Sign In
Upload
Manuals
Brands
Cisco Manuals
Software
3.3
Cisco 3.3 Manuals
Manuals and User Guides for Cisco 3.3. We have
1
Cisco 3.3 manual available for free PDF download: User Manual
Cisco 3.3 User Manual (860 pages)
for Windows Server Version 3.3
Brand:
Cisco
| Category:
Software
| Size: 6.95 MB
Table of Contents
Table of Contents
4
Product Documentation
32
Related Documentation
33
Obtaining Documentation
35
Documentation Feedback
36
Obtaining Technical Assistance
37
Obtaining Additional Publications and Information
39
Aaa Server Functions and Concepts
45
AAA Protocols-TACACS+ and RADIUS
46
Radius
47
Tacacs
47
Authentication
48
Authentication and User Databases
49
Authentication Considerations
49
Authentication Protocol-Database Compatibility
50
Passwords
51
Other Authentication-Related Features
56
Authorization
57
Dynamic Usage Quotas
58
Max Sessions
58
Shared Profile Components
58
Support for Cisco Device-Management Applications
59
Other Authorization-Related Features
61
Accounting
62
Other Accounting-Related Features
62
Administration
63
HTTP Port Allocation for Administrative Sessions
63
Network Device Groups
64
Other Administration-Related Features
64
Cisco Secure ACS HTML Interface
65
Posture Validation
65
About the Cisco Secure ACS HTML Interface
66
HTML Interface Security
66
HTML Interface Layout
67
Uniform Resource Locator for the HTML Interface
69
Administrative Sessions and HTTP Proxy
70
Network Environments and Administrative Sessions
70
Administrative Sessions through a NAT Gateway
71
Administrative Sessions through Firewalls
71
Accessing the HTML Interface
72
Logging off the HTML Interface
73
Online Help and Online Documentation
73
Using Online Help
74
Using the Online Documentation
74
Chapter 2 Deployment Considerations
78
Basic Deployment Requirements for Cisco Secure ACS
78
System Requirements
78
Hardware Requirements
78
Operating System Requirements
78
Third-Party Software Requirements
79
Network and Port Requirements
80
Basic Deployment Factors for Cisco Secure ACS
82
Network Topology
82
Dial-Up Topology
82
Wireless Network
85
Remote Access Using VPN
88
Remote Access Policy
90
Security Policy
91
Administrative Access Policy
91
Separation of Administrative and General Users
93
Database
94
Number of Users
94
Type of Database
94
Network Latency and Reliability
95
Suggested Deployment Sequence
95
Interface Configuration
99
Chapter 3 Interface Configuration
100
Interface Design Concepts
100
User-To-Group Relationship
100
Per-User or Per-Group Features
100
User Data Configuration Options
101
Defining New User Data Fields
101
Advanced Options
102
Setting Advanced Options for the Cisco Secure ACS User Interface
104
Protocol Configuration Options for TACACS
105
Setting Options for TACACS
107
Protocol Configuration Options for RADIUS
109
Setting Protocol Configuration Options for IETF RADIUS Attributes
114
Setting Protocol Configuration Options for Non-IETF RADIUS Attributes
115
Network Configuration
117
About Network Configuration
117
Chapter 4 Network Configuration
118
About Distributed Systems
118
AAA Servers in Distributed Systems
119
Default Distributed System Settings
119
Proxy in Distributed Systems
120
Fallback on Failed Connection
121
Character String
122
Stripping
122
Proxy in an Enterprise
122
Remote Use of Accounting Packets
123
Other Features Enabled by System Distribution
124
Network Device Searches
124
Network Device Search Criteria
124
Searching for Network Devices
125
AAA Client Configuration
127
AAA Client Configuration Options
127
Adding a AAA Client
132
Editing a AAA Client
135
Deleting a AAA Client
137
AAA Server Configuration
137
AAA Server Configuration Options
