Many
Manuals
search
Categorias
Marcas
Inicio
Cisco
Ordenadores
3.3
Manual de usuario
Cisco 3.3 Manual de usuario Pagina 628
Descarga
Compartir
Compartiendo
Añadir a mis manuales
Imprimir
Pagina
/
860
Tabla de contenidos
SOLUCIÓN DE PROBLEMAS
MARCADORES
Valorado
.
/ 5. Basado en
revisión del cliente
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
Chapte
r 15 Unknown User
Poli
cy
Disab
ling Unknow
n User Au
thentica
tion
15-18
User Guide f
or Cisco
Secur
e ACS fo
r Windo
ws Serv
er
78-16592-01
1
2
...
623
624
625
626
627
628
629
630
631
632
633
...
859
860
Windows Server
1
CONTENTS
3
3 Interface Configuration 3-1
6
4 Network Configuration 4-1
6
6 User Group Management 6-1
8
7 User Management 7-1
10
Contents
11
11 Logs and Reports 11-1
16
13 User Databases 13-1
18
15 Unknown User Policy 15-1
21
A Troubleshooting A-1
23
C RADIUS Attributes C-1
23
D CSUtil Database Utility D-1
24
E VPDN Processing E-1
26
G Internal Architecture G-1
26
Audience
29
Organization
29
Conventions
31
Product Documentation
32
Related Documentation
33
Table 2 Related Documentation
34
Obtaining Documentation
35
Documentation Feedback
36
Submitting a Service Request
37
Overview
41
The Cisco Secure ACS Paradigm
42
Chapter 1 Overview
43
• Authorization, page 1-17
46
• Accounting, page 1-22
46
• Administration, page 1-23
46
Authentication
48
Authentication Considerations
49
Passwords
51
Comparing PAP, CHAP, and ARAP
52
EAP Support
53
Basic Password Configurations
54
Password Aging
55
User-Changeable Passwords
56
Authorization
57
Max Sessions
58
Dynamic Usage Quotas
58
Accounting
62
Administration
63
Network Device Groups
64
HTML Interface Security
66
HTML Interface Layout
67
Accessing the HTML Interface
72
Using Online Help
74
Deployment Considerations
77
System Requirements
78
Network and Port Requirements
80
Network Topology
82
Wireless Network
85
Cisco Aironet AP
86
Remote Access using VPN
88
VPN concentrator
89
Network WAN
89
Remote Access Policy
90
Security Policy
91
Administrative Access Policy
91
Database
94
Suggested Deployment Sequence
95
Interface Configuration
99
Interface Design Concepts
100
Defining New User Data Fields
101
Advanced Options
102
78-16592-01
103
Interface
104
Setting Options for TACACS+
107
Attributes
114
Network Configuration
117
About Distributed Systems
118
Proxy in Distributed Systems
120
Fallback on Failed Connection
121
Proxy in an Enterprise
122
• Log them locally
123
Network Device Searches
124
Searching for Network Devices
125
AAA Client Configuration
127
Adding a AAA Client
132
Editing a AAA Client
135
AAA Server Configuration
137
Adding a AAA Server
140
Editing a AAA Server
142
Deleting a AAA Server
144
Adding a Network Device Group
145
Step 3 Click Delete
154
Step 4 Click OK
154
Shared Profile Components
155
Network Access Filters
156
Downloadable IP ACLs
161
About Downloadable IP ACLs
162
Adding a Downloadable IP ACL
164
Editing a Downloadable IP ACL
167
Network Access Restrictions
168
About IP-based NAR Filters
171
Command Authorization Sets
179
About Pattern Matching
184
Step 4 Click Delete
189
User Group Management
191
Default Group
192
Group TACACS+ Settings
192
Basic User Group Settings
193
Group Disablement
194
User Group
227
Ascend-Remote-Addr
233
Group Setting Management
244
Renaming a User Group
245
User Management
247
About User Databases
248
Basic User Setup Options
249
Adding a Basic User Account
250
Assigning a User to a Group
254
Setting User Callback Option
255
TACACS+ Settings (User)
269
RADIUS Attributes
283
Listing All Users
301
Finding a User
301
Disabling a User Account
302
Deleting a User Account
303
Saving User Settings
306
System Configuration: Basic
307
Service Control
308
Date Format Control
309
Local Password Management
311
Cisco Secure ACS Backup
315
Directory Management
316
Components Backed Up
316
Backup Options
317
Components Restored
321
Step 2 Click ACS Restore
322
System Monitoring
323
System Monitoring Options
324
Setting Up System Monitoring
325
Event Logging
326
VoIP Accounting Configuration
327
Step 4 Click Submit
328
Replication Process
332
Replication Frequency
335
Database Replication Logging
338
Replication Options
339
Outbound Replication Options
340
Cisco Secure ACSes
343
Replicating Immediately
347
Scheduling Replication
349
RDBMS Synchronization
353
About RDBMS Synchronization
354
User Groups
355
About CSDBSync
357
Synchronization
365
RDBMS Synchronization Options
366
IP Pools Server
372
Adding a New IP Pool
375
Editing an IP Pool Definition
376
Resetting an IP Pool
377
Deleting an IP Pool
378
IP Pools Address Recovery
379
Digital Certificates
382
EAP-TLS Authentication
382
About the EAP-TLS Protocol
383
EAP-TLS and Cisco Secure ACS
384
EAP-TLS Limitations
386
PEAP Authentication
388
PEAP and Cisco Secure ACS
389
Enabling PEAP Authentication
392
EAP-FAST Authentication
393
About Master Keys
395
About PACs
397
Automatic PAC Provisioning
398
Manual PAC Provisioning
400
Master Key and PAC TTLs
401
Replication and EAP-FAST
402
Enabling EAP-FAST
405
Global Authentication Setup
406
Step 5 Click Delete
425
Logs and Reports
433
Logging Formats
434
Special Logging Attributes
434
NAC Attributes in Logs
436
Accounting Logs
438
Step 2 Click Logged-in Users
442
Deleting Logged-in Users
443
Cisco Secure ACS System Logs
445
Working with CSV Logs
447
CSV Log File Locations
448
Viewing a CSV Report
450
Configuring a CSV Log
451
Working with ODBC Logs
453
Preparing for ODBC Logging
454
Configuring an ODBC Log
455
Remote Logging
458
Remote Logging Options
460
Service Logs
463
Services Logged
464
Configuring Service Logs
465
Administrator Accounts
467
About Administrator Accounts
468
Administrator Privileges
469
Access Policy
477
Access Policy Options
478
Setting Up Access Policy
480
Session Policy
482
Setting Up Session Policy
483
Audit Policy
484
User Databases
485
CiscoSecure User Database
486
User Import and Creation
487
About External User Databases
488
End-user client AAA client
490
Cisco Secure
490
Access Control Server
490
External user
490
Windows User Database
491
Trust Relationships
493
Domain-Qualified Usernames
498
UPN Usernames
498
EAP-TLS Domain Stripping
500
Machine Authentication
500
Machine Access Restrictions
503
Generic LDAP
516
User Database
517
Multiple LDAP Instances
517
Domain Filtering
518
LDAP Failover
520
LDAP Configuration Options
521
Novell NDS Database
533
User Contexts
535
ODBC Database
539
External User Database
542
Relational Database
543
Type Definitions
545
Procedure
546
PAP Procedure Output
549
EAP-TLS Procedure Output
552
Result Codes
553
Token Server User Databases
562
RADIUS-Enabled Token Servers
563
RSA SecurID Token Servers
