|
|
Product Number DOC-CSASC2.3UX-IG=
Use this guide to install the following CiscoSecure Access Control Server (ACS) products:
Table 1 lists the sections of this document:
| Section | Description |
|---|---|
Start with this section before installing CiscoSecure ACS 2.3 for UNIX software. | |
Read this section for the basic CiscoSecure ACS installation procedures. | |
Read this section if you are installing on top of Solaris 2.5.1. It describes Solaris 2.5.1 patches necessary to run CiscoSecure ACS. | |
Read this section if you are upgrading from a previous version of CiscoSecure ACS. | |
Activating the DSM Module on an Existing CiscoSecure ACS 2.3 | Read this section if you are licensing and activating the DSM module on an existing or newly upgraded CiscoSecure ACS 2.3 for UNIX site that is not yet licensed or enabled to support the DSM. |
Read this section if you intend to use an Oracle database engine to support CiscoSecure ACS. It describes the preinstallation Oracle configuration requirements. | |
Read this section if you intend to use a Sybase database engine to support CiscoSecure ACS. It describes the preinstallation Sybase configuration requirements. | |
This section lists the online and printed sources of CiscoSecure documentation. | |
Read this section if you intend to install CiscoSecure ACS on a workstation with no CD-ROM. | |
Read this section if you intend to run third-party programs that directly edit the CiscoSecure profile database. | |
Read this section for a basic description of how CiscoSecure ACS software works with your other network components to provide authentication, authorization, and accounting services. | |
Read this section for a basic description of the Distributed Session Manager (DSM) feature and a summary of DSM installation and post-installation requirements. | |
Editing Configuration Files to Enable or Disable the DSM Module | Read this section if you want to enable DSM but do not have access to the CiscoSecure Administrator web pages. |
Editing CSU.cfg to Specify a CiscoSecure Software License Key | Read this section if you want to specify a new or replacement software license key for CiscoSecure ACS but do not have access to the CiscoSecure Administrator web pages. |
Read this section for information about Cisco documentation and additional literature. | |
Read this section for guidelines on obtaining assistance and additional information from Cisco Systems. |
Before you begin, consider the following situations and steps you must take before starting the basic installation procedures in the next section.
| Consideration | Requirements |
|---|---|
| You need to acquaint yourself with the basic CiscoSecure ACS system and how it works with other network components to provide authentication, authorization, and accounting services. First read "CiscoSecure System Description,". |
| You need to acquaint yourself with the max sessions control features that the optional Distributed Session Manager can provide. First read "Distributed Session Manager Features,". |
| Start with the procedures in "Basic Installation Procedures,". |
| You need to look up old configuration information to apply to the upgrade. First read "Upgrading from CiscoSecure ACS 2.x to 2.3," for additional instructions. |
|
|
|
|
| You need to purchase and preinstall Oracle Enterprise or Sybase Enterprise software for each of your CiscoSecure ACSes. First read "Setting Up an Oracle Database for CiscoSecure," or "Setting Up a Sybase Enterprise SQL Server for CiscoSecure,". |
| You need to follow special procedures for downloading and starting the installation package. First read "Installing without a CD-ROM,". |
This section describes the basic procedures for first-time installation of CiscoSecure ACS 2.3 for UNIX at most sites.
![]() |
Note If you are upgrading from a previous version of CiscoSecure ACS 2.x, see "Upgrading from CiscoSecure ACS 2.x to 2.3," for additional instructions. |
The CiscoSecure ACS package includes the following items:
The network components that interact with CiscoSecure ACS 2.3 for UNIX consist of:
Each of these components has certain CiscoSecure configuration requirements.
CiscoSecure ACS (and its optional backup server) requires the following hardware and software:
![]() |
Note If you need to install CiscoSecure on an Ultra 1 workstation with no CD-ROM drive, you can download the CiscoSecure installation package from the Cisco Systems web page. (See "Installing without a CD-ROM,".) |
![]() |
Note To check your version of Solaris, enter the Solaris command uname -a. If the system returns 5.5.1, Solaris 2.5.1 is installed. If the system returns 5.6, Solaris 2.6 is installed. |
![]() |
Note To support the RADIUS tunneling feature of CiscoSecure ACS 2.3(5), the Sun Ultra 1or compatible workstation must be running Solaris 2.6. |
CiscoSecure ACS works with the following network access servers (NASes):
![]() |
Note To support the RADIUS tunneling feature of CiscoSecure ACS 2.3(5), the AAA server must be running Cisco IOS Release 12.0(5)T or another vendor's NAS software that supports RADIUS tunneling attributes. |
The web-browser-based CiscoSecure ACS workstation console requires the following hardware and software:
![]() |
Note The browser must be enabled for Java and Java Script. |
To support CiscoSecure database requirements, you can use either the supplied SQLAnywhere database engine or supported versions of your own preinstalled Oracle Enterprise or Sybase Enterprise software running on your network.
