A SERVICE OF

logo

Index
IN-22
User Guide for Cisco Secure ACS for Windows Server
78-16592-01
S
search order of external user databases 15-15
security policies 2-15
security protocols
Cisco AAA client devices
1-2
CSRadius G-8
CSTacacs G-8
interface options 3-9
RADIUS 1-6, C-1
TACACS+
custom commands
3-9
overview 1-6
time-of-day access 3-8
server certificate installation 10-35
service control in System Configuration 11-33
Service Monitoring logs
See Cisco Secure ACS Service Monitoring
logs
services
determining status of
8-2
logs
configuring
11-33
list of logs generated 11-32
management 8-17
overview 1-4, G-1
starting 8-2
stopping 8-2
session policies
configuring
12-17
options 12-16
overview 12-16
shared profile components
See also command authorization sets
See also downloadable IP ACLs
See also network access filters
See also network access restrictions
overview
5-1
shared secret G-8
shell command authorization sets
See also command authorization sets
in Group Setup
6-33
in User Setup 7-26
single password configurations 1-14
SMTP (simple mail-transfer protocol) G-7
specifications
RADIUS
RFC2138
1-7
RFC2139 1-7
system performance 1-3
TACACS+ 1-7
SSL (secure socket layer) 12-13
starting services 8-2
static IP addresses 7-10
stopping services 8-2
stored procedures
CHAP authentication
configuring
13-73
input values 13-66