User Guide for Cisco Secure ACS Solution Engine 4.0
Index

Table Of Contents

A - B - C - D - E - F - G - H - I - L - M - N - O - P - Q - R - S - T - U - V - W -

Index

A

AAA 1

See also AAA clients

See also AAA servers

pools for IP address assignment 7

AAA clients 1

adding and configuring 11

configuring 8

deleting 14

editing 13

IP pools 7

multiple IP addresses for 8

number of 22

searching for 6

table 1

timeout values 6

AAA protocols

TACACS+ and RADIUS 3

AAA servers 3

adding 16

configuring 15

deleting 19

editing 18

enabling in interface (table) 6

functions and concepts 2

in distributed systems 2

master 2

overview 15

primary 2

replicating 2

searching for 6

secondary 2

troubleshooting 1

accessing Cisco Secure ACS

how to 3

URL 20

with SSL enabled 20

access policies

See administrative access policies

accountActions table 19, 20

account disablement

Account Disabled check box 3

manual 37

resetting 39

setting options for 13

accounting

See also logging

administrative 15

overview 14

RADIUS 15

TACACS+ 15

ACLs

See downloadable IP ACLs

ACS

additional features 4

extended replication components 5

features, functions and concepts 2

internal database 3

introduction to 1

managing and administrating 15

scalability improvements 5

specifications 21

Windows Services 22

ACS internal database

See also databases

overview 1

password encryption 2

See replication

action codes

for creating and modifying user accounts 4

for initializing and modifying access filters 9

for modifying network configuration 17

for modifying TACACS+ and RADIUS settings 12

for setting and deleting values 4

in accountActions 3

Active Service Management

See Cisco Secure ACS Active Service Management

adding

external servers 23

ADF

importing for vendors 5

Administration Audit log

viewing 10

Administration Control

See also administrators

audit policy setup 12

administrative access policies

See also administrators

configuring 9

limits 8

options 8

overview 8

administrative accounting 15

administrative sessions

and HTTP proxy 2

network environment limitations of 1

session policies 11

through firewalls 2

through NAT (network address translation) 2

administrators

See also Administration Audit log

See also Administration Control

See also administrative access policies

adding 5

deleting 8

editing 6

locked out 7

locking out 11

overview 1

privileges 2

separation from general users 9

troubleshooting 1

unlocking 7

advanced options in interface 7

AES 128 algorithm 2

age-by-date rules for groups 18

Aironet

AAA client configuration 9

RADIUS parameters for group 30

RADIUS parameters for user 27

appliance

configuration 16

ARAP 9

in User Setup 4

attribute definition file

see also ADF 5

attributes

adding 36

definition file 34

definition file sample 41

deleting 38

dumping 40

enabling in interface 4

exporting 40

extended entity 39

extended property 39

group-specific (table) 24

logging of user data 2

management 33

NAC (posture validation) 33

per-group 4

per-user 4

posture validation (NAC) 33

user-specific (table) 24

attribute-value pairs

See AV (attribute value) pairs

audit policies

See also Administration Audit log

overview 12

audit server

functionality 40

setting up 25

authentication 6

configuration 19

configuring policies 27

considerations 7

denying unknown users 8

functionality 11

options 19

overview 6

protocol-database compatibility 7

request handling 3

user databases 7

via external user databases 3

Windows 7

authorization 12

configuring policies 43

ordering rules 46

rules 43

sets

See command authorization sets

AV (attribute value) pairs

See also RADIUS VSAs (vendor specific attributes)