Supported database engines include:
![]() |
Note If you intend to set up CiscoSecure with Oracle database replication, Cisco recommends that you read the PDF document Using CiscoSecure with Oracle's Distributed Database Feature (filename csbsdoc.pdf) before you install the Oracle or CiscoSecure software. This document is located in the $BASEDIR/FastAdmin/docs directory of the CiscoSecure distribution CD-ROM. It provides an easy-to-understand, start-to-finish, screen-by-screen configuration example of setting up Oracle database replication to work with CiscoSecure. |
If you are supporting token servers, they must be installed on the network before you install CiscoSecure ACS. Supported token servers include:
![]() |
Note If you are upgrading from a previous version of CiscoSecure 2.x, see "Upgrading from CiscoSecure ACS 2.x to 2.3," for instructions on using your old software license key. |
If you are installing CiscoSecure ACS for the first time on this Ultra 1 workstation:
# /usr/ucb/hostid 55412315
Step 2 Note the host ID for the primary and backup CiscoSecure ACS systems.
Step 3 Note the token code on the label attached to the form Requires Immediate Attention: Software License Keys.
Step 4 Follow the instructions on the form to obtain your license key.
![]() |
Note Software license keys issued to install CiscoSecure with the Distributed Session Manager (DSM) option will consist of 28 hexadecimal characters. Software license keys issued for CiscoSecure ACS 2.3 for UNIX without the DSM option will consist of 20 hexadecimal characters. |
Step 5 When you get the license key, transcribe it into the blank for Enter the AAA Server License Key, in the step Prepare Your Answers to the Installation Questions.
![]() |
Note The CiscoSecure ACS software is licensed per server. Each CiscoSecure ACS requires its own license. You can also use a backup server license to allow sites to run redundant systems to back up system security and accounting information. |
The questions you will be asked during the CiscoSecure ACS installation are similar to those below.
![]() |
Note Save these answers for both installation and post-installation configuration. |
![]() |
Note Selecting Security Dynamics, Inc. requires that the SDI client software be properly installed before the ACS is started. |
![]() |
Caution The SQLAnywhere database engine does not support networks of more than 5,000 users, does not support database replication, and does not support the maximum session limitation feature of the optional CiscoSecure Distributed Session Manager feature. If your network requires these support features, Cisco recommends preinstalling the Oracle Enterprise or Sybase Enterprise database engine. |
![]() |
Caution Dropping existing tables will delete all existing CiscoSecure ACS data. Existing ACS data will not be carried over to new tables. |
![]() |
Note Remember, if you are using the Oracle Enterprise or Sybase Enterprise product as your database engine, that database product must be installed, configured, and running before you start the install procedures described in this section. If you have not already done so, see "Setting Up an Oracle Database for CiscoSecure,", or "Setting Up a Sybase Enterprise SQL Server for CiscoSecure,", for details. |
Step 2 Insert the CD-ROM labeled "CiscoSecure ACS 2.3 for UNIX" and enter:
pkgadd -d /cdrom/csus_23 CSCEacs
The installer displays the first of a series of installation prompts:
Is this a completely new install Y/N (Default yes, q to quit)?
![]() |
Note If you install CiscoSecure using a link defined in the root directory pointing to the actual CiscoSecure base directory, a warning message might appear indicating there is not enough space in root to install CiscoSecure. If you know that there is sufficient space in the linked directory to install CiscoSecure, ignore this message and press Y at the prompt to continue the CiscoSecure installation. |
Step 3 Complete the installation using the preinstallation information that you recorded in the "Prepare Your Answers to the Installation Questions" section. After installation is complete, the system displays:
Installation of CSCEacs was successful.
Step 4 Start CiscoSecure ACS. Enter:
# /etc/rc2.d/S80CiscoSecure
If you installed the Distributed Session Manager module using the product labeled CiscoSecure ACS 2.3 for UNIX Distributed Session Manager, log in to the CiscoSecure Administrator web site and enable the DSM module as follows:
![]() |
Note If you did not install CiscoSecure ACS with the Distributed Session Manager option, skip this section. Go to "What's Next,". |
After starting CiscoSecure ACS, access the CiscoSecure Administrator web site to perform some initial configuration:
![]() |
Note If you do not have access to the CiscoSecure Administrator web site, you can enable the DSM module by carefully editing the CSU.cfg and CSConfig.ini files. See "Editing Configuration Files to Enable or Disable the DSM Module,". |
http://your_server/cs
where your_server is the host name (or the fully qualified domain name, FDQN, if host name and FDQN differ) of the Ultra 1 workstation where you installed CiscoSecure ACS. You can also substitute the Ultra 1 workstation's IP address for your_server.
![]() |
Note If the security socket layer feature on your browser is enabled, specify "https" rather than "http" as the hypertext transmission protocol. Enter: https://your_server/cs |
Step 2 When the CiscoSecure Logon window appears, enter the superuser name and password and click Submit. The default superuser name and password in a new CiscoSecure ACS installation are:
username: superuser password: changeme
Step 3 In the CiscoSecure Administrator web site menu bar, click AAA and then click General.
