Flylib.com
Cisco Access Control Security: AAA Administration Services
Cisco Access Control Security: AAA Administration Services
ISBN: 1587051249
EAN: 2147483647
Year: 2006
Pages: 173
Authors:
Brandon James Carroll
BUY ON AMAZON
Cisco Access Control Security: AAA Administrative Services
Table of Contents
Copyright
About the Author
About the Technical Reviewers
Acknowledgments
Icons Used in This Book
Introduction
How This Book Is Organized
Target Audience
Features of this Book
Troubleshooting
PartI.AAA Overview
Chapter1.Authentication, Authorization, and Accounting Overview
Authentication Overview
Authentication Example
Authorization Overview
Authorization Example
Accounting Overview
Accounting Example
Cisco Device Support for AAA
Summary
End Notes
Chapter2.TACACS and RADIUS
A Brief Overview of TACACS
A Brief Overview of RADIUS
TACACS in Detail
RADIUS in Detail
Summary
End Notes
Chapter3.Authentication Configuration on Cisco Routers
Local Authentication
Authentication Configurations Using Cisco Secure ACS for Windows Server and Cisco Secure ACS Solution Engine
Debugging Authentication
Authentication Command References
Summary
PartII.Enterprise AAA and Cisco Secure Access Control Server
Chapter4.Enterprise Authentication Servers
Cisco Secure Access Control Server Software and Versions
Cisco Secure Solution Engine
Summary
Chapter5.Deploying Cisco Secure Access Control Server for Windows Server
What Is ACS?
How to Obtain ACS
Requirements to Run ACS Version 3.2
Installing ACS
Reinstalling ACS and Using an Existing ACS Database
Positioning ACS in Your Network
Summary
Chapter6.Getting Familiar with CSACS
Navigating the HTML Interface
Starting Point for Configuring Your Server
Configuring Your Interface
Preparing to Add Users
Summary
Chapter7.Configuring User Accounts
Adding Users to the Database
User Changeable Passwords
Authenticating Users to a Windows NT2000 Database
Advanced Configurations
Summary
End Notes
Chapter8.Configuring User Groups
Group-Level Configuration of ACS
PPP Callback Configuration
Configuring Network Access Restrictions
Max Sessions, Usage Quotas, and Password Aging Rules
IP Assignment and Downloadable ACLs
Using TACACS for Group Configuration
Summary
End Notes
Chapter9.Managing Network Configurations
Configuring a Distributed System
Configuring Network Device Groups
Configuring Proxy Distribution Tables
Using Remote Accounting
Using Network Device Searches
Creating a Complete Distributed Network
Client Configuration
Troubleshooting Network Configurations
Summary
Chapter10.Configuring Shared Profile Components
Downloadable ACLs
Network Access Restrictions
Configuring Network Access Restrictions
Command Authorization Sets
Troubleshooting Extended Configurations
Common Issues of Network Access Restrictions
And Do Not Forget the Importance of Documentation
Summary
Chapter11.System Configuration
How Users Interact with Your External Database Configuration
External Database Configuration
Database Group Mappings
Unknown User Policy
Database Replication
Synchronization of ACS Devices
Summary
End Notes
Chapter12.Reports and Logging for Windows Server
ACS Reports
Logging Attributes in ACS Reports
ACS Reports
Remote Logging with ACS
Additional Logs Maintained by ACS
Summary
Chapter13.Exploring TACACS Attribute Values
TACACS AV Pairs Overview
Attributes of TACACS AV Pairs
AV Pair Example PPP Network
Understanding TACACS AV Pairs in the ACS Interface
Summary
PartIII.Service Provider AAA and the Cisco Access Registrar
Chapter14.Service Provider AAA and the Cisco CNS Access Registrar
Service Provider (SP) Model
Service Provider Challenge
Value Added Services
Cisco CNS Access Registrar
Options of AR
AR s Architecture
Installation Requirements for AR on Solaris 8
Installing AR
AR s Subdirectories
Configuring Cisco CNS AR
Summary
End Notes
Chapter15.Configuring the Cisco Access Registrar
Using aregcmd to Configure AR
AR s Server Object Hierarchy
Configuring the ACE ISP as a Basic Site
Configuring AR s Administrators
Configuring the RADIUS Server
Validating and Saving Your Changes to AR
Testing Your Configuration
Troubleshooting Your Configuration with trace
Summary
End Notes
PartIV.Appendix
AppendixA.RADIUS Attribute Tables
3000 Series Concentrator VSAs
Cisco VPN 5000 Concentrator RADIUS VSAs
Cisco Building Broadband Service Manager Dictionary of RADIUS VSA
IETF Dictionary of RADIUS Attribute Value Pairs
Microsoft Radius VSAs
Ascend RADIUS
Nortel RADIUS
Juniper RADIUS
Index
SYMBOL
A
B
C
D
E
F
G
H
I
J
L
M
N
O
P
R
S
T
U
V
W
X
Z
Cisco Access Control Security: AAA Administration Services
ISBN: 1587051249
EAN: 2147483647
Year: 2006
Pages: 173
Authors:
Brandon James Carroll
BUY ON AMAZON
High-Speed Signal Propagation[c] Advanced Black Magic
Approximations to the Fourier Transform
UTP Connectors
150-Ohm STP-A Cabling
Daisy-Chain Clock Distribution
Appendix A. Building a Signal Integrity Department
Data Structures and Algorithms in Java
Interfaces
The Comparable Interface
Tree Traversal
Disjoint Set Clusters
Minimum Spanning Trees
Introducing Microsoft ASP.NET AJAX (Pro - Developer)
The Pulsing Heart of ASP.NET AJAX
Partial Page Rendering
The AJAX Control Toolkit
Built-in Application Services
Remote Method Calls with ASP.NET AJAX
Junos Cookbook (Cookbooks (OReilly))
Forcibly Logging a User Out
Using the Management Interface
Filtering Traffic Transiting the Router
Creating a Not-So-Stubby Area
Verifying that an LDP-Signaled LSP Is Carrying Traffic
Lean Six Sigma for Service : How to Use Lean Speed and Six Sigma Quality to Improve Services and Transactions
Success Story #1 Lockheed Martin Creating a New Legacy
Seeing Services Through Your Customers Eyes-Becoming a customer-centered organization
Success Story #4 Stanford Hospital and Clinics At the forefront of the quality revolution
Using DMAIC to Improve Service Processes
First Wave Service Projects
Python Programming for the Absolute Beginner, 3rd Edition
Complete Program Examples
Where to Go from Here
Other Client-Side Tools
Sending Files to Clients and Servers
Parser Generators
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies