Index
IN-18
User Guide for Cisco Secure ACS for Windows Server
78-14696-01, Version 3.1
cascading 8-18
certificates 8-10
client configuration 8-22
components
overwriting (Caution)
8-22
overwriting (Note) 8-17
selecting 8-18
configuring 8-26
corrupted backups (Caution) 8-16
custom RADIUS dictionaries 8-10
disabling 8-29
external user databases 8-10
frequency 8-14
group mappings 8-10
immediate 8-24
implementing primary and secondary
setups
8-20
important considerations 8-15
in System Configuration 8-26
interface configuration 3-5
IP pools 8-10, 8-60
logging 8-17
manual initiation 8-24
master AAA servers 8-11
notifications 8-29
overview 8-9
partners
configuring
8-28
options 8-18
scheduling 8-26
scheduling options 8-18
selecting data 8-18
unsupported 8-10
user-defined RADIUS vendors 8-16
vs. backup 8-16
reports
See logging
Reports and Activity
configuring
9-17
CSV (comma-separated values) logs 9-11
in interface 1-26
See also logging
request handling
general
12-3
Windows NT/2000 user databases 12-4
requirements
hardware
2-2
network 2-4
operating system 2-2
system 2-2
third-party software 2-3
resource consumption G-6
restarting services 8-2
restore
components restored
configuring
8-54
overview 8-54
filenames 8-53
in System Configuration 8-52