Step 4 In the AAA > General web page locate the Max Sessions Enabled field and select the Distributed option. This is the option that enables the full set of Distributed Session Manager features on CiscoSecure ACS.
Step 5 For this setting to take effect, you must stop and restart CiscoSecure ACS.
Step 6 Confirm that Oracle or Sybase database replication is set up and enabled between your CiscoSecure database sites. For details, see the chapter "Setting Up Database Replication Among CiscoSecure ACSes" in the CiscoSecure ACS 2.3 for UNIX User Guide.
Step 7 Confirm that AAA accounting functions are enabled on all client NASes. For details, see the chapter "CiscoSecure ACS Accounting" in the CiscoSecure ACS 2.3 for UNIX User Guide.
The CiscoSecure ACS 2.3 for UNIX User Guide provides information about what to do next.
For a list of the documentation available, see "Accessing CiscoSecure ACS 2.3 for UNIX Documentation,".
Ultra 1 workstations running Solaris 2.5.1 require the following Solaris patches to support CiscoSecure ACS 2.3:
These patches or their latest versions can be downloaded from:
http://sunsolve.sun.com
README files for each patch are also available at this site.
![]() |
Note You will require a SunSpectrum support contract to obtain some or all of the above mentioned patches. |
You can use the Solaris showrev -p command to determine what Solaris patches are already installed on the system.
The product labeled CiscoSecure ACS Upgrade to v2.3 upgrades previous versions of CiscoSecure 2.x for UNIX to CiscoSecure ACS 2.3 for UNIX without the Distributed Session Manager (DSM) module enabled. If you are upgrading from CiscoSecure ACS 2.x, complete the following steps:
![]() |
Note If you want CiscoSecure ACS 2.3 for UNIX with the DSM module installed, first follow this procedure to upgrade to version 2.3. Then use the CiscoSecure ACS Distributed Session Manager Option product to license and enable the DSM module. To support DSM, make sure that an Oracle or Sybase RDBMS is installed for CiscoSecure prior to running the CiscoSecure upgrade installation program. For details, see "Setting Up an Oracle Database for CiscoSecure" section or "Setting Up a Sybase Enterprise SQL Server for CiscoSecure" section. |
$BASEDIR is the install directory for CiscoSecure that you specified at the time of installation. For example, if you specified "ciscosecure" as the install location, the file is located at /ciscosecure/config/CSU.cfg. Below is an example of the line in the CSU.cfg file that contains the software key value:
LIST config_license_key = {"a9505ad08a77f927afa4"};
Step 2 Prepare your CiscoSecure ACS 2.x database for upgrade to ACS 2.3 format:
If you are upgrading from CiscoSecure 2.x, the CiscoSecure ACS installation will implement database schema changes for version 2.3 compatibility. These schema changes include recreating a profile data table (cs_profile) as well as an accounting data table (cs_accounting_log).
Step 3 (Optional) If you want to preserve your old debug level, TACACS+ NAS configurations, and supported authentication methods settings for the ACS, save the current $BASEDIR/config/CSU.cfg file to a holding directory.
Step 4 (Optional) If you want to preserve your old unknown_user default profile settings, save the current $BASEDIR/config/DefaultProfile file to a holding directory.
Step 5 Remove the current version of CiscoSecure ACS from the Ultra 1 workstation. Log in as [Root] and enter:
pkgrm CSCEacs
Step 6 Install CiscoSecure ACS 2.3 for UNIX following the procedures described in the "Basic Installation Procedures,".
![]() |
Note However, skip the section "Obtain a CiscoSecure Software License Key." You do not need to obtain a new software license key to upgrade from a previous version of CiscoSecure ACS 2.x for UNIX to CiscoSecure ACS 2.3 for UNIX. |
Step 7 During installation, enter your old software license key (either primary or backup) when prompted by the installer and complete the installation.
![]() |
Note If you did not enter the software key value at the time of installation, you can specify it after installation in the CiscoSecure License Key field in the CiscoSecure ACS AAA General web page. |
![]() |
Note Depending on the number of user profiles existing in the CiscoSecure ACS database, the database upgrade phase of CiscoSecure installation could take some time. Conversion time is approximately 5 minutes for every 10,000 user profiles. |
Step 8 If the CiscoSecure installation procedure fails during the database upgrade phase due to a fixable condition (such as database resources errors):
a. Fix the condition that caused the failure.