138
Adding a AAA Server
140
Editing a AAA Server
142
Deleting a AAA Server
144
Network Device Group Configuration
144
Adding a Network Device Group
145
Assigning an Unassigned AAA Client or AAA Server to an NDG
146
Reassigning a AAA Client or AAA Server to an NDG
147
Renaming a Network Device Group
148
Deleting a Network Device Group
148
Proxy Distribution Table Configuration
150
About the Proxy Distribution Table
150
Adding a New Proxy Distribution Table Entry
151
Sorting the Character String Match Order of Distribution Entries
152
Editing a Proxy Distribution Table Entry
153
Deleting a Proxy Distribution Table Entry
154
Shared Profile Components
155
About Shared Profile Components
155
Network Access Filters
156
About Network Access Filters
156
Chapter 5 Shared Profile Component
157
Adding a Network Access Filter
157
Editing a Network Access Filter
159
Deleting a Network Access Filter
161
Downloadable IP Acls
161
About Downloadable IP Acls
162
Adding a Downloadable IP ACL
164
Editing a Downloadable IP ACL
167
Deleting a Downloadable IP ACL
168
Network Access Restrictions
168
About Network Access Restrictions
169
About IP-Based NAR Filters
171
About Non-IP-Based NAR Filters
172
Adding a Shared Network Access Restriction
173
Editing a Shared Network Access Restriction
177
Deleting a Shared Network Access Restriction
178
Command Authorization Sets
179
About Command Authorization Sets
180
Command Authorization Sets Description
180
Command Authorization Sets Assignment
182
Case Sensitivity and Command Authorization
183
Arguments and Command Authorization
183
About Pattern Matching
184
Adding a Command Authorization Set
185
Editing a Command Authorization Set
187
Deleting a Command Authorization Set
189
User Group Management
191
About User Group Setup Features and Functions
192
Default Group
192
Group TACACS+ Settings
192
Chapter 6 User Group Management
193
Basic User Group Settings
193
Group Disablement
194
Enabling Voip Support for a User Group
194
Setting Default Time-Of-Day Access for a User Group
195
Setting Callback Options for a User Group
197
Setting Network Access Restrictions for a User Group
198
Setting Max Sessions for a User Group
202
Setting Usage Quotas for a User Group
204
Configuration-Specific User Group Settings
206
Setting Token Card Settings for a User Group
208
Setting Enable Privilege Options for a User Group
209
Enabling Password Aging for the Ciscosecure User Database
211
Enabling Password Aging for Users in Windows Databases
216
Setting IP Address Assignment Method for a User Group
218
Assigning a Downloadable IP ACL to a Group
220
Configuring TACACS+ Settings for a User Group
221
Configuring a Shell Command Authorization Set for a User Group
223
Configuring a PIX Command Authorization Set for a User Group
225
Configuring Device-Management Command Authorization for a User Group
227
Configuring IETF RADIUS Settings for a User Group
228
Configuring Cisco IOS/PIX RADIUS Settings for a User Group
230
Configuring Cisco Aironet RADIUS Settings for a User Group
231
Configuring Ascend RADIUS Settings for a User Group
233
Configuring Cisco VPN 3000 Concentrator RADIUS Settings for a User Group
234
Configuring Cisco VPN 5000 Concentrator RADIUS Settings for a User Group
236
Configuring Microsoft RADIUS Settings for a User Group
237
Configuring Nortel RADIUS Settings for a User Group
239
Configuring Juniper RADIUS Settings for a User Group
240
Configuring BBSM RADIUS Settings for a User Group
241
Configuring Custom RADIUS VSA Settings for a User Group
243
Group Setting Management
244
Listing Users in a User Group
244
Resetting Usage Quota Counters for a User Group
245