RADIUS

Cisco IOS 3

IETF 11

TACACS+

accounting 3

general 1

Available Credentials 38

B

backups

components backed up 7

disabling scheduled 10

filename 7

filenames 11

manual 8

options 8

overview 7

reports 7

scheduled vs. manual 7

scheduling 9

vs. replication 6

browsers

See also web interface 18

troubleshooting 3

C

cab file 19

cached users

See discovered users

CA configuration 29

callback options

in Group Setup 5

in User Setup 6

cascading replication 4, 9

cautions

significance of xxv

certificate authority, trusted root 13

certificate database for LDAP servers 34

DB path 29

trusted root CA 29

certificate trust list

see CTL

certification

See also EAP-TLS

See also PEAP

adding certificate authority certificates 28

background 1

backups 7

Certificate Revocation Lists 30

certificate signing request generation 32

editing the certificate trust list 29

replacing certificate 36

self-signed certificates

configuring 35

NAC 5

overview 34

server certificate installation 25

updating certificate 36

Certification Revocation List (CRL) 6

CHAP 9

in User Setup 4

Cisco

Identity-Based Networking Services (IBNS) 2

Cisco IOS

RADIUS

AV (attribute value) pairs 2

group attributes 28

user attributes 25

TACACS+ AV (attribute value) pairs 1

troubleshooting 4

Cisco NAC support 5

Cisco Secure ACS Active Service Management

event logging configuration 15

overview 13

system monitoring

configuring 14

Cisco Secure ACS Active Service Monitoring logs

viewing 10

Cisco Secure ACS administration overview 15

Cisco Secure ACS Backup and Restore log

viewing 10

Cisco Secure ACS backups

See backups

Cisco Secure ACS system restore

See restore

CiscoSecure Authentication Agent 16

Cisco Security Agent 16

See also CSAgent

integration 5, 16

logging 17

policies 17

restrictions 17

viewing logs 21

CLID-based filters 19

cloning

Network Access Profiles 9

policies or rules 21

codes

See action codes

command authorization sets

See also shell command authorization sets

adding 28

configuring 24, 28

deleting 30

editing 29

overview 24

pattern matching 27

PIX command authorization sets 24

condition sets, defining 19

configuring

internal policies 18

configuring advanced filtering

Network Access Profiles 7

conventions xxiv

copying

policies or rules 21

creating

external servers 23

Credential Validation Databases 30

CRLs 30

CSAdmin

Windows Services 22

CSAdmin service 2

CSAgent

behavior 17

disabling 18

enabling 18

logging 17

overview 16

policies 17

CSAgent service 16, 2

CSAuth

Windows Services 22

CSDBSync 19

Windows Services 22

CSLog

Windows Services 22

CSMon

See also Cisco Secure ACS Active Service Management

configuration 3

log 5

windows Services 22

CSRadius 6

Windows Services 22

CSTacacs 6

Windows Services 22

CSV (comma-separated values) files

downloading 10

filename formats 9

logging format 1

viewing 10

CTL

external policy servers

CTL editing 29

custom attributes

in group-level TACACS+ settings 22

in user-level TACACS+ settings 15

customer support

collecting data for 20

D

database group mappings

configuring

for token servers 2

for Windows domains 6

no access groups 4

order 7

deleting

group set mappings 6

Windows domain configurations 7

Database Replication log

viewing 10

databases