![]() |
Note If the failed upgrade was for a Sybase Enterprise database from CiscoSecure ACS 2.0 format to CiscoSecure ACS 2.3 format, you must manually update the database schema. See "If CiscoSecure Installation Does Not Update the Sybase Database," for details. |
b. Manually complete the database upgrade procedure by changing to the CiscoSecure $BASEDIR/utils/bin directory and running the CSdbTool utility. Enter:
./CSdbTool upgrade
c. Remove the CiscoSecure binary files again. Enter:
pkgrm CSCEacs
d. Restart the CiscoSecure installation. Enter:
pkgadd -d /cdrom/csus_23 CSCEacs
Even though the database upgrade is now complete, running the installation procedure again ensures that all other necessary installation tasks will be carried out. Because the CiscoSecure ACS database upgrade is already complete, this portion of the installation will now be skipped.
Step 9 (Optional) After installation, if you saved your old CSU.cfg file as described in step 3, you can cut and paste your old settings from your old CSU.cfg file to the new CSU.cfg file to restore your original ACS debug level, TACACS+ NAS configurations, and supported authentication methods settings. See the section "Server Control File" in the chapter "Tuning CiscoSecure ACS Performance and Configuration" in the CiscoSecure ACS 2.3 for UNIX User Guide for a listing of CSU.cfg settings.
Alternatively, you can simply reenter these settings through the new CiscoSecure ACS AAA General and AAA NAS web pages.
![]() |
Caution Do not copy the old CSU.cfg file over the new CSU.cfg file. The new CSU.cfg file contains important new settings specific to CiscoSecure ACS 2.3 for UNIX. |
Step 10 (Optional) After installation, if you saved your old DefaultProfile file as described in Step 4, you can use the CiscoSecure ACS 2.3 CSImport utility to import your old unknown_user default profile settings into your new ACS installation. Enter:
$BASEDIR/CSimport -c -p /hold_dir -s DefaultProfile
where:
$BASEDIR is the directory where you installed CiscoSecure ACS.
hold_dir is the holding directory where you stored the old DefaultProfile file.
![]() |
Note After you successfully upgrade to CiscoSecure ACS 2.3 for UNIX, you can activate the optional DSM module. Obtain the CiscoSecure ACS Distributed Session Manager Option product to license and enable the DSM module. See "Activating the DSM Module on an Existing CiscoSecure ACS 2.3," for details. |
If you are attempting to upgrade from CiscoSecure 2.x in an existing replication environment and your environment includes non-updatable sites, when you upgrade the CiscoSecure software on such sites, you will receive an error message at the end of the upgrade process stating that the installation failed. This occurs because the CiscoSecure tables that were set up for replication cannot be written to except by the replication process.
The workaround for this problem is to make sure that you have successfully upgraded CiscoSecure on your Master Definition site. Ignore the error message received on the non-updatable site(s). When you replicate, the replication process will update these tables from the Master site.
If you are using the product labeled CiscoSecure ACS Distributed Session Manager Option (CSU-DSM) to enable the Distributed Session Manager module on an already existing CiscoSecure ACS 2.3 for UNIX installation, you do not need to run the installation program:
Step 2 If you have not already done so, follow instructions in the document labeled Requires Immediate Attention: License Keys for CiscoSecure ACS to obtain the special 28-character software license keys required to enable the DSM module.
Step 3 From any workstation with a web connection to CiscoSecure ACS, open your web browser and log in to the CiscoSecure Administrator web site as superuser.
![]() |
Note If you do not have access to the CiscoSecure Administrator web pages, you can manually edit the CiscoSecure CSU.cfg file to specify the new software license key. See "Editing CSU.cfg to Specify a CiscoSecure Software License Key,". |
Step 4 Locate the CiscoSecure License Key field in the AAA General web page, enter the special 28-character software license key, and click Re-Initialize.
Step 5 Locate the Max Sessions Enabled field in the AAA General web page and select the Distributed option to enable the Distributed Session Manager features on this ACS.
Step 6 Stop and restart CiscoSecure ACS for this setting to take effect:
Step 7 Confirm that Oracle or Sybase database replication is set up and enabled between your CiscoSecure database sites. For details, see the chapter "Setting up Database Replication Among CiscoSecure ACSes" in the CiscoSecure ACS 2.3 for UNIX User Guide.
Step 8 Confirm that AAA accounting functions are enabled on all client NASes. For details, see the CiscoSecure ACS 2.3 for UNIX User Guide chapter "CiscoSecure ACS Accounting."
![]() |
Note If you are installing and supporting the per user, per group, and per VPDN session limitation features of the optional CiscoSecure Distributed Session Manager feature, you must configure your Oracle databases for database replication. |
Oracle software is not bundled with CiscoSecure ACS. Therefore the CiscoSecure installation does not install or configure the Oracle product, create an Oracle database, or create a database user.
