IN-19
User Guide for Cisco Secure ACS for Windows Server
78-14696-01, Version 3.1
Index
overview 8-52
performing 8-54
reports 8-54
with CSUtil.exe D-5
RFC2138 1-6
RFC2139 1-6
RSA user databases
configuring
11-65
group mappings 12-12
S
SafeWord user databases
configuring
11-60
group mappings 12-12
RADIUS-based group specifications 12-22
search order of external user databases 12-9
security policies 2-14
security protocols
Cisco AAA client devices
1-2
CSRadius G-8
CSTacacs G-8
interface options 3-9
RADIUS 1-6, C-1
TACACS+
custom commands
3-8
overview 1-6
time-of-day access 3-8
service control in System Configuration 9-30
Service Monitoring log
See ACS Service Monitoring log
services
determing status of
8-2
logs
configuring
9-30
list of logs generated 9-29
management 8-55
overview 1-4, G-1
starting 8-2
stopping 8-2
session policies
configuring
10-17
options 10-16
overview 10-16
shared profile components
downloadable PIX ACLs (access control
lists)
5-2
overview 5-1
See also command authorization sets
See also network access restrictions
shared secret
G-8
shell command authorization sets
in Group Setup
6-31
in User Setup 7-25
See also command authorization sets
single password configurations
1-13
SMTP (simple mail-transfer protocol) G-7
specifications
RADIUS