See also external user databases

ACS internal database 1

authentication search process 3

deleting 42

deployment considerations 10

external

See also external user databases

See also Unknown User Policy

remote agent selection 17

replication

See replication

search order 7

search process 7

selecting user databases 1

synchronization

See RDBMS synchronization

token cards

See token servers

troubleshooting 6, 12

types

See generic LDAP user databases

See LEAP proxy RADIUS user databases

See Novell NDS user databases

See RADIUS user databases

unknown users 1

user databases 2

user import methods 2

Windows user databases 4

data source names

for RDMBS synchronization 24

data types, NAC attribute 8

date and time setting 17

date format control 3

debug logs

detail levels 19

frequency 19

default group

in Group Setup 2

mapping for Windows 4

default time-of-day/day-of-week specification 6

default time-of-day access settings for groups 5

deleting 10

external audit servers 26

external servers 25

logged-in users 7

Network Access Profiles 10

policies or rules 22

deployment

overview 1

sequence 11

device command sets

See command authorization sets

device management applications support 13

DHCP with IP pools 29

diagnostic logs 21

dial-in permission to users in Windows 17

dial-in troubleshooting 7

dial-up networking clients 6, 7

dial-up topologies 2

digital certificates

See certification

Disabled Accounts report

viewing 8

Disabled Accounts reports

description 6

discovered users 2

Distinguished Name Caching 26

distributed systems

See also proxy

AAA servers in 2

overview 2

settings

configuring 28

default entry 3

enabling in interface 6

distribution table

See Proxy Distribution Table

DNIS-based filters 19

documentation

conventions xxiv

objectives xxiii

online 20

related xxvi

Domain List

configuring 21

inadvertent user lockouts 9, 21

overview 9

unknown user authentication 5

domain name and hostname configuration 18

domain names

Windows operating systems 8, 9

downloadable IP ACLs 6

adding 15

assigning to groups 22

assigning to users 14

deleting 17

editing 16

enabling in interface

group-level 6

user-level 6

overview 13

draft-ietf-radius-tunnel-auth 3

dynamic usage quotas 13

dynamic users

removing 40

E

EAP (Extensible Authentication Protocol)

Configuration 29

overview 11

supported protocols 11

with Windows authentication 10

EAP authentication

protocol 8

EAP-FAST 11

enabling 17

identity protection 10

logging 9

master keys

definition 10

states 10

master server 16

overview 8

PAC

automatic provisioning 13

definition 11

manual provisioning 14

refresh 14

states 13

password aging 20

phases 9

replication 15

secured tunnel support 5

EAP-TLS 11

See also certification

authentication configuration 19

comparison methods 3

domain stripping 10

enabling 4

limitations 4

options 21, 24

overview 2

editing

external audit servers 26

external posture validation servers 24

internal policies 20

Network Access Profiles 9

enable password options for TACACS+ 23

enable privilege options for groups 13

entity field 8

Event log

configuring 15

exception events 5

exception events 5

exemption list

external audit 15

Extensible Authentication Protocol

See EAP (Extensible Authentication Protocol)

