for Windows Server78-16592-01IndexRADIUS issues A-22report issues A-17TACACS+ issues A-22third-party server issu
IndexIN-26User Guide for Cisco Secure ACS for Windows Server78-16592-01callback options 7-9configuring 7-2configuring device management command autho
IN-27User Guide for Cisco Secure ACS for Windows Server78-16592-01IndexODBC 11-23CSV (comma-separated values) file directory11-16enablingODBC11-23VPD
Chapter 2 Deployment ConsiderationsBasic Deployment Factors for Cisco Secure ACS2-10User Guide for Cisco Secure ACS for Windows Server78-16592-0
IndexIN-28User Guide for Cisco Secure ACS for Windows Server78-16592-01passwords 1-11rejection mode 15-6request handling 15-6trust relationships 13-9
2-11User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 2 Deployment ConsiderationsBasic Deployment Factors for Cisco Secure AC
Chapter 2 Deployment ConsiderationsBasic Deployment Factors for Cisco Secure ACS2-12User Guide for Cisco Secure ACS for Windows Server78-16592-0
2-13User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 2 Deployment ConsiderationsBasic Deployment Factors for Cisco Secure AC
ixUser Guide for Cisco Secure ACS for Windows Server78-16592-01ContentsBasic User Group Settings 6-3Group Disablement 6-4Enabling VoIP Support for a
Chapter 2 Deployment ConsiderationsBasic Deployment Factors for Cisco Secure ACS2-14User Guide for Cisco Secure ACS for Windows Server78-16592-0
2-15User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 2 Deployment ConsiderationsBasic Deployment Factors for Cisco Secure AC
Chapter 2 Deployment ConsiderationsBasic Deployment Factors for Cisco Secure ACS2-16User Guide for Cisco Secure ACS for Windows Server78-16592-0
2-17User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 2 Deployment ConsiderationsBasic Deployment Factors for Cisco Secure AC
Chapter 2 Deployment ConsiderationsBasic Deployment Factors for Cisco Secure ACS2-18User Guide for Cisco Secure ACS for Windows Server78-16592-0
2-19User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 2 Deployment ConsiderationsSuggested Deployment SequenceNetwork Latency
Chapter 2 Deployment ConsiderationsSuggested Deployment Sequence2-20User Guide for Cisco Secure ACS for Windows Server78-16592-01For more inform
2-21User Guide for Cisco Secure ACS for Windows Server78-16592-01Chapter 2 Deployment ConsiderationsSuggested Deployment SequenceAlong with the
Chapter 2 Deployment ConsiderationsSuggested Deployment Sequence2-22User Guide for Cisco Secure ACS for Windows Server78-16592-01
CHAPTER 3-1User Guide for Cisco Secure ACS for Windows Server78-16592-013Interface ConfigurationEase of use is the overriding design principle of the
Comments to this Manuals