Americas HeadquartersCisco Systems, Inc.170 West Tasman DriveSan Jose, CA 95134-1706 USAhttp://www.cisco.comTel: 408 526-4000800 553-NETS (6387)Fax: 4
ContentsxUser Guide for Cisco Secure Access Control System 5.4OL-26225-01Managing Authorizations and Permissions 9-17Creating, Duplicating, and Editin
5-4User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 5 Understanding My Workspace Using the Web Interface• Common Errors,
5-5User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 5 Understanding My Workspace Using the Web InterfaceNote The license
5-6User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 5 Understanding My Workspace Using the Web InterfaceWeb Interface Des
5-7User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 5 Understanding My Workspace Using the Web InterfaceNavigation PaneUs
5-8User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 5 Understanding My Workspace Using the Web InterfaceTo hide the navig
5-9User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 5 Understanding My Workspace Using the Web Interface• Secondary Windo
5-10User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 5 Understanding My Workspace Using the Web InterfaceTable 5-5 Common
5-11User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 5 Understanding My Workspace Using the Web InterfaceTree table pages
5-12User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 5 Understanding My Workspace Using the Web InterfaceFilteringLarge l
5-13User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 5 Understanding My Workspace Using the Web InterfaceFor pages that d
ContentsxiUser Guide for Cisco Secure Access Control System 5.4OL-26225-01Configuring a Group Mapping Policy 10-27Configuring Group Mapping Policy Rul
5-14User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 5 Understanding My Workspace Using the Web InterfaceFigure 5-9 Secon
5-15User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 5 Understanding My Workspace Using the Web InterfaceFigure 5-10 Tran
5-16User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 5 Understanding My Workspace Using the Web InterfaceSchedule BoxesSc
5-17User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 5 Understanding My Workspace Using the Web InterfaceDirectly above t
5-18User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 5 Understanding My Workspace Importing and Exporting ACS Objects thr
5-19User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 5 Understanding My Workspace Importing and Exporting ACS Objects thr
5-20User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 5 Understanding My Workspace Importing and Exporting ACS Objects thr
5-21User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 5 Understanding My Workspace Importing and Exporting ACS Objects thr
5-22User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 5 Understanding My Workspace Importing and Exporting ACS Objects thr
5-23User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 5 Understanding My Workspace Importing and Exporting ACS Objects thr
ContentsxiiUser Guide for Cisco Secure Access Control System 5.4OL-26225-01Adding Tabs to the Dashboard 11-6Adding Applications to Tabs 11-7Renaming T
5-24User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 5 Understanding My Workspace Importing and Exporting ACS Objects thr
5-25User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 5 Understanding My Workspace Common ErrorsCommon ErrorsYou might enc
5-26User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 5 Understanding My Workspace Common ErrorsError Message The item you
5-27User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 5 Understanding My Workspace AccessibilitySystem Failure ErrorsSyste
5-28User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 5 Understanding My Workspace Accessibility• Color used as an enhance
CHAPTER6-1User Guide for Cisco Secure Access Control System 5.4OL-26225-016Post-Installation Configuration TasksThis chapter provides a set of configu
6-2User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 6 Post-Installation Configuration Tasks Configuring ACS to Perform Sy
6-3User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 6 Post-Installation Configuration Tasks Configuring ACS to Perform Sy
6-4User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 6 Post-Installation Configuration Tasks Configuring ACS to Manage Acc
6-5User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 6 Post-Installation Configuration Tasks Configuring ACS to Monitor an
ContentsxiiiUser Guide for Cisco Secure Access Control System 5.4OL-26225-01CHAPTER 13 Managing Reports 13-1Working with Favorite Reports 13-3Adding R
6-6User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 6 Post-Installation Configuration Tasks Configuring ACS to Monitor an
CHAPTER7-1User Guide for Cisco Secure Access Control System 5.4OL-26225-017Managing Network ResourcesThe Network Resources drawer defines elements wit
7-2User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 7 Managing Network Resources Network Device GroupsNetwork Device Grou
7-3User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 7 Managing Network Resources Network Device GroupsStep 4 Click Submit
7-4User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 7 Managing Network Resources Network Device GroupsCreating, Duplicati
7-5User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 7 Managing Network Resources Network Devices and AAA ClientsDeleting
7-6User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 7 Managing Network Resources Network Devices and AAA ClientsYou must
7-7User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 7 Managing Network Resources Network Devices and AAA Clients–Descript
7-8User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 7 Managing Network Resources Network Devices and AAA ClientsStep 1 Ch
7-9User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 7 Managing Network Resources Network Devices and AAA ClientsThe Opera
ContentsxivUser Guide for Cisco Secure Access Control System 5.4OL-26225-01Formatting String Data 13-33Formatting Custom String Data 13-33Formatting D
7-10User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 7 Managing Network Resources Network Devices and AAA ClientsExportin
7-11User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 7 Managing Network Resources Network Devices and AAA ClientsThe firs
7-12User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 7 Managing Network Resources Network Devices and AAA ClientsIP Range
7-13User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 7 Managing Network Resources Network Devices and AAA ClientsSingle C
7-14User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 7 Managing Network Resources Network Devices and AAA ClientsDisplayi
7-15User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 7 Managing Network Resources Network Devices and AAA ClientsIP Range
7-16User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 7 Managing Network Resources Network Devices and AAA ClientsRADIUS S
7-17User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 7 Managing Network Resources Configuring a Default Network DeviceRel
7-18User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 7 Managing Network Resources Configuring a Default Network DeviceCho
7-19User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 7 Managing Network Resources Working with External Proxy ServersRela
ContentsxvUser Guide for Cisco Secure Access Control System 5.4OL-26225-01Hiding or Displaying Detail Rows in Groups or Sections 13-68Working with Fil
7-20User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 7 Managing Network Resources Working with External Proxy ServersStep
7-21User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 7 Managing Network Resources Working with OCSP ServicesNote If you w
7-22User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 7 Managing Network Resources Working with OCSP Services• Unknown —Th
7-23User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 7 Managing Network Resources Working with OCSP ServicesFailback To P
7-24User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 7 Managing Network Resources Working with OCSP ServicesStep 4 Click
CHAPTER8-1User Guide for Cisco Secure Access Control System 5.4OL-26225-018Managing Users and Identity StoresOverviewACS manages your network devices
8-2User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 8 Managing Users and Identity Stores OverviewFixed components are:• N
8-3User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 8 Managing Users and Identity Stores OverviewIdentity Stores with Two
8-4User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 8 Managing Users and Identity Stores Managing Internal Identity Store
8-5User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 8 Managing Users and Identity Stores Managing Internal Identity Store
ContentsxviUser Guide for Cisco Secure Access Control System 5.4OL-26225-01Viewing Scheduled Jobs 15-12Viewing Process Status 15-14Viewing Data Upgrad
8-6User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 8 Managing Users and Identity Stores Managing Internal Identity Store
8-7User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 8 Managing Users and Identity Stores Managing Internal Identity Store
8-8User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 8 Managing Users and Identity Stores Managing Internal Identity Store
8-9User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 8 Managing Users and Identity Stores Managing Internal Identity Store
8-10User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 8 Managing Users and Identity Stores Managing Internal Identity Stor
8-11User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 8 Managing Users and Identity Stores Managing Internal Identity Stor
8-12User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 8 Managing Users and Identity Stores Managing Internal Identity Stor
8-13User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 8 Managing Users and Identity Stores Managing Internal Identity Stor
8-14User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 8 Managing Users and Identity Stores Managing Internal Identity Stor
8-15User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 8 Managing Users and Identity Stores Managing Internal Identity Stor
ContentsxviiUser Guide for Cisco Secure Access Control System 5.4OL-26225-01Configuring Identity Policy Rule Properties 16-18Administrator Authorizati
8-16User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 8 Managing Users and Identity Stores Managing Internal Identity Stor
8-17User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 8 Managing Users and Identity Stores Managing Internal Identity Stor
8-18User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 8 Managing Users and Identity Stores Managing Internal Identity Stor
8-19User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 8 Managing Users and Identity Stores Managing Internal Identity Stor
8-20User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 8 Managing Users and Identity Stores Managing Internal Identity Stor
8-21User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 8 Managing Users and Identity Stores Managing Internal Identity Stor
8-22User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 8 Managing Users and Identity Stores Managing External Identity Stor
8-23User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 8 Managing Users and Identity Stores Managing External Identity Stor
8-24User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 8 Managing Users and Identity Stores Managing External Identity Stor
8-25User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 8 Managing Users and Identity Stores Managing External Identity Stor
ContentsxviiiUser Guide for Cisco Secure Access Control System 5.4OL-26225-01Creating, Duplicating, Editing, and Deleting Software Repositories 17-24M
8-26User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 8 Managing Users and Identity Stores Managing External Identity Stor
8-27User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 8 Managing Users and Identity Stores Managing External Identity Stor
8-28User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 8 Managing Users and Identity Stores Managing External Identity Stor
8-29User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 8 Managing Users and Identity Stores Managing External Identity Stor
8-30User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 8 Managing Users and Identity Stores Managing External Identity Stor
8-31User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 8 Managing Users and Identity Stores Managing External Identity Stor
8-32User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 8 Managing Users and Identity Stores Managing External Identity Stor
8-33User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 8 Managing Users and Identity Stores Managing External Identity Stor
8-34User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 8 Managing Users and Identity Stores Managing External Identity Stor
8-35User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 8 Managing Users and Identity Stores Managing External Identity Stor
ContentsxixUser Guide for Cisco Secure Access Control System 5.4OL-26225-01Configuring Global Logging Categories 18-25Configuring Per-Instance Logging
8-36User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 8 Managing Users and Identity Stores Managing External Identity Stor
8-37User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 8 Managing Users and Identity Stores Managing External Identity Stor
8-38User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 8 Managing Users and Identity Stores Managing External Identity Stor
8-39User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 8 Managing Users and Identity Stores Managing External Identity Stor
8-40User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 8 Managing Users and Identity Stores Managing External Identity Stor
8-41User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 8 Managing Users and Identity Stores Managing External Identity Stor
8-42User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 8 Managing Users and Identity Stores Managing External Identity Stor
8-43User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 8 Managing Users and Identity Stores Managing External Identity Stor
8-44User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 8 Managing Users and Identity Stores Managing External Identity Stor
8-45User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 8 Managing Users and Identity Stores Managing External Identity Stor
THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMM
ContentsxxUser Guide for Cisco Secure Access Control System 5.4OL-26225-01Session Access Requests (Device Administration [TACACS+]) A-2Command Authori
8-46User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 8 Managing Users and Identity Stores Managing External Identity Stor
8-47User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 8 Managing Users and Identity Stores Managing External Identity Stor
8-48User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 8 Managing Users and Identity Stores Managing External Identity Stor
8-49User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 8 Managing Users and Identity Stores Managing External Identity Stor
8-50User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 8 Managing Users and Identity Stores Managing External Identity Stor
8-51User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 8 Managing Users and Identity Stores Managing External Identity Stor
8-52User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 8 Managing Users and Identity Stores Managing External Identity Stor
8-53User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 8 Managing Users and Identity Stores Managing External Identity Stor
8-54User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 8 Managing Users and Identity Stores Managing External Identity Stor
8-55User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 8 Managing Users and Identity Stores Managing External Identity Stor
ContentsxxiUser Guide for Cisco Secure Access Control System 5.4OL-26225-01Private Keys and Passwords Backup B-13EAP-TLS Flow in ACS 5.4 B-13PEAPv0/1
8-56User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 8 Managing Users and Identity Stores Managing External Identity Stor
8-57User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 8 Managing Users and Identity Stores Managing External Identity Stor
8-58User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 8 Managing Users and Identity Stores Managing External Identity Stor
8-59User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 8 Managing Users and Identity Stores Managing External Identity Stor
8-60User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 8 Managing Users and Identity Stores Managing External Identity Stor
8-61User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 8 Managing Users and Identity Stores Managing External Identity Stor
8-62User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 8 Managing Users and Identity Stores Managing External Identity Stor
8-63User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 8 Managing Users and Identity Stores Managing External Identity Stor
8-64User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 8 Managing Users and Identity Stores Managing External Identity Stor
8-65User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 8 Managing Users and Identity Stores Managing External Identity Stor
ContentsxxiiUser Guide for Cisco Secure Access Control System 5.4OL-26225-01Authentication Protocol and Identity Store Compatibility B-36APPENDIX C Op
8-66User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 8 Managing Users and Identity Stores Managing External Identity Stor
8-67User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 8 Managing Users and Identity Stores Managing External Identity Stor
8-68User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 8 Managing Users and Identity Stores Managing External Identity Stor
8-69User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 8 Managing Users and Identity Stores Managing External Identity Stor
8-70User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 8 Managing Users and Identity Stores Managing External Identity Stor
8-71User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 8 Managing Users and Identity Stores Configuring CA CertificatesClic
8-72User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 8 Managing Users and Identity Stores Configuring CA CertificatesNote
8-73User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 8 Managing Users and Identity Stores Configuring CA CertificatesEdit
8-74User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 8 Managing Users and Identity Stores Configuring CA CertificatesStep
8-75User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 8 Managing Users and Identity Stores Configuring Certificate Authent
xxiiiUser Guide for Cisco Secure Access Control System 5.4OL-26225-01PrefaceRevised: November 13, 2013This guide describes how to use Cisco Secure Acc
8-76User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 8 Managing Users and Identity Stores Configuring Certificate Authent
8-77User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 8 Managing Users and Identity Stores Configuring Identity Store Sequ
8-78User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 8 Managing Users and Identity Stores Configuring Identity Store Sequ
8-79User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 8 Managing Users and Identity Stores Configuring Identity Store Sequ
8-80User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 8 Managing Users and Identity Stores Configuring Identity Store Sequ
8-81User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 8 Managing Users and Identity Stores Configuring Identity Store Sequ
8-82User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 8 Managing Users and Identity Stores Configuring Identity Store Sequ
CHAPTER9-1User Guide for Cisco Secure Access Control System 5.4OL-26225-019Managing Policy ElementsA policy defines the authentication and authorizati
9-2User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 9 Managing Policy Elements Managing Policy ConditionsYou can map user
9-3User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 9 Managing Policy Elements Managing Policy Conditions• Creating, Dupl
xxivUser Guide for Cisco Secure Access Control System 5.4OL-26225-01Preface Caution Means reader be careful. You are capable of doing something that
9-4User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 9 Managing Policy Elements Managing Policy ConditionsTo add date and
9-5User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 9 Managing Policy Elements Managing Policy ConditionsRelated Topics•
9-6User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 9 Managing Policy Elements Managing Policy ConditionsTo add custom co
9-7User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 9 Managing Policy Elements Managing Policy ConditionsNote The filters
9-8User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 9 Managing Policy Elements Managing Policy ConditionsThe device dicti
9-9User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 9 Managing Policy Elements Managing Policy ConditionsStep 5 Click Clo
9-10User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 9 Managing Policy Elements Managing Policy ConditionsNote To configu
9-11User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 9 Managing Policy Elements Managing Policy Conditions• Defining MAC
9-12User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 9 Managing Policy Elements Managing Policy ConditionsStep 2 Check th
9-13User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 9 Managing Policy Elements Managing Policy ConditionsNote To configu
xxvUser Guide for Cisco Secure Access Control System 5.4OL-26225-01PrefaceObtaining Documentation and Submitting a Service RequestFor information on o
9-14User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 9 Managing Policy Elements Managing Policy ConditionsDefining Name-B
9-15User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 9 Managing Policy Elements Managing Policy ConditionsCreating, Dupli
9-16User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 9 Managing Policy Elements Managing Policy Conditions• Check the che
9-17User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 9 Managing Policy Elements Managing Authorizations and PermissionsSt
9-18User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 9 Managing Policy Elements Managing Authorizations and Permissions•
9-19User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 9 Managing Policy Elements Managing Authorizations and Permissions•
9-20User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 9 Managing Policy Elements Managing Authorizations and PermissionsSt
9-21User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 9 Managing Policy Elements Managing Authorizations and PermissionsTa
9-22User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 9 Managing Policy Elements Managing Authorizations and PermissionsSp
9-23User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 9 Managing Policy Elements Managing Authorizations and PermissionsSt
xxviUser Guide for Cisco Secure Access Control System 5.4OL-26225-01Preface
9-24User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 9 Managing Policy Elements Managing Authorizations and PermissionsCr
9-25User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 9 Managing Policy Elements Managing Authorizations and PermissionsTh
9-26User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 9 Managing Policy Elements Managing Authorizations and PermissionsDe
9-27User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 9 Managing Policy Elements Managing Authorizations and PermissionsTa
9-28User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 9 Managing Policy Elements Managing Authorizations and PermissionsSt
9-29User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 9 Managing Policy Elements Managing Authorizations and PermissionsDe
9-30User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 9 Managing Policy Elements Managing Authorizations and PermissionsAf
9-31User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 9 Managing Policy Elements Managing Authorizations and PermissionsSt
9-32User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 9 Managing Policy Elements Managing Authorizations and PermissionsRe
9-33User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 9 Managing Policy Elements Managing Authorizations and Permissions–C
CHAPTER1-1User Guide for Cisco Secure Access Control System 5.4OL-26225-011Introducing ACS 5.4This section contains the following topics:• Overview of
9-34User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 9 Managing Policy Elements Managing Authorizations and PermissionsCo
CHAPTER10-1User Guide for Cisco Secure Access Control System 5.4OL-26225-0110Managing Access PoliciesIn ACS 5.4, policy drives all activities. Policie
10-2User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 10 Managing Access Policies Policy Creation FlowIn short, you must d
10-3User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 10 Managing Access Policies Policy Creation FlowPolicy Elements in t
10-4User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 10 Managing Access Policies Customizing a PolicyPolicy Creation Flow
10-5User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 10 Managing Access Policies Configuring the Service Selection Policy
10-6User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 10 Managing Access Policies Configuring the Service Selection Policy
10-7User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 10 Managing Access Policies Configuring the Service Selection Policy
10-8User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 10 Managing Access Policies Configuring the Service Selection Policy
10-9User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 10 Managing Access Policies Configuring the Service Selection Policy