Extensible Authentication Protocol (EAP) 2

external audit policy

what triggers an 15

external audit server

setting up 25

external audit servers

about 14

deleting 26

editing 26

external policies 11

exemption list support 15

external servers

creating 23

deleting 25

editing 24

external token servers

See token servers

external user databases

See also databases

authentication via 3

configuring 3

deleting configuration 42

latency factors 5

search order 6, 7

supported 7

Unknown User Policy 1

F

Failed attempts accouting log 15

Failed Attempts log

configuring

CSV (comma-separated values) 12

enabling

log 10

viewing 10

failed log-on attempts 4

failure events

customer-defined actions 5

predefined actions 5

fallbacks on failed connection 4

finding users 37

FTP server 7

G

gateways 2

Generic LDAP 7

generic LDAP user databases

authentication 22

certificate database downloading 34

configuring

database 30

options 26

directed authentications 24

domain filtering 24

failover 25

mapping database groups to AAA groups 3

mutiple instances 23

organizational units and groups 23

Global Authentication Setup 19

global authentication setup

enabling posture validation 5

grant dial-in permission to users 6, 17

greeting after login 18

group-level interface enabling

downloadable IP ACLs 6

network access restrictions 6

network access restriction sets 6

password aging 6

group-level network access restrictions

See network access restrictions

groups

See also network device groups

assigning users to 5

configuring RADIUS settings for

See RADIUS

Default Group 2, 4

enabling VoIP (Voice-over-IP) support for 4

listing all users in 40

mapping order 7

mappings 1

no access groups 4

overriding settings 4

relationship to users 4

renaming 40

resetting usage quota counters for 40

settings for

callback options 5

configuration-specific 12

configuring common 3

device management command authorization sets 26

enable privilege 13

IP address assignment method 21

management tasks 39

max sessions 9

network access restrictions 6

password aging rules 15

PIX command authorization sets 25

shell command authorization sets 24

TACACS+ 2, 3, 22

time-of-day access 5

token cards 14

usage quotas 10

setting up and managing 1

H

handle counts 4

hard disk space 4

host and domain names configuration 18

host system state 4

HTML interface

encrypting 9

logging off 3

HTTP port allocation

configuring 9

for administrative sessions 18

HTTPS 9

I

IEEE 802.1x 2

IETF 802.1x 11

IETF RADIUS attributes 4

inbound

authentication 9

password configuration 10

installation

related documentation xxvi

system requirements 11

troubleshooting 10

Interface Configuration

See also HTML interface

advanced options 5

configuring 1

customized user data fields 4

security protocol options 9

internal architecture 1

internal policies

configuration options 10

editing 20

rules 10

steps to set up 18

IP ACLs

See downloadable IP ACLs

IP addresses

in User Setup 7

multiple IP addresses for AAA client 8

requirement for CSTacacs and CSRadius 6

setting assignment method for user groups 21

IP pools

address recovery 33

deleting 32

DHCP 29

editing IP pool definitions 31

enabling in interface 6

overlapping 29, 30

refreshing 30

resetting 32

servers

adding IP pools 30

overview 28

replicating IP pools 29

user IP addresses 7

L

LAN manager 9

latency in networks 10

LDAP

Admin Logon Connection Management 26

Distinguished Name 26

LEAP 11

LEAP proxy RADIUS user databases

configuring external databases 36

group mappings 1

overview 35

RADIUS-based group specifications 8

list all users

in Group Setup 40

in User Setup 36

local policies

see internal policies

log files

storage directory 3

Logged-In Users report

deleting logged-in users 7

description 6

viewing 7

logging

See also Reports and Activity

accounting logs 4

administration reports 6

configuring 12

configuring remote agent logs 18

CSAgent 17

CSV (comma-separated values) files 1

custom RADIUS dictionaries 2

debug logs

detail levels 19

frequency 19

diagnostic logs 21

Disabled Accounts reports 6

domain names 2

external user databases 2

Failed Attempts logs 4

formats 1

Logged-In Users reports 6

overview 4

Passed Authentication logs 4

RADIUS logs 4

RDBMS synchronization 2

remote agent logging

configuration 17

options 17

remote logging

centralized 14

configuring 15

disabling 16

enabling 15

enabling in interface 6

local configuration 14

options 15

overview 13

service logs 11

services

configuring service logs 19

list of logs generated 19

system logs 8

TACACS+ logs 4

troubleshooting 11

user data attributes 2

VoIP logs 4

watchdog packets 3

login process test frequency 14

logins

greeting upon 18

password aging dependency 17

M

MAC-Authentication Bypass 29

Machine Access Restrictions (MAR) 6

machine authentication

enabling 15

overview 10

with Microsoft Windows 13

management application support 13

mappings

database groups to AAA groups 3

databases to AAA groups 1

master AAA servers 2

master key

definition 10

states 10

max sessions 12

enabling in interface 6

group 12

in Group Setup 9

in User Setup 11

overview 12

troubleshooting 11

user 12

member server 6, 8

memory utilization 4

monitoring

configuring 14

CSMon 4

overview 13

services 20

MS-CHAP 9

configuring 19

overview 9

protocol supported 8

multiple IP addresses for AAA clients 8

N

NAC 2

agentless host see also NAH 14

attributes

about 7

data types 8

configuring ACS for support for 4

credentials

about 7

implementing 4

logging 5

overview

policies

about 18

external 11

internal 9

results 18

remediation server

url-redirect attribute 6

rules

about 10, 6

default 11

operators 6

self-signed certificates 5

tokens

definition 3

descriptions of 3

returned by internal policies 9

NAC Agentless Host 25

NAC L2 IP 17

NAC L3 IP 15

NAFs

See network access filters

NAH

policies 14

NAR

See network access restrictions

NAS

See AAA clients

Network Access Filter (NAF)

