Home > Cisco > Control System > Cisco Acs 5x User Guide

Cisco Acs 5x User Guide

Here you can view all the pages of manual Cisco Acs 5x User Guide. The Cisco manuals for Control System are available online for free. You can easily download all the documents as PDF.

Page 281

10-17
User Guide for Cisco Secure Access Control System 5.3
OL-24201-01
Chapter 10      Managing Access Policies
  Configuring Access Services
Allow EAP-FAST Enables the EAP-FAST authentication protocol and EAP-FAST settings. The EAP-FAST 
protocol can support multiple internal protocols on the same server. The default inner method is 
MSCHAPv2.
When you check Allow EAP-FAST, you can configure EAP-FAST inner methods:
Allow EAP-MSCHAPv2
–Allow Password Change—Check for ACS to support password changes in...

Page 282

10-18
User Guide for Cisco Secure Access Control System 5.3
OL-24201-01
Chapter 10      Managing Access Policies
  Configuring Access Services
Allow EAP-FAST 
(continued)PA C  O pt i on s

Tunnel PAC Time To Live—The Time To Live (TTL) value restricts the lifetime of the PAC. 
Specify the lifetime value and units. The default is one (1) day. 
Proactive PAC Update When:  of PAC TTL is Left—The Update value ensures that the 
client has a valid PAC. ACS initiates update after the first successful...

Page 283

10-19
User Guide for Cisco Secure Access Control System 5.3
OL-24201-01
Chapter 10      Managing Access Policies
  Configuring Access Services
Step 3Click Finish to save your changes to the access service. 
To enable an access service, you must add it to the service selection policy.
Configuring Access Services Templates
Use a service template to define an access service with policies that are customized to use specific 
condition types.
Step 1In the Configuring General Access Service Properties, page...

Page 284

10-20
User Guide for Cisco Secure Access Control System 5.3
OL-24201-01
Chapter 10      Managing Access Policies
  Configuring Access Services
Deleting an Access Service
To delete an access service:
Step 1Select Access Policies > Access Services.
The Access Services page appears with a list of configured services.
Step 2Check one or more check boxes next to the access services that you want to delete.
Step 3Click Delete; then click OK in the confirmation message. 
The Access Policies page appears without...

Page 285

10-21
User Guide for Cisco Secure Access Control System 5.3
OL-24201-01
Chapter 10      Managing Access Policies
  Configuring Access Service Policies
Configuring Access Service Policies
You configure access service policies after you create the access service: 
Viewing Identity Policies, page 10-21
Configuring Identity Policy Rule Properties, page 10-24
Configuring a Group Mapping Policy, page 10-26
Configuring a Session Authorization Policy for Network Access, page 10-29
Configuring a Session...

Page 286

10-22
User Guide for Cisco Secure Access Control System 5.3
OL-24201-01
Chapter 10      Managing Access Policies
  Configuring Access Service Policies
In the rule-based policy, each rule contains one or more conditions and a result, which is the identity 
source to use for authentication. You can create, duplicate, edit, and delete rules within the identity 
policy; and you can enable and disable them.
CautionIf you switch between the simple policy and the rule-based policy pages, you will lose your...

Page 287

10-23
User Guide for Cisco Secure Access Control System 5.3
OL-24201-01
Chapter 10      Managing Access Policies
  Configuring Access Service Policies
Viewing Rules-Based Identity Policies
Select Access Policies > Access Services > service > Identity, where  is the name of the 
access service.
By default, the Simple Identity Policy page appears with the fields described in Table 10-9. If 
configured, the Rules-Based Identity Policy page appears with the fields described in Table 10-10:
To configure a...

Page 288

10-24
User Guide for Cisco Secure Access Control System 5.3
OL-24201-01
Chapter 10      Managing Access Policies
  Configuring Access Service Policies
Creating Policy Rules, page 10-37
Duplicating a Rule, page 10-38
Editing Policy Rules, page 10-38
Deleting Policy Rules, page 10-39
For information about configuring an identity policy for Host Lookup requests, see Configuring an 
Authorization Policy for Host Lookup Requests, page 4-20.
Related Topics
Configuring a Group Mapping Policy, page 10-26...

Page 289

10-25
User Guide for Cisco Secure Access Control System 5.3
OL-24201-01
Chapter 10      Managing Access Policies
  Configuring Access Service Policies
Table 10-11 Identity Rule Properties Page 
Option Description
General
Rule  Name Name of the rule. If you are duplicating a rule, you must enter a unique name as a minimum configuration; 
all other fields are optional.
Rule Status Rule statuses are:
Enabled—The rule is active.
Disabled—ACS does not apply the results of the rule.
Monitor—The rule is active,...

Page 290

10-26
User Guide for Cisco Secure Access Control System 5.3
OL-24201-01
Chapter 10      Managing Access Policies
  Configuring Access Service Policies
Configuring a Group Mapping Policy
Configure a group mapping policy to map groups and attributes that are retrieved from external identity 
stores to ACS identity groups. When ACS processes a request for a user or host, this policy retrieves the 
relevant identity group which can be used in authorization policy rules.
If you created an access service that...
Start reading Cisco Acs 5x User Guide

Related Manuals for Cisco Acs 5x User Guide

All Cisco manuals