Flylib.com
Cisco Access Control Security: AAA Administration Services
Cisco Access Control Security: AAA Administration Services
ISBN: 1587051249
EAN: 2147483647
Year: 2006
Pages: 173
Authors:
Brandon James Carroll
BUY ON AMAZON
Cisco Access Control Security: AAA Administrative Services
Table of Contents
Copyright
About the Author
About the Technical Reviewers
Acknowledgments
Icons Used in This Book
Introduction
How This Book Is Organized
Target Audience
Features of this Book
Troubleshooting
PartI.AAA Overview
Chapter1.Authentication, Authorization, and Accounting Overview
Authentication Overview
Authentication Example
Authorization Overview
Authorization Example
Accounting Overview
Accounting Example
Cisco Device Support for AAA
Summary
End Notes
Chapter2.TACACS and RADIUS
A Brief Overview of TACACS
A Brief Overview of RADIUS
TACACS in Detail
RADIUS in Detail
Summary
End Notes
Chapter3.Authentication Configuration on Cisco Routers
Local Authentication
Authentication Configurations Using Cisco Secure ACS for Windows Server and Cisco Secure ACS Solution Engine
Debugging Authentication
Authentication Command References
Summary
PartII.Enterprise AAA and Cisco Secure Access Control Server
Chapter4.Enterprise Authentication Servers
Cisco Secure Access Control Server Software and Versions
Cisco Secure Solution Engine
Summary
Chapter5.Deploying Cisco Secure Access Control Server for Windows Server
What Is ACS?
How to Obtain ACS
Requirements to Run ACS Version 3.2
Installing ACS
Reinstalling ACS and Using an Existing ACS Database
Positioning ACS in Your Network
Summary
Chapter6.Getting Familiar with CSACS
Navigating the HTML Interface
Starting Point for Configuring Your Server
Configuring Your Interface
Preparing to Add Users
Summary
Chapter7.Configuring User Accounts
Adding Users to the Database
User Changeable Passwords
Authenticating Users to a Windows NT2000 Database
Advanced Configurations
Summary
End Notes
Chapter8.Configuring User Groups
Group-Level Configuration of ACS
PPP Callback Configuration
Configuring Network Access Restrictions
Max Sessions, Usage Quotas, and Password Aging Rules
IP Assignment and Downloadable ACLs
Using TACACS for Group Configuration
Summary
End Notes
Chapter9.Managing Network Configurations
Configuring a Distributed System
Configuring Network Device Groups
Configuring Proxy Distribution Tables
Using Remote Accounting
Using Network Device Searches
Creating a Complete Distributed Network
Client Configuration
Troubleshooting Network Configurations
Summary
Chapter10.Configuring Shared Profile Components
Downloadable ACLs
Network Access Restrictions
Configuring Network Access Restrictions
Command Authorization Sets
Troubleshooting Extended Configurations
Common Issues of Network Access Restrictions
And Do Not Forget the Importance of Documentation
Summary
Chapter11.System Configuration
How Users Interact with Your External Database Configuration
External Database Configuration
Database Group Mappings
Unknown User Policy
Database Replication
Synchronization of ACS Devices
Summary
End Notes
Chapter12.Reports and Logging for Windows Server
ACS Reports
Logging Attributes in ACS Reports
ACS Reports
Remote Logging with ACS
Additional Logs Maintained by ACS
Summary
Chapter13.Exploring TACACS Attribute Values
TACACS AV Pairs Overview
Attributes of TACACS AV Pairs
AV Pair Example PPP Network
Understanding TACACS AV Pairs in the ACS Interface
Summary
PartIII.Service Provider AAA and the Cisco Access Registrar
Chapter14.Service Provider AAA and the Cisco CNS Access Registrar
Service Provider (SP) Model
Service Provider Challenge
Value Added Services
Cisco CNS Access Registrar
Options of AR
AR s Architecture
Installation Requirements for AR on Solaris 8
Installing AR
AR s Subdirectories
Configuring Cisco CNS AR
Summary
End Notes
Chapter15.Configuring the Cisco Access Registrar
Using aregcmd to Configure AR
AR s Server Object Hierarchy
Configuring the ACE ISP as a Basic Site
Configuring AR s Administrators
Configuring the RADIUS Server
Validating and Saving Your Changes to AR
Testing Your Configuration
Troubleshooting Your Configuration with trace
Summary
End Notes
PartIV.Appendix
AppendixA.RADIUS Attribute Tables
3000 Series Concentrator VSAs
Cisco VPN 5000 Concentrator RADIUS VSAs
Cisco Building Broadband Service Manager Dictionary of RADIUS VSA
IETF Dictionary of RADIUS Attribute Value Pairs
Microsoft Radius VSAs
Ascend RADIUS
Nortel RADIUS
Juniper RADIUS
Index
SYMBOL
A
B
C
D
E
F
G
H
I
J
L
M
N
O
P
R
S
T
U
V
W
X
Z
Cisco Access Control Security: AAA Administration Services
ISBN: 1587051249
EAN: 2147483647
Year: 2006
Pages: 173
Authors:
Brandon James Carroll
BUY ON AMAZON
OpenSSH: A Survival Guide for Secure Shell Handling (Version 1.0)
Step 2.1 Use the OpenSSH Tool Suite to Replace Clear-Text Programs
Step 4.1 Authentication with Public Keys
Step 4.2 Passphrase Considerations
Step 4.6 How to use PuTTY Passphrase Agents
Step 5.1 General Troubleshooting
Snort Cookbook
Logging Alerts to a Database
Not Logging
Suppressing Rules
Decoding Application Traffic
Obfuscating IP Addresses
The Java Tutorial: A Short Course on the Basics, 4th Edition
Runtime Exceptions The Controversy
Working with Random Access Files
Example Four: LunarPhases
Appendix C. Collections
Path Help
Programming Microsoft ASP.NET 3.5
Web Forms Internals
Creating Bindable Grids of Data
Paging Through Data Sources
ASP.NET Security
Creating New ASP.NET Controls
.NET System Management Services
Using the System.Management Namespace
Querying WMI
Instrumenting .NET Applications with WMI
The WMI Schema
WMI Security
GDI+ Programming with C#
Some Basic GDI+ Objects
Understanding and Using Brushes
Working with Metafiles
Understanding and Using Graphics Paths
Matrix Operations in Image Processing
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies