Table Of Contents
Preface
Audience
Organization
Conventions
Product Documentation
Obtaining Documentation and Submitting a Service Request
Preface
This guide explains the roles of Cisco Secure Access Control Server (ACS) Remote Agents, and provides procedures for installing and configuring the remote agents for Microsoft Windows and Solaris.
Audience
This guide is written for network administrators and explains how Cisco Secure ACS Remote Agent works, and how to install and configure it for use with Cisco Secure ACS Solution Engine (ACS SE).
Organization
This document contains the following chapters:
•Chapter 1 "Introduction to Cisco Secure ACS Remote Agents"—Introduces remote agent concepts and features.
•Chapter 2 "Installing Cisco Secure ACS Remote Agent for Windows"—Provides installation information for Cisco Secure ACS Remote Agent for Windows Server, plus additional configuration information if the Windows authentication service is installed.
•Chapter 3 "Installing Cisco Secure ACS Remote Agent for Solaris"—Provides installation information for Cisco Secure ACS Remote Agent for Solaris.
•Chapter 4 "Configuring and Maintaining a Remote Agent"—Provides information about configuring and maintaining remote agents, including debugging information.
Conventions
This document uses the following conventions:
Item
|
Convention
|
Commands, keywords, special terminology, and options that should be selected during procedures
|
boldface font
|
Variables for which you supply values and new or important terminology
|
italic font
|
Displayed session and system information, paths and file names
|
screen font
|
Information you enter
|
boldface screen font
|
Variables you enter
|
italic screen font
|
Menu items and button names
|
boldface font
|
Indicates menu items to select, in the order you select them.
|
Option > Network Preferences
|
Tip Identifies information to help you get the most benefit from your product.
Note Means reader take note. Notes identify important information that you should reflect on before continuing, contain helpful suggestions, or provide references to materials not contained in the document.
Caution Means
reader be careful. In this situation, you might do something that could result in equipment damage, loss of data, or a potential breach in your network security.
|
Warning Identifies information that you must heed to prevent damaging yourself, the state of software, or equipment. Warnings identify definite security breaches that will result if the information presented is not followed carefully.
|
Product Documentation
Note We sometimes update the printed and electronic documentation after original publication. Therefore, you should also review the documentation on Cisco.com for any updates.
describes the product documentation that is available.
Obtaining Documentation and Submitting a Service Request
For information on obtaining documentation, submitting a service request, and gathering additional information, see the monthly What's New in Cisco Product Documentation, which also lists all new and revised Cisco technical documentation, at:
http://www.cisco.com/en/US/docs/general/whatsnew/whatsnew.html
Subscribe to the What's New in Cisco Product Documentation as a Really Simple Syndication (RSS) feed and set content to be delivered directly to your desktop using a reader application. The RSS feeds are a free service and Cisco currently supports RSS version 2.0.