Flylib.com
Cisco Access Control Security: AAA Administration Services
Cisco Access Control Security: AAA Administration Services
ISBN: 1587051249
EAN: 2147483647
Year: 2006
Pages: 173
Authors:
Brandon James Carroll
BUY ON AMAZON
Cisco Access Control Security: AAA Administrative Services
Table of Contents
Copyright
About the Author
About the Technical Reviewers
Acknowledgments
Icons Used in This Book
Introduction
How This Book Is Organized
Target Audience
Features of this Book
Troubleshooting
PartI.AAA Overview
Chapter1.Authentication, Authorization, and Accounting Overview
Authentication Overview
Authentication Example
Authorization Overview
Authorization Example
Accounting Overview
Accounting Example
Cisco Device Support for AAA
Summary
End Notes
Chapter2.TACACS and RADIUS
A Brief Overview of TACACS
A Brief Overview of RADIUS
TACACS in Detail
RADIUS in Detail
Summary
End Notes
Chapter3.Authentication Configuration on Cisco Routers
Local Authentication
Authentication Configurations Using Cisco Secure ACS for Windows Server and Cisco Secure ACS Solution Engine
Debugging Authentication
Authentication Command References
Summary
PartII.Enterprise AAA and Cisco Secure Access Control Server
Chapter4.Enterprise Authentication Servers
Cisco Secure Access Control Server Software and Versions
Cisco Secure Solution Engine
Summary
Chapter5.Deploying Cisco Secure Access Control Server for Windows Server
What Is ACS?
How to Obtain ACS
Requirements to Run ACS Version 3.2
Installing ACS
Reinstalling ACS and Using an Existing ACS Database
Positioning ACS in Your Network
Summary
Chapter6.Getting Familiar with CSACS
Navigating the HTML Interface
Starting Point for Configuring Your Server
Configuring Your Interface
Preparing to Add Users
Summary
Chapter7.Configuring User Accounts
Adding Users to the Database
User Changeable Passwords
Authenticating Users to a Windows NT2000 Database
Advanced Configurations
Summary
End Notes
Chapter8.Configuring User Groups
Group-Level Configuration of ACS
PPP Callback Configuration
Configuring Network Access Restrictions
Max Sessions, Usage Quotas, and Password Aging Rules
IP Assignment and Downloadable ACLs
Using TACACS for Group Configuration
Summary
End Notes
Chapter9.Managing Network Configurations
Configuring a Distributed System
Configuring Network Device Groups
Configuring Proxy Distribution Tables
Using Remote Accounting
Using Network Device Searches
Creating a Complete Distributed Network
Client Configuration
Troubleshooting Network Configurations
Summary
Chapter10.Configuring Shared Profile Components
Downloadable ACLs
Network Access Restrictions
Configuring Network Access Restrictions
Command Authorization Sets
Troubleshooting Extended Configurations
Common Issues of Network Access Restrictions
And Do Not Forget the Importance of Documentation
Summary
Chapter11.System Configuration
How Users Interact with Your External Database Configuration
External Database Configuration
Database Group Mappings
Unknown User Policy
Database Replication
Synchronization of ACS Devices
Summary
End Notes
Chapter12.Reports and Logging for Windows Server
ACS Reports
Logging Attributes in ACS Reports
ACS Reports
Remote Logging with ACS
Additional Logs Maintained by ACS
Summary
Chapter13.Exploring TACACS Attribute Values
TACACS AV Pairs Overview
Attributes of TACACS AV Pairs
AV Pair Example PPP Network
Understanding TACACS AV Pairs in the ACS Interface
Summary
PartIII.Service Provider AAA and the Cisco Access Registrar
Chapter14.Service Provider AAA and the Cisco CNS Access Registrar
Service Provider (SP) Model
Service Provider Challenge
Value Added Services
Cisco CNS Access Registrar
Options of AR
AR s Architecture
Installation Requirements for AR on Solaris 8
Installing AR
AR s Subdirectories
Configuring Cisco CNS AR
Summary
End Notes
Chapter15.Configuring the Cisco Access Registrar
Using aregcmd to Configure AR
AR s Server Object Hierarchy
Configuring the ACE ISP as a Basic Site
Configuring AR s Administrators
Configuring the RADIUS Server
Validating and Saving Your Changes to AR
Testing Your Configuration
Troubleshooting Your Configuration with trace
Summary
End Notes
PartIV.Appendix
AppendixA.RADIUS Attribute Tables
3000 Series Concentrator VSAs
Cisco VPN 5000 Concentrator RADIUS VSAs
Cisco Building Broadband Service Manager Dictionary of RADIUS VSA
IETF Dictionary of RADIUS Attribute Value Pairs
Microsoft Radius VSAs
Ascend RADIUS
Nortel RADIUS
Juniper RADIUS
Index
SYMBOL
A
B
C
D
E
F
G
H
I
J
L
M
N
O
P
R
S
T
U
V
W
X
Z
Cisco Access Control Security: AAA Administration Services
ISBN: 1587051249
EAN: 2147483647
Year: 2006
Pages: 173
Authors:
Brandon James Carroll
BUY ON AMAZON
Strategies for Information Technology Governance
Assessing Business-IT Alignment Maturity
Linking the IT Balanced Scorecard to the Business Objectives at a Major Canadian Financial Group
Measuring and Managing E-Business Initiatives Through the Balanced Scorecard
The Evolution of IT Governance at NB Power
Governance Structures for IT in the Health Care Industry
Identifying and Managing Project Risk: Essential Tools for Failure-Proofing Your Project
Identifying Project Resource Risk
Managing Project Constraints and Documenting Risks
Quantifying and Analyzing Activity Risks
Monitoring and Controlling Risky Projects
Closing Projects
Documenting Software Architectures: Views and Beyond
Uses Style
Shared-Data Style
Discussion Questions
A Standard Organization for Interface Documentation
Appendix A. Excerpts from a Software Architecture Documentation Package
Introduction to 80x86 Assembly Language and Computer Architecture
Representing Data in a Computer
Floating-Point Arithmetic
Decimal Arithmetic
Input/Output
Appendix E 80x86 Instructions (by Opcode)
Practical Intrusion Analysis: Prevention and Detection for the Twenty-First Century: Prevention and Detection for the Twenty-First Century
Understanding Intrusion Detection
Crash Course in the Internet Protocol Suite
Unauthorized Activity II
NFR Security
Security Business Issues
User Interfaces in C#: Windows Forms and Custom Controls
Control Class Basics
Forms
Data Controls
Dynamic User Interface
GDI+ Controls
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies