| | Copyright |
| | About the Author |
| | | About the Technical Reviewers |
| | Acknowledgments |
| | Icons Used in This Book |
| | Introduction |
| | | How This Book Is Organized |
| | | Target Audience |
| | | Features of this Book |
| | | Troubleshooting |
| | Part I. AAA Overview |
| | | Chapter 1. Authentication, Authorization, and Accounting Overview |
| | | Authentication Overview |
| | | Authentication Example |
| | | Authorization Overview |
| | | Authorization Example |
| | | Accounting Overview |
| | | Accounting Example |
| | | Cisco Device Support for AAA |
| | | Summary |
| | | End Notes |
| | | Chapter 2. TACACS+ and RADIUS |
| | | A Brief Overview of TACACS+ |
| | | A Brief Overview of RADIUS |
| | | TACACS+ in Detail |
| | | RADIUS in Detail |
| | | Summary |
| | | End Notes |
| | | Chapter 3. Authentication Configuration on Cisco Routers |
| | | Local Authentication |
| | | Authentication Configurations Using Cisco Secure ACS for Windows Server and Cisco Secure ACS Solution Engine |
| | | Debugging Authentication |
| | | Authentication Command References |
| | | Summary |
| | Part II. Enterprise AAA and Cisco Secure Access Control Server |
| | | Chapter 4. Enterprise Authentication Servers |
| | | Cisco Secure Access Control Server Software and Versions |
| | | Cisco Secure Solution Engine |
| | | Summary |
| | | Chapter 5. Deploying Cisco Secure Access Control Server for Windows Server |
| | | What Is ACS? |
| | | How to Obtain ACS |
| | | Requirements to Run ACS Version 3.2 |
| | | Installing ACS |
| | | Reinstalling ACS and Using an Existing ACS Database |
| | | Positioning ACS in Your Network |
| | | Summary |
| | | Chapter 6. Getting Familiar with CSACS |
| | | Navigating the HTML Interface |
| | | Starting Point for Configuring Your Server |
| | | Configuring Your Interface |
| | | Preparing to Add Users |
| | | Summary |
| | | Chapter 7. Configuring User Accounts |
| | | Adding Users to the Database |
| | | User Changeable Passwords |
| | | Authenticating Users to a Windows NT/2000 Database |
| | | Advanced Configurations |
| | | Summary |
| | | End Notes |
| | | Chapter 8. Configuring User Groups |
| | | Group-Level Configuration of ACS |
| | | PPP Callback Configuration |
| | | Configuring Network Access Restrictions |
| | | Max Sessions, Usage Quotas, and Password Aging Rules |
| | | IP Assignment and Downloadable ACLs |
| | | Using TACACS+ for Group Configuration |
| | | Summary |
| | | End Notes |
| | | Chapter 9. Managing Network Configurations |
| | | Configuring a Distributed System |
| | | Configuring Network Device Groups |
| | | Configuring Proxy Distribution Tables |
| | | Using Remote Accounting |
| | | Using Network Device Searches |
| | | Creating a Complete Distributed Network |
| | | Client Configuration |
| | | Troubleshooting Network Configurations |
| | | Summary |
| | | Chapter 10. Configuring Shared Profile Components |
| | | Downloadable ACLs |
| | | Network Access Restrictions |
| | | Configuring Network Access Restrictions |
| | | Command Authorization Sets |
| | | Troubleshooting Extended Configurations |
| | | Common Issues of Network Access Restrictions |
| | | And Do Not Forget the Importance of Documentation |
| | | Summary |
| | | Chapter 11. System Configuration |
| | | How Users Interact with Your External Database Configuration |
| | | External Database Configuration |
| | | Database Group Mappings |
| | | Unknown User Policy |
| | | Database Replication |
| | | Synchronization of ACS Devices |
| | | Summary |
| | | End Notes |
| | | Chapter 12. Reports and Logging for Windows Server |
| | | ACS Reports |
| | | Logging Attributes in ACS Reports |
| | | ACS Reports |
| | | Remote Logging with ACS |
| | | Additional Logs Maintained by ACS |
| | | Summary |
| | | Chapter 13. Exploring TACACS+ Attribute Values |
| | | TACACS+ AV Pairs Overview |
| | | Attributes of TACACS+ AV Pairs |
| | | AV Pair Example PPP Network |
| | | Understanding TACACS+ AV Pairs in the ACS Interface |
| | | Summary |
| | Part III. Service Provider AAA and the Cisco Access Registrar |
| | | Chapter 14. Service Provider AAA and the Cisco CNS Access Registrar |
| | | Service Provider (SP) Model |
| | | Service Provider Challenge |
| | | Value Added Services |
| | | Cisco CNS Access Registrar |
| | | Options of AR |
| | | AR's Architecture |
| | | Installation Requirements for AR on Solaris 8 |
| | | Installing AR |
| | | AR's Subdirectories |
| | | Configuring Cisco CNS AR |
| | | Summary |
| | | End Notes |
| | | Chapter 15. Configuring the Cisco Access Registrar |
| | | Using aregcmd to Configure AR |
| | | AR's Server Object Hierarchy |
| | | Configuring the ACE ISP as a Basic Site |
| | | Configuring AR's Administrators |
| | | Configuring the RADIUS Server |
| | | Validating and Saving Your Changes to AR |
| | | Testing Your Configuration |
| | | Troubleshooting Your Configuration with trace |
| | | Summary |
| | | End Notes |
| | Part IV. Appendix |
| | | Appendix A. RADIUS Attribute Tables |
| | | 3000 Series Concentrator VSAs |
| | | Cisco VPN 5000 Concentrator RADIUS VSAs |
| | | Cisco Building Broadband Service Manager Dictionary of RADIUS VSA |
| | | IETF Dictionary of RADIUS Attribute Value Pairs |
| | | Microsoft Radius VSAs |
| | | Ascend RADIUS |
| | | Nortel RADIUS |
| | | Juniper RADIUS |
| | Index |