User Guide for Cisco Secure ACS Appliance 3.2
Index

Table Of Contents


A - B - C - D - E - F - G - H - I - L - M - N - O - P - Q - R - S - T - U - V - W - Z

Index

A

AAA

See also AAA clients

See also AAA servers

definition 1-1

pools for IP address assignment 7-10

AAA clients

AAA Clients table 4-2

adding and configuring 4-17

configuration 4-11

definition 1-5

deleting 4-21

editing 4-20

interaction with AAA servers 1-5

IP pools 7-10

multiple IP addresses for 4-12

searching for 4-9

supported Cisco AAA clients 1-2

timeout values 14-8

AAA servers

AAA Servers table 4-2

adding 4-25

configuring 4-22

deleting 4-28

editing 4-27

enabling in interface (table) 3-5

functions and concepts 1-4

in distributed systems 4-3

master 9-3

overview 4-22

primary 9-3

replicating 9-3

searching for 4-9

secondary 9-3

troubleshooting A-1

access devices 1-5

accessing Cisco Secure ACS

how to 1-29

URL 1-27

with SSL enabled 1-27

access policies

See administrative access policies

accountActions File 9-28

account disablement

Account Disabled check box 7-4

manual 7-55

resetting 7-57

setting options for 7-19

accounting

See also logging

logs 11-5

overview 1-20

ACLs

See downloadable IP ACLs

action codes

for initializing and modifying access filters E-15

for modifying network configuration E-27

for modifying TACACS+ and RADIUS settings E-19

for setting and deleting values E-5

in accountActions E-5

ActivCard user databases

configuring 13-61

group mappings 15-2

RADIUS-based group specifications 15-13

Administration Audit log

viewing 11-14

administration logs 11-7

administrative access policies

See also administrators

configuring 12-14

limits 12-11

options 12-12

overview 2-13

administrative sessions

and HTTP proxy 1-28

network environment limitations of 1-27

session policies 12-16

through firewalls 1-28

through NAT (network address translation) 1-29

administrators

See also Administration Audit log

See also Administration Control

See also administrative access policies

adding 12-6

deleting 12-11

editing 12-8

locked out 12-10

locking out 12-17

overview 12-2

privileges 12-3

separation from general users 2-15

troubleshooting A-2

unlocking 12-10

advanced options in interface 3-6

age-by-date rules for groups 6-24

Aironet

AAA client configuration 4-14

RADIUS parameters for group 6-39

RADIUS parameters for user 7-39

appliance

configuration 8-22

hardware specifications 1-2

Appliance Status report

description 11-8

viewing 11-11

ARAP

compatible databases 1-9

in User Setup 7-4

protocol supported 1-10

architectural components of Cisco Secure ACS F-1

ASCII/PAP

compatible databases 1-9

protocol supported 1-10

attributes

enabling in interface 3-2

group-specific (table) E-37

logging of user data 11-2

per-group 3-2

per-user 3-2

user-specific (table) E-36

attribute-value pairs

See AV (attribute value) pairs

authentication

configuration 10-25

denying external user databases 14-11

options 10-32

overview 1-8

request handling 14-4

via external user databases 13-5

Windows 13-10

authorization 1-16

authorization sets

See command authorization sets

AV (attribute value) pairs

See also RADIUS VSAs (vendor specific attributes)

