EasyManua.ls Logo

Cisco 2509 - Router - EN User Manual

Cisco 2509 - Router - EN
686 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
Page #1 background imageLoading...
Page #1 background image
Corporate Headquarters
Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134-1706
USA
http://www.cisco.com
Tel: 408 526-4000
800 553-NETS (6387)
Fax: 408 526-4100
User Guide for Cisco Secure ACS
for Windows Server
Customer Order Number: DOC-7814696=
Text Part Number: 78-14696-01

Table of Contents

Questions and Answers:

Cisco 2509 - Router - EN Specifications

General IconGeneral
BrandCisco
Model2509 - Router - EN
CategorySoftware
LanguageEnglish

Summary

CHAPTER 1 Overview of Cisco Secure ACS

The Cisco Secure ACS Paradigm

Cisco Secure ACS provides authentication, authorization, and accounting (AAA) services to network devices.

AAA Protocols—TACACS+ and RADIUS

Compares TACACS+ and RADIUS protocols, including transmission protocol, ports, architecture, and intended purpose.

Cisco Secure ACS HTML Interface

This section discusses the Cisco Secure ACS HTML interface and provides procedures for using it.

CHAPTER 2 Deploying Cisco Secure ACS

Basic Deployment Requirements for Cisco Secure ACS

Details the minimum hardware, operating system, third-party software, and network requirements for deploying Cisco Secure ACS.

Basic Deployment Factors for Cisco Secure ACS

Presents basic factors to consider before implementing Cisco Secure ACS, including network topology and security policy.

CHAPTER 3 Setting Up the Cisco Secure ACS HTML Interface

User Data Configuration Options

Enables adding or editing up to five fields for recording information on each user.

Advanced Options

Determines which advanced features Cisco Secure ACS displays, allowing simplification of pages by hiding unused features.

Protocol Configuration Options for TACACS+

Details the configuration of the Cisco Secure ACS HTML interface for TACACS+ settings, enabling display or hiding of options.

Protocol Configuration Options for RADIUS

Allows customization of displayed RADIUS attributes to simplify setup for users or groups.

CHAPTER 4 Setting Up and Managing Network Configuration

Proxy in Distributed Systems

A powerful feature enabling authentication in networks with multiple AAA servers by forwarding requests.

AAA Client Configuration

Enables Cisco Secure ACS to interact with network devices, ensuring correct configuration for AAA services.

AAA Server Configuration

Presents procedures for configuring AAA servers in the Cisco Secure ACS HTML interface.

Network Device Group Configuration

An advanced feature to view and administer a collection of network devices as a single logical group.

Proxy Distribution Table Configuration

Allows configuration of proxy capabilities, including domain stripping, for distributed systems.

CHAPTER 5 Setting Up and Managing Shared Profile Components

Downloadable PIX ACLs

Describes downloadable PIX ACLs and provides detailed instructions for configuring and managing them.

Network Access Restrictions

Describes network access restrictions (NARs) and provides detailed instructions for configuring and managing shared NARs.

Command Authorization Sets

Provides a central mechanism to control authorization of each command on each network device.

CHAPTER 6 Setting Up and Managing User Groups

Common User Group Settings

Details procedures typically performed regardless of specific network security configuration.

CHAPTER 7 Setting Up and Managing User Accounts

Basic User Setup Options

Information and procedures for basic settings and options when configuring a user account.

Adding a Basic User Account

Details the minimum steps necessary to add a new user account to the CiscoSecure user database.

Advanced User Authentication Settings

Details steps for configuring user-level TACACS+ and RADIUS enable parameters.

CHAPTER 8 Establishing Cisco Secure ACS System Configuration

Service Control

Provides basic status information about services and enables configuration of service log files.

Local Password Management

Configures settings for managing passwords stored in the CiscoSecure user database, including validation options.

CiscoSecure Database Replication

Provides information about database replication, including procedures for implementation and configuration.

RDBMS Synchronization

Information about the RDBMS Synchronization feature, including procedures for implementation.

Cisco Secure ACS Backup

Information about the Cisco Secure ACS Backup feature, including procedures for implementation.

Cisco Secure ACS System Restore

Information about restoring Cisco Secure ACS from a backup file.

Cisco Secure ACS Active Service Management

An application-specific service monitoring tool tightly integrated with ACS.

IP Pools Server

Information about the IP Pools feature, including procedures for creating and maintaining IP pools.

IP Pools Address Recovery

Enables recovery of assigned IP addresses not used for a specified period.

Cisco Secure ACS Certificate Setup

Provides information on installing server certificates, CA certificates, and managing the certificate trust list.

Global Authentication Setup

Specifies settings for all EAP and MS-CHAP authentication requests.

CHAPTER 9 Working with Logging and Reports

Working with CSV Logs

Provides procedures for enabling, disabling, viewing, and configuring CSV logs.

Working with ODBC Logs

Details procedures for preparing for and configuring ODBC logging.

Remote Logging

Discusses remote logging capabilities, including centralizing accounting logs from multiple Cisco Secure ACSes.

CHAPTER 10 Setting Up and Managing Administrators and Policy

Administrator Accounts

Provides details about Cisco Secure ACS administrators and their unique accounts.

Adding an Administrator Account

Details the steps to add a Cisco Secure ACS administrator account.

Access Policy

Affects access to the Cisco Secure ACS HTML interface, allowing limits by IP address, TCP port, and SSL.

Session Policy

Controls various aspects of Cisco Secure ACS administrative sessions, including idle timeout and auto login.

CHAPTER 11 Working with User Databases

Windows NT/2000 User Database

Details how to configure Cisco Secure ACS to use a Windows NT/2000 user database for authentication.

Generic LDAP

Explains Cisco Secure ACS support for authentication via generic Lightweight Directory Access Protocol (LDAP) databases.

ODBC Database

Details support for ODBC-compliant relational databases for user records.

CHAPTER 12 Administering External User Databases

Unknown User Processing

Defines how Cisco Secure ACS handles users not listed in its database by forwarding requests to external databases.

Database Group Mappings

Enables association of unknown users with Cisco Secure ACS groups for assigning authorization profiles.

Creating a Cisco Secure ACS Group Mapping for Windows NT/2000, Novell NDS, or Generic LDAP Groups

Maps Windows NT/2000, Novell NDS, or generic LDAP groups to Cisco Secure ACS groups.

APPENDIX A Troubleshooting Information for Cisco Secure ACS

APPENDIX B TACACS+ Attribute-Value Pairs

APPENDIX C RADIUS Attributes

APPENDIX D Cisco Secure ACS Command-Line Database Utility

Backing Up Cisco Secure ACS with CSUtil.exe

Explains how to create a system backup of all Cisco Secure ACS internal data using the -b option.

Restoring Cisco Secure ACS with CSUtil.exe

Describes how to restore all Cisco Secure ACS internal data using the -r option.

Creating a CiscoSecure User Database

Details the steps to create a CiscoSecure user database using the -n option.

APPENDIX E Cisco Secure ACS and Virtual Private Dial-up Networks

APPENDIX F RDBMS Synchronization Import Definitions

APPENDIX G Cisco Secure ACS Internal Architecture

Related product manuals