Cisco Systems s user manual

User manual for the device Cisco Systems s

Device: Cisco Systems s
Category: Server
Manufacturer: Cisco Systems
Size: 5.3 MB
Added : 6/4/2013
Number of pages: 654
Print the manual

Download

How to use this site?

Our goal is to provide you with a quick access to the content of the user manual for Cisco Systems s. Using the online preview, you can quickly view the contents and go to the page where you will find the solution to your problem with Cisco Systems s.

For your convenience

If looking through the Cisco Systems s user manual directly on this website is not convenient for you, there are two possible solutions:

  • Full Screen Viewing - to easily view the user manual (without downloading it to your computer), you can use full-screen viewing mode. To start viewing the user manual Cisco Systems s on full screen, use the button Fullscreen.
  • Downloading to your computer - You can also download the user manual Cisco Systems s to your computer and keep it in your files. However, if you do not want to take up too much of your disk space, you can always download it in the future from ManualsBase.
Cisco Systems s User manual - Online PDF
Advertisement
« Page 1 of 654 »
Advertisement
Print version

Many people prefer to read the documents not on the screen, but in the printed version. The option to print the manual has also been provided, and you can use it by clicking the link above - Print the manual. You do not have to print the entire manual Cisco Systems s but the selected pages only. paper.

Summaries

Below you will find previews of the content of the user manuals presented on the following pages to Cisco Systems s. If you want to quickly view the content of pages found on the following pages of the manual, you can use them.

Abstracts of contents
Summary of the content on the page No. 1

Cisco Secure ACS 3.0 for Windows
2000/NT Servers User Guide
November 2001
Corporate Headquarters
Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134-1706
USA
http://www.cisco.com
Tel: 408 526-4000
800 553-NETS (6387)
Fax: 408 526-4100
Customer Order Number: DOC-7813751=
Text Part Number: 78-13751-01

Summary of the content on the page No. 2

THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS. THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND ARE I

Summary of the content on the page No. 3

CONTENTS Preface xxvii Document Objectives xxvii Who Should Read This Guide xxvii How This Guide is Organized xxviii Conventions Used in This Guide xxx Related Documentation xxxi Obtaining Documentation xxxii World Wide Web xxxii Documentation CD-ROM xxxii Ordering Documentation xxxii Documentation Feedback xxxiii Obtaining Technical Assistance xxxiii Cisco.com xxxiii Technical Assistance Center xxxiv Cisco TAC Web Site xxxiv Cisco TAC Escalation Center xxxv CHAPTER 1 Overview of Cisco Secure AC

Summary of the content on the page No. 4

Contents AAA Server Functions and Concepts 1-4 Cisco Secure ACS and the AAA Client 1-5 AAA Protocols—TACACS+ and RADIUS 1-5 TACACS+ 1-6 RADIUS 1-6 Authentication 1-7 Authentication Considerations 1-8 Authentication and User Databases 1-8 Passwords 1-10 Other Authentication-Related Features 1-14 Authorization 1-15 Max Sessions 1-16 Dynamic Usage Quotas 1-16 Other Authorization-Related Features 1-17 Accounting 1-17 Other Accounting-Related Features 1-18 Administration 1-18 HTTP Port Allocation for

Summary of the content on the page No. 5

Contents Remote Administrative Sessions through a NAT Gateway 1-25 Accessing the HTML Interface 1-26 Logging Off the HTML Interface 1-26 Online Help and Online Documentation 1-27 Using Online Help 1-27 Using the Online Documentation 1-28 CHAPTER 2 Deploying Cisco Secure ACS 2-1 Basic Deployment Requirements for Cisco Secure ACS 2-2 System Requirements 2-2 Hardware Requirements 2-2 Operating System Requirements 2-3 Third-Party Software Requirements 2-3 Network Requirements 2-4 Basic Deployment F

Summary of the content on the page No. 6

Contents Network Speed and Reliability 2-18 Suggested Deployment Sequence 2-18 CHAPTER 3 Setting Up the Cisco Secure ACS HTML Interface 3-1 Interface Design Concepts 3-2 User-to-Group Relationship 3-2 Per-User or Per-Group Features 3-2 User Data Configuration Options 3-3 Defining New User Data Fields 3-3 Advanced Options 3-4 Setting Advanced Options for the Cisco Secure ACS User Interface 3-6 Protocol Configuration Options for TACACS+ 3-7 Setting Options for TACACS+ 3-9 Protocol Configuration Op

Summary of the content on the page No. 7

Contents Default Distributed System Settings 4-3 Proxy in Distributed Systems 4-4 Fallback on Failed Connection 4-5 Character String 4-6 Stripping 4-6 Proxy in an Enterprise 4-6 Remote Use of Accounting Packets 4-7 Other Features Enabled by System Distribution 4-8 AAA Client Configuration 4-8 Adding and Configuring a AAA Client 4-9 Editing an Existing AAA Client 4-12 Deleting a AAA Client 4-14 AAA Server Configuration 4-15 Adding and Configuring a AAA Server 4-16 Editing a AAA Server Configurati

