Cisco 2509 - Router - EN User Manual page 394

User guide
Hide thumbs Also See for 2509 - Router - EN:
Table of Contents

Advertisement

Administrator Accounts
Note
User Guide for Cisco Secure ACS for Windows Server
10-4
Additional command authorization set privilege options may appear, if
other Cisco network management applications, such as CiscoWorks2000,
have updated the configuration of Cisco Secure ACS.
Network Configuration—Allows the administrator full access to the
features in the Network Configuration section of the HTML interface.
System Configuration...—Contains the privilege options for the features
found in the System Configuration section of the HTML interface. For each
of the following features, enabling the option allows the administrator full
access to the feature.
Service Control—For more information about this feature, see
Control, page
8-2.
Date/Time Format Control—For more information about this feature,
see
Date Format Control, page
Logging Control—For more information about this feature, see
Logging, page
8-3.
Local Password Management—For more information about this
feature, see
Local Password Management, page
DB Replication—For more information about this feature, see
CiscoSecure Database Replication, page
RDBMS Synchronization—For more information about this feature,
see
RDBMS Synchronization, page
IP Pool Address Recovery—For more information about this feature,
see
IP Pools Address Recovery, page
IP Pool Server Configuration—For more information about this
feature, see
IP Pools Server, page
ACS Backup—For more information about this feature, see
Cisco Secure ACS Backup, page
ACS Restore—For more information about this feature, see
Cisco Secure ACS System Restore, page
ACS Service Management—For more information about this feature,
see
Cisco Secure ACS Active Service Management, page
Chapter 10
Setting Up and Managing Administrators and Policy
8-3.
8-29.
8-67.
8-59.
8-47.
8-5.
8-9.
8-52.
8-55.
78-14696-01, Version 3.1
Service

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Secure acs

Table of Contents