Renaming a User Group
245
Saving Changes to User Group Settings
246
User Management
247
About User Setup Features and Functions
247
Chapter 7 User Management
248
About User Databases
248
Basic User Setup Options
249
Adding a Basic User Account
250
Setting Supplementary User Information
252
Setting a Separate CHAP/MS-CHAP/ARAP Password
253
Assigning a User to a Group
254
Setting User Callback Option
255
Assigning a User to a Client IP Address
256
Setting Network Access Restrictions for a User
257
Setting Max Sessions Options for a User
262
Setting User Usage Quotas Options
264
Setting Options for User Account Disablement
266
Assigning a Downloadable IP ACL to a User
267
Advanced User Authentication Settings
268
TACACS+ Settings (User)
269
Configuring TACACS+ Settings for a User
270
Configuring a Shell Command Authorization Set for a User
272
Configuring a PIX Command Authorization Set for a User
275
User
276
Configuring the Unknown Service Setting for a User
278
Advanced TACACS+ Settings (User)
279
Setting Enable Privilege Options for a User
279
Setting TACACS+ Enable Password Options for a User
281
Setting TACACS+ Outbound Password for a User
283
RADIUS Attributes
283
Setting Cisco IOS/PIX RADIUS Parameters for a User
284
Setting Cisco Aironet RADIUS Parameters for a User
284
Setting Ascend RADIUS Parameters for a User
289
Setting Cisco VPN 3000 Concentrator RADIUS Parameters for a User
290
Setting Cisco VPN 5000 Concentrator RADIUS Parameters for a User
292
Setting Microsoft RADIUS Parameters for a User
293
Setting Nortel RADIUS Parameters for a User
295
Setting Juniper RADIUS Parameters for a User
297
Setting BBSM RADIUS Parameters for a User
298
Setting Custom RADIUS Attributes for a User
299
User Management
300
Listing All Users
301
Finding a User
301
Disabling a User Account
302
Deleting a User Account
303
Resetting User Session Quota Counters
304
Resetting a User Account after Login Failure
305
Saving User Settings
306
System Configuration: Basic
307
Service Control
307
Determining the Status of Cisco Secure ACS Services
308
Stopping, Starting, or Restarting Services
308
Chapter 8 System Configuration: Basic
309
Logging
309
Date Format Control
309
Setting the Date Format
309
Local Password Management
311
Configuring Local Password Management
313
Cisco Secure ACS Backup
315
About Cisco Secure ACS Backup
315
Backup File Locations
315
Directory Management
316
Components Backed up
316
Reports of Cisco Secure ACS Backups
316
Backup Options
317
Performing a Manual Cisco Secure ACS Backup
317
Scheduling Cisco Secure ACS Backups
318
Disabling Scheduled Cisco Secure ACS Backups
319
Cisco Secure ACS System Restore
320
About Cisco Secure ACS System Restore
320
Backup Filenames and Locations
320
Components Restored
321
Reports of Cisco Secure ACS Restorations
322
Restoring Cisco Secure ACS from a Backup File
322
Cisco Secure ACS Active Service Management
323
System Monitoring
323
System Monitoring Options
324
Setting up System Monitoring
325
Event Logging
326
Setting up Event Logging
326
Voip Accounting Configuration
327
Configuring Voip Accounting
327
Ciscosecure Database Replication
329
C H a P T E R 9 System Configuration: Advanced
330
About Ciscosecure Database Replication
330
Replication Process
332
Replication Frequency
335
Important Implementation Considerations
335
Database Replication Versus Database Backup
338
Database Replication Logging
338
Replication Options
339
Replication Components Options
339
Outbound Replication Options
340
Inbound Replication Options
343
Implementing Primary and Secondary Replication Setups on Cisco Secure Acses
343
Configuring a Secondary Cisco Secure ACS
345