1-2User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 1 Introducing ACS 5.4 ACS Distributed DeploymentACS provides advanced
10-10User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 10 Managing Access Policies Configuring the Service Selection Polic
10-11User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 10 Managing Access Policies Configuring Access ServicesConfiguring
10-12User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 10 Managing Access Policies Configuring Access ServicesStep 3 Edit
10-13User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 10 Managing Access Policies Configuring Access ServicesStep 2 Do on
10-14User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 10 Managing Access Policies Configuring Access ServicesDescription
10-15User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 10 Managing Access Policies Configuring Access ServicesStep 3 Click
10-16User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 10 Managing Access Policies Configuring Access ServicesConfiguring
10-17User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 10 Managing Access Policies Configuring Access ServicesAllow EAP-TL
10-18User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 10 Managing Access Policies Configuring Access ServicesAllow EAP-FA
10-19User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 10 Managing Access Policies Configuring Access ServicesAllow EAP-FA
1-3User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 1 Introducing ACS 5.4 ACS Licensing ModelACS 4.x did not provide incr
10-20User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 10 Managing Access Policies Configuring Access ServicesStep 3 Click
10-21User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 10 Managing Access Policies Configuring Access ServicesDeleting an
10-22User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 10 Managing Access Policies Configuring Access Service PoliciesConf
10-23User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 10 Managing Access Policies Configuring Access Service PoliciesIn t
10-24User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 10 Managing Access Policies Configuring Access Service PoliciesView
10-25User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 10 Managing Access Policies Configuring Access Service Policies• Cr
10-26User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 10 Managing Access Policies Configuring Access Service PoliciesTabl
10-27User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 10 Managing Access Policies Configuring Access Service PoliciesConf
10-28User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 10 Managing Access Policies Configuring Access Service PoliciesStep
10-29User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 10 Managing Access Policies Configuring Access Service Policies• De
iiiUser Guide for Cisco Secure Access Control System 5.4OL-26225-01CONTENTSPreface xxiiiAudience xxiiiDocument Conventions xxiiiDocumentation Updates
1-4User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 1 Introducing ACS 5.4 ACS Management Interfaces• ACS Web-based Interf
10-30User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 10 Managing Access Policies Configuring Access Service PoliciesConf
10-31User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 10 Managing Access Policies Configuring Access Service PoliciesTabl
10-32User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 10 Managing Access Policies Configuring Access Service PoliciesConf
10-33User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 10 Managing Access Policies Configuring Access Service PoliciesConf
10-34User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 10 Managing Access Policies Configuring Access Service PoliciesConf
10-35User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 10 Managing Access Policies Configuring Access Service PoliciesConf
10-36User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 10 Managing Access Policies Configuring Access Service PoliciesTo c
10-37User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 10 Managing Access Policies Configuring Access Service PoliciesTo c
10-38User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 10 Managing Access Policies Configuring Access Service PoliciesCrea
10-39User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 10 Managing Access Policies Configuring Access Service PoliciesDupl
1-5User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 1 Introducing ACS 5.4 Hardware Models Supported by ACS• Configuration
10-40User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 10 Managing Access Policies Configuring Access Service PoliciesStep
10-41User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 10 Managing Access Policies Configuring Compound ConditionsConfigur
10-42User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 10 Managing Access Policies Configuring Compound ConditionsNote Dyn
10-43User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 10 Managing Access Policies Configuring Compound ConditionsFigure 1
10-44User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 10 Managing Access Policies Configuring Compound ConditionsFigure 1
10-45User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 10 Managing Access Policies Configuring Compound ConditionsRelated
10-46User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 10 Managing Access Policies Security Group Access Control PagesRela
10-47User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 10 Managing Access Policies Security Group Access Control PagesRela
10-48User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 10 Managing Access Policies Security Group Access Control PagesNDAC
10-49User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 10 Managing Access Policies Security Group Access Control PagesRela
1-6User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 1 Introducing ACS 5.4 Hardware Models Supported by ACS
10-50User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 10 Managing Access Policies Security Group Access Control PagesNote
10-51User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 10 Managing Access Policies Maximum User SessionsNetwork Device Acc
10-52User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 10 Managing Access Policies Maximum User SessionsMax Session User S
10-53User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 10 Managing Access Policies Maximum User SessionsUnlimited is selec
10-54User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 10 Managing Access Policies Maximum User SessionsRelated topics• Ma
10-55User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 10 Managing Access Policies Maximum User SessionsThe Purge User Ses
10-56User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 10 Managing Access Policies Maximum User SessionsMaximum User Sessi
CHAPTER11-1User Guide for Cisco Secure Access Control System 5.4OL-26225-0111Monitoring and Reporting in ACSThe Monitoring and Reports drawer appears
11-2User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 11 Monitoring and Reporting in ACS Authentication Records and Detail
11-3User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 11 Monitoring and Reporting in ACS Dashboard PagesNote These tabs ar
CHAPTER2-1User Guide for Cisco Secure Access Control System 5.4OL-26225-012Migrating from ACS 4.x to ACS 5.4ACS 4.x stores policy and authentication i
11-4User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 11 Monitoring and Reporting in ACS Working with Portlets–Authenticat
11-5User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 11 Monitoring and Reporting in ACS Working with PortletsFigure 11-1
11-6User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 11 Monitoring and Reporting in ACS Configuring Tabs in the Dashboard
11-7User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 11 Monitoring and Reporting in ACS Configuring Tabs in the Dashboard
11-8User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 11 Monitoring and Reporting in ACS Configuring Tabs in the Dashboard
CHAPTER12-1User Guide for Cisco Secure Access Control System 5.4OL-26225-0112Managing AlarmsThe Monitoring feature in ACS generates alarms to notify y
12-2User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 12 Managing Alarms Understanding AlarmsSystem AlarmsSystem alarms no
12-3User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 12 Managing Alarms Viewing and Editing Alarms in Your InboxNotifying
12-4User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 12 Managing Alarms Viewing and Editing Alarms in Your InboxTime Dis
12-5User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 12 Managing Alarms Viewing and Editing Alarms in Your InboxConfigure
2-2User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 2 Migrating from ACS 4.x to ACS 5.4 Overview of the Migration Process
12-6User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 12 Managing Alarms Viewing and Editing Alarms in Your InboxFull Data
12-7User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 12 Managing Alarms Viewing and Editing Alarms in Your InboxNote The
12-8User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 12 Managing Alarms Viewing and Editing Alarms in Your InboxNote ACS
12-9User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 12 Managing Alarms Understanding Alarm SchedulesRelated Topics• Crea
12-10User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 12 Managing Alarms Understanding Alarm SchedulesStep 3 Click Submit
12-11User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 12 Managing Alarms Creating, Editing, and Duplicating Alarm Thresho
12-12User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 12 Managing Alarms Creating, Editing, and Duplicating Alarm Thresho
12-13User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 12 Managing Alarms Creating, Editing, and Duplicating Alarm Thresho
12-14User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 12 Managing Alarms Creating, Editing, and Duplicating Alarm Thresho
12-15User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 12 Managing Alarms Creating, Editing, and Duplicating Alarm Thresho
2-3User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 2 Migrating from ACS 4.x to ACS 5.4 Before You BeginNote You must ins
12-16User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 12 Managing Alarms Creating, Editing, and Duplicating Alarm Thresho
12-17User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 12 Managing Alarms Creating, Editing, and Duplicating Alarm Thresho
12-18User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 12 Managing Alarms Creating, Editing, and Duplicating Alarm Thresho
12-19User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 12 Managing Alarms Creating, Editing, and Duplicating Alarm Thresho
12-20User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 12 Managing Alarms Creating, Editing, and Duplicating Alarm Thresho
12-21User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 12 Managing Alarms Creating, Editing, and Duplicating Alarm Thresho
12-22User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 12 Managing Alarms Creating, Editing, and Duplicating Alarm Thresho
12-23User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 12 Managing Alarms Creating, Editing, and Duplicating Alarm Thresho
12-24User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 12 Managing Alarms Creating, Editing, and Duplicating Alarm Thresho
12-25User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 12 Managing Alarms Creating, Editing, and Duplicating Alarm Thresho
2-4User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 2 Migrating from ACS 4.x to ACS 5.4 Migrating from ACS 4.x to ACS 5.4
12-26User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 12 Managing Alarms Creating, Editing, and Duplicating Alarm Thresho
12-27User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 12 Managing Alarms Creating, Editing, and Duplicating Alarm Thresho
12-28User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 12 Managing Alarms Creating, Editing, and Duplicating Alarm Thresho
12-29User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 12 Managing Alarms Creating, Editing, and Duplicating Alarm Thresho
12-30User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 12 Managing Alarms Creating, Editing, and Duplicating Alarm Thresho
12-31User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 12 Managing Alarms Creating, Editing, and Duplicating Alarm Thresho
12-32User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 12 Managing Alarms Creating, Editing, and Duplicating Alarm Thresho
12-33User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 12 Managing Alarms Deleting Alarm ThresholdsRelated Topics• Viewing
12-34User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 12 Managing Alarms Configuring System Alarm SettingsConfiguring Sys
12-35User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 12 Managing Alarms Understanding Alarm Syslog TargetsUnderstanding
2-5User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 2 Migrating from ACS 4.x to ACS 5.4 Functionality Mapping from ACS 4.