editing 5

Network Access Filters (NAF) 6, 4

adding 3

deleting 6

overview 2

Network Access Profiles 5, 1, 10, 28

cloning 9

configuring advanced filtering 7

editing 9

setting up 3

network access quotas 13

network access restrictions

deleting 23

editing 22

enabling in interface

group-level 6

user-level 6

in Group Setup 6

interface configuration 6

in User Setup 6, 8

non-IP-based filters 19

overview 18

network access servers

See AAA clients

Network Admission Control

see NAC

network configuration 1

network device groups

adding 24

assigning AAA clients to 25

assigning AAA servers to 25

configuring 24

deleting 27

enabling in interface 6

reassigning AAA clients to 26

reassigning AAA servers to 26

renaming 26

network devices

searches for 6

networks

latency 10

reliability 10

network time protocol

See NTP server

network topologies

deployment 2

wireless 4

noncompliant devices 2

non-EAP authentication

protocol 7

Novell NDS user databases

mapping database groups to AAA groups 3

NTP server 17

O

ODBC features

accountActions table 21

group mappings 1

One-time Passwords (OTPs) 6

online documentation 20

online help 20

location in HTML interface 19

using 20

online user guide 21

ordering rules, in policies 10

outbound password configuration 10

overview of Cisco Secure ACS 1

P

PAC

automatic provisioning 13

definition 11

manual provisioning 14

refresh 14

PAP 9

in User Setup 4

vs. ARAP 9

vs. CHAP 9

Passed authentications accounting log 15

Passed Authentications log

configuring CSV (comma-separated values) 12

enabling CSV (comma-separated values) logging 10

viewing 10

password

automatic change password configuration 16

password aging 10

age-by-uses rules 17

Cisco IOS release requirement for 16

EAP-FAST 16

interface configuration 6

in Windows databases 19

MS-CHAP 16

overview 10

PEAP 16

rules 15

password configurations

basic 9

passwords

See also password aging

CHAP/MS-CHAP/ARAP 5

configurations

caching 10

inbound passwords 10

outbound passwords 10

separate passwords 9

single password 9

token caching 10

token cards 9

encryption 2

expiration 17

local management 4

post-login greeting 18

protocols supported 8

remote change 5

user-changeable 11

validation options in System Configuration 4

patch

overview 21

process 23

pattern matching in command authorization 27

PEAP 11

See also certification

configuring 19

enabling 7

identity protection 6

options 20

overview 5

password aging 19

phases 6

with Unknown User Policy 7

performance monitoring 4

performance specifications 22

per-group attributes

See also groups

enabling in interface 4

per-user attributes

enabling in interface 4

TACACS+/RADIUS in Interface Configuration 5

ping command 17

PIX ACLs

See downloadable IP ACLs

PIX command authorization sets

See command authorization sets

PKI (public key infastructure)