Replicating Immediately
347
Scheduling Replication
349
Disabling Ciscosecure Database Replication
352
RDBMS Synchronization
353
Database Replication Event Errors
353
About RDBMS Synchronization
354
Users
355
User Groups
355
Network Configuration
356
Custom RADIUS Vendors and Vsas
356
RDBMS Synchronization Components
357
About Csdbsync
357
About the Accountactions Table
359
Cisco Secure ACS Database Recovery Using the Accountactions Table
360
Reports and Event (Error) Handling
361
Preparing to Use RDBMS Synchronization
361
Considerations for Using CSV-Based Synchronization
363
Preparing for CSV-Based Synchronization
364
Configuring a System Data Source Name for RDBMS Synchronization
365
RDBMS Synchronization Options
366
RDBMS Setup Options
366
Synchronization Scheduling Options
367
Synchronization Partners Options
367
Performing RDBMS Synchronization Immediately
368
Scheduling RDBMS Synchronization
369
Disabling Scheduled RDBMS Synchronizations
371
IP Pools Server
372
About IP Pools Server
372
Allowing Overlapping IP Pools or Forcing Unique Pool Address Ranges
373
Refreshing the AAA Server IP Pools Table
375
Adding a New IP Pool
375
Editing an IP Pool Definition
376
Resetting an IP Pool
377
Deleting an IP Pool
378
IP Pools Address Recovery
379
Enabling IP Pool Address Recovery
379
About Certification and EAP Protocols
381
C H a P T E R 10 System Configuration: Authentication and Certificates
382
Digital Certificates
382
EAP-TLS Authentication
382
About the EAP-TLS Protocol
383
EAP-TLS and Cisco Secure ACS
384
EAP-TLS Limitations
386
Enabling EAP-TLS Authentication
387
PEAP Authentication
388
About the PEAP Protocol
388
PEAP and Cisco Secure ACS
389
PEAP and the Unknown User Policy
391
Enabling PEAP Authentication
392
EAP-FAST Authentication
393
About EAP-FAST
393
About Master Keys
395
About Pacs
397
Master Key and PAC Ttls
401
Replication and EAP-FAST
402
Enabling EAP-FAST
405
Global Authentication Setup
406
Authentication Configuration Options
407
Configuring Authentication Options
413
Cisco Secure ACS Certificate Setup
414
Installing a Cisco Secure ACS Server Certificate
415
Adding a Certificate Authority Certificate
417
Editing the Certificate Trust List
418
Managing Certificate Revocation Lists
420
About Certificate Revocation Lists
420
Certificate Revocation List Configuration Options
420
Adding a Certificate Revocation List Issuer
420
Editing a Certificate Revocation List Issuer
420
Deleting a Certificate Revocation List Issuer
420
Generating a Certificate Signing Request
425
Using Self-Signed Certificates
427
About Self-Signed Certificates
427
Self-Signed Certificate Configuration Options
428
Generating a Self-Signed Certificate
429
Updating or Replacing a Cisco Secure ACS Certificate
430
Logs and Reports
434
Chapter 11 Log and Report
434
Logging Formats
434
Special Logging Attributes
434
NAC Attributes in Logs
436
Update Packets in Accounting Logs
437
About Cisco Secure ACS Logs and Reports
438
Accounting Logs
438
Dynamic Administration Reports
441
Viewing the Logged-In Users Report
442
Deleting Logged-In Users
443
Viewing the Disabled Accounts Report
444
Cisco Secure ACS System Logs
445
Configuring the Administration Audit Log
446
Working with CSV Logs
447
CSV Log File Names
447
CSV Log File Locations
448
Enabling or Disabling a CSV Log
449
Viewing a CSV Report
450
Configuring a CSV Log
451
Working with ODBC Logs
453
Preparing for ODBC Logging
454
Configuring a System Data Source Name for ODBC Logging
454
Configuring an ODBC Log
455
Remote Logging
458
About Remote Logging
458
Implementing Centralized Remote Logging
459
Remote Logging Options
460
Enabling and Configuring Remote Logging
461
Disabling Remote Logging
463
Service Logs
463
Services Logged
464
Configuring Service Logs
465
Administrator Accounts
467
C H a P T E R 12 Administrators and Administrative Policy
468
About Administrator Accounts
468
Administrator Privileges
469
Adding an Administrator Account
472
Editing an Administrator Account
473
Edit Cisco Acs Administrator Account Privileges
474
Unlocking a Locked out Administrator Account
476
Deleting an Administrator Account
477
Access Policy
477
Access Policy Options
478
Setting up Access Policy
480
Session Policy
482
Session Policy Options
482
Setting up Session Policy
483
Audit Policy
484
Chapter 13 User Database
486
Ciscosecure User Database
486
About the Ciscosecure User Database
486
User Import and Creation
487
About External User Databases
488
Authenticating with External User Databases
489
External User Database Authentication Process
490
Windows User Database
491
What's Supported with Windows User Databases
492
Authentication with Windows User Databases
493
Trust Relationships
493
Windows Dial-Up Networking Clients
494
Windows Dial-Up Networking Clients with a Domain Field
494
Windows Dial-Up Networking Clients Without a Domain Field
495
Usernames and Windows Authentication
495
Username Formats and Windows Authentication
495
Non-Domain-Qualified Usernames
497
Domain-Qualified Usernames
498
UPN Usernames
498
EAP and Windows Authentication
499
EAP-TLS Domain Stripping
500
Machine Authentication
500
Machine Access Restrictions
503
Microsoft Windows and Machine Authentication
504
Enabling Machine Authentication
506
User-Changeable Passwords with Windows User Databases
509
Preparing Users for Authenticating with Windows
510
Windows User Database Configuration Options
510
Configuring a Windows External User Database
514
Generic LDAP
516
Cisco Secure ACS Authentication Process with a Generic LDAP User Database
517
Multiple LDAP Instances
517
LDAP Organizational Units and Groups
518
Domain Filtering
518
LDAP Failover
520
Successful Previous Authentication with the Primary LDAP Server
520
Unsuccessful Previous Authentication with the Primary LDAP Server
521
LDAP Configuration Options
521
Configuring a Generic LDAP External User Database
527
Novell NDS Database
533
About Novell NDS User Databases
534
User Contexts
535
Novell NDS External User Database Options
536
Configuring a Novell NDS External User Database
537
ODBC Database
539
What Is Supported with ODBC User Databases
541
Cisco Secure ACS Authentication Process with an ODBC External User Database
542
Preparing to Authenticate Users with an ODBC-Compliant Relational Database
543
Implementation of Stored Procedures for ODBC Authentication
544
Type Definitions
545
Microsoft SQL Server and Case-Sensitive Passwords
545
Sample Routine for Generating a PAP Authentication SQL Procedure
546
Sample Routine for Generating an SQL CHAP Authentication Procedure
547
Sample Routine for Generating an EAP-TLS Authentication Procedure
548
PAP Authentication Procedure Input
548
PAP Procedure Output
549
CHAP/MS-CHAP/ARAP Authentication Procedure Input
550
CHAP/MS-CHAP/ARAP Procedure Output
550
EAP-TLS Authentication Procedure Input
551
EAP-TLS Procedure Output
552
Result Codes
553
Configuring a System Data Source Name for an ODBC External User Database
554
Configuring an ODBC External User Database
555
LEAP Proxy RADIUS Server Database
559
Configuring a LEAP Proxy RADIUS Server External User Database
560
Token Server User Databases
562
About Token Servers and Cisco Secure ACS
562
Token Servers and ISDN
563
RADIUS-Enabled Token Servers
563
About RADIUS-Enabled Token Servers
563
Token Server RADIUS Authentication Request and Response