12-36User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 12 Managing Alarms Understanding Alarm Syslog TargetsStep 4 Click S
CHAPTER13-1User Guide for Cisco Secure Access Control System 5.4OL-26225-0113Managing ReportsThe Monitoring and Report Viewer component of ACS collect
13-2User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 13 Managing Reports • Catalog—Monitoring and Reports > Reports &g
13-3User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 13 Managing Reports Working with Favorite ReportsThis chapter descri
13-4User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 13 Managing Reports Working with Favorite ReportsStep 5 Click Add to
13-5User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 13 Managing Reports Working with Favorite ReportsEditing Favorite Re
13-6User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 13 Managing Reports Sharing ReportsThe report is generated in the pa
13-7User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 13 Managing Reports Working with Catalog ReportsStep 7 Click Save.Th
13-8User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 13 Managing Reports Working with Catalog ReportsTACACS Authenticatio
13-9User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 13 Managing Reports Working with Catalog ReportsACS Log Information
2-6User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 2 Migrating from ACS 4.x to ACS 5.4 Functionality Mapping from ACS 4.
13-10User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 13 Managing Reports Working with Catalog ReportsNetwork Device Auth
13-11User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 13 Managing Reports Working with Catalog ReportsRunning Catalog Rep
13-12User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 13 Managing Reports Working with Catalog ReportsThe available repor
13-13User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 13 Managing Reports Working with Catalog ReportsNote You cannot del
13-14User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 13 Managing Reports Working with Catalog ReportsRelated Topics• Wor
13-15User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 13 Managing Reports Working with Catalog ReportsIdentity Group Ente
13-16User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 13 Managing Reports Working with Catalog ReportsCommand Accounting
13-17User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 13 Managing Reports Working with Catalog ReportsRelated Topics• Wor
13-18User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 13 Managing Reports Working with Catalog ReportsChanging Authorizat
13-19User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 13 Managing Reports Working with Catalog ReportsFigure 13-3 CoA Opt
2-7User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 2 Migrating from ACS 4.x to ACS 5.4 Common Scenarios in MigrationComm
13-20User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 13 Managing Reports Viewing ReportsNote If you save the customized
13-21User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 13 Managing Reports Viewing ReportsAbout Standard ViewerFrom Standa
13-22User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 13 Managing Reports Viewing ReportsFigure 13-5 Context Menu for Lab
13-23User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 13 Managing Reports Viewing ReportsUsing the Table of ContentsIn th
13-24User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 13 Managing Reports Viewing ReportsExporting Report DataThe viewer
13-25User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 13 Managing Reports Viewing ReportsFigure 13-12 The Export Data Dia
13-26User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 13 Managing Reports Viewing ReportsPrinting ReportsYou can print a
13-27User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 13 Managing Reports Formatting Reports in Interactive ViewerFigure
13-28User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 13 Managing Reports Formatting Reports in Interactive ViewerThe tex
13-29User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 13 Managing Reports Formatting Reports in Interactive Viewer• Modif
ContentsivUser Guide for Cisco Secure Access Control System 5.4OL-26225-01Policy Terminology 3-3Simple Policies 3-4Rule-Based Policies 3-4Types of Pol
2-8User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 2 Migrating from ACS 4.x to ACS 5.4 Common Scenarios in MigrationMigr
13-30User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 13 Managing Reports Formatting Reports in Interactive ViewerFormatt
13-31User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 13 Managing Reports Formatting Reports in Interactive Viewer.Format
13-32User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 13 Managing Reports Formatting Reports in Interactive ViewerThe dat
13-33User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 13 Managing Reports Formatting Reports in Interactive ViewerFormatt
13-34User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 13 Managing Reports Formatting Reports in Interactive Viewer415-555
13-35User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 13 Managing Reports Formatting Reports in Interactive ViewerStep 4
13-36User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 13 Managing Reports Formatting Reports in Interactive ViewerTo crea
13-37User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 13 Managing Reports Formatting Reports in Interactive ViewerFigure
13-38User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 13 Managing Reports Formatting Reports in Interactive ViewerAfter y
13-39User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 13 Managing Reports Formatting Reports in Interactive ViewerFigure
2-9User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 2 Migrating from ACS 4.x to ACS 5.4 Common Scenarios in MigrationStep
13-40User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 13 Managing Reports Formatting Reports in Interactive ViewerTo add
13-41User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 13 Managing Reports Organizing Report DataStep 4 Click Apply.Settin
13-42User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 13 Managing Reports Organizing Report DataDisplaying and Organizing
13-43User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 13 Managing Reports Organizing Report DataFigure 13-25 Report Displ
13-44User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 13 Managing Reports Organizing Report DataFigure 13-27 Report Displ
13-45User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 13 Managing Reports Organizing Report DataStep 3 Select any items y
13-46User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 13 Managing Reports Organizing Report DataFigure 13-29 Separate Col
13-47User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 13 Managing Reports Organizing Report DataSelecting a Column from a
13-48User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 13 Managing Reports Organizing Report DataWhen you sort multiple co
13-49User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 13 Managing Reports Organizing Report DataGrouping DataA report can
2-10User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 2 Migrating from ACS 4.x to ACS 5.4 Common Scenarios in Migration
13-50User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 13 Managing Reports Organizing Report DataFigure 13-33 Grouped Data
13-51User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 13 Managing Reports Organizing Report DataStep 2 From the context m
13-52User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 13 Managing Reports Organizing Report DataStep 2 From the context m
13-53User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 13 Managing Reports Organizing Report DataFigure 13-38 Selecting a
13-54User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 13 Managing Reports Organizing Report DataAND Combines two conditio
13-55User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 13 Managing Reports Organizing Report DataFalse The Boolean False.
13-56User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 13 Managing Reports Organizing Report DataISBOTTOMN(expr, n) Displa
13-57User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 13 Managing Reports Organizing Report DataLIKE(str) Displays True i
13-58User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 13 Managing Reports Organizing Report DataOR The logical OR operato
13-59User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 13 Managing Reports Organizing Report DataROUNDDOWN(num) Rounds a n
CHAPTER3-1User Guide for Cisco Secure Access Control System 5.4OL-26225-013ACS 5.x Policy ModelACS 5.x is a policy-based access control system. The te
13-60User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 13 Managing Reports Organizing Report DataWEEKDAY(date, option) Dis
13-61User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 13 Managing Reports Organizing Report DataUnderstanding Supported O
13-62User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 13 Managing Reports Organizing Report DataUsing Multiply Values in
13-63User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 13 Managing Reports Organizing Report DataStep 7 For the second arg
13-64User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 13 Managing Reports Organizing Report DataFigure 13-39 Aggregate Ro
13-65User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 13 Managing Reports Organizing Report DataCreating an Aggregate Dat
13-66User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 13 Managing Reports Organizing Report DataAdding Additional Aggrega
13-67User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 13 Managing Reports Hiding and Filtering Report DataDeleting Aggreg
13-68User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 13 Managing Reports Hiding and Filtering Report DataFigure 13-43 Su
13-69User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 13 Managing Reports Hiding and Filtering Report DataFigure 13-44 Gr
3-2User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 3 ACS 5.x Policy Model Overview of the ACS 5.x Policy ModelFor exampl
13-70User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 13 Managing Reports Hiding and Filtering Report DataTypes of Filter
13-71User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 13 Managing Reports Hiding and Filtering Report DataSetting Filter
13-72User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 13 Managing Reports Hiding and Filtering Report DataFigure 13-46 Se
13-73User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 13 Managing Reports Hiding and Filtering Report DataStep 3 From the
13-74User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 13 Managing Reports Hiding and Filtering Report DataFigure 13-47 Th
13-75User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 13 Managing Reports Hiding and Filtering Report DataStep 7 Validate
13-76User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 13 Managing Reports Understanding ChartsStep 2 From the Filter pull
13-77User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 13 Managing Reports Understanding ChartsFigure 13-49 Parts of a Bas
13-78User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 13 Managing Reports Understanding ChartsChanging Chart Subtypechart
13-79User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 13 Managing Reports Understanding ChartsFigure 13-50 Chart Formatti
3-3User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 3 ACS 5.x Policy Model Overview of the ACS 5.x Policy ModelPolicy Ter
13-80User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 13 Managing Reports Understanding Charts
CHAPTER14-1User Guide for Cisco Secure Access Control System 5.4OL-26225-0114Troubleshooting ACS with the Monitoring and Report ViewerThis chapter des
14-2User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 14 Troubleshooting ACS with the Monitoring and Report Viewer Availab
14-3User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 14 Troubleshooting ACS with the Monitoring and Report Viewer Perform
14-4User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 14 Troubleshooting ACS with the Monitoring and Report Viewer Downloa
14-5User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 14 Troubleshooting ACS with the Monitoring and Report Viewer Downloa
14-6User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 14 Troubleshooting ACS with the Monitoring and Report Viewer Working
14-7User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 14 Troubleshooting ACS with the Monitoring and Report Viewer Working
14-8User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 14 Troubleshooting ACS with the Monitoring and Report Viewer Working
14-9User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 14 Troubleshooting ACS with the Monitoring and Report Viewer Working
3-4User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 3 ACS 5.x Policy Model Overview of the ACS 5.x Policy ModelSimple Pol
14-10User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 14 Troubleshooting ACS with the Monitoring and Report Viewer Workin
14-11User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 14 Troubleshooting ACS with the Monitoring and Report Viewer Workin
14-12User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 14 Troubleshooting ACS with the Monitoring and Report Viewer Workin
14-13User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 14 Troubleshooting ACS with the Monitoring and Report Viewer Workin
14-14User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 14 Troubleshooting ACS with the Monitoring and Report Viewer Workin
14-15User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 14 Troubleshooting ACS with the Monitoring and Report Viewer Workin
14-16User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 14 Troubleshooting ACS with the Monitoring and Report Viewer Workin
14-17User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 14 Troubleshooting ACS with the Monitoring and Report Viewer Workin
14-18User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 14 Troubleshooting ACS with the Monitoring and Report Viewer Workin
CHAPTER15-1User Guide for Cisco Secure Access Control System 5.4OL-26225-0115Managing System Operations and Configuration in the Monitoring and Report
3-5User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 3 ACS 5.x Policy Model Overview of the ACS 5.x Policy ModelTypes of P
15-2User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 15 Managing System Operations and Configuration in the Monitoring and
15-3User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 15 Managing System Operations and Configuration in the Monitoring and
15-4User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 15 Managing System Operations and Configuration in the Monitoring and
15-5User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 15 Managing System Operations and Configuration in the Monitoring and
15-6User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 15 Managing System Operations and Configuration in the Monitoring and
15-7User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 15 Managing System Operations and Configuration in the Monitoring and
15-8User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 15 Managing System Operations and Configuration in the Monitoring and
15-9User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 15 Managing System Operations and Configuration in the Monitoring and
15-10User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 15 Managing System Operations and Configuration in the Monitoring an
15-11User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 15 Managing System Operations and Configuration in the Monitoring an
3-6User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 3 ACS 5.x Policy Model Access ServicesAccess ServicesAccess services
15-12User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 15 Managing System Operations and Configuration in the Monitoring an
15-13User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 15 Managing System Operations and Configuration in the Monitoring an
15-14User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 15 Managing System Operations and Configuration in the Monitoring an
15-15User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 15 Managing System Operations and Configuration in the Monitoring an
15-16User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 15 Managing System Operations and Configuration in the Monitoring an
15-17User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 15 Managing System Operations and Configuration in the Monitoring an
15-18User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 15 Managing System Operations and Configuration in the Monitoring an
15-19User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 15 Managing System Operations and Configuration in the Monitoring an
15-20User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 15 Managing System Operations and Configuration in the Monitoring an
CHAPTER16-1User Guide for Cisco Secure Access Control System 5.4OL-26225-0116Managing System AdministratorsSystem administrators are responsible for d
3-7User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 3 ACS 5.x Policy Model Access ServicesTable 3-5 describes an example
16-2User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 16 Managing System Administrators Understanding Administrator Roles
16-3User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 16 Managing System Administrators Configuring System Administrators
16-4User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 16 Managing System Administrators Understanding Roles• Dynamic Role
16-5User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 16 Managing System Administrators Understanding RolesPredefined Role
16-6User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 16 Managing System Administrators Understanding RolesNote At first l
16-7User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 16 Managing System Administrators Creating, Duplicating, Editing, an
16-8User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 16 Managing System Administrators Creating, Duplicating, Editing, an
16-9User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 16 Managing System Administrators Viewing Predefined RolesStep 4 Cli
16-10User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 16 Managing System Administrators Configuring Authentication Settin
16-11User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 16 Managing System Administrators Configuring Authentication Settin
ContentsvUser Guide for Cisco Secure Access Control System 5.4OL-26225-01Agentless Network Access 4-12Overview of Agentless Network Access 4-12Host Lo
3-8User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 3 ACS 5.x Policy Model Access ServicesACS accepts the results of the
16-12User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 16 Managing System Administrators Configuring Session Idle TimeoutN
16-13User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 16 Managing System Administrators Configuring Administrator Access
16-14User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 16 Managing System Administrators Working with Administrative Acces
16-15User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 16 Managing System Administrators Working with Administrative Acces
16-16User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 16 Managing System Administrators Working with Administrative Acces
16-17User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 16 Managing System Administrators Working with Administrative Acces
16-18User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 16 Managing System Administrators Working with Administrative Acces
16-19User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 16 Managing System Administrators Working with Administrative Acces
16-20User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 16 Managing System Administrators Working with Administrative Acces
16-21User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 16 Managing System Administrators Working with Administrative Acces
3-9User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 3 ACS 5.x Policy Model Access ServicesACS can simultaneously act as a
16-22User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 16 Managing System Administrators Resetting the Administrator Passw
16-23User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 16 Managing System Administrators Changing the Administrator Passwo
16-24User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 16 Managing System Administrators Changing the Administrator Passwo
CHAPTER17-1User Guide for Cisco Secure Access Control System 5.4OL-26225-0117Configuring System OperationsYou can configure and deploy ACS instances s
17-2User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 17 Configuring System Operations Understanding Distributed Deploymen
17-3User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 17 Configuring System Operations Understanding Distributed Deploymen
17-4User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 17 Configuring System Operations Understanding Distributed Deploymen
17-5User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 17 Configuring System Operations Understanding Distributed Deploymen
17-6User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 17 Configuring System Operations Scheduled BackupsStep 3 You must ac
17-7User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 17 Configuring System Operations Scheduled BackupsStep 2 Click Submi
3-10User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 3 ACS 5.x Policy Model Access Services• Identity Sequence—Sequences
17-8User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 17 Configuring System Operations Backing Up Primary and Secondary In
17-9User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 17 Configuring System Operations Synchronizing Primary and Secondary
17-10User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 17 Configuring System Operations Editing InstancesTable 17-4 Distri
17-11User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 17 Configuring System Operations Editing InstancesStep 2 From the P
17-12User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 17 Configuring System Operations Editing InstancesStep 4 Click Subm
17-13User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 17 Configuring System Operations Editing InstancesViewing and Editi
17-14User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 17 Configuring System Operations Activating a Secondary InstanceAct
17-15User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 17 Configuring System Operations Registering a Secondary Instance t
17-16User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 17 Configuring System Operations Registering a Secondary Instance t
17-17User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 17 Configuring System Operations Deregistering Secondary Instances
3-11User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 3 ACS 5.x Policy Model Access ServicesGroup Mapping PolicyThe identi
17-18User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 17 Configuring System Operations Promoting a Secondary Instance fro
17-19User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 17 Configuring System Operations Promoting a Secondary Instance fro
17-20User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 17 Configuring System Operations Replicating a Secondary Instance f
17-21User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 17 Configuring System Operations Replicating a Secondary Instance f
17-22User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 17 Configuring System Operations Replicating a Secondary Instance f
17-23User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 17 Configuring System Operations Using the Deployment Operations Pa
17-24User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 17 Configuring System Operations Using the Deployment Operations Pa
17-25User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 17 Configuring System Operations Using the Deployment Operations Pa
17-26User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 17 Configuring System Operations Using the Deployment Operations Pa
CHAPTER18-1User Guide for Cisco Secure Access Control System 5.4OL-26225-0118Managing System Administration ConfigurationsAfter you install Cisco Secu
3-12User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 3 ACS 5.x Policy Model Service Selection PolicyRelated Topics• Polic
18-2User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 18 Managing System Administration Configurations Configuring Global
18-3User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 18 Managing System Administration Configurations Configuring Global
18-4User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 18 Managing System Administration Configurations Configuring RSA Sec
18-5User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 18 Managing System Administration Configurations Managing Dictionari
18-6User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 18 Managing System Administration Configurations Managing Dictionari
18-7User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 18 Managing System Administration Configurations Managing Dictionari
18-8User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 18 Managing System Administration Configurations Managing Dictionari
18-9User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 18 Managing System Administration Configurations Managing Dictionari
18-10User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 18 Managing System Administration Configurations Managing Dictionar
18-11User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 18 Managing System Administration Configurations Managing Dictionar
3-13User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 3 ACS 5.x Policy Model Service Selection PolicyRules-Based Service S
18-12User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 18 Managing System Administration Configurations Managing Dictionar
18-13User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 18 Managing System Administration Configurations Managing Dictionar
18-14User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 18 Managing System Administration Configurations Configuring Local
18-15User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 18 Managing System Administration Configurations Adding Local Serve
18-16User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 18 Managing System Administration Configurations Adding Local Serve
18-17User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 18 Managing System Administration Configurations Adding Local Serve
18-18User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 18 Managing System Administration Configurations Adding Local Serve
18-19User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 18 Managing System Administration Configurations Adding Local Serve
18-20User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 18 Managing System Administration Configurations Adding Local Serve
18-21User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 18 Managing System Administration Configurations Configuring LogsSt
3-14User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 3 ACS 5.x Policy Model Service Selection PolicyIn this example, inst
18-22User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 18 Managing System Administration Configurations Configuring LogsSt
18-23User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 18 Managing System Administration Configurations Configuring LogsSt
18-24User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 18 Managing System Administration Configurations Configuring LogsCo
18-25User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 18 Managing System Administration Configurations Configuring LogsCo
18-26User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 18 Managing System Administration Configurations Configuring LogsSt
18-27User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 18 Managing System Administration Configurations Configuring LogsRe
18-28User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 18 Managing System Administration Configurations Configuring LogsVi
18-29User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 18 Managing System Administration Configurations Configuring LogsSe
18-30User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 18 Managing System Administration Configurations Configuring LogsCo
18-31User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 18 Managing System Administration Configurations Configuring LogsCo
3-15User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 3 ACS 5.x Policy Model Service Selection PolicyThe default rule spec
18-32User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 18 Managing System Administration Configurations Configuring LogsDi
18-33User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 18 Managing System Administration Configurations Configuring LogsCo
18-34User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 18 Managing System Administration Configurations Licensing Overview
18-35User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 18 Managing System Administration Configurations Installing a Licen
18-36User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 18 Managing System Administration Configurations Installing a Licen
18-37User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 18 Managing System Administration Configurations Installing a Licen
18-38User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 18 Managing System Administration Configurations Viewing License Fe
18-39User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 18 Managing System Administration Configurations Adding Deployment
18-40User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 18 Managing System Administration Configurations Deleting Deploymen
18-41User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 18 Managing System Administration Configurations Available Download
3-16User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 3 ACS 5.x Policy Model Authorization Profiles for Network AccessPoli
18-42User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 18 Managing System Administration Configurations Available Download
CHAPTER19-1User Guide for Cisco Secure Access Control System 5.4OL-26225-0119Understanding LoggingThis chapter describes logging functionality in ACS
19-2User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 19 Understanding Logging About LoggingUsing Log TargetsYou can speci
19-3User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 19 Understanding Logging About LoggingNote For complex configuration
19-4User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 19 Understanding Logging About LoggingEach log message contains the
19-5User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 19 Understanding Logging About LoggingLocal Store TargetLog messages
19-6User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 19 Understanding Logging About LoggingTable 19-2 Local Store and Sys
19-7User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 19 Understanding Logging About LoggingYou can use the web interface
19-8User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 19 Understanding Logging About LoggingWhen you configure a critical
19-9User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 19 Understanding Logging About LoggingTable 19-3 Remote Syslog Messa
3-17User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 3 ACS 5.x Policy Model Policies and Identity AttributesYou can defin
19-10User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 19 Understanding Logging About LoggingThe syslog message data or pa
19-11User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 19 Understanding Logging About LoggingThe Monitoring and Report Vie
19-12User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 19 Understanding Logging ACS 4.x Versus ACS 5.4 LoggingACS 4.x Vers
19-13User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 19 Understanding Logging ACS 4.x Versus ACS 5.4 LoggingConfiguratio
19-14User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 19 Understanding Logging ACS 4.x Versus ACS 5.4 Logging
A-1User Guide for Cisco Secure Access Control System 5.4OL-26225-01APPENDIXAAAA ProtocolsThis section contains the following topics:• Typical Use Case
A-2User Guide for Cisco Secure Access Control System 5.4OL-26225-01Appendix A AAA Protocols Typical Use CasesSession Access Requests (Device Adm
A-3User Guide for Cisco Secure Access Control System 5.4OL-26225-01Appendix A AAA Protocols Typical Use Cases–EAP protocols that involve a TLS h
A-4User Guide for Cisco Secure Access Control System 5.4OL-26225-01Appendix A AAA Protocols Typical Use Cases–EAP-FAST/EAP-MSCHAPv2–EAP-FAST/EAP
A-5User Guide for Cisco Secure Access Control System 5.4OL-26225-01Appendix A AAA Protocols Access Protocols—TACACS+ and RADIUSAccess Protocols—
ContentsviUser Guide for Cisco Secure Access Control System 5.4OL-26225-01My Account Page 5-2Login Banner 5-3Using the Web Interface 5-3Accessing the
3-18User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 3 ACS 5.x Policy Model Policies and Network Device GroupsRelated Top
A-6User Guide for Cisco Secure Access Control System 5.4OL-26225-01Appendix A AAA Protocols Overview of RADIUSOverview of RADIUSThis section con
A-7User Guide for Cisco Secure Access Control System 5.4OL-26225-01Appendix A AAA Protocols Overview of RADIUSACS 5.4 as the AAA ServerA AAA ser
A-8User Guide for Cisco Secure Access Control System 5.4OL-26225-01Appendix A AAA Protocols Overview of RADIUSRADIUS Attribute Support in ACS 5.
A-9User Guide for Cisco Secure Access Control System 5.4OL-26225-01Appendix A AAA Protocols Overview of RADIUSAuthenticationACS supports various
A-10User Guide for Cisco Secure Access Control System 5.4OL-26225-01Appendix A AAA Protocols Overview of RADIUSAdministrator can configure the a
A-11User Guide for Cisco Secure Access Control System 5.4OL-26225-01Appendix A AAA Protocols Overview of RADIUS• If the Multiple attributes are
A-12User Guide for Cisco Secure Access Control System 5.4OL-26225-01Appendix A AAA Protocols Overview of RADIUSWhen the RADIUS server receives t
B-1User Guide for Cisco Secure Access Control System 5.4OL-26225-01APPENDIXBAuthentication in ACS 5.4Authentication verifies user information to confi
B-2User Guide for Cisco Secure Access Control System 5.4OL-26225-01Appendix B Authentication in ACS 5.4 PAPThis appendix describes the following
B-3User Guide for Cisco Secure Access Control System 5.4OL-26225-01Appendix B Authentication in ACS 5.4 EAPRADIUS PAP Authentication You can use
3-19User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 3 ACS 5.x Policy Model Flows for Configuring Services and PoliciesFi
B-4User Guide for Cisco Secure Access Control System 5.4OL-26225-01Appendix B Authentication in ACS 5.4 EAPIn ACS 5.4, EAP is encapsulated in th
B-5User Guide for Cisco Secure Access Control System 5.4OL-26225-01Appendix B Authentication in ACS 5.4 EAP-MD5ACS supports full EAP infrastruct
B-6User Guide for Cisco Secure Access Control System 5.4OL-26225-01Appendix B Authentication in ACS 5.4 EAP-TLSOverview of EAP-TLSEAP-TLS is one
B-7User Guide for Cisco Secure Access Control System 5.4OL-26225-01Appendix B Authentication in ACS 5.4 EAP-TLS• Using a third-party signature,
B-8User Guide for Cisco Secure Access Control System 5.4OL-26225-01Appendix B Authentication in ACS 5.4 EAP-TLSYou can configure the timeout for
B-9User Guide for Cisco Secure Access Control System 5.4OL-26225-01Appendix B Authentication in ACS 5.4 EAP-TLSFor HTTPS, SFTP, SSH and ActiveMQ
B-10User Guide for Cisco Secure Access Control System 5.4OL-26225-01Appendix B Authentication in ACS 5.4 EAP-TLS• Initial Self-Signed Certificat
B-11User Guide for Cisco Secure Access Control System 5.4OL-26225-01Appendix B Authentication in ACS 5.4 EAP-TLSThere are two types of certifica
B-12User Guide for Cisco Secure Access Control System 5.4OL-26225-01Appendix B Authentication in ACS 5.4 EAP-TLSCredentials DistributionAll cert
B-13User Guide for Cisco Secure Access Control System 5.4OL-26225-01Appendix B Authentication in ACS 5.4 EAP-TLSPrivate Keys and Passwords Backu
3-20User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 3 ACS 5.x Policy Model Flows for Configuring Services and Policies•
B-14User Guide for Cisco Secure Access Control System 5.4OL-26225-01Appendix B Authentication in ACS 5.4 PEAPv0/1Note All communication between
B-15User Guide for Cisco Secure Access Control System 5.4OL-26225-01Appendix B Authentication in ACS 5.4 PEAPv0/1• Cisco AC 3.x• Funk Odyssey Ac
B-16User Guide for Cisco Secure Access Control System 5.4OL-26225-01Appendix B Authentication in ACS 5.4 PEAPv0/1• Fast Reconnect, page B-16• Se
B-17User Guide for Cisco Secure Access Control System 5.4OL-26225-01Appendix B Authentication in ACS 5.4 PEAPv0/1Protected Exchange of Arbitrary
B-18User Guide for Cisco Secure Access Control System 5.4OL-26225-01Appendix B Authentication in ACS 5.4 PEAPv0/1Figure B-3 PEAP Processing Flow
B-19User Guide for Cisco Secure Access Control System 5.4OL-26225-01Appendix B Authentication in ACS 5.4 EAP-FASTAuthenticating with MSCHAPv2Aft
B-20User Guide for Cisco Secure Access Control System 5.4OL-26225-01Appendix B Authentication in ACS 5.4 EAP-FASTEAP-FAST is a client-server sec
B-21User Guide for Cisco Secure Access Control System 5.4OL-26225-01Appendix B Authentication in ACS 5.4 EAP-FASTEAP-FAST can protect the userna
B-22User Guide for Cisco Secure Access Control System 5.4OL-26225-01Appendix B Authentication in ACS 5.4 EAP-FAST• ACS-Supported Features for PA
B-23User Guide for Cisco Secure Access Control System 5.4OL-26225-01Appendix B Authentication in ACS 5.4 EAP-FASTProvisioning ModesACS supports
3-21User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 3 ACS 5.x Policy Model Flows for Configuring Services and PoliciesRe
B-24User Guide for Cisco Secure Access Control System 5.4OL-26225-01Appendix B Authentication in ACS 5.4 EAP-FASTThe various means by which an e
B-25User Guide for Cisco Secure Access Control System 5.4OL-26225-01Appendix B Authentication in ACS 5.4 EAP-FASTTo control whether ACS performs
B-26User Guide for Cisco Secure Access Control System 5.4OL-26225-01Appendix B Authentication in ACS 5.4 EAP-FASTThe proactive PAC update time i
B-27User Guide for Cisco Secure Access Control System 5.4OL-26225-01Appendix B Authentication in ACS 5.4 EAP-FASTMaster Key Generation and PAC T
B-28User Guide for Cisco Secure Access Control System 5.4OL-26225-01Appendix B Authentication in ACS 5.4 EAP-FASTFor information about how maste
B-29User Guide for Cisco Secure Access Control System 5.4OL-26225-01Appendix B Authentication in ACS 5.4 EAP-FAST• PAC Migration from ACS 4.x, p
B-30User Guide for Cisco Secure Access Control System 5.4OL-26225-01Appendix B Authentication in ACS 5.4 EAP Authentication with RADIUS Key Wrap
B-31User Guide for Cisco Secure Access Control System 5.4OL-26225-01Appendix B Authentication in ACS 5.4 EAP-MSCHAPv2Overview of EAP-MSCHAPv2Som
B-32User Guide for Cisco Secure Access Control System 5.4OL-26225-01Appendix B Authentication in ACS 5.4 CHAPEAP- MSCHAPv2 Flow in ACS 5.4Compon
B-33User Guide for Cisco Secure Access Control System 5.4OL-26225-01Appendix B Authentication in ACS 5.4 Certificate Attributes• Subject’s ST at
3-22User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 3 ACS 5.x Policy Model Flows for Configuring Services and Policies
B-34User Guide for Cisco Secure Access Control System 5.4OL-26225-01Appendix B Authentication in ACS 5.4 Certificate Attributes• Subject's
B-35User Guide for Cisco Secure Access Control System 5.4OL-26225-01Appendix B Authentication in ACS 5.4 Machine AuthenticationThe configuration
B-36User Guide for Cisco Secure Access Control System 5.4OL-26225-01Appendix B Authentication in ACS 5.4 Authentication Protocol and Identity St
B-37User Guide for Cisco Secure Access Control System 5.4OL-26225-01Appendix B Authentication in ACS 5.4 Authentication Protocol and Identity St
B-38User Guide for Cisco Secure Access Control System 5.4OL-26225-01Appendix B Authentication in ACS 5.4 Authentication Protocol and Identity St
C-1User Guide for Cisco Secure Access Control System 5.4OL-26225-01APPENDIXCOpen Source License AcknowledgementsSee http://www.cisco.com/en/US/product
C-2User Guide for Cisco Secure Access Control System 5.4OL-26225-01Appendix C Open Source License Acknowledgements Notices4. The names “OpenSSL
C-3User Guide for Cisco Secure Access Control System 5.4OL-26225-01Appendix C Open Source License Acknowledgements4. If you include any Windows s
C-4User Guide for Cisco Secure Access Control System 5.4OL-26225-01Appendix C Open Source License Acknowledgements
GL-1User Guide for Cisco Secure Access Control System 5.4OL-26225-01GLOSSARYAAAAAuthentication, authorization, and accounting (AAA) is a term for a fr
CHAPTER4-1User Guide for Cisco Secure Access Control System 5.4OL-26225-014Common Scenarios Using ACSNetwork control refers to the process of controll
GlossaryGL-2User Guide for Cisco Secure Access Control System 5.4OL-26225-01accountsThe capability of ACS to record user sessions in a log file. ACS S
GlossaryGL-3User Guide for Cisco Secure Access Control System 5.4OL-26225-01authenticityThe validity and conformance of the original information.autho
GlossaryGL-4User Guide for Cisco Secure Access Control System 5.4OL-26225-01certificate-based authenticationThe use of Secure Sockets Layer (SSL) and
GlossaryGL-5User Guide for Cisco Secure Access Control System 5.4OL-26225-01configuration managementThe process of establishing a known baseline condi
GlossaryGL-6User Guide for Cisco Secure Access Control System 5.4OL-26225-01DdaemonA program which is often started at the time the system boots and r
GlossaryGL-7User Guide for Cisco Secure Access Control System 5.4OL-26225-01digital envelopeAn encrypted message with the encrypted session key.digita