Summary of the content on the page No. 8

Contents Editing a Proxy Distribution Table Entry 4-28 Deleting a Proxy Distribution Table Entry 4-29 CHAPTER 5 Setting Up and Managing Shared Profile Components 5-1 Downloadable PIX ACLs 5-2 About Downloadable PIX ACLs 5-2 Downloadable PIX ACL Configuration 5-3 Adding a Downloadable PIX ACL 5-3 Editing a Downloadable PIX ACL 5-4 Deleting a Downloadable PIX ACL 5-5 Network Access Restrictions 5-6 About Network Access Restrictions 5-6 Shared Network Access Restrictions Configuration 5-7 Adding

Summary of the content on the page No. 9

Contents Group TACACS+ Settings 6-2 Common User Group Settings 6-3 Enabling VoIP Support for a User Group 6-4 Setting Default Time of Day Access for a User Group 6-5 Setting Callback Options for a User Group 6-6 Setting Network Access Restrictions for a User Group 6-7 Setting Max Sessions for a User Group 6-11 Setting Usage Quotas for a User Group 6-13 Configuration-specific User Group Settings 6-15 Setting Token Card Settings for a User Group 6-17 Setting Enable Privilege Options for a User Gro

Summary of the content on the page No. 10

Contents Configuring Microsoft RADIUS Settings for a User Group 6-41 Configuring Nortel RADIUS Settings for a User Group 6-42 Configuring Juniper RADIUS Settings for a User Group 6-44 Configuring Cisco BBSM RADIUS Settings for a User Group 6-45 Configuring Custom RADIUS VSA Settings for a User Group 6-46 Group Setting Management 6-48 Listing Users in a User Group 6-48 Resetting Usage Quota Counters for a User Group 6-49 Renaming a User Group 6-49 Saving Changes to User Group Settings 6-50 CHAPTE

Summary of the content on the page No. 11

Contents Advanced User Authentication Settings 7-23 TACACS+ Settings (User) 7-24 Configuring TACACS+ Settings for a User 7-24 Configuring a Shell Command Authorization Set for a User 7-26 Configuring a PIX Command Authorization Set for a User 7-29 Configuring the Unknown Service Setting for a User 7-31 Advanced TACACS+ Settings (User) 7-31 Setting Enable Privilege Options for a User 7-32 Setting TACACS+ Enable Password Options for a User 7-34 Setting TACACS+ Outbound Password for a User 7-35 RAD

Summary of the content on the page No. 12

Contents Deleting a User Account 7-54 Resetting User Session Quota Counters 7-55 Resetting a User Account after Login Failure 7-55 Saving User Settings 7-56 CHAPTER 8 Establishing Cisco Secure ACS System Configuration 8-1 Service Control 8-2 Determining the Status of Cisco Secure ACS Services 8-2 Stopping, Starting, or Restarting Services 8-2 Logging 8-3 Date Format Control 8-3 Setting the Date Format 8-4 Password Validation 8-4 Setting Password Validation Options 8-5 CiscoSecure Database Replic

Summary of the content on the page No. 13

Contents Configuring a Secondary Cisco Secure ACS Server 8-17 Replicating Immediately 8-18 Scheduling Replication 8-20 Disabling CiscoSecure Database Replication 8-23 Database Replication Event Error Alert Notification 8-23 RDBMS Synchronization 8-24 About RDBMS Synchronization 8-24 RDBMS Synchronization Components 8-25 About CSDBSync 8-25 About the accountActions Table 8-26 Cisco Secure ACS Database Recovery Using the accountActions Table 8-28 Reports and Event (Error) Handling 8-29 Preparing t

Summary of the content on the page No. 14

Contents Components Backed Up 8-41 Reports of Cisco Secure ACS Backups 8-42 Performing a Manual Cisco Secure ACS Backup 8-42 Scheduling Cisco Secure ACS Backups 8-43 Disabling Scheduled Cisco Secure ACS Backups 8-44 Cisco Secure ACS System Restore 8-45 About Cisco Secure ACS System Restore 8-45 Backup File Names and Locations 8-45 Components Restored 8-47 Reports of Cisco Secure ACS Restorations 8-47 Restoring Cisco Secure ACS from a Backup File 8-47 Cisco Secure ACS Active Service Management 8-