563
Contents
563
Configuring a RADIUS Token Server External User Database
563
RSA Securid Token Servers
568
Configuring an RSA Securid Token Server External User Database
569
Deleting an External User Database Configuration
570
About Network Admission Control
573
NAC AAA Components
574
Posture Validation
575
Chapter 14 Network Admission Control
575
Posture Tokens
576
Non-Responsive NAC-Client Computers
577
Implementing Network Admission Control
577
NAC Databases
582
About NAC Databases
582
About NAC Credentials and Attributes
583
NAC Database Configuration Options
584
Policy Selection Options
585
Configuring a NAC Database
586
NAC Policies
588
Local Policies
589
About Local Policies
590
About Rules, Rule Elements, and Attributes
591
Local Policy Configuration Options
594
Rule Configuration Options
596
Creating a Local Policy
597
External Policies
600
About External Policies
600
External Policy Configuration Options
601
Creating an External Policy
604
Editing a Policy
606
Deleting a Policy
608
Unknown User Policy
611
Known, Unknown, and Discovered Users
611
Authentication and Unknown Users
611
Chapter 15 Unknown User Policy
613
About Unknown User Authentication
614
General Authentication of Unknown Users
615
Windows Authentication of Unknown Users
616
Domain-Qualified Unknown Windows Users
616
Windows Authentication with Domain Qualification
617
Multiple User Account Creation
618
Performance of Unknown User Authentication
618
Added Authentication Latency
619
Authentication Timeout Value on AAA Clients
619
Posture Validation and the Unknown User Policy
620
NAC and the Unknown User Policy
620
Posture Validation Use of the Unknown User Policy
621
Required Use for Posture Validation
622
Authorization of Unknown Users
623
Unknown User Policy Options
623
Database Search Order
624
Configuring the Unknown User Policy
626
Disabling Unknown User Authentication
627
User Group Mapping and Specification
629
About User Group Mapping and Specification
629
C H a P T E R 16 User Group Mapping and Specification
630
Group Mapping by External User Database
630
Creating a Cisco Secure ACS Group Mapping for a Token Server, ODBC Database, or LEAP Proxy RADIUS Server Database
631
Group Mapping by Group Set Membership
632
Group Mapping Order
633
No Access Group for Group Set Mappings
633
Default Group Mapping for Windows
634
Windows Group Mapping Limitations
634
Generic LDAP Groups
635
Editing a Windows, Novell NDS, or Generic LDAP Group Set Mapping
637
Deleting a Windows, Novell NDS, or Generic LDAP Group Set Mapping
638
Deleting a Windows Domain Group Mapping Configuration
639
Changing Group Set Mapping Order
640
NAC Group Mapping
641
Configuring NAC Group Mapping
641
RADIUS-Based Group Specification
642
Appendix
645
A Troubleshooting
646
Administration Issues
646
Appendix A Troubleshooting
647
Browser Issues
648
Cisco IOS Issues
649
Database Issues
651
Dial-In Connection Issues
654
Debug Issues
658
Proxy Issues
659
Installation and Upgrade Issues
660
Maxsessions Issues
660
Report Issues
661
Third-Party Server Issues
663
User Authentication Issues
664
TACACS+ and RADIUS Attribute Issues
666
Appendix
667
TACACS+ Attribute-Value Pairs
667
Cisco IOS AV Pair Dictionary
667
Appendix B TACAC+ Attribute-Value Pair
668
TACACS+ AV Pairs
668
TACACS+ Accounting AV Pairs
670
Appendix
673
RADIUS Attributes
673
Cisco IOS Dictionary of RADIUS AV Pairs
675
Appendix C RADIU Attribute
675
Cisco IOS/PIX Dictionary of RADIUS Vsas
677
About the Cisco-Av-Pair RADUIS Attribute
679
Cisco VPN 3000 Concentrator Dictionary of RADIUS Vsas
681
Cisco VPN 5000 Concentrator Dictionary of RADIUS Vsas
685
Cisco Building Broadband Service Manager Dictionary of RADIUS VSA