See certification

Point-to-Point Protocol (PPP) 23

policies

cloning 21

configuring 17

copying 21

deleting 22

external 11

configuration options 12

internal 9

local

see internal policies

NAH 14

overview 7

renaming 22

rule order 10

setting up an external audit server 25

setting up external servers 23

Populate from Global 28

Network Access Profiles 28

port 2002

in HTTP port ranges 9

in URLs 20

port allocation

See HTTP port allocation

ports

See also HTTP port allocation

See also port 2002

RADIUS 3

TACACS+ 3

Posture Validation

for Agentless Hosts 41

posture validation

attributes 7

configuring ACS for 4

credentials 7

CTL 5

enabling 5

failed attempts log 5

implementing 4

internal policy configuration options 10

options 17

passed authentications log 5

policy overview 7

process flow 6

and profile-based policies 27

profiles, adding user groups 5

rule

assigning posture tokens 6

rules, about 10

server certificate requirement 5

Posture Validation Policies

configuring 35

PPP password aging 16

privileges

See administrators

processor utilization 4

profile 1

Profile-based Policies 2

profile components

See shared profile components

profiles 47

profile templates 13

protocols supported 8

protocol support

EAP authentication 8

non-EAP authentication

7

protocol types

Network Access Profiles 5

proxy

See also Proxy Distribution Table

character strings

defining 4

stripping 4

configuring 27

in enterprise settings 5

overview 3

sending accounting packets 5

troubleshooting 10

Proxy Distribution Table

See also proxy

adding entries 28

configuring 28

default entry 3, 28

deleting entries 30

editing entries 30

match order sorting 29

overview 28

Q

quotas

See network access quotas

See usage quotas

R

RAC and Groups 47

RADIUS 3

See also RADIUS VSAs (vendor specific attributes)

accounting 15

attributes

See also RADIUS VSAs (vendor specific attributes)

in User Setup 24

AV (attribute value) pairs

See also RADIUS VSAs (vendor specific attributes)

Cisco IOS 3

IETF 11

overview 1

Cisco Aironet 9

compliant token servers 7

IETF

in Group Setup 27

interface configuration 12

in User Setup 25

interface configuration overview 9

password aging 19

ports 3

specifications 3

token servers 38

troubleshooting 14

tunneling packets 12

vs. TACACS+ 3

RADIUS Accounting log

configuring

CSV (comma-separated values) 12

configuring CSV (comma-separated values) 10

enabling CSV (comma-separated values) 10

RADIUS user databases

configuring 39

group mappings 1

RADIUS-based group specifications 8

RADIUS VSAs (vendor specific attributes)

Ascend

in Group Setup 32

in User Setup 28

supported attributes 21

Cisco Aironet

in Group Setup 30

in User Setup 27

Cisco BBSM (Building Broadband Service Manager)

