OneStart

Cisco 2509 - Router - EN manuals

2509 - Router - EN first page preview

2509 - Router - EN

Brand: Cisco | Category: Controller
Table of contents
2509 - Router - EN first page preview

2509 - Router - EN

Brand: Cisco | Category: Software
Table of contents
  1. Table Of Contents
  2. Table Of Contents
  3. Table Of Contents
  4. Table Of Contents
  5. Table Of Contents
  6. Table Of Contents
  7. Table Of Contents
  8. Table Of Contents
  9. Table Of Contents
  10. Table Of Contents
  11. Table Of Contents
  12. Table Of Contents
  13. Table Of Contents
  14. Table Of Contents
  15. Table Of Contents
  16. Table Of Contents
  17. Table Of Contents
  18. Table Of Contents
  19. Table Of Contents
  20. Table Of Contents
  21. related documentation
  22. obtaining documentation
  23. documentation feedback
  24. technical assistance center
  25. AAA Protocols—TACACS+ and RADIUS
  26. Authentication
  27. Authentication Considerations
  28. Authentication Protocol-Database Compatibility
  29. Passwords
  30. Other Authentication-Related Features
  31. Max Sessions
  32. Dynamic Usage Quotas
  33. Support for Cisco Device-Management Applications
  34. Other Authorization-Related Features
  35. Accounting
  36. Administration
  37. Network Device Groups
  38. Cisco Secure ACS HTML Interface
  39. HTML Interface Security
  40. HTML Interface Layout
  41. Uniform Resource Locator for the HTML Interface
  42. Network Environments and Remote Administrative Sessions
  43. Remote Administrative Sessions through Firewalls
  44. Accessing the HTML Interface
  45. Online Help and Online Documentation
  46. Using the Online Documentation
  47. Chapter 2 Deploying Cisco Secure AC
  48. Third-Party Software Requirements
  49. Network Requirements
  50. Basic Deployment Factors for Cisco Secure ACS
  51. Wireless Network
  52. Remote Access using VPN
  53. Remote Access Policy
  54. Security Policy
  55. Separation of Administrative and General Users
  56. Database
  57. Network Latency and Reliability
  58. advanced options
  59. C H A P T E R 4 Setting Up and Managing Network Configuration
  60. About Distributed Systems
  61. Default Distributed System Settings
  62. Fallback on Failed Connection
  63. Proxy in an Enterprise
  64. Other Features Enabled by System Distribution
  65. Network Device Search Criteria
  66. Searching for Network Devices
  67. AAA Client Configuration
  68. Adding a AAA Client
  69. Editing a AAA Client
  70. Deleting a AAA Client
  71. AAA Server Configuration
  72. AAA Server Configuration Options
  73. Adding a AAA Server
  74. Editing a AAA Server
  75. Deleting a AAA Server
  76. Adding a Network Device Group
  77. Assigning an Unassigned AAA Client or AAA Server to an NDG
  78. Reassigning a AAA Client or AAA Server to an NDG
  79. Renaming a Network Device Group
  80. Proxy Distribution Table Configuration
  81. Adding a New Proxy Distribution Table Entry
  82. Sorting the Character String Match Order of Distribution Entries
  83. Deleting a Proxy Distribution Table Entry
  84. About Shared Profile Components
  85. C H A P T E R 5 Setting Up and Managing Shared Profile Components
  86. Downloadable PIX ACL Configuration
  87. Editing a Downloadable PIX ACL
  88. Network Access Restrictions
  89. Shared Network Access Restrictions Configuration
  90. Adding a Shared Network Access Restriction
  91. Editing a Shared Network Access Restriction
  92. Deleting a Shared Network Access Restriction
  93. About Command Authorization Sets
  94. About Pattern Matching
  95. Command Authorization Sets Configuration
  96. Editing a Command Authorization Set
  97. Deleting a Command Authorization Set
  98. Chapter 6 Setting Up and Managing User Group
  99. Common User Group Settings
  100. Enabling VoIP Support for a User Group
  101. Setting Default Time-of-Day Access for a User Group
  102. Setting Callback Options for a User Group
  103. Setting Network Access Restrictions for a User Group
  104. Setting Max Sessions for a User Group
  105. Setting Usage Quotas for a User Group
  106. Configuration-specific User Group Settings
  107. Setting Token Card Settings for a User Group
  108. Setting Enable Privilege Options for a User Group
  109. Enabling Password Aging for the CiscoSecure User Database
  110. Enabling Password Aging for Users in Windows Databases
  111. Setting IP Address Assignment Method for a User Group
  112. Assigning a Downloadable PIX ACL to a Group
  113. Configuring TACACS+ Settings for a User Group
  114. Configuring a Shell Command Authorization Set for a User Group
  115. Configuring a PIX Command Authorization Set for a User Group
  116. Group
  117. Configuring IETF RADIUS Settings for a User Group
  118. Configuring Cisco IOS/PIX RADIUS Settings for a User Group
  119. Configuring Cisco Aironet RADIUS Settings for a User Group
  120. Configuring Ascend RADIUS Settings for a User Group
  121. Configuring Cisco VPN 3000 Concentrator RADIUS Settings for a User Group
  122. Configuring Cisco VPN 5000 Concentrator RADIUS Settings for a User Group
  123. Configuring Microsoft RADIUS Settings for a User Group
  124. Configuring Nortel RADIUS Settings for a User Group
  125. Configuring Juniper RADIUS Settings for a User Group
  126. Configuring BBSM RADIUS Settings for a User Group
  127. Configuring Custom RADIUS VSA Settings for a User Group
  128. Group Setting Management
  129. Listing Users in a User Group
  130. Renaming a User Group
  131. Chapter 7 Setting Up and Managing User Account
  132. Basic User Setup Options
  133. Adding a Basic User Account
  134. Setting Supplementary User Information
  135. Setting a Separate CHAP/MS-CHAP/ARAP Password
  136. Assigning a User to a Group
  137. Setting User Callback Option
  138. Assigning a User to a Client IP Address
  139. Setting Network Access Restrictions for a User
  140. Setting Max Sessions Options for a User
  141. Setting User Usage Quotas Options
  142. Setting Options for User Account Disablement
  143. Assigning a PIX ACL to a User
  144. Advanced User Authentication Settings
  145. Configuring TACACS+ Settings for a User
  146. Configuring a Shell Command Authorization Set for a User
  147. Configuring a PIX Command Authorization Set for a User
  148. Configuring Device Management Command Authorization for a User
  149. Configuring the Unknown Service Setting for a User
  150. Advanced TACACS+ Settings (User)
  151. Setting TACACS+ Enable Password Options for a User
  152. Setting TACACS+ Outbound Password for a User
  153. RADIUS Attributes
  154. Setting IETF RADIUS Parameters for a User
  155. Setting Cisco IOS/PIX RADIUS Parameters for a User
  156. Setting Cisco Aironet RADIUS Parameters for a User
  157. Setting Ascend RADIUS Parameters for a User
  158. User
  159. Setting Microsoft RADIUS Parameters for a User
  160. Setting Nortel RADIUS Parameters for a User
  161. Setting Juniper RADIUS Parameters for a User
  162. Setting BBSM RADIUS Parameters for a User
  163. Setting Custom RADIUS Attributes for a User
  164. User Management
  165. Listing All Users
  166. Disabling a User Account
  167. Deleting a User Account
  168. Resetting User Session Quota Counters
  169. Resetting a User Account after Login Failure
  170. Saving User Settings
  171. C H A P T E R 8 Establishing Cisco Secure ACS System Configuration
  172. Logging
  173. Setting the Date Format
  174. Local Password Management
  175. Configuring Local Password Management
  176. CiscoSecure Database Replication
  177. Replication Process
  178. Replication Frequency
  179. Important Implementation Considerations
  180. Database Replication Versus Database Backup
  181. Database Replication Logging
  182. Outbound Replication Options
  183. Inbound Replication Options
  184. Configuring a Secondary Cisco Secure ACS
  185. Replicating Immediately
  186. Scheduling Replication
  187. Disabling CiscoSecure Database Replication
  188. About RDBMS Synchronization
  189. Users
  190. User Groups
  191. Custom RADIUS Vendors and VSAs
  192. About the accountActions Table
  193. Cisco Secure ACS Database Recovery Using the accountActions Table
  194. Reports and Event (Error) Handling
  195. Considerations for Using CSV-Based Synchronization
  196. Preparing for CSV-Based Synchronization
  197. Configuring a System Data Source Name for RDBMS Synchronization
  198. RDBMS Synchronization Options
  199. Synchronization Scheduling Options
  200. Performing RDBMS Synchronization Immediately
  201. Scheduling RDBMS Synchronization
  202. Disabling Scheduled RDBMS Synchronizations
  203. Cisco Secure ACS Backup
  204. Backup File Locations
  205. Reports of Cisco Secure ACS Backups
  206. Performing a Manual Cisco Secure ACS Backup
