Cisco Acs 57 User Guide
Here you can view all the pages of manual Cisco Acs 57 User Guide. The Cisco manuals for Control System are available online for free. You can easily download all the documents as PDF.
Page 1
Cisco Systems, Inc.www.cisco.com—CiscoSans User Guide for Cisco Secure Access Control System 5.7 Last Updated: 11/1/16 THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS. THE SOFTWARE LICENSE AND LIMITED...
Page 2
ii Any Internet Protocol (IP) addresses used in this document are not intended to be actual addresses. Any examples, command display output, and figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses in illustrative content is unintentional and coincidental. © 2015 Cisco Systems, Inc. All rights reserved.
Page 3
1 Cisco Systems, Inc.www.cisco.com Preface Revised: November 1, 2016 This guide describes how to use Cisco Secure Access Control System (ACS) 5.7. Audience This guide is for security administrators who use ACS, and who set up and maintain network and application security. Document Conventions This guide uses the convention whereby the symbol ^ represents the key labeled Control. For example, the key combination ^z means hold down the Control key while you press the zkey. Command descriptions use...
Page 4
2 Preface Documentation Updates Documentation Updates Table 1 on page 2 lists the updates to the User Guide for Cisco Secure Access Control System 5.7. Related Documentation Table 2 on page 2 lists a set of related technical documentation available on Cisco.com. To find end-user documentation for all products on Cisco.com, go to: http://www.cisco.com/go/techdocs. Select Products > Security > Access Control and Policy > Policy and Access Management > Cisco Secure Access Control System. Note: It is...
Page 5
3 Preface Obtaining Documentation and Submitting a Service Request Subscribe to the What’s New in Cisco Product Documentation as a Really Simple Syndication (RSS) feed and set content to be delivered directly to your desktop using a reader application. The RSS feeds are a free service and Cisco currently supports RSS version 2.0.
Page 7
1 Cisco Systems, Inc.www.cisco.com Introducing ACS 5.7 This section contains the following topics: Overview of ACS, page 1 ACS Distributed Deployment, page 2 ACS Management Interfaces, page 3 Overview of ACS ACS is a policy-based security server that provides standards-compliant Authentication, Authorization, and Accounting (AAA) services to your network. ACS facilitates the administrative management of Cisco and non-Cisco devices and applications. As a dominant enterprise network access control...
Page 8
2 Introducing ACS 5.7 ACS Distributed Deployment For more information about using ACS for device administration and network access scenarios, see Common Scenarios Using ACS, page 1 Cisco Secure ACS: Enforces access policies for VPN and wireless users. Provides simplified device administration. Provides advanced monitoring, reporting, and troubleshooting tools. There are several changes and enhancements in ACS 5.7 compared to ACS 5.6. For a complete list of new and changed features, see Release...
Page 9
3 Introducing ACS 5.7 ACS Licensing Model For more information about setting up a distributed deployment, see Configuring System Operations, page 1. Note: Replication does not work in ACS servers if you use the Cisco Overlay Transport Virtualization technology in your Virtual Local Area Network. Note: Network Address Translation (NAT) is not supported in an ACS distributed deployment environment. That is, if the network address of a primary or secondary instance is translated, then the database...
Page 10
4 Introducing ACS 5.7 ACS Management Interfaces Reflects the new policy model, which is organized around the user’s view of policy administration. The new policy model is easier to use, as it separates the complex interrelationships that previously existed among policy elements. For example, user groups, network device groups (NDGs), network access filters, network access profiles, and so on. Presents the configuration tasks in a logical order that you can follow for many common scenarios. For...