686
IETF Dictionary of RADIUS AV Pairs
686
Microsoft MPPE Dictionary of RADIUS Vsas
700
Microsoft MPPE Dictionary of RADIUS Vsas
702
Ascend Dictionary of RADIUS AV Pairs
703
Ascend Dictionary of RADIUS AV Pairs
705
Nortel Dictionary of RADIUS Vsas
715
Juniper Dictionary of RADIUS Vsas
716
Appendix
717
Appendix D Csutil Database Utility
718
Csutil Database Utility
719
Csutil.exe Options
719
Displaying Command-Line Syntax
721
Backing up Cisco Secure ACS with Csutil.exe
722
Restoring Cisco Secure ACS with Csutil.exe
723
Creating a Ciscosecure User Database
724
Creating a Cisco Secure ACS Database Dump File
726
Loading the Cisco Secure ACS Database from a Dump File
727
Compacting the Ciscosecure User Database
728
User and AAA Client Import Option
730
Importing User and AAA Client Information
731
User and AAA Client Import File Format
732
About User and AAA Client Import File Format
733
ONLINE or OFFLINE Statement
733
ADD Statements
734
UPDATE Statements
735
DELETE Statements
737
ADD_NAS Statements
737
DEL_NAS Statements
739
Import File Example
740
Exporting User List to a Text File
740
Exporting Group Information to a Text File
741
Exporting Registry Information to a Text File
742
Decoding Error Numbers
743
Recalculating CRC Values
744
User-Defined RADIUS Vendors and VSA Sets
744
About User-Defined RADIUS Vendors and VSA Sets
745
Adding a Custom RADIUS Vendor and VSA Set
745
Deleting a Custom RADIUS Vendor and VSA Set
747
Listing Custom RADIUS Vendors
748
Exporting Custom RADIUS Vendor and VSA Sets
749
RADIUS Vendor/Vsa Import File
750
About the RADIUS Vendor/Vsa Import File
750
Vendor and VSA Set Definition
751
Attribute Definition
752
Enumeration Definition
754
Example RADIUS Vendor/Vsa Import File
755
PAC File Generation
756
PAC File Options and Examples
757
Generating PAC Files
759
Posture Validation Attributes
760
Posture Validation Attribute Definition File
760
Exporting Posture Validation Attribute Definitions
764
Importing Posture Validation Attribute Definitions
765
Deleting a Posture Validation Attribute Definition
767
Default Posture Validation Attribute Definition File
768
Appendix
781
VPDN Processing
781
VPDN Process
781
Appendix
787
RDBMS Synchronization Import Definitions
787
Accountactions Specification
787
Accountactions Format
788
Accountactions Mandatory Fields
789
Accountactions Processing Order
790
Action Codes
790
Action Codes for Setting and Deleting Values
791
Action Codes for Creating and Modifying User Accounts
793
Action Codes for Initializing and Modifying Access Filters
800
Action Codes for Modifying TACACS+ and RADIUS Group and User Settings
805
Action Codes for Modifying Network Configuration
811
Cisco Secure ACS Attributes and Action Codes
818
User-Specific Attributes
818
User-Defined Attributes
818
Group-Specific Attributes
818
An Example of Accountactions
822
Appendix
825
G Internal Architecture
825
Windows Services
825
Windows Registry
825
Csadmin
826
Csauth
827
Csdbsync
828
Cslog
828
Csmon
828
Monitoring
829
Recording
830
Notification
831
Response
831
Cstacacs and Csradius
832
Advertisement
Advertisement
Related Products
Cisco 3550-24 - Catalyst SMI Switch
Cisco CallManager Release 3.0(10
Cisco 3002 - VPN Hardware Client
Cisco Catalyst Supervisor Engine 32 PISA
CISCO SIEMENS HICOM 330E
Cisco Explorer 3350
Cisco 3310 Mobility Services Engine
Cisco 3005 - VPN Concentrator - Gateway
Cisco Catalyst 3560-12PC-S
Cisco ME 3400EG-2CS-A
Cisco Categories
Switch
IP Phone
Network Router
Wireless Access Point
Conference System
More Cisco Manuals
Login
Sign In
OR
Sign in with Facebook
Sign in with Google
Upload manual
Upload from disk
Upload from URL