RADIUS

Cisco IOS C-2

IETF C-12

TACACS+

accounting B-4

general B-1

Axent user databases

See PassGo user databases

B

backups

components backed up 8-9

disabling scheduled 8-13

filenames 8-14

options 8-9

overview 8-8

performing manually 8-10

reports 8-9

scheduled vs. manual 8-8

scheduling 8-11

vs. replication 9-10

browsers

See also HTML interface

troubleshooting A-4

C

cab file 8-24

callback options

in Group Setup 6-6

in User Setup 7-8

cascading replication 9-6, 9-12

certificate database for LDAP servers 13-47

certification

See also EAP-TLS

See also PEAP

adding certificate authority certificates 10-36

background 10-1

backups 8-9

certificate enrollment 10-33

certificate signing request generation 10-39

editing the certificate trust list 10-38

installing certificate 10-33

replacing certificate 10-40

updating certificate 10-40

CHAP

compatible databases 1-9

in User Setup 7-4

protocol supported 1-10

Cisco IOS

RADIUS

AV (attribute value) pairs C-2

group attributes 6-38

user attributes 7-38

TACACS+ AV (attribute value) pairs B-1

troubleshooting A-5

Cisco Secure ACS Active Service Management

overview 8-17

Cisco Secure ACS Active Service Monitoring log

viewing 11-14

Cisco Secure ACS administration overview 1-21

Cisco Secure ACS Backup and Restore log

viewing 11-14

Cisco Secure ACS backups

See backups

Cisco Secure ACS service management

event logging configuration 8-20

system monitoring

configuring 8-19

options 8-18

Cisco Secure ACS Service Monitoring log

CSV (comma-separated values) file directory 11-26

Cisco Secure ACS system restore

See restore

CiscoSecure Authentication Agent 1-15, 6-20

CiscoSecure database replication

See replication

CiscoSecure user database

See also databases

overview 13-2

codes

See action codes

command authorization sets

See also shell command authorization sets

adding 5-19

configuring 5-15, 5-19

deleting 5-23

editing 5-22

overview 5-15

pattern matching 5-19

PIX command authorization sets 5-15

conventions xxv

CRYPTOCard user databases

configuring 13-61

group mappings 15-2

RADIUS-based group specifications 15-13

CSAdmin F-2

CSAuth F-3

CSDBSync 9-28, F-3

CSLog F-4

CSMon

See also Cisco Secure ACS Active Service Management

configuration F-4

failure events

customer-defined actions F-7

predefined actions F-7

functions F-4

log F-6

overview F-4

CSRadius F-7

CSTacacs F-7

CSV (comma-separated values) files

downloading 11-14

viewing 11-14

custom attributes

in group-level TACACS+ settings 6-29

in user-level TACACS+ settings 7-22

D

database group mappings

configuring

for token servers 15-3

for Windows domains 15-8

no access groups 15-6

order 15-11

deleting

group set mappings 15-10

Windows domain configurations 15-11

in external user databases 15-1

overview 15-1

Database Replication log

description 11-12

viewing 11-14

databases

authentication protocol compatibility of 1-9

CiscoSecure user database 13-2

deleting 13-64

deployment considerations 2-16

external

See also external user databases

See also unknown user policies

group mappings

See database group mappings

performance 14-8

remote agent selection 13-23

replication

See replication

search order 14-10

search process 14-9, 14-10

selecting user databases 13-1

synchronization

See RDBMS synchronization

token cards

See token servers

troubleshooting A-6, A-16

types

See ActivCard user databases

See CRYPTOCard user databases

See generic LDAP user databases

See LEAP proxy RADIUS user databases

See Novell NDS user databases

See PassGo user databases

See RADIUS user databases

See SafeWord user databases

unknown users 14-2

user

import methods 13-2

Windows user databases 13-6

date and time setting 8-22

date format control 8-3

debug logs

detail levels 11-27

frequency 11-27

troubleshooting A-12

default group in Group Setup 6-2

default group mapping for Windows 15-6

default time-of-day/day-of-week specification 3-4

default time-of-day access settings for groups 6-5

deleting logged-in users 11-10

deployment

overview 2-1

sequence 2-17

device command sets

See command authorization sets

device groups

See network device groups

device management applications support 1-18

DHCP with IP pools 9-39

diagnostic logs 8-27

dial-in permission to users in Windows 13-23

dial-in troubleshooting A-8

dial-up networking clients 13-10

dial-up topologies 2-4

digital certificates

See certification

Disabled Accounts report

description 11-8

viewing 11-11

discovered users 14-2

distributed systems

See also proxy

AAA servers in 4-3

overview 4-3

settings

configuring 4-42

default entry 4-4

enabling in interface 3-5

distribution table

See Proxy Distribution Table

documentation

conventions xxv

objectives xxiii

online 1-31

organization xxiv

related xxvii

domain lists

configuring 13-29

inadvertent user lockouts 13-12, 13-26

overview 13-11

domain name and hostname configuration 8-23

domain names

Windows operating systems 13-10

downloadable IP ACLs

adding 5-4

assigning to groups 6-28

assigning to users 7-20

deleting 5-6

editing 5-5

enabling in interface

group-level 3-5

user-level 3-4

overview 5-2

draft-ietf-radius-tunnel-auth 1-6

E

EAP (Extensible Authentication Protocol)

overview 1-12

with Windows authentication 13-12

EAP-FAST

compatible databases 1-9

enabling 10-23

identity protection 10-13

logging 10-12

master keys

definition 10-13

states 10-14

master server 10-22

options 10-26

overview 10-12

PAC

automatic provisioning 10-17

definition 10-15

manual provisioning 10-18

refresh 10-19

states 10-17

phases 10-12

replication 10-20

EAP-TLS

See also certification

authentication configuration 10-25

comparison methods 10-4

compatible databases 1-9

domain stripping 13-13

enabling 10-5

limitations 10-5

options 10-29

overview 10-2

session resume 10-4

enable password options for TACACS+ 7-34

enable privilege options for groups 6-18

event logging 8-20

exception events F-6

Extensible Authentication Protocol

See EAP (Extensible Authentication Protocol)

external token servers

See token servers

external user databases

See also databases

authentication via 13-5

configuring 13-3

deleting configuration 13-64

latency factors 14-8

search order 14-8, 14-10

supported 1-9

turning off authentication from 14-11

unknown user policy 14-1

F

Failed Attempts log

configuring CSV 11-15

enabling

log 11-13

viewing 11-14

failed log-on attempts F-6

failure events

customer-defined actions F-7

predefined actions F-7

fallbacks on failed connection 4-6

finding users 7-54

firewalls

administering AAA servers through 1-22

troubleshooting A-16

FTP setup options 9-31

G

gateways D-3

generic LDAP user databases

authentication 13-30

certificate database downloading 13-47

configuring

database 13-42

options 13-36

directed authentications 13-32

domain filtering 13-32

failover 13-34

mapping database groups to AAA groups 15-4

multiple instances 13-31

organizational units and groups 13-32

Global Authentication Setup 10-32

grant dial-in permission to users 13-9, 13-23

greeting after login 6-23

group-level interface enabling

downloadable IP ACLs 3-5

network access restrictions 3-5

password aging 3-5

group-level network access restrictions

See network access restrictions

groups

See also network device groups

assigning users to 7-7

configuring RADIUS settings for

See RADIUS

Default Group 6-2, 15-6

enabling VoIP (Voice-over-IP) support for 6-4

listing all users in 6-53

mapping order 15-11

mappings 15-1

multiple mappings 15-5

no access groups 15-5

overriding settings 3-2

relationship to users 3-2

renaming 6-54

resetting usage quota counters for 6-53

settings for

callback options 6-6

configuration-specific 6-15

configuring common 6-3

device management command authorization sets 6-35

enable privilege 6-18

IP address assignment method 6-27

management tasks 6-52

max sessions 6-11

network access restrictions 6-7

password aging rules 6-20

PIX command authorization sets 6-33

shell command authorization sets 6-31

TACACS+ 6-2, 6-29

time-of-day access 6-5

token cards 6-17

usage quotas 6-13

setting up and managing 6-1

sort order within group mappings 15-5

GUI

See HTML interface

H

handle counts F-5

hard disk space F-5

Help 1-26

host and domain names configuration 8-23

host system state F-5

HTML interface

See also Interface Configuration

encrypting 12-13

logging off 1-30

overview 1-24

security 1-24

SSL 1-24

web server F-2

HTTP port allocation

configuring 12-14

overview 1-22

HTTPS 12-13

I

IETF 802.1x 1-12

inbound authentication 1-13

inbound password configuration 1-14

installation

related documentation xxvii

system requirements 2-2

troubleshooting A-13

Interface Configuration

See also HTML interface

advanced options 3-4

configuring 3-1

customized user data fields 3-3

security protocol options 3-9

IP addresses

in User Setup 7-9

multiple IP addresses for AAA client 4-12

requirement for CSTacacs and CSRadius F-7

setting assignment method for user groups 6-27

IP pools

address recovery 9-44

deleting 9-43

DHCP 9-39

editing IP pool definitions 9-41

enabling in interface 3-5

IP pools address recovery 3-5

overlapping 9-39, 9-40

refreshing 9-40

resetting 9-42

servers

adding IP pools 9-40

overview 9-38

replicating IP pools 9-38

user IP addresses 7-10

L

LAN manager 1-12

latency in networks 2-17

LDAP databases

See generic LDAP user databases

LEAP proxy RADIUS user databases

configuring external databases 13-56

group mappings 15-2

overview 13-55

RADIUS-based group specifications 15-13

list all users

in Group Setup 6-53

in User Setup 7-54

Logged-In Users report

deleting logged-in users 11-10

description 11-8

viewing 11-9

logging

See also Reports and Activity

accounting logs 11-5

configuring 11-16, 11-17

configuring remote agent logs 11-24, 11-25

debug log detail levels 11-27

diagnostic logs 8-27

domain names 11-2

dynamic administration reports 11-7

event logging 8-20

external user databases 11-2

format 11-1

overview 11-4

remote agent logging

configuration 11-22

options 11-22

remote logging

centralized 11-18

configuring 11-20

disabling 11-22

enabling 11-20

enabling in interface 3-5

local configuration 11-19

options 11-19

overview 11-17

replication 9-11

services

configuring service logs 11-27

list of logs generated 11-26

system logs 11-12

troubleshooting A-14

user data attributes 11-2

watchdog packets 11-3

logins

greeting upon 6-23

password aging dependency 6-22

login testing frequency 8-18

M

machine authentication

overview 13-13

with Microsoft Windows 13-16

management application support 1-18

mappings

database groups to AAA groups 15-4

database to AAA groups 15-2

master AAA servers 9-3

master key

definition 10-13

states 10-14

max sessions

enabling in interface 3-5

in Group Setup 6-11

in User Setup 7-15

overview 1-17

troubleshooting A-14

memory utilization F-5

monitoring

configuring 8-19

CSMon F-5

overview 8-18

services 8-26

MS-CHAP

compatible databases 1-9

configuring 10-25

overview 1-12

protocol supported 1-10

multiple group mappings 15-5

multiple IP addresses for AAA clients 4-12

N

NAR

See network access restrictions

NAS

See AAA clients

NDG

See network device groups

network access filters

See network access restrictions

network access quotas 1-18

network access restrictions

adding 5-9

configuring 5-9

deleting 5-14

editing 5-12

enabling in interface

group-level 3-4

user-level 3-4

in Group Setup 6-7

Interface Configuration 3-5

in User Setup 6-7, 7-10

overview 5-7

network access servers

See AAA clients

Network Configuration 4-1

network device groups

adding 4-37

assigning AAA clients to 4-38

assigning AAA servers to 4-38

configuring 4-36

deleting 4-40

enabling in interface 3-6

overview 1-22, 4-2

reassigning AAA clients to 4-39

reassigning AAA servers to 4-39

renaming 4-39

network devices

See AAA clients

searches for 4-9

network requirements 2-2

networks

latency 2-17

reliability 2-17

network time protocol

See NTP server

network topologies

deployment 2-4

wireless 2-7

notifications F-6

Novell NDS user databases

authentication 13-49

configuring 13-53

mapping database groups to AAA groups 15-4

options 13-51

user contexts 13-50

NTP server 8-22

O

Online Documentation 1-31

online Help

location in HTML interface 1-26