  207. Disabling Scheduled Cisco Secure ACS Backups
  208. Cisco Secure ACS System Restore
  209. Backup File Names and Locations
  210. Components Restored
  211. Cisco Secure ACS Active Service Management
  212. System Monitoring
  213. Setting Up System Monitoring
  214. Event Logging
  215. IP Pools Server
  216. About IP Pools Server
  217. Allowing Overlapping IP Pools or Forcing Unique Pool Address Ranges
  218. Refreshing the AAA Server IP Pools Table
  219. Adding a New IP Pool
  220. Editing an IP Pool Definition
  221. Resetting an IP Pool
  222. Deleting an IP Pool
  223. IP Pools Address Recovery
  224. VoIP Accounting Configuration
  225. Cisco Secure ACS Certificate Setup
  226. About the EAP-TLS Protocol
  227. About the PEAP Protocol
  228. Installing a Cisco Secure ACS Server Certificate
  229. Adding a Certificate Authority Certificate
  230. Editing the Certificate Trust List
  231. Generating a Certificate Signing Request
  232. Updating or Replacing a Cisco Secure ACS Certificate
  233. Global Authentication Setup
  234. Logging Formats
  235. Special Logging Attributes
  236. Chapter 9 Working with Logging and Report
  237. Update Packets In Accounting Logs
  238. Accounting Logs
  239. Dynamic Administration Reports
  240. Viewing the Logged-in Users Report
  241. Deleting Logged-in Users
  242. Viewing the Disabled Accounts Report
  243. Cisco Secure ACS System Logs
  244. Configuring the Administration Audit Log
  245. Working with CSV Logs
  246. Enabling or Disabling a CSV Log
  247. Viewing a CSV Report
  248. Configuring a CSV Log
  249. Working with ODBC Logs
  250. Configuring a System Data Source Name for ODBC Logging
  251. Remote Logging
  252. Implementing Centralized Remote Logging
  253. Remote Logging Options
  254. Enabling and Configuring Remote Logging
  255. Disabling Remote Logging
  256. Services Logged
  257. Configuring Service Logs
  258. Administrator Accounts
  259. C H A P T E R 10 Setting Up and Managing Administrators and Policy
  260. Administrator Privileges
  261. Adding an Administrator Account
  262. Editing an Administrator Account
  263. Unlocking a Locked Out Administrator Account
  264. Deleting an Administrator Account
  265. Access Policy Options
  266. Setting Up Access Policy
  267. Session Policy
  268. Setting Up Session Policy
  269. Audit Policy
  270. CiscoSecure User Database
  271. Chapter 11 Working with User Database
  272. About External User Databases
  273. Authenticating with External User Databases
  274. External User Database Authentication Process
  275. Windows NT/2000 User Database
  276. What's Supported with Windows NT/2000 User Databases
  277. Databases
  278. Windows Dial-up Networking Clients
  279. Windows Dial-up Networking Clients without a Domain Field
  280. User-Changeable Passwords with Windows NT/2000 User Databases
  281. Preparing Users for Authenticating with Windows NT/2000
  282. Generic LDAP
  283. Multiple LDAP Instances
  284. LDAP Organizational Units and Groups
  285. LDAP Failover
  286. Successful Previous Authentication with the Primary LDAP Server
  287. LDAP Configuration Options
  288. Configuring a Generic LDAP External User Database
  289. Novell NDS Database
  290. About Novell NDS User Databases
  291. User Contexts
  292. Novell NDS External User Database Options
  293. Configuring a Novell NDS External User Database
  294. ODBC Database
  295. What is Supported with ODBC User Databases
  296. Implementation of Stored Procedures for ODBC Authentication
  297. Type Definitions
  298. Sample Routine for Generating a PAP Authentication SQL Procedure
  299. Procedure
  300. PAP Procedure Output
  301. CHAP/MS-CHAP/ARAP Authentication Procedure Input
  302. Result Codes
  303. Configuring an ODBC External User Database
  304. LEAP Proxy RADIUS Server Database
  305. Configuring a LEAP Proxy RADIUS Server External User Database
  306. Token Server User Databases
  307. Token Servers and ISDN
  308. RADIUS-Enabled Token Servers
  309. Token Server RADIUS Authentication Request and Response Contents
  310. RSA SecurID Token Servers
  311. Configuring an RSA SecurID Token Server External User Database
  312. Deleting an External User Database Configuration
  313. Unknown User Processing
  314. C H A P T E R 12 Administering External User Databases
  315. General Authentication Request Handling and Rejection Mode
