Cisco Acs 5x User Guide
Here you can view all the pages of manual Cisco Acs 5x User Guide. The Cisco manuals for Control System are available online for free. You can easily download all the documents as PDF.
Page 61
3-19 User Guide for Cisco Secure Access Control System 5.3 OL-24201-01 Chapter 3 ACS 5.x Policy Model Flows for Configuring Services and Policies Figure 3-2 illustrates what this policy rule table could look like. Figure 3-2 Sample Rule-Based Policy Each row in the policy table represents a single rule. Each rule, except for the last Default rule, contains two conditions, ID Group and Location, and a result, Authorization Profile. ID Group is an identity-based classification and Location is a...
Page 62
3-20 User Guide for Cisco Secure Access Control System 5.3 OL-24201-01 Chapter 3 ACS 5.x Policy Model Flows for Configuring Services and Policies Added users to the internal ACS identity store or add external identity stores. See Creating Internal Users, page 8-11, Managing Identity Attributes, page 8-7, or Creating External LDAP Identity Stores, page 8-26. Table 3-8 Steps to Configure Services and Policies Step Action Drawer in Web Interface Step 1Define policy results: Authorizations and...
Page 63
3-21 User Guide for Cisco Secure Access Control System 5.3 OL-24201-01 Chapter 3 ACS 5.x Policy Model Flows for Configuring Services and Policies Related Topics Policy Terminology, page 3-3 Policy Conditions, page 3-16 Policy Results, page 3-16 Policies and Identity Attributes, page 3-17
Page 64
3-22 User Guide for Cisco Secure Access Control System 5.3 OL-24201-01 Chapter 3 ACS 5.x Policy Model Flows for Configuring Services and Policies
Page 65
CH A P T E R 4-1 User Guide for Cisco Secure Access Control System 5.3 OL-24201-01 4 Common Scenarios Using ACS Network control refers to the process of controlling access to a network. Traditionally a username and password was used to authenticate a user to a network. Now a days with the rapid technological advancements, the traditional method of managing network access with a username and a password is no longer sufficient. The ways in which the users can access the network and what they can access...
Page 66
4-2 User Guide for Cisco Secure Access Control System 5.3 OL-24201-01 Chapter 4 Common Scenarios Using ACS Overview of Device Administration Cisco Secure Access Control System (ACS) allows you to centrally manage access to your network services and resources (including devices, such as IP phones, printers, and so on). ACS 5.3 is a policy-based access control system that allows you to create complex policy conditions and helps you to comply with the various Governmental regulations. When you...
Page 67
4-3 User Guide for Cisco Secure Access Control System 5.3 OL-24201-01 Chapter 4 Common Scenarios Using ACS Overview of Device Administration If a command is matched to a command set, the corresponding permit or deny setting for the command is retrieved. If multiple results are found in the rules that are matched, they are consolidated and a single permit or deny result for the command is returned, as described in these conditions: If an explicit deny-always setting exists in any command set, the...
Page 68
4-4 User Guide for Cisco Secure Access Control System 5.3 OL-24201-01 Chapter 4 Common Scenarios Using ACS Overview of Device Administration Step 5Configure an access service policy. See Access Service Policy Creation, page 10-4. Step 6Configure a service selection policy. See Service Selection Policy Creation, page 10-4. Step 7Configure an authorization policy (rule table). See Configuring a Session Authorization Policy for Network Access, page 10-29. Command Authorization This topic describes...
Page 69
4-5 User Guide for Cisco Secure Access Control System 5.3 OL-24201-01 Chapter 4 Common Scenarios Using ACS Password-Based Network Access TACACS+ Custom Services and Attributes This topic describes the configuration flow to define TACACS+ custom attributes and services. Step 1Create a custom TACACS+ condition to move to TACACS+ service on request. To do this: a.Go to Policy Elements > Session Conditions > Custom and click Create. b.Create a custom TACACS+ condition. See Creating, Duplicating, and...
Page 70
4-6 User Guide for Cisco Secure Access Control System 5.3 OL-24201-01 Chapter 4 Common Scenarios Using ACS Password-Based Network Access NoteDuring password-based access (or certificate-based access), the user is not only authenticated but also authorized according to the ACS configuration. And if NAS sends accounting requests, the user is also accounted. ACS supports the following password-based authentication methods: Plain RADIUS password authentication methods –RADIUS-PAP –RADIUS-CHAP...