using 1-31

outbound password configuration 1-14

overview of Cisco Secure ACS 1-1

P

PAC

automatic provisioning 10-17

definition 10-15

manual provisioning 10-18

refresh 10-19

PAP

compatible databases 1-9

in User Setup 7-4

vs. ARAP 1-11

vs. CHAP 1-11

Passed Authentications log

configuring CSV (comma-separated values) 11-15

enabling CSV (comma-separated values) logging 11-13

viewing 11-14

PassGo user databases

configuring external databases 13-61

group mappings 15-2

RADIUS-based group specifications 15-13

password aging

age-by-uses rules 6-22

Cisco IOS release requirement for 6-20

EAP-FAST 13-22

interface configuration 3-5

in Windows databases 6-25

MS-CHAP 13-22

overview 1-15

PEAP 13-22

rules 6-20

passwords

See also password aging

CHAP/MS-CHAP/ARAP 7-6

configurations

caching 1-14

inbound passwords 1-14

outbound passwords 1-14

separate passwords 1-13

single password 1-13

token caching 1-14

token cards 1-13

expiration 6-22

local management 8-5

post-login greeting 6-23

protocols and user database compatibility 1-9

protocols supported 1-10

remote change of 8-5

user-changeable 1-15

validation options in System Configuration 8-5

pattern matching in command authorization 5-19

PEAP

See also certification

compatible databases 1-9

configuring 10-25

enabling 10-10

identity protection 10-8

options 10-25

overview 10-7

password aging 6-26

phases 10-7

with Unknown User Policy 10-9

performance monitoring F-5

performance specifications 1-2

per-group attributes

See also groups

enabling in interface 3-2

per-user attributes

enabling in interface 3-2

TACACS+/RADIUS in Interface Configuration 3-4

PIX ACLs

See downloadable IP ACLs

PIX command authorization sets

See command authorization sets

PIX Firewall troubleshooting A-16

PKI (public key infrastructure)

See certification

port 2002

in HTTP port ranges 12-13, F-2

in URLs 1-27

port allocation

See HTTP port allocation

ports

See also HTTP port allocation

See also port 2002

RADIUS 1-6

requirements 2-2

TACACS+ 1-6

PPP password aging 6-20

processor utilization F-5

profile components

See shared profile components

proxy

See also Proxy Distribution Table

character strings

defining 4-6

stripping 4-6

configuring 4-41

in enterprise settings 4-7

overview 4-4

sending accounting packets 4-7

troubleshooting A-13

Proxy Distribution Table

See also proxy

adding entries 4-43

configuring 4-42

default entry 4-4, 4-42

deleting entries 4-46

editing entries 4-45

match order sorting 4-44

overview 4-3, 4-42

Q

quotas

See network access quotas

See usage quotas

R

RADIUS

See also RADIUS VSAs (vendor specific attributes)

attributes

See also RADIUS VSAs (vendor specific attributes)

in User Setup 7-36

AV (attribute value) pairs

See also RADIUS VSAs (vendor specific attributes)

Cisco IOS C-2

IETF C-12

overview C-1

Cisco Aironet 4-14

IETF

in Group Setup 6-37

interface configuration 3-16

in User Setup 7-37

interface configuration overview 3-11

password aging 6-25

ports 1-6

specifications 1-6

troubleshooting A-18

tunneling packets 4-19

vs. TACACS+ 1-6

RADIUS Accounting log

configuring CSV (comma-separated values) 11-14, 11-15

enabling CSV (comma-separated values) 11-13

RADIUS user databases

configuring 13-61

group mappings 15-2

RADIUS-based group specifications 15-13

RADIUS VSAs (vendor specific attributes)

Ascend

in Group Setup 6-41

in User Setup 7-41

supported attributes C-30

Cisco Aironet

in Group Setup 6-39

in User Setup 7-39

Cisco BBSM (Building Broadband Service Manager)

