|
|
This chapter presents a brief overview of the software modules that work together as part of the CiscoSecure ACS 2.3 for UNIX package.
The CiscoSecure ACS consists of several interrelated software modules that carry out different communication, profile data retrieval, profile data storage, administrative, and performance-enhancement functions. Understanding the interaction of these modules is useful for troubleshooting or fine tuning CiscoSecure ACS 2.3 for UNIX performance.
The CiscoSecure ACS components described in this chapter include:
The diagram in Figure 2-1 represents how the components of the CiscoSecure ACS interact with each other and other elements on the network.

At a network level, user login requests are transmitted through the network access servers (NASes) to one entity called the "CiscoSecure ACS," which checks its RDBMS database of group and user profiles against each user logging in and issues instructions to the NASes to allow or disallow user login, and enforce any restrictions on the connection.
If the user is using a token card generated one-time password (OTP) login, the ACS forwards the login request to a token server for further processing and transmits the results back to the assigned NAS.
Internally, the CiscoSecure ACS components interoperate as described in Table 2-1.
AAA Server The component that carries on direct communications with the NASes and the token servers on the network. Its functions include: The component that handles most of the direct access to the RDBMS. The relational database where the group and user profile data (including max sessions data) is stored. The RDBMS can be installed locally, on the same machine as the CiscoSecure ACS; or it can be installed on a remote server. The RDBMS can be one of three supported database engines: SQLAnywhere (supplied and installed by the CiscoSecure installation program), Sybase Enterprise, or Oracle Enterprise (supplied and installed by the customer prior to CiscoSecure installation). Its functions include: CiscoSecure Web Interface The Web server component of the CiscoSecure ACS supports HTML and Java pages that allow GUI-based user, group administrator, and system administrator level management of the CiscoSecure ACS. It consists of special licensed web server products bundled with CiscoSecure. Distributed Sessions Manager (DSM) The optional server module that maintains and enforces a concurrent max sessions limitations on users, groups, or VPDNs. Its functions include: The module that enables a group or system administrator to edit group or user profiles through CiscoSecure command lines. It takes command line input from the system administrator and transmits this input to the DBServer. Profile Cache The optional local memory cache into which the DBServer downloads the RDBMS profile data. The DBServer then uses the profile cache for authentication, authorization, and query operations until the profile database is updated or until a periodic update of the profile cache is run. Token Cache The optional local memory cache into which the AAA server stores an enabled user's initial token card generated one-time password (OTP). Thereafter, for a specified period of time, the AAA server will use the stored OTP to authenticate this user for new sessions rather than forward the login to the token server. Numerous utilities, not included in Figure 2-1, that import, export, and modify profile data in the RDBMS through access to the DBServer. These utilities include:
Table 2-1: Components of the CiscoSecure ACS
Module
Description

Note Some database operations, such as database replication or operations by third-party applications, bypass the DBServer and access and modify the RDBMS directly.
![]()
![]()
![]()
![]()
![]()
![]()
![]()
Posted: Sun Apr 2 16:11:17 PDT 2000
Copyright 1989 - 2000©Cisco Systems Inc.