  316. Authentication Request Handling and Rejection Mode with the Windows NT/2000 User Database
  317. Windows Authentication with a Domain Specified
  318. Windows Authentication with Domain Omitted
  319. Performance of Unknown User Authentication
  320. Network Access Authorization
  321. Database Search Order
  322. Turning off External User Database Authentication
  323. Group Mapping by External User Database
  324. Database, or LEAP Proxy RADIUS Server Database
  325. Group Mapping by Group Set Membership
  326. Group Mapping Order
  327. Default Group Mapping for Windows NT/2000
  328. Mapping
  329. Configuration
  330. Changing Group Set Mapping Order
  331. RADIUS-Based Group Specification
  332. Administration Issues
  333. A P P E N D I X A Troubleshooting Information for Cisco Secure ACS
  334. Database Issues
  335. Dial-in Connection Issues
  336. Debug Issues
  337. Proxy Issues
  338. MaxSessions Issues
  339. Third-Party Server Issues
  340. User Authentication Issues
  341. TACACS+ and RADIUS Attribute Issues
  342. cisco ios av pair dictionary
  343. Appendix B TACAC+ Attribute-Value Pair
  344. TACACS+ Accounting AV Pairs
  345. Appendix C RADIU Attribute
  346. Cisco IOS Dictionary of RADIUS AV Pairs
  347. Cisco IOS/PIX Dictionary of RADIUS VSAs
  348. Cisco VPN 3000 Concentrator Dictionary of RADIUS VSAs
  349. Cisco VPN 5000 Concentrator Dictionary of RADIUS VSAs
  350. Cisco Building Broadband Service Manager Dictionary of RADIUS VSA
  351. IETF Dictionary of RADIUS AV Pairs
  352. microsoft mppe dictionary of radius vsas
  353. Microsoft MPPE Dictionary of RADIUS VSAs
  354. ascend dictionary of radius av pairs
  355. Ascend Dictionary of RADIUS AV Pairs
  356. Nortel Dictionary of RADIUS VSAs
  357. juniper dictionary of radius vsas
  358. Juniper Dictionary of RADIUS VSAs
  359. A P P E N D I X D Cisco Secure ACS Command-Line Database Utility
  360. CSUtil.exe Options
  361. Backing Up Cisco Secure ACS with CSUtil.exe
  362. Restoring Cisco Secure ACS with CSUtil.exe
  363. Creating a CiscoSecure User Database
  364. Creating a Cisco Secure ACS Database Dump File
  365. Loading the Cisco Secure ACS Database from a Dump File
  366. Compacting the CiscoSecure User Database
  367. User and AAA Client Import Option
  368. User and AAA Client Import File Format
  369. ADD Statements
  370. UPDATE Statements
  371. DELETE Statements
  372. ADD_NAS Statements
  373. DEL_NAS Statements
  374. Import File Example
  375. Exporting Group Information to a Text File
  376. Exporting Registry Information to a Text File
  377. Decoding Error Numbers
  378. Recalculating CRC Values
  379. About User-Defined RADIUS Vendors and VSA Sets
  380. Deleting a Custom RADIUS Vendor and VSA Set
  381. Listing Custom RADIUS Vendors
  382. Exporting Custom RADIUS Vendor and VSA Sets
  383. RADIUS Vendor/VSA Import File
  384. Vendor and VSA Set Definition
  385. Attribute Definition
  386. Enumeration Definition
  387. Example RADIUS Vendor/VSA Import File
  388. vpdn process
  389. A P P E N D I X E Cisco Secure ACS and Virtual Private Dial-up Networks
  390. accountactions specification
  391. A P P E N D I X F RDBMS Synchronization Import Definitions
  392. accountactions mandatory fields
  393. accountActions Mandatory Fields
  394. Action Codes
  395. Action Codes for Setting and Deleting Values
  396. Action Codes for Creating and Modifying User Accounts
  397. action codes for initializing and modifying access filters
  398. Action Codes for Initializing and Modifying Access Filters
  399. user settings
  400. Settings
  401. action codes for modifying network configuration
  402. Action Codes for Modifying Network Configuration
  403. cisco secure acs attributes and action codes
  404. Cisco Secure ACS Attributes and Action Codes
  405. User-Defined Attributes
  406. Group-Specific Attributes
  407. An Example of accountActions
  408. Windows 2000 Services
  409. Windows 2000 Registry
  410. A P P E N D I X G Cisco Secure ACS Internal Architecture
  411. CSDBSync
  412. Monitoring
  413. Recording
  414. Notification
  415. CSTacacs and CSRadius
Related products
2501 - Router - EN2524 - Router - EN2514 - Router - EN2511 - Router - EN2504 - 2504 Router2504-RF - 2504 Router2515 - 2515 Router2504-CH - 2504 Router2520 - 2520 Router2520-RF - 2520 Router
Cisco categories
More Cisco categories