in Group Setup 6-50

in User Setup 7-51

supported attributes C-12

Cisco IOS/PIX

in Group Setup 6-38

interface configuration 3-17

in User Setup 7-38

supported attributes C-5

Cisco VPN 3000

in Group Setup 6-42

in User Setup 7-43

supported attributes C-7

Cisco VPN 5000

in Group Setup 6-44

in User Setup 7-45

supported attributes C-11

custom

about 9-27

in Group Setup 6-51

in User Setup 7-52

Juniper

in Group Setup 6-49

in User Setup 7-50

supported attributes C-43

Microsoft

in Group Setup 6-45

in User Setup 7-46

supported attributes C-27

Nortel

in Group Setup 6-47

in User Setup 7-48

supported attributes C-42

overview C-1

user-defined

about 9-27

action codes for E-19

replicating 9-27

RDBMS synchronization

accountActions file

as a transaction queue 9-28

overview 9-28

configuring 9-34

CSDBSync 9-28

disabling 9-37

enabling in interface 3-5

FTP configuration 9-31

FTP setup options 9-31

group-related configuration 9-26

import definitions E-1

log

description 11-12

viewing 11-14

network configuration 9-26

overview 9-24

partners 9-32

preparations for 9-29

scheduling options 9-32

starting manually 9-32

user-related configuration 9-25

rejection mode

general 14-4

Windows user databases 14-5

related documentation xxvii

reliability of network 2-17

remote access policies 2-12

remote agent logging

configuration 11-22

options 11-22

remote agents

adding 4-32

configuring 4-29

deleting 4-35

editing 4-34

options 4-30

overview 4-29

Remote Agents table 4-2

selecting for authentication 13-23

remote logging

centralized 11-18

configuring remote agent logs 11-23

disabling 11-22

local configuration 11-19

options 11-19

overview 11-17

replication

backups recommended (Caution) 9-10

cascading 9-6, 9-12

certificates 9-3

client configuration 9-16

components

overwriting (Caution) 9-16

overwriting (Note) 9-11

selecting 9-11

configuring 9-20

corrupted backups (Caution) 9-10

disabling 9-23

EAP-FAST 10-20

frequency 9-7

immediate 9-18

implementing primary and secondary setups 9-15

important considerations 9-8

in System Configuration 9-20

interface configuration 3-5

IP pools 9-3, 9-38

logging 9-11

manual initiation 9-18

master AAA servers 9-3

notifications 9-23

options 9-11

overview 9-2

partners

configuring 9-22

options 9-12

process 9-4

scheduling 9-20

scheduling options 9-12

selecting data 9-11

user-defined RADIUS vendors 9-9

vs. backup 9-10

Reports and Activity

See also logging

configuring 11-16, 11-17

CSV logs 11-12

in interface 1-26

overview 11-4

request handling

general 14-4

Windows user databases 14-5

requirements

network 2-2

system installation 2-2

resource consumption F-5

restarting services 8-2

restore

components restored

configuring 8-15

overview 8-15

filenames 8-14

in System Configuration 8-13

overview 8-14

performing 8-15

reports 8-15

RFC2138 1-6

RFC2139 1-6

RSA user database group mappings 15-2

S

SafeWord user databases

configuring 13-61

group mappings 15-2

RADIUS-based group specifications 15-13

search order of external user databases 14-10

security policies 2-13

security protocols

Cisco AAA client devices 1-2

CSRadius F-7

CSTacacs F-7

interface options 3-9

RADIUS 1-6, C-1

TACACS+

custom commands 3-9

overview 1-6

time-of-day access 3-8

service control in System Configuration 11-27

Service Monitoring log

See Cisco Secure ACS Service Monitoring log

services

determining status of 8-2

logs

configuring 11-27

list of logs generated 11-26

management 8-17

monitoring 8-26

overview 1-4, F-1

starting 8-2

stopping 8-2

session policies

configuring 12-17

options 12-16

overview 12-16

shared profile components

See also command authorization sets

See also network access restrictions

downloadable IP ACLs 5-2

overview 5-1

shared secret F-7

shell command authorization sets

See also command authorization sets

in Group Setup 6-31

in User Setup 7-25

single password configurations 1-13

SMTP (simple mail-transfer protocol) F-6

specifications

RADIUS

RFC2138 1-6

RFC2139 1-6

system performance 1-2, 1-3

TACACS+ 1-6

SSL (secure socket layer) 12-13

starting services 8-2

static IP addresses 7-9

stopping services 8-2

supplementary user information

in User Setup 7-5

setting 7-5

support page 8-24

synchronization

See RDBMS synchronization

system

configuration

advanced 9-1

authentication 10-1

basic 8-1

certificates 10-1

health F-5

messages in interface 1-26

services

See services

system installation requirements 2-2

system monitoring

See monitoring

technical support file 8-24

T

TACACS+

advanced TACACS+ settings

in Group Setup 6-2

in User Setup 7-32

AV (attribute value) pairs

accounting B-4

general B-1

custom commands 3-9

enable password options for users 7-34

enable privilege options 7-32

interface configuration 3-7

interface options 3-9

outbound passwords for users 7-36

ports 1-6

SENDAUTH 1-14

settings

in Group Setup 6-2, 6-29

in User Setup 7-21, 7-22

specifications 1-6

time-of-day access 3-8

troubleshooting A-18

vs. RADIUS 1-6

TACACS+ Accounting log

configuring CSV (comma-separated values) 11-15

enabling CSV (comma-separated values) 11-13

viewing 11-14

TACACS+ Administration log

configuring CSV (comma-separated values) 11-15

enabling CSV (comma-separated values) 11-13

viewing 11-14

Telnet

See also command authorization sets

password aging 6-20

test login frequency 8-18

thread used F-6

time and date setting 8-22

time-of-day/day-of-week specification enablement 3-4

timeout values on AAA clients 14-8

TLS (transport level security)

