Flylib.com
Cisco Access Control Security: AAA Administration Services
Cisco Access Control Security: AAA Administration Services
ISBN: 1587051249
EAN: 2147483647
Year: 2006
Pages: 173
Authors:
Brandon James Carroll
BUY ON AMAZON
Cisco Access Control Security: AAA Administrative Services
Table of Contents
Copyright
About the Author
About the Technical Reviewers
Acknowledgments
Icons Used in This Book
Introduction
How This Book Is Organized
Target Audience
Features of this Book
Troubleshooting
PartI.AAA Overview
Chapter1.Authentication, Authorization, and Accounting Overview
Authentication Overview
Authentication Example
Authorization Overview
Authorization Example
Accounting Overview
Accounting Example
Cisco Device Support for AAA
Summary
End Notes
Chapter2.TACACS and RADIUS
A Brief Overview of TACACS
A Brief Overview of RADIUS
TACACS in Detail
RADIUS in Detail
Summary
End Notes
Chapter3.Authentication Configuration on Cisco Routers
Local Authentication
Authentication Configurations Using Cisco Secure ACS for Windows Server and Cisco Secure ACS Solution Engine
Debugging Authentication
Authentication Command References
Summary
PartII.Enterprise AAA and Cisco Secure Access Control Server
Chapter4.Enterprise Authentication Servers
Cisco Secure Access Control Server Software and Versions
Cisco Secure Solution Engine
Summary
Chapter5.Deploying Cisco Secure Access Control Server for Windows Server
What Is ACS?
How to Obtain ACS
Requirements to Run ACS Version 3.2
Installing ACS
Reinstalling ACS and Using an Existing ACS Database
Positioning ACS in Your Network
Summary
Chapter6.Getting Familiar with CSACS
Navigating the HTML Interface
Starting Point for Configuring Your Server
Configuring Your Interface
Preparing to Add Users
Summary
Chapter7.Configuring User Accounts
Adding Users to the Database
User Changeable Passwords
Authenticating Users to a Windows NT2000 Database
Advanced Configurations
Summary
End Notes
Chapter8.Configuring User Groups
Group-Level Configuration of ACS
PPP Callback Configuration
Configuring Network Access Restrictions
Max Sessions, Usage Quotas, and Password Aging Rules
IP Assignment and Downloadable ACLs
Using TACACS for Group Configuration
Summary
End Notes
Chapter9.Managing Network Configurations
Configuring a Distributed System
Configuring Network Device Groups
Configuring Proxy Distribution Tables
Using Remote Accounting
Using Network Device Searches
Creating a Complete Distributed Network
Client Configuration
Troubleshooting Network Configurations
Summary
Chapter10.Configuring Shared Profile Components
Downloadable ACLs
Network Access Restrictions
Configuring Network Access Restrictions
Command Authorization Sets
Troubleshooting Extended Configurations
Common Issues of Network Access Restrictions
And Do Not Forget the Importance of Documentation
Summary
Chapter11.System Configuration
How Users Interact with Your External Database Configuration
External Database Configuration
Database Group Mappings
Unknown User Policy
Database Replication
Synchronization of ACS Devices
Summary
End Notes
Chapter12.Reports and Logging for Windows Server
ACS Reports
Logging Attributes in ACS Reports
ACS Reports
Remote Logging with ACS
Additional Logs Maintained by ACS
Summary
Chapter13.Exploring TACACS Attribute Values
TACACS AV Pairs Overview
Attributes of TACACS AV Pairs
AV Pair Example PPP Network
Understanding TACACS AV Pairs in the ACS Interface
Summary
PartIII.Service Provider AAA and the Cisco Access Registrar
Chapter14.Service Provider AAA and the Cisco CNS Access Registrar
Service Provider (SP) Model
Service Provider Challenge
Value Added Services
Cisco CNS Access Registrar
Options of AR
AR s Architecture
Installation Requirements for AR on Solaris 8
Installing AR
AR s Subdirectories
Configuring Cisco CNS AR
Summary
End Notes
Chapter15.Configuring the Cisco Access Registrar
Using aregcmd to Configure AR
AR s Server Object Hierarchy
Configuring the ACE ISP as a Basic Site
Configuring AR s Administrators
Configuring the RADIUS Server
Validating and Saving Your Changes to AR
Testing Your Configuration
Troubleshooting Your Configuration with trace
Summary
End Notes
PartIV.Appendix
AppendixA.RADIUS Attribute Tables
3000 Series Concentrator VSAs
Cisco VPN 5000 Concentrator RADIUS VSAs
Cisco Building Broadband Service Manager Dictionary of RADIUS VSA
IETF Dictionary of RADIUS Attribute Value Pairs
Microsoft Radius VSAs
Ascend RADIUS
Nortel RADIUS
Juniper RADIUS
Index
SYMBOL
A
B
C
D
E
F
G
H
I
J
L
M
N
O
P
R
S
T
U
V
W
X
Z
Cisco Access Control Security: AAA Administration Services
ISBN: 1587051249
EAN: 2147483647
Year: 2006
Pages: 173
Authors:
Brandon James Carroll
BUY ON AMAZON
Cisco IP Telephony (CIPT) (Authorized Self-Study) (2nd Edition)
Upgrading Prior Cisco Unified CallManager Versions
Server and Administration Configuration
Using the CTL Client
Introducing Database Tools and Cisco Unified CallManager Serviceability
Review Questions
Excel Scientific and Engineering Cookbook (Cookbooks (OReilly))
Entering Data
Working with Data Types
Introduction
Computing Summary Statistics
Understanding Solver Reports
Postfix: The Definitive Guide
Email Topics
master.cf
Queue Management
Mail Relaying
External Databases
Twisted Network Programming Essentials
Finding Answers to Your Questions
Checking Whether a Page Has Changed
Web Services and RPC
Downloading Messages from an IMAP Mailbox
Listing the Newsgroups on a Server
What is Lean Six Sigma
Key #1: Delight Your Customers with Speed and Quality
Key #3: Work Together for Maximum Gain
Beyond the Basics: The Five Laws of Lean Six Sigma
Making Improvements That Last: An Illustrated Guide to DMAIC and the Lean Six Sigma Toolkit
The Experience of Making Improvements: What Its Like to Work on Lean Six Sigma Projects
Telecommunications Essentials, Second Edition: The Complete Global Source (2nd Edition)
Twisted-Pair
SS7 and Next-Generation Networks
The Evolution to IP Services
4G: Wireless Broadband
WPANs
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies