|
|
This section discusses the objectives, audience, and organization of the CiscoSecure ACS 2.3 for UNIX User Guide and CiscoSecure ACS 2.3 for UNIX Reference Guide.
Cisco documentation and additional literature are available in a CD-ROM package, which ships with your product. The Documentation CD-ROM, a member of the Cisco Connection Family, is updated monthly. Therefore, it might be more up to date than printed documentation. To order additional copies of the Documentation CD-ROM, contact your local sales representative or call customer service. The CD-ROM package is available as a single package or as an annual subscription. You can also access Cisco documentation on the World Wide Web at http://www.cisco.com, http://www-china.cisco.com, or
http://www-europe.cisco.com.
The objective of this document is to provide examples and reference information to help you better customize the CiscoSecure Access Control Server (ACS) 2.3 for UNIX (Solaris) software to suit your needs. For sample file formats, see Chapter 6; for guidelines for troubleshooting, see Chapter 2; and for a list of references and recommended reading, see Appendix A.
This guide was written for system administrators who use the CiscoSecure ACS software to set up and maintain accounts and dial-in network security.
Two manuals are provided in this package, the CiscoSecure ACS 2.3 User Guide and the CiscoSecure ACS 2.3 Reference Guide.
The major sections of the CiscoSecure ACS 2.3 for UNIX User Guide are as follows:
| This Chapter: | Contains: |
|---|---|
Chapter 1, "Introduction to the CiscoSecure ACS Software" | Overview of the CiscoSecure ACS software; defines package contents and system requirements; describes features of the software; and provides general information on network security. |
Chapter 2, "Configuring Initial Test Group and User Profiles" | Information on configuring initial test group profiles and test user profiles to confirm the operability of your CiscoSecure installation. |
Chapter 3, "Simple User and ACS Management" | Information on simple configuration and management of user profiles through the CiscoSecure ACS web pages. |
Chapter 4, "Advanced Group and User Management" | Information on advanced group and user profile configuration and management through the CiscoSecure ACS web pages and the CiscoSecure Administrator advanced configuration program. |
Chapter 5, "ACS and NAS Management" | Information on NAS management, ACS management, and local and remote domain management, through the CiscoSecure ACS web pages and the CiscoSecure Administrator advanced configuration program. |
Chapter 6, "Limiting and Tracking Sessions Per User, Group, or VPDN" | Information on using the max sessions features of CiscoSecure for limiting the number of sessions allowed per user, group, VPDN, or PoP. |
Chapter 7, "Strategies Applying Attributes" | Information about the CiscoSecure ACS features, including attributes and sample profiles. |
Chapter 8, "CiscoSecure ACS Accounting" | Information on the CiscoSecure ACS software accounting database file and the instructions for enabling accounting. |
Chapter 9, "Configuring the NAS for TACACS+" | Information on configuring the NAS for authentication, authorization, and accounting if you are using the TACACS+ protocol. |
Chapter 10, "Configuring the NAS for RADIUS" | Information on configuring the NAS for authentication, authorization, and accounting if you are using the RADIUS protocol. |
Chapter 11, "Token Server Support" | Information on one-time password authentication and token servers. |
Appendix A, "References and Recommended Reading" | List of other documents that you might find helpful in your management of CiscoSecure ACS software. |
The major sections of the CiscoSecure ACS 2.3 for UNIX Reference Guide are as follows:
| This Chapter: | Contains: |
|---|---|
An overview of the major software components of the CiscoSecure ACS 2.3 for UNIX product. | |
Information on how to identify and resolve potential problems with your CiscoSecure ACS, including timesaving tips and resources for service and support. | |
"Converting an Existing AA Database for CiscoSecure ACS 2.3" | Instructions for using the import utility to transfer an existing CiscoSecure database or an existing RADIUS database to the sample runtime database that can be used with CiscoSecure ACS 2.3. |
Configuration parameters and syntax for the server control file, message catalogs, content and grammar conventions of the AA database, and sample configurations for setting server attributes. | |
Listing and explanation of the CiscoSecure | |
Examples that you can apply directly to your own CiscoSecure ACS platform, including Lock and Key, remote-node IP and IPX dialup, ISDN dialup to a Cisco AS5200, and remote-node IP dialup. | |
Reference information pertaining to the use of the RADIUS protocol to exchange data between your NAS and the CiscoSecure ACS. | |
Reference information on database schema. | |
Information on integrating Oracle or Sybase database replication with CiscoSecure profile data. | |
Tips for enhancing the security of your network and the CiscoSecure AAA management system. | |
List of other documents that you might find helpful in your management of CiscoSecure ACS software. |
This publication uses the following conventions to convey instructions and information.
Command descriptions use these conventions:
| This Convention: | Indicates: |
|---|---|
boldface font | Commands and keywords |
italic font | Variables for which you supply values |
plain font | Filenames |
square brackets ([ ]) | Optional elements |
braces ({ }) | Group of required keywords |
vertical bar ( | ) | Alternative keywords within the braces |
Examples use these conventions:
| This Convention: | Indicates: |
|---|---|
| Terminal sessions |
boldface screen font | Information you enter |
![]() | Caution Means reader be careful. In this situation, you might do something that could result in equipment damage or loss of data. |
![]() | TimeSaver Means the described action saves time. You can save time by performing the action described in the paragraph. |
|
|