cc/td/doc/product/access/acs_soft/cs_unx
hometocprevnextglossaryfeedbacksearchhelp
PDF

Table of Contents

About This Guide

About This Guide

This section discusses the objectives, audience, and organization of the CiscoSecure ACS 2.2.2 for UNIX User Guide.

Cisco technical documentation and additional literature are available in a CD-ROM package, which ships with your product. The Documentation CD-ROM, a member of the Cisco Connection Family, is updated monthly. Therefore, it might be more up to date than printed documentation. To order additional copies of the Documentation CD-ROM, contact your local sales representative or call customer service. The CD-ROM package is available as a single package or as an annual subscription. You can also access Cisco documentation on the World Wide Web at http://www.cisco.com, http://www-china.cisco.com, or http://www-europe.cisco.com.

Cisco documentation and additional literature are available in a CD-ROM package, which ships with your product. The Documentation CD-ROM, a member of the Cisco Connection Family, is updated monthly. Therefore, it might be more up to date than printed documentation. To order additional copies of the Documentation CD-ROM, contact your local sales representative or call customer service. The CD-ROM package is available as a single package or as an annual subscription. You can also access Cisco documentation on the World Wide Web at http://www.cisco.com, http://www-china.cisco.com, or http://www-europe.cisco.com.

Document Objectives

The objective of this document is to help you configure and use the CiscoSecure Access Control Server (ACS) 2.2.2 for UNIX (Solaris) software and review some basic concepts of network security. For sample file formats, guidelines for troubleshooting, and a list of references and recommended reading, see the appendixes.

Audience

This guide was written for system administrators who use the CiscoSecure ACS software to set up and maintain accounts and dial-in network security.

Document Organization

The major sections of this guide are as follows:

This Chapter: Contains:
Chapter 1, "Introduction to the CiscoSecure ACS Software" Overview of the CiscoSecure ACS software; defines package contents and system requirements; describes features of the software; and provides general information on network security.
Chapter 2, "Configuring Initial Test Group and User Profiles" Information on configuring initial test group profiles and test user profiles to confirm the operability of your CiscoSecure installation.
Chapter 3, "Simple User and ACS Management" Information on simple configuration and management of user profiles through the CiscoSecure ACS web pages.
Chapter 4, "Advanced Group and User Management" Information on advanced group and user profile configuration and management through the CiscoSecure ACS web pages and the CiscoSecure Administrator advanced configuration program.
Chapter 5, "ACS and NAS Management" Information on NAS management, ACS management, and local and remote domain management, through the CiscoSecure ACS web pages and the CiscoSecure Administrator advanced configuration program.
Chapter 6, "Strategies Applying Attributes" Information about the CiscoSecure ACS features, including attributes and sample profiles.
Chapter 7, "CiscoSecure ACS Accounting" Information on the CiscoSecure ACS software accounting database file and the instructions for enabling accounting.
Chapter 8, "Configuring the NAS for TACACS+" Information on configuring the NAS for authentication, authorization, and accounting if you are using the TACACS+ protocol.
Chapter 9, "Configuring the NAS for RADIUS" Information on configuring the NAS for authentication, authorization, and accounting if you are using the RADIUS protocol.
Chapter 10, "Token Server Support" Information on one-time password authentication and token servers.
Chapter 11, "Troubleshooting Information" Information on how to identify and resolve potential problems with your CiscoSecure ACS, including timesaving tips and resources for service and support.
Appendix A, "Converting an Existing AA Database to a CiscoSecure ACS 2.2.2 Database" Instructions for using the import utility to transfer an existing CiscoSecure database or an existing RADIUS database to the sample runtime database that can be used with CiscoSecure ACS 2.2.2.
Appendix B, "CiscoSecure ACS File Formats and Syntax" Configuration parameters and syntax for the server control file, message catalogs, content and grammar conventions of the AA database, and sample configurations for setting server attributes.
Appendix C, "Using the Command-Line Administrator Interface" Listing and explanation of the CiscoSecure Command Line Interface, which allows an administrator to carry out simple CiscoSecure administration through UNIX command lines.
Appendix D, "NAS Configuration Examples" Examples that you can apply directly to your own CiscoSecure ACS platform, including Lock and Key, remote-node IP and IPX dialup, ISDN dialup to a Cisco AS5200, and remote-node IP dialup.
Appendix E, "RADIUS Attribute-Value Pairs and Dictionary Management" Reference information pertaining to the use of the RADIUS protocol to exchange data between your NAS and the CiscoSecure ACS.
Appendix F, "CiscoSecure ACS Database Structure" Reference information on database schema.
Appendix G,"Setting up Database Replication among CiscoSecure ACSes" Information on integrating Oracle or Sybase database replication with CiscoSecure profile data.
Appendix H, "References and Recommended Reading" List of other documents that you might find helpful in your management of CiscoSecure ACS software.

Document Conventions

This publication uses the following conventions to convey instructions and information:

Command descriptions use these conventions:

This Convention: Indicates:
boldface font Commands and keywords
italic font Variables for which you supply values
plain font Filenames
square brackets ([ ]) Optional elements
braces ({ }) Group of required keywords
vertical bar ( | ) Alternative keywords within the braces

Examples use these conventions:

This Convention: Indicates:
screen font Terminal sessions
boldface screen font Information you enter

Note Means reader take note. Notes contain helpful suggestions or references to materials not contained in this manual.
 
Caution Means reader be careful. In this situation, you might do something that could result in equipment damage or loss of data.  
Timesaver Means the described action saves time. You can save time by performing the action described in the paragraph.

hometocprevnextglossaryfeedbacksearchhelp
Copyright 1989-1998 © Cisco Systems Inc.