Cisco Acs 57 User Guide
Here you can view all the pages of manual Cisco Acs 57 User Guide. The Cisco manuals for Control System are available online for free. You can easily download all the documents as PDF.
Page 251
27 Managing Policy Elements Managing Authorizations and Permissions Defining Custom Attributes Use this tab to define custom attributes for the shell profile. This tab also displays the Common Tasks Attributes that you have chosen in the Common Tasks tab. 1.Edit the fields in the Custom Attributes tab as described in Table 75 on page 27: 2.Click: Submit to save your changes and return to the Shell Profiles page. The General tab to configure the name and description for the authorization profile;...
Page 252
28 Managing Policy Elements Managing Authorizations and Permissions To create, duplicate, or edit a new command set: 1.Choose Policy Elements > Authorization and Permissions > Device Administration > Command Sets. The Command Sets page appears. 2.Do one of the following: Click Create. The Command Set Properties page appears. Check the check box the command set that you want to duplicate and click Duplicate. The Command Set Properties page appears. Click the name that you want to modify; or, check...
Page 253
29 Managing Policy Elements Managing Authorizations and Permissions 4.Click Submit. The command set is saved. The Command Sets page appears with the command set that you created or duplicated. Related Topics Creating, Duplicating, and Editing Authorization Profiles for Network Access, page 17 Creating, Duplicating, and Editing a Shell Profile for Device Administration, page 22 Deleting an Authorizations and Permissions Policy Element, page 31 Command Set table Use this section to define commands to...
Page 254
30 Managing Policy Elements Managing Authorizations and Permissions Creating, Duplicating, and Editing a Shell Profile for Device Administration, page 22 Creating, Duplicating, and Editing Downloadable ACLs You can define downloadable ACLs for the Access-Accept message to return. Use ACLs to prevent unwanted traffic from entering the network. ACLs can filter source and destination IP addresses, transport protocols, and more by using the RADIUS protocol. After you create downloadable ACLs as named...
Page 255
31 Managing Policy Elements Managing Authorizations and Permissions 4.Click Submit. The downloadable ACL is saved. The Downloadable ACLs page appears with the downloadable ACL that you created or duplicated. Related Topics Creating, Duplicating, and Editing Authorization Profiles for Network Access, page 17 Configuring a Session Authorization Policy for Network Access, page 30 Deleting an Authorizations and Permissions Policy Element, page 31 Deleting an Authorizations and Permissions Policy...
Page 256
32 Managing Policy Elements Managing Authorizations and Permissions SGACLs are also called role-based ACLs (RBACLs). 1.Choose Policy Elements > Authorizations and Permissions > Named Permissions Objects > Security Group ACLs. The Security Group Access Control Lists page appears with the fields described in Table 78 on page 32: 2.Click one of the following options: Create to create a new SGACL. Duplicate to duplicate an SGACL. Edit to edit an SGACL. 3.Complete the fields in the Security Group Access...
Page 257
1 Cisco Systems, Inc.www.cisco.com Managing Access Policies In ACS 5.7, policy drives all activities. Policies consist mainly of rules that determine the action of the policy. You create access services to define authentication and authorization policies for requests. A global service selection policy contains rules that determine which access service processes an incoming request. For a basic work flow for configuring policies and all their elements, see Flows for Configuring Services and Policies,...
Page 258
2 Managing Access Policies Policy Creation Flow This section contains the following topics: Network Definition and Policy Goals, page 2 Policy Elements in the Policy Creation Flow, page 2 Access Service Policy Creation, page 4 Service Selection Policy Creation, page 4 Network Definition and Policy Goals The first step in creating a policy is to determine the devices and users for which the policy should apply. Then you can start to configure your policy elements. For basic policy creation, you can...
Page 259
3 Managing Access Policies Policy Creation Flow The locations, device types, and identity groups that you create are children of these defaults. To create the building blocks for a basic device administration policy: 1.Create network resources. In the Network Resources drawer, create: a.Device groups for Locations, such as All Locations > East, West, HQ. b.Device groups for device types, such as All Device Types > Router, Switch. c.AAA clients (clients for AAA switches and routers, address for each,...
Page 260
4 Managing Access Policies Customizing a Policy Access Service Policy Creation After you create the basic elements, you can create an access policy that includes identity groups and privileges. For example, you can create an access service for device administration, called NetOps, which contains authorization and authentication policies that use this data: Users in the Supervisor identity group—Full privileges to all devices at all locations. User in the East, HQ, West identity groups—Full...