Cisco Acs 57 User Guide
Here you can view all the pages of manual Cisco Acs 57 User Guide. The Cisco manuals for Control System are available online for free. You can easily download all the documents as PDF.
Page 531
7 Understanding Logging About Logging Remote Syslog Server Target You can use the web interface to configure logging category messages so that they are sent to remote syslog server targets. Log messages are sent to the remote syslog server targets in accordance with the syslog protocol standard (see RFC-3164). The syslog protocol is an unsecure UDP. Log messages are sent to the remote syslog server with this syslog message header format, which precedes the local store syslog message format (see...
Page 532
8 Understanding Logging About Logging The syslog message data or payload is the same as the Local Store Message Format, which is described in Table 37 on page 5. The remote syslog server targets are identified by the facility code names LOCAL0 to LOCAL7 (LOCAL6 is the default logging location.) Log messages that you assign to the remote syslog server are sent to the default location for Linux syslog (/var/log/messages), however; you can configure a different location on the server. The remote...
Page 533
9 Understanding Logging ACS 4.x Versus ACS 5.7 Logging Figure 2 Monitoring and Reports Viewer The Monitoring and Report Viewer has two drawer options: Monitoring and Reports—Use this drawer to view and configure alarms, view log reports, and perform troubleshooting tasks. Monitoring Configuration—Use this drawer to view and configure logging operations and system settings. In addition to the information that is captured in the log messages described in Logging Categories, page 2, the Viewer...
Page 534
10 Understanding Logging ACS 4.x Versus ACS 5.7 Logging Table 39 ACS 4.x vs. ACS 5.7 Logging Functionality This logging function… is handled this way in ACS 4.x… and this way in ACS 5.7 Log TypesAAA-related logs contain information about the use of remote access services by users. Audit logs contain information about the ACS system and activities and, therefore, record system-related events. These logs are useful for troubleshooting or audits. CSV audit logs are always enabled, and you can...
Page 535
11 Understanding Logging ACS 4.x Versus ACS 5.7 Logging Configuration Use the System Configuration > Logging page to define: Loggers and individual logs Critical loggers Remote logging CSV log file Syslog log ODBC logSee Configuring Local and Remote Log Storage, page 23 and the CLI Reference Guide for Cisco Secure Access Control System 5.7. Viewing and Downloading Log MessagesUse the Reports and Activity pages. See Viewing Log Messages, page 8. Troubleshooting with Log MessagesService log...
Page 537
1 Cisco Systems, Inc.www.cisco.com AAA Protocols This section contains the following topics: Typical Use Cases, page 1 Access Protocols—TACACS+ and RADIUS, page 4 Overview of TACACS+, page 5 Overview of RADIUS, page 5 Typical Use Cases This section contains the following topics: Device Administration (TACACS+), page 1 Network Access (RADIUS With and Without EAP), page 2 Device Administration (TACACS+) Figure 3 on page 1 shows the flows associated with device administration. The two primary...
Page 538
2 AAA Protocols Typical Use Cases 4.ACS sends a TACACS+ response to the network device that applies the decision. The response includes parameters, such as the privilege level that determines the level of administrator access for the duration of the session. Command Authorization Requests Note: The numbers refer to Figure 3Device Administration Flow, page 1. For command authorization: 1.An administrator issues a command at a network device. 2.The network device sends a TACACS+ access request to ACS....
Page 539
3 AAA Protocols Typical Use Cases For more information on RADIUS-based flows with EAP authentication, see RADIUS-Based Flows with EAP Authentication, page 3. RADIUS-Based Flow Without EAP Authentication This section describes RADIUS-based workflow without EAP authentication. For RADIUS with PAP authentication: 1.A host connects to a network device. 2.The network device sends a RADIUS Access-Request to ACS, containing RADIUS attributes appropriate to the specific protocol that is being used (PAP,...
Page 540
4 AAA Protocols Access Protocols—TACACS+ and RADIUS For all EAP authentications: 1.A host connects to a network device. 2.The network device sends an EAP Request to the host. 3.The host replies with an EAP Response to the network device. 4.The network device encapsulates the EAP Response that it received from the host into a RADIUS Access-Request (using the EAP-Message RADIUS attribute) and sends the RADIUS Access-Request to ACS. 5.ACS extracts the EAP Response from the RADIUS packet and creates a new...