![]() |
Note If you intend to set up CiscoSecure with Oracle database replication, Cisco recommends that you read the PDF document Using CiscoSecure with Oracle's Distributed Database Feature (filename csbsdoc.pdf) before you install the Oracle or CiscoSecure software. This document is located in the $BASEDIR/FastAdmin/docs directory of the CiscoSecure distribution CD-ROM. It provides an easy-to-understand, start-to-finish, screen-by-screen configuration example of setting up Oracle database replication to work with CiscoSecure. |
If you intend to use an Oracle database with CiscoSecure ACS, make sure the Oracle database meets the following requirements before starting the CiscoSecure installation:
![]() |
Note If you intend to support Oracle database replication, Oracle version 7.3.3, 7.3.4, or 8.0x must be installed. Additionally, Oracle 7.3.3 and 7.3.4 require the Symmetric Replication Option and Distributed Database Option packages installed to support database replication. Oracle 8.0.x does not require these packages. |
![]() |
Note To upgrade to the above modules from a lower version, run the Oracle installation program, select the upgrade option, and select to upgrade the client versions of these modules. |
CiscoSecure ACS installation prompts require the following information concerning your Oracle installation:
If you want to set up database replication among multiple CiscoSecure ACS sites, assign your Oracle database administrator (DBA) to do so after CiscoSecure installation is complete. See the CiscoSecure ACS 2.3 for UNIX User Guide chapter "Setting up Database Replication among CiscoSecure ACSes" for details.
![]() |
Caution Database replication setup requires database administrator (DBA) expertise. If you do not possess DBA experience, assign this task to someone who does. |
![]() |
Note If you are installing and supporting the per user, per group, and per VPDN session limitation features of the optional CiscoSecure Distributed Session Manager feature, you must configure your Oracle databases for database replication. |
![]() |
Note If you intend to set up CiscoSecure with Oracle database replication, Cisco recommends that you read the PDF document Using CiscoSecure with Oracle's Distributed Database Feature (filename csbsdoc.pdf) before you install the Oracle or CiscoSecure software. This document is located in the $BASEDIR/FastAdmin/docs directory of the CiscoSecure distribution CD-ROM. It provides an easy-to-understand, start-to-finish, screen-by-screen configuration example of setting up Oracle database replication to work with CiscoSecure. |
Check the following items on the Oracle database:
![]() |
Note See Oracle's Network Products Troubleshooting Guide for help in determining the SQL*Net configuration problems. |
If you intend to use a Sybase Enterprise database with CiscoSecure ACS, make sure the Sybase Enterprise SQL server meets the following requirements.
Before you install CiscoSecure:
CiscoSecure installation will prompt for the following information related to Sybase:
If you want to set up database replication among multiple CiscoSecure ACS sites, assign your Sybase database administrator (DBA) to do so after CiscoSecure installation is complete. See the CiscoSecure ACS 2.3 for UNIX User Guide chapter "Setting up Database Replication among CiscoSecure ACSes." for details.
![]() |
Caution Database replication setup requires database administrator (DBA) expertise. If you do not possess DBA experience, assign this task to someone who does. |
![]() |
Note If you are installing and supporting the per user, per group, and per VPDN session limitation features of the CiscoSecure ACS 2.3 for UNIX with DSM package, you must configure your Sybase databases for database replication. |
The CiscoSecure installation might fail to update the Sybase Enterprise database for early CiscoSecure for UNIX 2.x versions. In such cases, the installation program will stop after the following series of prompts and messages:
alter table cs_password add primary key (profile_id, pwd_type)
*** SQLException caught ***
SQLState:
Message: Line 1 Error 1920 Level 16 State 1
A column in a primary key constraint's
column list is not constrained to be not null,
column name: 'profile_id'.
Vendor: 1920
Upgrading schema failed.
In such cases, you must use Sybase tools to manually update the Sybase database schema, then rerun the part of the CiscoSecure installation program that updates the CiscoSecure database schema.
create table cs_password_new ( profile_id int not null, pwd_type varchar(32) not null, pwd_value varchar(255) null , pwd_from_date datetime null , pwd_until_date datetime null , pwd_opaque varchar(255) null , pwd_qualifier varchar(10) null , ) go insert into cs_password_new (profile_id, pwd_type, pwd_value, pwd_from_date,pwd_until_date, pwd_opaque, pwd_qualifier) select profile_id, pwd_type, pwd_value, pwd_from_date, pwd_until_date, pwd_opaque, pwd_qualifier from cs_password go drop table cs_password go sp_rename cs_password_new, cs_password go
Step 2 Run the $BASEDIR/utils/bin CSdbTool utility to continue the CiscoSecure database upgrade. Enter:
CSdbTool upgrade
After you install the CiscoSecure ACS 2.3 for UNIX software, the following documentation is available to you in several formats and several locations:
http://acs_server:9090/docs/csuxug23/index.htm
![]() |
Note The documents at this site are likely to be the most recently updated documents available for CiscoSecure ACS. |
http://www.adobe.com
If you do not have a CD-ROM drive attached to the Ultra 1 workstation where you want to install CiscoSecure ACS, download the installation software from the Cisco web site and run the installation program as follows:
![]() |
Note To take the steps described in this section, you must have a valid SmartNet account. If you do not have a SmartNet account, contact your authorized Cisco Systems support representative for instructions. |
Step 2 Go to the CiscoSecure Software Planner URL:
http://wwwin.cisco.com/cmc/cc/cisco/mkt/access/secure/
You are prompted for a username and password in order to access Cisco Connection Online (CCO).
Step 3 Using your SmartNet account, log in to CCO, specifying your username and password as prompted.
Step 4 Click Download CiscoSecure Software. The CiscoSecure Server Software Images page appears.
Step 5 Click the button beside the applicable version of CiscoSecure Solaris. If you agree to the terms of the software agreement, click Execute. You are prompted to specify the location from which to transfer the software image.
Step 6 Click the location of the CCO server that is closest to your target CiscoSecure server. You are prompted again for your CCO password.
Step 7 Enter your CCO password. A file is copied to your home directory.
Step 8 Uncompress the CiscoSecure ACS software package by entering the following command at the UNIX prompt:
uncompress CSCEacs-2.3.x.x.solaris.pkg.Z
Step 9 Translate the package file by entering the following command at the UNIX prompt:
pkgtrans CSCEacs-2.3.x.x.solaris.pkg /tmp
The following output displays:
The following packages are available: 1 CSCEacs-2.3.x.x CiscoSecure Access Control Software (sun4) x.x Select package(s) you wish to process (or 'all' to process all packages). (default: all) [?,??,q]:
Step 10 Enter 1.
The download operation is now complete.
Step 11 Obtain your server license key and answer the preinstallation questions according to the instructions in the section "Basic Installation Procedures,".
![]() |
Note Do not enter the pkgadd -d/cdrom/csus_23 CSCEacs string to start the installation program. |
Step 12 To start the installation program, enter:
pkgadd -d /tmp CSCEacs
Profile cache updating must be enabled for CiscoSecure ACS servers whose CiscoSecure profile databases are modified directly by Oracle or Sybase database replication implementations or by third-party applications.
In the case of Oracle or Sybase database replication, you enable profile cache updating in the process of implementing the replication.
If you are using third-party applications that directly modify the CiscoSecure ACS profile data, use the following procedure to enable profile cache updating following the normal CiscoSecure installation.
![]() |
Note For profile cache updating to work, the database user account used by the third-party application must be different from the user account that you specified when you originally installed and configured the Oracle or Sybase engines for CiscoSecure ACS. |
./CSdbTool cache_trigger
This installs triggers in the CiscoSecure ACS database tables that insert the changes in a special log table, cs_trans_log, whenever a third-party program alters any profile data. These changes are periodically incorporated into the profile cache.
Step 2 In the CSConfig.ini file, make sure the following parameters are set:
[ProfileCaching] EnableProfileCaching = ON ;polling period in minutes for cs_trans_log table DBPollinterval = number_of_minutes
where number_of_minutes is the time in minutes that the customer wants between profile cache updates. This interval should match the intervals at which database replication or third-party applications directly modify the ACS profile data. For example, if database replication is configured to take place every 15 minutes, then the number_of_minutes for DBPollinterval should also be set to 15.
The default value is 30 minutes.
Basic network components that interact with CiscoSecure ACS are shown in Figure 1.
| Node | Description |
|---|---|
Network access server (NAS) | The NASes provide the ports (through which remote users can dial in to the network), forward login requests to CiscoSecure ACS, and carry out authentication and authorization instructions from CiscoSecure ACS. A single CiscoSecure ACS can provide authentication, authorization, and accounting services to multiple NASes. |
CiscoSecure Access Control Server (ACS) | CiscoSecure ACS receives the login request from the NAS, pulls the profile from the user making the login request from the RDBMS and based on the profile:
If a token server is in use, CiscoSecure ACS transmits the login request to the token server for authentication. |
CiscoSecure Profile database | The profile database contains the authentication, authorization, and accounting information for each of your users and groups. Each CiscoSecure ACS requires a relational database management system (RDBMS) engine installed to store, retrieve, and maintain this information. CiscoSecure supplies an SQLAnywhere database engine with the CiscoSecure ACS for UNIX product; however, if you intend to support profile databases larger than 5,000 users or a network of CiscoSecure ACSes using a common replicated profile database for authentication, authorization, and accounting, you must purchase and preinstall Oracle Enterprise or Sybase Enterprise RDBMS to support your RDBMS. |
CiscoSecure workstation console | The CiscoSecure workstation console provides web-based pages through which the CiscoSecure profile database can be administered by the CiscoSecure system administrator or group administrator. |
Token server | An optional third-party server for executing authentication of token card users entering one-time passwords (OTPs). CiscoSecure ACS can be configured to forward login requests from token card users for authentication by the token server. |
Networks that provide access at multiple locations or support large numbers of users (for example, nationwide ISP networks that provide local dial-in login across the nation) are best supported by multiple ACSes with an RDBMS configured to replicate changes to any local CiscoSecure profile database to all other CiscoSecure profile database sites in the network.
In order to support database replication among your ACSes, you need to purchase and preinstall Oracle Enterprise or Sybase Enterprise RDBMS software at each ACS database site where you want replication of the CiscoSecure profile database to be carried out.
The per user, per group, or per VPDN maximum session limit feature of the CiscoSecure ACS 2.3 for UNIX with DSM package requires you to configure profile database replication.
With the CiscoSecure ACS 2.3 for UNIX product, you can purchase a special software license key to enable the Distributed Session Manager (DSM). When installed and enabled, the DSM feature allows access to special DSM-specific web pages that enable the CiscoSecure system administrator to limit and enforce, on a very fine-grained basis, the number of concurrent sessions allowed per user, per group, or per VPDN either on a network-wide basis, or through a particular "point-of-presence" group of NASes.
![]() |
Note If you do not purchase the DSM-enabling software license key, you can still limit the number of concurrent sessions on a per user basis. See the CiscoSecure ACS 2.3 for UNIX User Guide chapter "Limiting and Tracking Sessions Per User, Group, or VPDN" for descriptions of maximum session limits supported by the DSM-enabled and the non-DSM-enabled CiscoSecure ACS 2.3 for UNIX packages. |
Before you attempt to configure DSM max sessions control, make sure that you have implemented the following CiscoSecure installation and post-installation requirements:
![]() |
Caution Database replication setup requires database administrator (DBA) expertise. If you do not possess DBA experience, assign this task to someone who does. |
Cisco strongly recommends using the Max Sessions Enabled field in the CiscoSecure Administrator AAA General web page to enable or disable the Distributed Session Manager or other supported types of max sessions control.
Alternatively, if you do not have access to a web browser, you can enable or disable max sessions control by editing the CSU.cfg and CSConfig.ini configuration files.
![]() |
Caution If you edit the CSU.cfg and CSConfig.ini files, make sure that when you enable one type of max sessions control that you also disable all other types of max sessions control. Enabling the settings for one type of max sessions control in the table below without disabling the settings for the other types of max sessions control can cause extremely slow authentication performance and out-of-memory errors. |
| Type of Max Sessions | CSU.cfg Required Settings | CSConfig.ini Required Settings |
|---|---|---|
None (all max sessions control disabled) |
Disables AAA server and DSM max sessions control |
Disables DBServer-based max sessions control. |
Distributed Session1 Manager (DSM) |
Disables AAA server-based max sessions control and enable the DSM |
Disables DBServer-based max sessions control |
DBServer-based Max Sessions control |
Disables AAA server-based max sessions control and the DSM |
Enables DBServer-based max sessions control |
AAA Server-based Max Sessions control |
Enables AAA server-based max sessions control and disables the DSM |
Disables DBServer-based max sessions control |
| 1DSM-based session control can only take effect if the optional Distributed Session Manager module has been licensed for this installation of CiscoSecure ACS 2.3 for UNIX. |
Step 2 After making the above settings, stop and restart CiscoSecure ACS to make sure that all the above settings take effect:
![]() |
Note All forms of max sessions control require that the AAA accounting functions be enabled in the client NASes. |
If you want to specify a software license key after installing CiscoSecure ACS, or if you want to modify the software license key for an existing CiscoSecure ACS 2.3 UNIX installation because you have obtained a new key to enable the optional Distributed Session Manager module, you can use the CiscoSecure License Key field in the CiscoSecure Administrator AAA General web page.
Alternatively, you can manually edit the config_license_key variable in the CSU.cfg file:
$BASEDIR is the install directory for CiscoSecure that you specified at the time of installation. If you used the default install location, the file is located at /ciscosecure/config/CSU.cfg.
Step 2 Find the config_license_key variable and enter or modify the value for software license key number. For example:
LIST config_license_key = {"a9505ad08a77f927afa4"};
Step 3 After changing the software license key, stop and restart CiscoSecure ACS for your changes to the CSU.cfg file to take effect.
You can access the most current Cisco documentation on the World Wide Web at http://www.cisco.com, http://www-china.cisco.com, or http://www-europe.cisco.com.
Cisco documentation and additional literature are available in a CD-ROM package, which ships with your product. The Documentation CD-ROM is updated monthly. Therefore, it is probably more current than printed documentation. The CD-ROM package is available as a single unit or as an annual subscription.
Registered CCO users can order the Documentation CD-ROM and other Cisco Product documentation through our online Subscription Services at http://www.cisco.com/cgi-bin/subcat/kaojump.cgi.
Nonregistered CCO users can order documentation through a local account representative by calling Cisco's corporate headquarters (California, USA) at 408 526-4000 or, in North America, call 800 553-NETS (6387).
Cisco provides Cisco Connection Online (CCO) as a starting point for all technical assistance. Warranty or maintenance contract customers can use the Technical Assistance Center. All customers can submit technical feedback on Cisco documentation using the web, e-mail, a self-addressed stamped response card included in many printed docs, or by sending mail to Cisco.