568
Network Admission Control
573
NAC AAA Components
574
Posture Validation
575
Posture Tokens
576
NAC Databases
582
Policy Selection Options
585
Configuring a NAC Database
586
NAC Policies
588
Local Policies
589
About Local Policies
590
NAC Attribute Data Types
591
Rule Operators
592
Rule Configuration Options
596
Creating a Local Policy
597
External Policies
600
Creating an External Policy
604
Editing a Policy
606
Deleting a Policy
608
Step 5 Click Delete Policy
609
Step 6 Click Submit
609
Unknown User Policy
611
\username. The
617
Added Authentication Latency
619
:username
620
Unknown User Policy Options
623
Database Search Order
624
User Group Mapping and
629
Specification
629
• Windows domains
632
• Novell NDS
632
• Generic LDAP
632
Group Mapping Order
633
NAC Group Mapping
641
Troubleshooting
645
Administration Issues
646
Browser Issues
648
Cisco IOS Issues
649
Database Issues
651
Dial-in Connection Issues
654
Debug Issues
658
Proxy Issues
659
MaxSessions Issues
660
Report Issues
661
Third-Party Server Issues
663
User Authentication Issues
664
• If you have RADIUS/TACACS
665
Note Some attributes are not
666
TACACS+ Attribute-Value Pairs
667
TACACS+ AV Pairs
668
Cisco IOS AV Pair Dictionary
669
TACACS+ Accounting AV Pairs
670
Dictionary of RADIUS VSA
686
• Cisco IOS
700
• Cisco VPN 3000
700
• Ascend
700
Note The MS-CHAP-MPPE-Keys
702
Table C-9 Nortel RADIUS VSAs
715
CSUtil Database Utility
717
CSUtil.exe Syntax
718
CSUtil.exe Options
719
CSUtil.exe -x
721
Step 2 Type:
722
CSUtil.exe -r config filename
724
Step 3 Type:
726
Dump File
727
ONLINE or OFFLINE Statement
733
ADD Statements
734
UPDATE Statements
735
DELETE Statements
737
ADD_NAS Statements
737
DEL_NAS Statements
739
Import File Example
740
Decoding Error Numbers
743
Recalculating CRC Values
744
Listing Custom RADIUS Vendors
748
RADIUS Vendor/VSA Import File
750
Vendor and VSA Set Definition
751
Attribute Definition
752
Enumeration Definition
754
PAC File Generation
756
PAC File Options and Examples
757
Generating PAC Files
759
Posture Validation Attributes
760
CSUtil.exe -addavp filename
765
CSUtil.exe -delavp vendor-ID
767
VPDN Processing
781
VPDN Process
782
Figure E-10
786
RDBMS Synchronization Import
787
Definitions
787
Action Codes
790
PIX Shell (pixshell)
799
NAS01,tty0,0898-69696969
801
User Settings
805
User-Specific Attributes
818
User-Defined Attributes
820
Group-Specific Attributes
821
An Example of accountActions
822
Internal Architecture
825
Windows Registry
826
CSDBSync
828
Monitoring
829
Recording
830
Notification
831
Response
831
CSTacacs and CSRadius
832
Comentarios a estos manuales
Sin comentarios
Publish
Relacionado con productos y manuales para Ordenadores Cisco 3.3
Ordenadores Cisco 6200 Manual de usuario
(32 paginas)
Ordenadores Cisco Cisco Access Registrar 3.5 Manual de usuario
(80 paginas)
Ordenadores Cisco Level Two Technical Support for BBSM Document ID: Manual de usuario
(14 paginas)
Ordenadores Cisco SFS 7008P Manual de usuario
(34 paginas)
Ordenadores Cisco ONS 15200 Manual de usuario
(74 paginas)
Ordenadores Cisco SFS 7008 Manual de usuario
(108 paginas)
Ordenadores Cisco TOPSPIN SFS 3001 Manual de usuario
(30 paginas)
Ordenadores Cisco OL-6349-01 Manual de usuario
(12 paginas)
Imprimir documento
Imprimir pagina 628
Comentarios a estos manuales