Guest

Cisco Secure Access Control Server for Windows

Read Me First: CiscoSecure ACS 2.3 for Windows NT Getting Started

 Feedback

Table of Contents

Read Me First
CiscoSecure ACS 2.3 for Windows NT Server Getting Started

Read Me First
CiscoSecure ACS 2.3 for Windows NT Server Getting Started




Product Summary

CiscoSecure ACS 2.3 for Windows NT (CiscoSecure ACS) network security software helps you authenticate users by controlling dial-in access to a network access server (NAS) device—an access server, Cisco PIX firewall, or router.

CiscoSecure access control server (ACS) operates as a Windows NT service and controls the authentication, authorization, and accounting of users accessing networks. CiscoSecure ACS operates with Windows NT server version 4.0.


Note Unless specifically stated otherwise, all references to NAS in the CiscoSecure ACS 2.3 documentation apply to any access device.




System Requirements

  • Your Windows NT server must meet the following minimum requirements:

    • Pentium processor running at 200 MHz or better

    • Microsoft Windows NT Server 4.0 operating system, English language version

    • 64 MB of RAM required, 128 MB recommended

    • At least 150 MB of free disk space

    • Minimum of 256 colors at resolution of 800 x 600 lines

  • To have CiscoSecure ACS refer to the Grant Dial-in Permission to User feature, make sure this option is checked in the Windows NT User Manager for the applicable user accounts.

  • Make sure your NAS is running Cisco IOS Release 11.1 or higher (Release 11.2 or higher for RADIUS) or you are using a third-party device that can be configured with TACACS+ and/or RADIUS.

  • Make sure dial-up clients can successfully dial in to your NAS.

  • Make sure the Windows NT server can ping the NAS.

  • One of the following browsers must be installed on the Windows NT server:

    • Microsoft Internet Explorer 3.02 or higher

    • Netscape Navigator 3.x or Communicator 4.x or higher

  • Java and JavaScript support must be enabled.




Information You Need

  • You must have the following information:

    • Security protocol:



      TACACS+ (Cisco) (default)



      RADIUS (IETF)



      RADIUS (Cisco)



      RADIUS (Ascend)



      RADIUS (RedCreek)



    • Access server name:




    • Access server IP address:




    • Windows NT server IP address (if different from the IP address of this machine):




    • TACACS+ or RADIUS key (shared secret):







For More Information

The following additional documentation is available for your CiscoSecure ACS:

  • Quick Installation Card: CiscoSecure ACS 2.3 for Windows NT Server—Contains information and procedures for installing CiscoSecure ACS.

  • Quick Reference Card: Web Server Installation for CiscoSecure ACS for Windows NT User-Changeable Passwords—Contains information on installing and configuring the web server for use with the optional user-changeable password feature.

  • Online Help—Contains information for each associated window.

  • Online Documentation—A complete online copy of the CiscoSecure ACS 2.3 for Windows NT Server User Guide. This document is also available in PDF format on the CiscoSecure ACS product CD-ROM.

You will also need the documentation for your NAS.

All Cisco documentation and additional literature are available in a CD-ROM package, which ships with your product. The Documentation CD-ROM, a member of the Cisco Connection Family, is updated monthly. Therefore, it might be more current than printed documentation. To order additional copies of the Documentation CD-ROM, contact your local sales representative or call customer service. The CD-ROM package is available as a single package or as an annual subscription. You can also access Cisco documentation on the World Wide Web at http://www.cisco.com, http://www-china.cisco.com, or http://www-europe.cisco.com.

If you are reading Cisco product documentation on the World Wide Web, you can submit comments electronically. Click Feedback in the toolbar and select Documentation. After you complete the form, click Submit to send it to Cisco. We appreciate your comments.