Installation and Configuration Guide for Cisco Secure ACS Remote Agents 4.1
Index

Table Of Contents

C - D - E - I - L - M - N - P - R - S - U - W -

Index

C

cautions

significance of 1-viii

Cisco Secure ACS for Windows Server 1-2

concurrent connections 1-2

configuration

methods 1-2

settings 4-2

configuration provider

configuring 1-7

definition 1-2

logging configuration 1-3

conventions 1-vii

CSAgent

description 1-5

settings 4-2

use at startup 1-2

CSAgent.ini

configuring 4-6

location 4-1

options 4-2

sample 4-5

use at startup 1-2

CSLogAgent

description 1-5

process overview 1-3

settings 4-3

CSWinAgent

description 1-6

process overview 1-4

purpose 1-4

settings 4-4

D

debugging 4-9

directories 4-8

documentation

conventions 1-vii

E

encryption 1-1

I

installation

for Solaris 3-2

for Windows 2-4

L

local security setting, configuring in Windows 2-13

log format 4-4

logs

location 4-8

support 4-9

M

maintenance 4-7

member server

configuring Windows 2-9

N

NTLM 2-6, 2-10

P

ports

configuration provider 4-2

CSAgent 4-2

CSLogAgent

for accounting 4-3

for appliance messages 4-3

CSWinAgent 4-4

permitted by gateway devices 2-3, 3-2

R

requirements

network 2-3, 3-2

Solaris

hardware 3-1

operating system 2-2, 3-2

Windows

hardware 2-2

restarting services 4-7

S

security 1-1

service configuration 2-15

services

starting 4-7

stopping 4-7

services, configuring in Windows 2-15

starting services 4-7

stopping services 4-7

support logs 4-9

U

uninstalling

for Solaris 3-5

for Windows 2-5

upgrading

for Solaris 3-6

for Windows 2-5

W

warnings

significance of 1-viii

Windows authentication

member server 2-9