in Group Setup 38

in User Setup 34

supported attributes 10

Cisco IOS/PIX

in Group Setup 28

interface configuration 13

in User Setup 25

supported attributes 4

Cisco VPN 3000

in Group Setup 33

in User Setup 29

supported attributes 6

Cisco VPN 5000

in Group Setup 34

in User Setup 30

supported attributes 10

custom

about 19

in Group Setup 39

in User Setup 35

Juniper

in Group Setup 37

in User Setup 33

supported attributes 28

Microsoft

in Group Setup 35

in User Setup 31

supported attributes 19

Nortel

in Group Setup 36

in User Setup 33

supported attributes 28

overview 1

user-defined

about 19

action codes for 12

replicating 19

RDBMS synchronization

accountActions table as transaction queue 21

configuring 26

data source name configuration 23, 24

disabling 28

enabling in interface 6

group-related configuration 18

import definitions 1

log

viewing 10

manual initialization 25

network configuration 18

overview 17

partners 25

preparing to use 22

report and error handling 22

scheduling options 25

user-related configuration 18

rejection mode

general 3

Windows user databases 4

related documentation xxvi

reliability of network 10

remote access policies 7

remote agent

configuration 19

selecting for authentication 17

remote agent logging

configuration 17

options 17

remote agents

adding 21

configuring 19

deleting 23

editing 22

options 20

overview 19

Remote Agents table 2

selecting for authentication 17

remote logging

centralized 14

configuring remote agent logs 17

disabling 16

local configuration 14

options 15

overview 13

Remove Dynamic Users 40

removing

external audit servers 26

external servers 25

policies or rules 22

removing dynamic users 40

renaming

policies 22

replication

ACS Service Management page 2

auto change password settings 16

backups recommended (Caution) 7

cascading 4, 9

certificates 2

client configuration 11

components

overwriting (Caution) 11

overwriting (Note) 7

selecting 7

configuring 13

corrupted backups (Caution) 7

custom RADIUS dictionaries 2

disabling 15, 16

EAP-FAST 15

encryption 4

external user databases 2

frequency 5

group mappings 2

immediate 12

implementing primary and secondary setups 10

important considerations 5

in System Configuration 13

interface configuration 6

IP pools 2, 29

logging 7

manual initiation 12

master AAA servers 2

notifications 16

options 7

overview 2

partners

configuring 15

options 8

process 3

scheduling 13

scheduling options 8

selecting data 7

unsupported 2

user-defined RADIUS vendors 6

vs. backup 6

Reports and Activity

See also logging

configuration privileges 4

configuring 12

CSV (comma-separated values) logs 8

in interface 20

overview 4

request handling

general 3

Windows user databases 4

Required Credential Types 38

requirements

system installation 11

resource consumption 4

restarting services 2

restore

components restored

configuring 12

overview 12

filenames 11

in System Configuration 10

on a different server 11

overview 11

performing 12

reports 12

RFC2138 3

RFC2139 3

RSA user databases

group mappings 1

rules

about 10

internal policy 10

S

search order of external user databases 7

security policies 8

security protocols

CSRadius 6

CSTacacs 6

interface options 9

RADIUS 3, 1

TACACS+

custom commands 8

overview 3

time-of-day access 8

Selected Credentials 38

server certificate installation 25

service control in System Configuration 19

services

determining status of 2

logs

configuring 19

list of logs generated 19

management 13

monitoring 20

starting 2

stopping 2

session policies

configuring 11

options 11

overview 11

setting up

Network Access Profiles 3

shared profile components

See also command authorization sets

See also downloadable IP ACLs

See also network access filters

See also network access restrictions

overview 1

Shared Profile Components (SPC) 13

Shared RAC 46

shared secret 6

shell command authorization sets

See also command authorization sets

in Group Setup 24

in User Setup 17

Simple Network Management Protocol (SNMP) 12

single password configurations 9

SMTP (simple mail-transfer protocol) 5

SNMP

support 4

specifications

RADIUS

RFC2138 3

RFC2139 3

system performance 22

TACACS+ 3

SSL (secure socket layer) 9, 29

starting services 2

static IP addresses 7

stopping services 2

supplementary user information

in User Setup 4

setting 4

support

Cisco Device-Management Applications 13

supported password protocols 8

support page 19

synchronization

See RDBMS synchronization

system

configuration

advanced 1

authentication 1

basic 1

certificates 1

privileges 3

health 4

messages in interface 20

monitoring

See monitoring

performance specifications 22

services

See services

system installation requirements 11

system monitoring

technical support file 19

system performance

specifications 22

T

TACACS+ 3

accounting 15

advanced TACACS+ settings

in Group Setup 2, 3

in User Setup 21

AV (attribute value) pairs

accounting 3

general 1

custom commands 8

enable password options for users 23

enable privilege options 22

interface configuration 7

interface options 9

outbound passwords for users 24

ports 3

SENDAUTH 10

settings

in Group Setup 2, 3, 22

in User Setup 15

specifications 3

time-of-day access 8

troubleshooting 14

vs. RADIUS 3

TACACS+ Accounting log

configuring

CSV (comma-separated values) 12

enabling CSV (comma-separated values) 10

viewing 10

TACACS+ Administration log

configuring

CSV(comma-separated values) 12

enabling CSV (comma-separated values) 10

viewing 10

Telnet

See also command authorization sets

password aging 16

test login frequency internally 14

thread used 4

time and date setting 17

time-of-day/day-of-week specification

See also date format control

enabling in interface 6

timeout values on AAA clients 6

TLS (transport level security)

