Flylib.com
Cisco Access Control Security: AAA Administration Services
Cisco Access Control Security: AAA Administration Services
ISBN: 1587051249
EAN: 2147483647
Year: 2006
Pages: 173
Authors:
Brandon James Carroll
BUY ON AMAZON
Cisco Access Control Security: AAA Administrative Services
Table of Contents
Copyright
About the Author
About the Technical Reviewers
Acknowledgments
Icons Used in This Book
Introduction
How This Book Is Organized
Target Audience
Features of this Book
Troubleshooting
PartI.AAA Overview
Chapter1.Authentication, Authorization, and Accounting Overview
Authentication Overview
Authentication Example
Authorization Overview
Authorization Example
Accounting Overview
Accounting Example
Cisco Device Support for AAA
Summary
End Notes
Chapter2.TACACS and RADIUS
A Brief Overview of TACACS
A Brief Overview of RADIUS
TACACS in Detail
RADIUS in Detail
Summary
End Notes
Chapter3.Authentication Configuration on Cisco Routers
Local Authentication
Authentication Configurations Using Cisco Secure ACS for Windows Server and Cisco Secure ACS Solution Engine
Debugging Authentication
Authentication Command References
Summary
PartII.Enterprise AAA and Cisco Secure Access Control Server
Chapter4.Enterprise Authentication Servers
Cisco Secure Access Control Server Software and Versions
Cisco Secure Solution Engine
Summary
Chapter5.Deploying Cisco Secure Access Control Server for Windows Server
What Is ACS?
How to Obtain ACS
Requirements to Run ACS Version 3.2
Installing ACS
Reinstalling ACS and Using an Existing ACS Database
Positioning ACS in Your Network
Summary
Chapter6.Getting Familiar with CSACS
Navigating the HTML Interface
Starting Point for Configuring Your Server
Configuring Your Interface
Preparing to Add Users
Summary
Chapter7.Configuring User Accounts
Adding Users to the Database
User Changeable Passwords
Authenticating Users to a Windows NT2000 Database
Advanced Configurations
Summary
End Notes
Chapter8.Configuring User Groups
Group-Level Configuration of ACS
PPP Callback Configuration
Configuring Network Access Restrictions
Max Sessions, Usage Quotas, and Password Aging Rules
IP Assignment and Downloadable ACLs
Using TACACS for Group Configuration
Summary
End Notes
Chapter9.Managing Network Configurations
Configuring a Distributed System
Configuring Network Device Groups
Configuring Proxy Distribution Tables
Using Remote Accounting
Using Network Device Searches
Creating a Complete Distributed Network
Client Configuration
Troubleshooting Network Configurations
Summary
Chapter10.Configuring Shared Profile Components
Downloadable ACLs
Network Access Restrictions
Configuring Network Access Restrictions
Command Authorization Sets
Troubleshooting Extended Configurations
Common Issues of Network Access Restrictions
And Do Not Forget the Importance of Documentation
Summary
Chapter11.System Configuration
How Users Interact with Your External Database Configuration
External Database Configuration
Database Group Mappings
Unknown User Policy
Database Replication
Synchronization of ACS Devices
Summary
End Notes
Chapter12.Reports and Logging for Windows Server
ACS Reports
Logging Attributes in ACS Reports
ACS Reports
Remote Logging with ACS
Additional Logs Maintained by ACS
Summary
Chapter13.Exploring TACACS Attribute Values
TACACS AV Pairs Overview
Attributes of TACACS AV Pairs
AV Pair Example PPP Network
Understanding TACACS AV Pairs in the ACS Interface
Summary
PartIII.Service Provider AAA and the Cisco Access Registrar
Chapter14.Service Provider AAA and the Cisco CNS Access Registrar
Service Provider (SP) Model
Service Provider Challenge
Value Added Services
Cisco CNS Access Registrar
Options of AR
AR s Architecture
Installation Requirements for AR on Solaris 8
Installing AR
AR s Subdirectories
Configuring Cisco CNS AR
Summary
End Notes
Chapter15.Configuring the Cisco Access Registrar
Using aregcmd to Configure AR
AR s Server Object Hierarchy
Configuring the ACE ISP as a Basic Site
Configuring AR s Administrators
Configuring the RADIUS Server
Validating and Saving Your Changes to AR
Testing Your Configuration
Troubleshooting Your Configuration with trace
Summary
End Notes
PartIV.Appendix
AppendixA.RADIUS Attribute Tables
3000 Series Concentrator VSAs
Cisco VPN 5000 Concentrator RADIUS VSAs
Cisco Building Broadband Service Manager Dictionary of RADIUS VSA
IETF Dictionary of RADIUS Attribute Value Pairs
Microsoft Radius VSAs
Ascend RADIUS
Nortel RADIUS
Juniper RADIUS
Index
SYMBOL
A
B
C
D
E
F
G
H
I
J
L
M
N
O
P
R
S
T
U
V
W
X
Z
Cisco Access Control Security: AAA Administration Services
ISBN: 1587051249
EAN: 2147483647
Year: 2006
Pages: 173
Authors:
Brandon James Carroll
BUY ON AMAZON
Project Management JumpStart
Planning and Acquiring Resources
Assessing Risk
Closing the Books
Appendix A Answers to Review Questions
Appendix B Sample Project Management Forms
An Introduction to Design Patterns in C++ with Qt 4
Review Questions
Parameter Passing by Value
Iteration and the Visitor Pattern
Views of a QStringList
QMetaObject: The MetaObject Pattern
GO! with Microsoft Office 2003 Brief (2nd Edition)
Objective 5. Save and Print Web Pages
Objective 1. Create a Decorative Title
Objective 2. Select Parts of a Worksheet
Skill Assessments
GO! with Help
File System Forensic Analysis
FAT Data Structures
NTFS Analysis
Bibliography
Extended Attributes
Bibliography
The Lean Six Sigma Pocket Toolbook. A Quick Reference Guide to Nearly 100 Tools for Improving Process Quality, Speed, and Complexity
Voice of the Customer (VOC)
Data Collection
Descriptive Statistics and Data Displays
Complexity Value Stream Mapping and Complexity Analysis
Selecting and Testing Solutions
Cultural Imperative: Global Trends in the 21st Century
Cultural Black Holes
Cognitive Processes
The Pacific Rim: The Fourth Cultural Ecology
Culture and Globalization
Appendix A Cultural Categorization Characteristics
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies