Cisco 2509 - Router - EN manuals
2509 - Router - EN
Table of contents
2509 - Router - EN
Table of contents
- about this guide
- overview of the router
- hardware features
- cisco connection online
- ordering documentation
- preparing to install the router
- maintaining safety with electricity
- preventing electrostatic discharge damage
- general site requirements
- preparing to connect to a network
- isdn connections
- signaling standards
- ethernet connections
- token ring connections
- where to go next
- installing the router
- required tools and equipment
- setting up the chassis
- connecting the dc power supply
- connecting the console terminal and modem
- connecting a modem to the auxiliary port
- configuring the router for the first time
- cisco ios software basics
- configuring isdn
- verifying network connectivity
- isolating problems
- troubleshooting the power and cooling systems
- reading the leds
- console and auxiliary port signals and pinouts
2509 - Router - EN
Table of contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- related documentation
- obtaining documentation
- documentation feedback
- technical assistance center
- AAA Protocols—TACACS+ and RADIUS
- Authentication
- Authentication Considerations
- Authentication Protocol-Database Compatibility
- Passwords
- Other Authentication-Related Features
- Max Sessions
- Dynamic Usage Quotas
- Support for Cisco Device-Management Applications
- Other Authorization-Related Features
- Accounting
- Administration
- Network Device Groups
- Cisco Secure ACS HTML Interface
- HTML Interface Security
- HTML Interface Layout
- Uniform Resource Locator for the HTML Interface
- Network Environments and Remote Administrative Sessions
- Remote Administrative Sessions through Firewalls
- Accessing the HTML Interface
- Online Help and Online Documentation
- Using the Online Documentation
- Chapter 2 Deploying Cisco Secure AC
- Third-Party Software Requirements
- Network Requirements
- Basic Deployment Factors for Cisco Secure ACS
- Wireless Network
- Remote Access using VPN
- Remote Access Policy
- Security Policy
- Separation of Administrative and General Users
- Database
- Network Latency and Reliability
- advanced options
- C H A P T E R 4 Setting Up and Managing Network Configuration
- About Distributed Systems
- Default Distributed System Settings
- Fallback on Failed Connection
- Proxy in an Enterprise
- Other Features Enabled by System Distribution
- Network Device Search Criteria
- Searching for Network Devices
- AAA Client Configuration
- Adding a AAA Client
- Editing a AAA Client
- Deleting a AAA Client
- AAA Server Configuration
- AAA Server Configuration Options
- Adding a AAA Server
- Editing a AAA Server
- Deleting a AAA Server
- Adding a Network Device Group
- Assigning an Unassigned AAA Client or AAA Server to an NDG
- Reassigning a AAA Client or AAA Server to an NDG
- Renaming a Network Device Group
- Proxy Distribution Table Configuration
- Adding a New Proxy Distribution Table Entry
- Sorting the Character String Match Order of Distribution Entries
- Deleting a Proxy Distribution Table Entry
- About Shared Profile Components
- C H A P T E R 5 Setting Up and Managing Shared Profile Components
- Downloadable PIX ACL Configuration
- Editing a Downloadable PIX ACL
- Network Access Restrictions
- Shared Network Access Restrictions Configuration
- Adding a Shared Network Access Restriction
- Editing a Shared Network Access Restriction
- Deleting a Shared Network Access Restriction
- About Command Authorization Sets
- About Pattern Matching
- Command Authorization Sets Configuration
- Editing a Command Authorization Set
- Deleting a Command Authorization Set
- Chapter 6 Setting Up and Managing User Group
- Common User Group Settings
- Enabling VoIP Support for a User Group
- Setting Default Time-of-Day Access for a User Group
- Setting Callback Options for a User Group
- Setting Network Access Restrictions for a User Group
- Setting Max Sessions for a User Group