Cisco continues to revolutionize how business is done on the Internet. Cisco Connection Online is the foundation of a suite of interactive, networked services that provides immediate, open access to Cisco information and resources at anytime, from anywhere in the world. This highly integrated Internet application is a powerful, easy-to-use tool for doing business with Cisco.
CCO's broad range of features and services helps customers and partners to streamline business processes and improve productivity. Through CCO, you will find information about Cisco and our networking solutions, services, and programs. In addition, you can resolve technical issues with online support services, download and test software packages, and order Cisco learning materials and merchandise. Valuable online skill assessment, training, and certification programs are also available.
Customers and partners can self-register on CCO to obtain additional personalized information and services. Registered users may order products, check on the status of an order and view benefits specific to their relationships with Cisco.
You can access CCO in the following ways:
You can e-mail questions about using CCO to cco-team@cisco.com.
The Cisco Technical Assistance Center (TAC) is available to warranty or maintenance contract customers who need technical assistance with a Cisco product that is under warranty or covered by a maintenance contract.
To display the TAC web site that includes links to technical support information and software upgrades and for requesting TAC support, use www.cisco.com/techsupport.
To contact by e-mail, use one of the following:
| Language | E-mail Address |
|---|---|
English | tac@cisco.com |
Hanzi (Chinese) | chinese-tac@cisco.com |
Kanji (Japanese) | japan-tac@cisco.com |
Hangul (Korean) | korea-tac@cisco.com |
Spanish | tac@cisco.com |
Thai | thai-tac@cisco.com |
In North America, TAC can be reached at 800 553-2447 or 408 526-7209. For other telephone numbers and TAC e-mail addresses worldwide, consult the following web site: http://www.cisco.com/warp/public/687/Directory/DirTAC.shtml.
If you are reading Cisco product documentation on the World Wide Web, you can submit technical comments electronically. Click Feedback in the toolbar and select Documentation. After you complete the form, click Submit to send it to Cisco.
You can e-mail your comments to bug-doc@cisco.com.
To submit your comments by mail, for your convenience many documents contain a response card behind the front cover. Otherwise, you can mail your comments to the following address:
Cisco Systems, Inc.
Document Resource Connection
170 West Tasman Drive
San Jose, CA 95134-9883
We appreciate and value your comments.
This document is to be used in conjunction with the CiscoSecure ACS 2.3 for UNIX User Guide publication.
Access Registrar, AccessPath, Any to Any, AtmDirector, Browse with Me, CCDA, CCDE, CCDP, CCIE, CCNA, CCNP, CCSI, CD-PAC, the Cisco logo, Cisco Certified Internetwork Expert logo, CiscoLink, the Cisco Management Connection logo, the Cisco NetWorks logo, the Cisco Powered Network logo, Cisco Systems Capital, the Cisco Systems Capital logo, Cisco Systems Networking Academy, the Cisco Systems Networking Academy logo, the Cisco Technologies logo, ConnectWay, Fast Step, FireRunner, Follow Me Browsing, FormShare, GigaStack, IGX, Intelligence in the Optical Core, Internet Quotient, IP/VC, Kernel Proxy, MGX, MultiPath Data, MultiPath Voice, Natural Network Viewer, NetSonar, Network Registrar, the Networkers logo, Packet, PIX, Point and Click Internetworking, Policy Builder, Precept, ScriptShare, Secure Script, ServiceWay, Shop with Me, SlideCast, SMARTnet, SVX, The Cell, TrafficDirector, TransPath, ViewRunner, Virtual Loop Carrier System, Virtual Service Node, Virtual Voice Line, VisionWay, VlanDirector, Voice LAN, WaRP, Wavelength Router, Wavelength Router Protocol, WebViewer, Workgroup Director, and Workgroup Stack are trademarks; Changing the Way We Work, Live, Play, and Learn, Empowering the Internet Generation, The Internet Economy, and The New Internet Economy are service marks; and ASIST, BPX, Catalyst, Cisco, Cisco IOS, the Cisco IOS logo, Cisco Systems, the Cisco Systems logo, the Cisco Systems Cisco Press logo, Enterprise/Solver, EtherChannel, EtherSwitch, FastHub, FastLink, FastPAD, FastSwitch, GeoTel, IOS, IP/TV, IPX, LightStream, LightSwitch, MICA, NetRanger, Post-Routing, Pre-Routing, Registrar, StrataView Plus, Stratm, TeleRouter, and VCO are registered trademarks of Cisco Systems, Inc. or its affiliates in the U.S. and certain other countries. All other trademarks mentioned in this document are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any of its resellers. (9912R)
Copyright © 1998-2000, Cisco Systems, Inc.
All rights reserved.
![]()
![]()
![]()
![]()
![]()
![]()
![]()
Posted: Sun Apr 2 16:18:09 PDT 2000
Copyright 1989 - 2000©Cisco Systems Inc.