See certification

token caching 1-14, 13-59

token cards

password configuration 1-13

settings in Group Setup 6-17

token servers

ISDN terminal adapters 13-59

overview 13-58

supported servers 1-9

token caching 13-59

topologies

See network topologies

troubleshooting

AAA servers A-1

administration issues A-2

browser issues A-4

Cisco IOS issues A-5

database issues A-6

debug logs 11-25, A-12

dial-in issues A-8

installation issues A-13

max sessions issues A-14

PIX Firewall issues A-16

proxy issues A-13

RADIUS issues A-18

report issues A-14

TACACS+ issues A-18

third-party server issues A-16

upgrade issues A-13

user issues A-17

trust lists

See certification

trust relationships 13-9

U

unknown service user setting 7-31

unknown user policies

See also unknown users

configuring 14-10

in external user databases 14-10

overview 14-9

unknown users

See also unknown user policies

authentication processing 14-8

handling methods 14-2

network access authorization 14-9

update packets

See watchdog packets

upgrade

applying 8-35

distribution server requirements 8-29

overview 8-28

process 8-30

transferring 8-32

troubleshooting A-13

usage quotas

in Group Setup 6-13

in Interface Configuration 3-5

in User Setup 7-17

overview 1-18

resetting

for groups 6-53

for single users 7-57

user-changeable passwords

overview 1-15

with Windows user databases 13-22

User Data Configuration 3-3

user groups

See groups

user-level

See also per-user attributes

downloadable ACLs interface 3-4

network access restrictions

See also network access restrictions

enabling in interface 3-4

users

See also User Setup

adding

basic steps 7-3

methods 13-2

assigning client IP addresses to 7-9

assigning to a group 7-7

callback options 7-8

configuring 7-2

configuring device management command authorization sets for 7-29

configuring PIX command authorization sets for 7-28

configuring shell command authorization sets for 7-25

customized data fields 3-3

data configuration

See User Data Configuration

deleting 11-10

deleting accounts 7-56

disabling accounts 7-4

finding 7-54

import methods 13-2

in multiple databases 14-6

in multiple domains 14-6

listing all users 7-54

number allowed 2-16

RDBMS synchronization 9-25

relationship to groups 3-2

resetting accounts 7-57

saving settings 7-59

supplementary information 7-5

troubleshooting A-17

types

discovered 14-3

known 14-2

unknown 14-2

VPDN dialup D-2

User Setup

account management tasks 7-53

basic options 7-2

configuring 7-2

deleting user accounts 7-56

saving settings 7-59

Users in Group button 6-53

V

validation of passwords 8-5

Vasco user databases

group mappings 15-2

RADIUS-based group specifications 15-13

vendor-specific attributes

See RADIUS VSAs (vendor specific attributes)

viewing logs and reports

See logging

VoIP (Voice-over-IP)

accounting configuration 8-21

accounting configuration in Interface Configuration 3-6

Accounting log

configuring 11-15

enabling csv log 11-13

viewing 11-14

enabling in interface 3-6

group settings in Interface Configuration 3-6

in Group Setup 6-4

VPDN

advantages 2-10

authentication process D-1

domain authorization D-2

home gateways D-3

IP addresses D-3

tunnel IDs D-3

users D-2

VSAs

See RADIUS VSAs (vendor specific attributes)

W

warning events F-5, F-7

watchdog packets

configuring on AAA clients 4-19

configuring on AAA servers 4-26

logging 11-3

web servers F-2

Windows operating systems

authentication order 14-6

dial-up networking 13-10

dial-up networking clients

domain field 13-10

password field 13-10

username field 13-10

Domain List effect 14-6

domains

domain names 13-10, 14-5

trusted 13-10

rejection mode 14-5

request handling 14-5

user databases

configuring 13-29

Windows user databases

Active Directory 13-23

Domain list

inadvertent user lockouts 13-26

domain mapping 15-8

domains

trusted 13-9

grant dial-in permission to users 13-9, 13-23

group mappings

editing 15-8

no access groups 15-6

remapping 15-8

mapping database groups to AAA groups 15-4

overview 13-6

password aging 6-25

passwords 1-10

trust relationships 13-9

user-changeable passwords 13-22

user manager 13-23

wireless network topologies 2-7

Z