Cisco Acs 5x User Guide
Here you can view all the pages of manual Cisco Acs 5x User Guide. The Cisco manuals for Control System are available online for free. You can easily download all the documents as PDF.
Page 91
4-27 User Guide for Cisco Secure Access Control System 5.3 OL-24201-01 Chapter 4 Common Scenarios Using ACS ACS and Cisco Security Group Access Step 5Click Next. The Access Services Properties page appears. Step 6In the Authentication Protocols area, check the relevant protocols for your access service. Step 7Click Finish. Creating an Endpoint Admission Control Policy After you create a service, you configure the endpoint admission control policy. The endpoint admission control policy returns an...
Page 92
4-28 User Guide for Cisco Secure Access Control System 5.3 OL-24201-01 Chapter 4 Common Scenarios Using ACS ACS and Cisco Security Group Access The first row (topmost) of the matrix contains the column headers, which display the destination SGT. The first column (far left) contains the row titles, with the source SG displayed. At the intersection of these axes lies the origin cell (top left) that contains the titles of the axes, namely, Destination and Source. All other cells are internal...
Page 93
4-29 User Guide for Cisco Secure Access Control System 5.3 OL-24201-01 Chapter 4 Common Scenarios Using ACS RADIUS and TACACS+ Proxy Requests To create a default policy: Step 1Choose Access Policies > Security Group Access Control > Egress Policy then choose Default Policy. Step 2Fill in the fields as in the Default Policy for Egress Policy page. Step 3Click Submit. RADIUS and TACACS+ Proxy Requests You can use ACS to act as a proxy server that receives authentication and accounting RADIUS...
Page 94
4-30 User Guide for Cisco Secure Access Control System 5.3 OL-24201-01 Chapter 4 Common Scenarios Using ACS RADIUS and TACACS+ Proxy Requests During proxying, ACS: 1.Receives the following packets from the NAS and forwards them to the remote RADIUS server: Access-Request Accounting-Request packets 2.Receives the following packets from the remote RADIUS server and returns them to the NAS: Access-Accept Access-Reject Access-Challenge Accounting-Response 3.Receives the following packets from the NAS...
Page 95
4-31 User Guide for Cisco Secure Access Control System 5.3 OL-24201-01 Chapter 4 Common Scenarios Using ACS RADIUS and TACACS+ Proxy Requests The TACACS+ proxy feature in ACS supports the following protocols: PA P ASCII CHAP MSCHAP authentications types Related Topics RADIUS and TACACS+ Proxy Requests, page 4-29 Supported RADIUS Attributes, page 4-31 Configuring Proxy Service, page 4-32 Supported RADIUS Attributes The following supported RADIUS attributes are encrypted: User-Password...
Page 96
4-32 User Guide for Cisco Secure Access Control System 5.3 OL-24201-01 Chapter 4 Common Scenarios Using ACS RADIUS and TACACS+ Proxy Requests Configuring Proxy Service To configure proxy services: Step 1Configure a set of remote RADIUS and TACACS+ servers. For information on how to configure remote servers, see Creating, Duplicating, and Editing External Proxy Servers, page 7-19. Step 2Configure an External proxy service. For information on how to configure a External proxy service, see...
Page 97
CH A P T E R 5-1 User Guide for Cisco Secure Access Control System 5.3 OL-24201-01 5 Understanding My Workspace The Cisco Secure ACS web interface is designed to be viewed using Microsoft Internet Explorer 7.x, 8.x, and 9.x and Mozilla Firefox 3.x and 4.x. The web interface not only makes viewing and administering ACS possible, but it also allows you to monitor and report on any event in the network. These reports track connection activity, show which users are currently logged in, list the failed...
Page 98
5-2 User Guide for Cisco Secure Access Control System 5.3 OL-24201-01 Chapter 5 Understanding My Workspace Task Guides Task Guides From the My Workspace drawer, you can access Tasks Guides. When you click any of the tasks, it opens a frame on the right side of the web interface. This frame contains step-by-step instructions as well as links to additional information. ACS provides the following task guides: Quick Start—Lists the minimal steps required to get ACS up and running quickly. Initial...
Page 99
5-3 User Guide for Cisco Secure Access Control System 5.3 OL-24201-01 Chapter 5 Understanding My Workspace Using the Web Interface Related Topics Configuring Authentication Settings for Administrators, page 16-9 Changing the Administrator Password, page 16-13 Using the Web Interface You can configure and administer ACS through the ACS web interface, in which you can access pages, perform configuration tasks, and view interface configuration errors. This section describes: Accessing the Web...
Page 100
5-4 User Guide for Cisco Secure Access Control System 5.3 OL-24201-01 Chapter 5 Understanding My Workspace Using the Web Interface Logging In To log in to the ACS web interface for the first time after installation: Step 1Enter the ACS URL in your browser, for example https://acs_host/acsadmin, where /acs_host is the IP address or Domain Name System (DNS) hostname. The login page appears. Step 2Enter ACSAdmin in the Username field; the value is not case-sensitive. Step 3Enter default in the...