GlossaryGL-8User Guide for Cisco Secure Access Control System 5.4OL-26225-01dumpsecA security tool that dumps a variety of information about a system&
GlossaryGL-9User Guide for Cisco Secure Access Control System 5.4OL-26225-01EAPExtensible Authentication Protocol. A protocol for wireless networks th
GlossaryGL-10User Guide for Cisco Secure Access Control System 5.4OL-26225-01GgatewayA network point that acts as an entrance to another network.globa
GlossaryGL-11User Guide for Cisco Secure Access Control System 5.4OL-26225-01II18NInternationalization and localization are means of adapting software
4-2User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 4 Common Scenarios Using ACS Overview of Device AdministrationACS org
GlossaryGL-12User Guide for Cisco Secure Access Control System 5.4OL-26225-01ISOInternational Organization for Standardization, a voluntary, non-treat
GlossaryGL-13User Guide for Cisco Secure Access Control System 5.4OL-26225-01MMAC AddressA physical address; a numeric value that uniquely identifies
GlossaryGL-14User Guide for Cisco Secure Access Control System 5.4OL-26225-01PI (Programmatic Interface)The ACS PI is a programmatic interface that pr
GlossaryGL-15User Guide for Cisco Secure Access Control System 5.4OL-26225-01RRDN (LDAP)The Relative Distinguished Name (frequently but incorrectly wr
GlossaryGL-16User Guide for Cisco Secure Access Control System 5.4OL-26225-01Schema (LDAP)A package of attributes and object classes that are sometime
GlossaryGL-17User Guide for Cisco Secure Access Control System 5.4OL-26225-01SOAP (Simple Object Access Protocol)A lightweight XML-based protocol for
GlossaryGL-18User Guide for Cisco Secure Access Control System 5.4OL-26225-01UUDPUser Datagram Protocol. A communications protocol that offers a limit
GlossaryGL-19User Guide for Cisco Secure Access Control System 5.4OL-26225-01XX.509A standard for public key infrastructure. X.509 specifies, amongst
GlossaryGL-20User Guide for Cisco Secure Access Control System 5.4OL-26225-01
IN-1User Guide for Cisco Secure Access Control System 5.4OL-26225-01INDEXSymbols! formatting symbol 13-34% operator 13-61& formatting symbol 13-34
4-3User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 4 Common Scenarios Using ACS Overview of Device AdministrationIf a co
IndexIN-2User Guide for Cisco Secure Access Control System 5.4OL-26225-01Arrange Columns dialog 13-42ascending sort order 13-47AVERAGE function 13-54A
IndexIN-3User Guide for Cisco Secure Access Control System 5.4OL-26225-01formatting data and 13-37context menus 13-21conversions 13-34COUNT_DISTINCT f
IndexIN-4User Guide for Cisco Secure Access Control System 5.4OL-26225-01downloads 18-40duplicate values 13-67, 13-68EEAP-FASTenablingB-27identity pro
IndexIN-5User Guide for Cisco Secure Access Control System 5.4OL-26225-01GGeneral Date format option 13-31General Number format option 13-31Go to page
IndexIN-6User Guide for Cisco Secure Access Control System 5.4OL-26225-01localescreating charts and13-78customizing formats for 13-30, 13-32, 13-35loc
IndexIN-7User Guide for Cisco Secure Access Control System 5.4OL-26225-01numeric data types 13-31numeric expressions 13-61, 13-62numeric values 13-24,
IndexIN-8User Guide for Cisco Secure Access Control System 5.4OL-26225-01report viewers 13-21resizing columns 13-24, 13-29RIGHT function 13-58ROUNDDOW
IndexIN-9User Guide for Cisco Secure Access Control System 5.4OL-26225-01time data types 13-31time formats 13-31, 13-35timesaver, description of ii-xx
IndexIN-10User Guide for Cisco Secure Access Control System 5.4OL-26225-01Xx-axis values 13-76Yy-axis values 13-76YEAR function 13-60
4-4User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 4 Common Scenarios Using ACS Overview of Device AdministrationStep 5
4-5User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 4 Common Scenarios Using ACS Password-Based Network AccessTACACS+ Cus
ContentsviiUser Guide for Cisco Secure Access Control System 5.4OL-26225-01Viewing and Performing Bulk Operations for Network Devices 7-6Exporting Ne
4-6User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 4 Common Scenarios Using ACS Password-Based Network AccessNote During
4-7User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 4 Common Scenarios Using ACS Password-Based Network AccessPassword-Ba
4-8User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 4 Common Scenarios Using ACS Password-Based Network AccessFor RADIUS,
4-9User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 4 Common Scenarios Using ACS Certificate-Based Network AccessRelated
4-10User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 4 Common Scenarios Using ACS Certificate-Based Network AccessYou can
4-11User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 4 Common Scenarios Using ACS Certificate-Based Network AccessYou can
4-12User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 4 Common Scenarios Using ACS Agentless Network AccessA default Local
4-13User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 4 Common Scenarios Using ACS Agentless Network AccessThe default sec
4-14User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 4 Common Scenarios Using ACS Agentless Network AccessACS supports ho
4-15User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 4 Common Scenarios Using ACS Agentless Network Access• Twelve consec
ContentsviiiUser Guide for Cisco Secure Access Control System 5.4OL-26225-01Viewing and Performing Bulk Operations for Internal Identity Store Hosts 8
4-16User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 4 Common Scenarios Using ACS Agentless Network AccessAgentless Netwo
4-17User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 4 Common Scenarios Using ACS Agentless Network AccessStep 7 Define t
4-18User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 4 Common Scenarios Using ACS Agentless Network AccessPrevious Step:N
4-19User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 4 Common Scenarios Using ACS Agentless Network Accessc. Select Netwo
4-20User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 4 Common Scenarios Using ACS VPN Remote Network AccessConfiguring an
4-21User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 4 Common Scenarios Using ACS VPN Remote Network AccessSupported Auth
4-22User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 4 Common Scenarios Using ACS VPN Remote Network AccessSupported VPN
4-23User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 4 Common Scenarios Using ACS ACS and Cisco Security Group AccessRela
4-24User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 4 Common Scenarios Using ACS ACS and Cisco Security Group Access6. C
4-25User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 4 Common Scenarios Using ACS ACS and Cisco Security Group AccessDevi
ContentsixUser Guide for Cisco Secure Access Control System 5.4OL-26225-01Configuring an AD Identity Store 8-49Selecting an AD Group 8-53Configuring A
4-26User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 4 Common Scenarios Using ACS ACS and Cisco Security Group AccessTo c
4-27User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 4 Common Scenarios Using ACS ACS and Cisco Security Group AccessStep
4-28User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 4 Common Scenarios Using ACS ACS and Cisco Security Group AccessInit
4-29User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 4 Common Scenarios Using ACS RADIUS and TACACS+ Proxy RequestsRADIUS
4-30User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 4 Common Scenarios Using ACS RADIUS and TACACS+ Proxy Requests• TAC_
4-31User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 4 Common Scenarios Using ACS RADIUS and TACACS+ Proxy Requests• Supp
4-32User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 4 Common Scenarios Using ACS RADIUS and TACACS+ Proxy RequestsConfig
CHAPTER5-1User Guide for Cisco Secure Access Control System 5.4OL-26225-015Understanding My WorkspaceThe Cisco Secure ACS web interface is designed to
5-2User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 5 Understanding My Workspace Task GuidesIn ACS 5.4, you can also see
5-3User Guide for Cisco Secure Access Control System 5.4OL-26225-01Chapter 5 Understanding My Workspace Login BannerRelated Topics• Configuring
Komentarze do niniejszej Instrukcji