See certification

token caching 10, 38

token cards 23

password configuration 9

settings in Group Setup 14

token servers

ISDN terminal adapters 38

overview 38

RADIUS-enabled 38

RADIUS token servers 39

supported servers 7

token caching 38

topologies

See network topologies

troubleshooting 47

AAA servers 1

administration issues 1

browser issues 3

Cisco IOS issues 4

database issues 6

debug logs 19

dial-in issues 7

installation issues 10

max sessions issues 11

proxy issues 10

RADIUS issues 14

report issues 11

TACACS+ issues 14

third-party server issues 12

upgrade issues 10

user issues 13

trusted root certificate authority 13

trust lists

See certification

trust relationships 6

U

unknown service user setting 21

Unknown User Policy 18

See also unknown users

configuring 8

in external user databases 2, 7

turning off 8

unknown users

See also Unknown User Policy

authentication 3

authentication performance 5

authentication processing 5

network access authorization 6

unmatched user requests 10

update packets

See watchdog packets

upgrade

applying 27

CSAgent 17

distribution server requirements 22

overview 21

process 23

restrictions 17

transferring 24

upgrade troubleshooting 10

usage quotas

in Group Setup 10

in Interface Configuration 6

in User Setup 12

overview 13

resetting

for groups 40

for single users 38

user-changeable passwords

overview 11

with Windows user databases 16

user databases

See databases

User Data Configuration 4

user groups

See groups

user guide

online 21

user-level

downloadable ACLs interface 6

network access restrictions

See also network access restrictions

enabling in interface 5

users

See also User Setup

adding

basic steps 3

methods 2

assigning client IP addresses to 7

assigning to a group 5

callback options 6

configuring 1

configuring device management command authorization sets for 20

configuring PIX command authorization sets for 19

configuring shell command authorization sets for 17

customized data fields 4

data configuration

See User Data Configuration

deleting 7

deleting accounts 38

disabling accounts 3

finding 37

import methods 2

in multiple databases 4

listing all users 36

number allowed 10

number of 22

RDBMS synchronization 18

relationship to groups 4

removing dynamic 40

resetting accounts 39

saving settings 40

supplementary information 4

troubleshooting 13

types

discovered 2

known 2

unknown 2

VPDN dialup 1

User Setup

account management tasks 36

basic options 2

configuring 1

deleting user accounts 38

saving settings 40

Users in Group button 40

V

validation of passwords 4

vendor-specific attributes

See RADIUS VSAs (vendor specific attributes)

in RDBMS synchronization 8, 19

vendor-specific attributes (VSAs) 4

viewing logs and reports

See logging

Virtual Private Dial-Up Networks (VPDNs) 12

Voice-over-IP

See VoIP (Voice-over-IP)

VoIP (Voice-over-IP)

accounting configuration 7, 15

Accounting log

enabling csv log 10

viewing 10

enabling in interface 7

group settings in Interface Configuration 7

in Group Setup 4

VoIP (Voice-over-IP) Accounting log

configuring

CSV (comma-separated values) 12

VoIP accounting log 15

VPDN

advantages 6

authentication process 1

domain authorization 2

home gateways 2

IP addresses 2

tunnel IDs 2

users 1

VSAs

See RADIUS VSAs (vendor specific attributes)

W

warning events 4, 5

warnings

significance of xxv

watchdog packets

configuring on AAA clients 12

configuring on AAA servers 17

logging 3

web interface

See also Interface Configuration

layout 18

security 16

uniform resource locator 20

Windows Callback 18

Windows Database Callback 18

Windows operating systems

authentication order 4

Cisco Secure ACS-related services

services 2

dial-up networking 6

dial-up networking clients

domain field 7

password field 7

username field 7

Domain List effect 5

domains

domain names 8, 9, 4

Event logs 5

Windows Services 22

CSAdmin 22

CSAuth 22

CSDBSync 22

CSLog 22

CSMon 22

CSRadius 22

CSTacacs 22

overview 22

Windows user database 7

passwords 8

Windows user databases

See also databases

Active Directory 17

configuring 21

Domain list

inadvertent user lockouts 21

domain mapping 6

domains

trusted 6

grant dial-in permission to users 6, 17

group mappings

editing 6

limitations 3

no access groups 4

remapping 6

mapping database groups to AAA groups 3

overview 4

password aging 19

rejection mode 4

request handling 4

trust relationships 6

user-changeable passwords 16

user manager 17

wireless network topologies 4