- Setting Usage Quotas for a User Group
- Configuration-specific User Group Settings
- Setting Token Card Settings for a User Group
- Setting Enable Privilege Options for a User Group
- Enabling Password Aging for the CiscoSecure User Database
- Enabling Password Aging for Users in Windows Databases
- Setting IP Address Assignment Method for a User Group
- Assigning a Downloadable PIX ACL to a Group
- Configuring TACACS+ Settings for a User Group
- Configuring a Shell Command Authorization Set for a User Group
- Configuring a PIX Command Authorization Set for a User Group
- Group
- Configuring IETF RADIUS Settings for a User Group
- Configuring Cisco IOS/PIX RADIUS Settings for a User Group
- Configuring Cisco Aironet RADIUS Settings for a User Group
- Configuring Ascend RADIUS Settings for a User Group
- Configuring Cisco VPN 3000 Concentrator RADIUS Settings for a User Group
- Configuring Cisco VPN 5000 Concentrator RADIUS Settings for a User Group
- Configuring Microsoft RADIUS Settings for a User Group
- Configuring Nortel RADIUS Settings for a User Group
- Configuring Juniper RADIUS Settings for a User Group
- Configuring BBSM RADIUS Settings for a User Group
- Configuring Custom RADIUS VSA Settings for a User Group
- Group Setting Management
- Listing Users in a User Group
- Renaming a User Group
- Chapter 7 Setting Up and Managing User Account
- Basic User Setup Options
- Adding a Basic User Account
- Setting Supplementary User Information
- Setting a Separate CHAP/MS-CHAP/ARAP Password
- Assigning a User to a Group
- Setting User Callback Option
- Assigning a User to a Client IP Address
- Setting Network Access Restrictions for a User
- Setting Max Sessions Options for a User
- Setting User Usage Quotas Options
- Setting Options for User Account Disablement
- Assigning a PIX ACL to a User
- Advanced User Authentication Settings
- Configuring TACACS+ Settings for a User
- Configuring a Shell Command Authorization Set for a User
- Configuring a PIX Command Authorization Set for a User
- Configuring Device Management Command Authorization for a User
- Configuring the Unknown Service Setting for a User
- Advanced TACACS+ Settings (User)
- Setting TACACS+ Enable Password Options for a User
- Setting TACACS+ Outbound Password for a User
- RADIUS Attributes
- Setting IETF RADIUS Parameters for a User
- Setting Cisco IOS/PIX RADIUS Parameters for a User
- Setting Cisco Aironet RADIUS Parameters for a User
- Setting Ascend RADIUS Parameters for a User
- User
- Setting Microsoft RADIUS Parameters for a User
- Setting Nortel RADIUS Parameters for a User
- Setting Juniper RADIUS Parameters for a User
- Setting BBSM RADIUS Parameters for a User
- Setting Custom RADIUS Attributes for a User
- User Management
- Listing All Users
- Disabling a User Account
- Deleting a User Account
- Resetting User Session Quota Counters
- Resetting a User Account after Login Failure
- Saving User Settings
- C H A P T E R 8 Establishing Cisco Secure ACS System Configuration
- Logging
- Setting the Date Format
- Local Password Management
- Configuring Local Password Management
- CiscoSecure Database Replication
- Replication Process
- Replication Frequency
- Important Implementation Considerations
- Database Replication Versus Database Backup
- Database Replication Logging
- Outbound Replication Options
- Inbound Replication Options
- Configuring a Secondary Cisco Secure ACS
- Replicating Immediately
- Scheduling Replication
- Disabling CiscoSecure Database Replication
- About RDBMS Synchronization
- Users
- User Groups
- Custom RADIUS Vendors and VSAs
- About the accountActions Table
- Cisco Secure ACS Database Recovery Using the accountActions Table
- Reports and Event (Error) Handling
- Considerations for Using CSV-Based Synchronization
- Preparing for CSV-Based Synchronization
- Configuring a System Data Source Name for RDBMS Synchronization
- RDBMS Synchronization Options
- Synchronization Scheduling Options
- Performing RDBMS Synchronization Immediately
- Scheduling RDBMS Synchronization
- Disabling Scheduled RDBMS Synchronizations
- Cisco Secure ACS Backup
- Backup File Locations
- Reports of Cisco Secure ACS Backups
- Performing a Manual Cisco Secure ACS Backup
- Disabling Scheduled Cisco Secure ACS Backups
- Cisco Secure ACS System Restore
- Backup File Names and Locations
- Components Restored
- Cisco Secure ACS Active Service Management
- System Monitoring
- Setting Up System Monitoring
- Event Logging
- IP Pools Server
- About IP Pools Server
- Allowing Overlapping IP Pools or Forcing Unique Pool Address Ranges
- Refreshing the AAA Server IP Pools Table
- Adding a New IP Pool
- Editing an IP Pool Definition
- Resetting an IP Pool
- Deleting an IP Pool
- IP Pools Address Recovery
- VoIP Accounting Configuration
- Cisco Secure ACS Certificate Setup
- About the EAP-TLS Protocol
- About the PEAP Protocol
- Installing a Cisco Secure ACS Server Certificate
- Adding a Certificate Authority Certificate
- Editing the Certificate Trust List
- Generating a Certificate Signing Request
- Updating or Replacing a Cisco Secure ACS Certificate
- Global Authentication Setup
- Logging Formats
- Special Logging Attributes
- Chapter 9 Working with Logging and Report
- Update Packets In Accounting Logs
- Accounting Logs
- Dynamic Administration Reports
- Viewing the Logged-in Users Report
- Deleting Logged-in Users
- Viewing the Disabled Accounts Report
- Cisco Secure ACS System Logs
- Configuring the Administration Audit Log
- Working with CSV Logs
- Enabling or Disabling a CSV Log
- Viewing a CSV Report
- Configuring a CSV Log
- Working with ODBC Logs
- Configuring a System Data Source Name for ODBC Logging
- Remote Logging
- Implementing Centralized Remote Logging
- Remote Logging Options
- Enabling and Configuring Remote Logging
- Disabling Remote Logging
- Services Logged
- Configuring Service Logs
- Administrator Accounts
- C H A P T E R 10 Setting Up and Managing Administrators and Policy
- Administrator Privileges
- Adding an Administrator Account
- Editing an Administrator Account
- Unlocking a Locked Out Administrator Account
- Deleting an Administrator Account
- Access Policy Options
- Setting Up Access Policy
- Session Policy
- Setting Up Session Policy
- Audit Policy
- CiscoSecure User Database
- Chapter 11 Working with User Database
- About External User Databases
- Authenticating with External User Databases
- External User Database Authentication Process
- Windows NT/2000 User Database
- What's Supported with Windows NT/2000 User Databases
- Databases
- Windows Dial-up Networking Clients
- Windows Dial-up Networking Clients without a Domain Field
- User-Changeable Passwords with Windows NT/2000 User Databases
- Preparing Users for Authenticating with Windows NT/2000
- Generic LDAP
- Multiple LDAP Instances
- LDAP Organizational Units and Groups
- LDAP Failover
- Successful Previous Authentication with the Primary LDAP Server
- LDAP Configuration Options
- Configuring a Generic LDAP External User Database
- Novell NDS Database
- About Novell NDS User Databases
- User Contexts
- Novell NDS External User Database Options
- Configuring a Novell NDS External User Database
- ODBC Database
- What is Supported with ODBC User Databases
- Implementation of Stored Procedures for ODBC Authentication
- Type Definitions
- Sample Routine for Generating a PAP Authentication SQL Procedure
- Procedure
- PAP Procedure Output
- CHAP/MS-CHAP/ARAP Authentication Procedure Input
- Result Codes
- Configuring an ODBC External User Database
- LEAP Proxy RADIUS Server Database
- Configuring a LEAP Proxy RADIUS Server External User Database
- Token Server User Databases
- Token Servers and ISDN
- RADIUS-Enabled Token Servers
- Token Server RADIUS Authentication Request and Response Contents
- RSA SecurID Token Servers
- Configuring an RSA SecurID Token Server External User Database
- Deleting an External User Database Configuration
- Unknown User Processing
- C H A P T E R 12 Administering External User Databases
- General Authentication Request Handling and Rejection Mode
- Authentication Request Handling and Rejection Mode with the Windows NT/2000 User Database
- Windows Authentication with a Domain Specified
- Windows Authentication with Domain Omitted
- Performance of Unknown User Authentication
- Network Access Authorization
- Database Search Order
- Turning off External User Database Authentication
- Group Mapping by External User Database
- Database, or LEAP Proxy RADIUS Server Database
- Group Mapping by Group Set Membership
- Group Mapping Order
- Default Group Mapping for Windows NT/2000
- Mapping
- Configuration
- Changing Group Set Mapping Order
- RADIUS-Based Group Specification
- Administration Issues
- A P P E N D I X A Troubleshooting Information for Cisco Secure ACS
- Database Issues
- Dial-in Connection Issues
- Debug Issues
- Proxy Issues
- MaxSessions Issues
- Third-Party Server Issues
- User Authentication Issues
- TACACS+ and RADIUS Attribute Issues
- cisco ios av pair dictionary
- Appendix B TACAC+ Attribute-Value Pair
- TACACS+ Accounting AV Pairs
- Appendix C RADIU Attribute
- Cisco IOS Dictionary of RADIUS AV Pairs
- Cisco IOS/PIX Dictionary of RADIUS VSAs
- Cisco VPN 3000 Concentrator Dictionary of RADIUS VSAs
- Cisco VPN 5000 Concentrator Dictionary of RADIUS VSAs
- Cisco Building Broadband Service Manager Dictionary of RADIUS VSA
- IETF Dictionary of RADIUS AV Pairs
- microsoft mppe dictionary of radius vsas
- Microsoft MPPE Dictionary of RADIUS VSAs
- ascend dictionary of radius av pairs
- Ascend Dictionary of RADIUS AV Pairs
- Nortel Dictionary of RADIUS VSAs
- juniper dictionary of radius vsas
- Juniper Dictionary of RADIUS VSAs
- A P P E N D I X D Cisco Secure ACS Command-Line Database Utility
- CSUtil.exe Options
- Backing Up Cisco Secure ACS with CSUtil.exe
- Restoring Cisco Secure ACS with CSUtil.exe
- Creating a CiscoSecure User Database
- Creating a Cisco Secure ACS Database Dump File
- Loading the Cisco Secure ACS Database from a Dump File
- Compacting the CiscoSecure User Database
- User and AAA Client Import Option
- User and AAA Client Import File Format
- ADD Statements
- UPDATE Statements
- DELETE Statements
- ADD_NAS Statements
- DEL_NAS Statements
- Import File Example
- Exporting Group Information to a Text File
- Exporting Registry Information to a Text File
- Decoding Error Numbers
- Recalculating CRC Values
- About User-Defined RADIUS Vendors and VSA Sets
- Deleting a Custom RADIUS Vendor and VSA Set
- Listing Custom RADIUS Vendors
- Exporting Custom RADIUS Vendor and VSA Sets
- RADIUS Vendor/VSA Import File
- Vendor and VSA Set Definition
- Attribute Definition
- Enumeration Definition
- Example RADIUS Vendor/VSA Import File
- vpdn process
- A P P E N D I X E Cisco Secure ACS and Virtual Private Dial-up Networks
- accountactions specification
- A P P E N D I X F RDBMS Synchronization Import Definitions
- accountactions mandatory fields
- accountActions Mandatory Fields
- Action Codes
- Action Codes for Setting and Deleting Values
- Action Codes for Creating and Modifying User Accounts
- action codes for initializing and modifying access filters
- Action Codes for Initializing and Modifying Access Filters
- user settings
- Settings
- action codes for modifying network configuration
- Action Codes for Modifying Network Configuration
- cisco secure acs attributes and action codes
- Cisco Secure ACS Attributes and Action Codes
- User-Defined Attributes
- Group-Specific Attributes
- An Example of accountActions
- Windows 2000 Services
- Windows 2000 Registry
- A P P E N D I X G Cisco Secure ACS Internal Architecture
- CSDBSync
- Monitoring
- Recording
- Notification
- CSTacacs and CSRadius
Related products
2501 - Router - EN2524 - Router - EN2514 - Router - EN2511 - Router - EN2504 - 2504 Router2504-RF - 2504 Router2515 - 2515 Router2504-CH - 2504 Router2520 - 2520 Router2520-RF - 2520 RouterCisco categories
Switch
Network Router
Network Hardware
Wireless Access Point
IP Phone
Server
Gateway
Software
Transceiver
Conference System