Cisco Acs 5x User Guide
Here you can view all the pages of manual Cisco Acs 5x User Guide. The Cisco manuals for Control System are available online for free. You can easily download all the documents as PDF.
Page 271
10-7 User Guide for Cisco Secure Access Control System 5.3 OL-24201-01 Chapter 10 Managing Access Policies Configuring the Service Selection Policy To configure a rule-based service selection policy, see these topics: Creating, Duplicating, and Editing Service Selection Rules, page 10-8 Deleting Service Selection Rules, page 10-10 After you configure your service selection policy, you can continue to configure your access service policies. See Configuring Access Service Policies, page 10-21....
Page 272
10-8 User Guide for Cisco Secure Access Control System 5.3 OL-24201-01 Chapter 10 Managing Access Policies Configuring the Service Selection Policy Creating, Duplicating, and Editing Service Selection Rules Create service selection rules to determine which access service processes incoming requests. The Default Rule provides a default access service in cases where no rules are matched or defined. When you create rules, remember that the order of the rules is important. When ACS encounters a...
Page 273
10-9 User Guide for Cisco Secure Access Control System 5.3 OL-24201-01 Chapter 10 Managing Access Policies Configuring the Service Selection Policy The Default Rule—You can change only the access service. See Table 10-3 for field descriptions: Step 4Click OK. The Service Selection Policy page appears with the rule that you configured. Step 5Click Save Changes. Related Topics Configuring Access Services, page 10-11 Deleting Service Selection Rules, page 10-10 Table 10-3 Service Selection Rule...
Page 274
10-10 User Guide for Cisco Secure Access Control System 5.3 OL-24201-01 Chapter 10 Managing Access Policies Configuring the Service Selection Policy Displaying Hit Counts Use this page to reset and refresh the Hit Count display on the Rule-based Policy page. To display this page, click Hit Count on the Rule-based Policy page. Deleting Service Selection Rules NoteYou cannot delete the Default service selection rule. To delete a service selection rule: Step 1Select Access Policies > Service...
Page 275
10-11 User Guide for Cisco Secure Access Control System 5.3 OL-24201-01 Chapter 10 Managing Access Policies Configuring Access Services Configuring Access Services Access services contain the authentication and authorization policies for requests. You can create separate access services for different use cases; for example, device administration, wireless network access, and so on. When you create an access service, you define the type of policies and policy structures that it contains; for...
Page 276
10-12 User Guide for Cisco Secure Access Control System 5.3 OL-24201-01 Chapter 10 Managing Access Policies Configuring Access Services Step 3Edit the fields in the Allowed Protocols tab as described in Table 10-7. Step 4Click Submit to save the changes you have made to the default access service. Creating, Duplicating, and Editing Access Services Access services contain the authentication and authorization policies for requests. When you create an access service, you define: Policy structure—The...
Page 277
10-13 User Guide for Cisco Secure Access Control System 5.3 OL-24201-01 Chapter 10 Managing Access Policies Configuring Access Services Step 2Do one of the following: Click Create. Check the check box next to the access service that you want to duplicate; then click Duplicate. Click the access service name that you want to modify; or, check the check box next to the name and click Edit. Click the access service name in the left navigation tab. The Access Service Properties General page appears....
Page 278
10-14 User Guide for Cisco Secure Access Control System 5.3 OL-24201-01 Chapter 10 Managing Access Policies Configuring Access Services Step 3Click Next to configure the allowed protocols. See Configuring Access Service Allowed Protocols, page 10-15. Description Description of the access service. Access Service Policy Structure Based on service template Creates an access service containing policies based on a predefined template. This option is available only for service creation. Based on...
Page 279
10-15 User Guide for Cisco Secure Access Control System 5.3 OL-24201-01 Chapter 10 Managing Access Policies Configuring Access Services Related Topic Configuring Access Service Allowed Protocols, page 10-15 Configuring Access Services Templates, page 10-19 Configuring Access Service Allowed Protocols The allowed protocols are the second part of access service creation. Access service definitions contain general and allowed protocol information. When you duplicate and edit services, the Access...
Page 280
10-16 User Guide for Cisco Secure Access Control System 5.3 OL-24201-01 Chapter 10 Managing Access Policies Configuring Access Services Allow EAP-TLS Enables the EAP-TLS Authentication protocol and configures EAP-TLS settings. You can specify how ACS verifies user identity as presented in the EAP Identity response from the end-user client. User identity is verified against information in the certificate that the end-user client presents. This comparison occurs after an EAP-TLS tunnel is...