Summary of the content on the page No. 15

Contents VoIP Accounting Configuration 8-60 Configuring VoIP Accounting 8-61 Cisco Secure ACS Certificate Setup 8-61 Background on Certification 8-62 EAP-TLS Setup Overview 8-63 Requirements for Certificate Enrollment 8-63 Generating a Request for a Certificate 8-64 Installing Cisco Secure ACS Certification with Manual Enrollment 8-66 Installing Cisco Secure ACS Certification with Automatic Enrollment 8-68 Performing Cisco Secure ACS Certification Update or Replacement 8-69 Certification Authori

Summary of the content on the page No. 16

Contents Passed Authentications Log 9-10 Dynamic Cisco Secure ACS Administration Reports 9-10 Logged-In Users Report 9-11 Disabled Accounts Report 9-14 Cisco Secure ACS System Logs 9-15 ACS Backup and Restore Log 9-15 RDBMS Synchronization Log 9-16 Database Replication Log 9-16 Administration Audit Log 9-17 ACS Service Monitoring Log 9-18 Working with CSV Logs 9-19 CSV Log File Names 9-19 Enabling or Disabling a CSV Log 9-19 Viewing a CSV Report 9-20 Configuring a CSV Log 9-22 Working with ODBC

Summary of the content on the page No. 17

Contents Service Logs 9-34 Services Logged 9-34 Configuring Service Logs 9-35 CHAPTER 10 Setting Up and Managing Administrators and Policy 10-1 Administrator Accounts 10-1 Administrator Privileges 10-2 Adding an Administrator Account 10-6 Editing an Administrator Account 10-7 Deleting an Administrator Account 10-9 Access Policy 10-10 Access Policy Options 10-10 Setting Up Access Policy 10-12 Session Policy 10-13 Session Policy Options 10-13 Setting Up Session Policy 10-14 Audit Policy 10-16 CH

Summary of the content on the page No. 18

Contents Windows Dial-up Networking Clients 11-9 About the Windows NT/2000 Dial-up Networking Client 11-9 About the Windows 95/98/Millennium Edition Dial-up Networking Client 11-10 Windows NT/2000 Authentication 11-10 User-Changeable Passwords with Windows NT/2000 User Databases 11-12 Preparing Users for Authenticating with Windows NT/2000 11-12 Configuring a Windows NT/2000 External User Database 11-13 Generic LDAP 11-14 Cisco Secure ACS Authentication Process with a Generic LDAP User Databas

Summary of the content on the page No. 19

Contents Implementation of Stored Procedures for ODBC Authentication 11-33 Type Definitions 11-34 Microsoft SQL Server and Case-Sensitive Passwords 11-34 Sample Routine for Generating a PAP Authentication SQL Procedure 11-35 Sample Routine for Generating an SQL CHAP Authentication Procedure 11-36 PAP Authentication Procedure Input 11-36 PAP Procedure Output 11-37 CHAP/MS-CHAP/ARAP Authentication Procedure Input 11-38 CHAP/MS-CHAP/ARAP Procedure Output 11-38 Result Codes 11-39 Configuring a Syst

Summary of the content on the page No. 20

Contents Configuring an AXENT Token Server External User Database AXENT 11-55 Configuring an RSA SecurID Token Server External User Database 11-56 Deleting an External User Database Configuration 11-58 CHAPTER 12 Administering External User Databases 12-1 Unknown User Processing 12-1 Known, Unknown, and Cached Users 12-2 General Authentication Request Handling and Rejection Mode 12-3 Authentication Request Handling and Rejection Mode with the Windows NT/2000 User Database 12-4 Windows Authenti


Alternative user manuals
# User manual Category Download
1 Cisco Systems 6200 User manual Server 0
2 Cisco Systems Be6000 Ucs C220m3 HdBE6KSTBDLPLSK9 User manual Server 54
3 Cisco Systems 5.4 User manual Server 0
4 Cisco Systems A03D1TBSATA User manual Server 0
5 Cisco Systems 6 User manual Server 0
6 Cisco Systems Cisco 1121 Secure Access Control System CSACS1121UPK9 User manual Server 25
7 Cisco Systems Cisco Access Registrar 3.5 User manual Server 0
8 Cisco Systems C24 M3 User manual Server 0
9 Cisco Systems Cisco Network StorageC220 User manual Server 1
10 Cisco Systems 3.3 User manual Server 0
11 Cisco Systems Channelized T3 Trunk Card AS5800 User manual Server 0
12 Cisco Systems Cisco Network StorageUCSRAID9266CV User manual Server 0
13 Cisco Systems Cisco Network Storage9266CV-8i User manual Server 0
14 Cisco Systems Cisco Network StorageUCSSP6C220E User manual Server 0
15 Cisco Systems 4.2 User manual Server 6
16 Edelbrock 1921 User manual Server 0
17 Sony VAIO VGF-HS1 User manual Server 11
18 Sony NAS-SV20DI User manual Server 1
19 3Com 10031370-01 User manual Server 1
20 3Com SuperStack 3 User manual Server 9