Home > Cisco > Control System > Cisco Acs 5x User Guide

Cisco Acs 5x User Guide

    Download as PDF Print this page Share this page

    Have a look at the manual Cisco Acs 5x User Guide online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 53 Cisco manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.

    Page
    of 650
    							18-27
    User Guide for Cisco Secure Access Control System 5.3
    OL-24201-01
    Chapter 18      Managing System Administration Configurations
      Configuring Logs
    Related Topic
    Configuring Per-Instance Logging Categories, page 18-29
    Viewing ADE-OS Logs, page 18-28 Software-Management
    ACS_UPGRADE—ACS upgraded
    ACS_PATCH—ACS patch installed
    UPGRADE_SCHEMA_CHANGE—ACS schema upgrade complete
    UPGRADE_DICTIONARY—ACS dictionary upgrade complete
    UPGRADE_DATA_MANIPULATION—ACS upgrade - data manipulation stage complete
    UPGRADE_AAC—ACS AAC upgrade complete
    UPGRADE_PKI—ACS PKI upgrade complete
    UPGRADE_VIEW—ACS View upgrade complete
    CLI_ACS_UPGRADE—ACS upgrade started
    CLI_ACS_INSTALL—ACS install started
    System-Management
    ACS_MIGRATION_INTERFACE—ACS migration interface enabled/disabled
    ACS_ADMIN_PSWD_RESET—ACS administrator password reset
    CLI_CLOCK_SET—Clock set
    CLI_TZ_SET—Time zone set
    CLI_NTP_SET—NTP Server set
    CLI_HOSTNAME_SET—Hostname set
    CLI_IPADDRESS_SET—IP address set
    CLI_IPADDRESS_STATE—IP address state
    CLI_DEFAULT_GATEWAY—Default gateway set
    CLI_NAME_SERVER—Name server set
    ADEOS_XFER_LIBERROR—ADE OS Xfer library error
    ADEOS_INSTALL_LIBERROR—ADE OS install library error
    AD_JOIN_ERROR—AD agent failed to join AD domain
    AD_JOIN_DOMAIN—AD agent joined AD domain
    AD_LEAVE_DOMAIN—AD agent left AD domain
    IMPORT_EXPORT_PROCESS_ABORTED—Import/Export process aborted
    IMPORT_EXPORT_PROCESS_STARTED—Import/Export process started
    IMPORT_EXPORT_PROCESS_COMPLETED—Import/Export process completed
    IMPORT_EXPORT_PROCESS_ERROR—Error while Import/Export process
    Table 18-22 Administrative and Operational Logs Not Logged in the Local Target (continued)
    Category Log and Description 
    						
    							18-28
    User Guide for Cisco Secure Access Control System 5.3
    OL-24201-01
    Chapter 18      Managing System Administration Configurations
      Configuring Logs
    Viewing ADE-OS Logs
    The logs listed in Table 18-22 are written to the ADE-OS logs. From the ACS CLI, you can use the 
    following command to view the ADE-OS logs:
    show logging system
    This command lists all the ADE-OS logs and your output would be similar to the following example.
    Sep 29 23:24:15 cd-acs5-13-179 sshd(pam_unix)[20013]: 1 more authentication failure; 
    logname= uid=0 euid=0 tty=ssh ruser= rhost=10.77.137.95 
    user=admin
    Sep 29 23:24:34 cd-acs5-13-179 sshd(pam_unix)[20017]: authentication failure; logname= 
    uid=0 euid=0 tty=ssh ruser= rhost=10.77.137.95 user=ad
    min
    Sep 29 23:24:36 cd-acs5-13-179 sshd[20017]: Failed password for admin from 10.77.137.95 
    port 3635 ssh2
    Sep 30 00:47:44 cd-acs5-13-179 sshd(pam_unix)[20946]: authentication failure; logname= 
    uid=0 euid=0 tty=ssh ruser= rhost=10.77.137.95 user=ad
    min
    Sep 30 00:47:46 cd-acs5-13-179 sshd[20946]: Failed password for admin from 10.77.137.95 
    port 3953 ssh2
    Sep 30 00:54:59 cd-acs5-13-179 sshd(pam_unix)[21028]: authentication failure; logname= 
    uid=0 euid=0 tty=ssh ruser= rhost=10.77.137.95 user=ad
    min
    Sep 30 00:55:01 cd-acs5-13-179 sshd[21028]: Failed password for admin from 10.77.137.95 
    port 3962 ssh2
    Sep 30 00:55:35 cd-acs5-13-179 last message repeated 5 times
    Sep 30 00:55:39 cd-acs5-13-179 sshd[21028]: Accepted password for admin from 10.77.137.95 
    port 3962 ssh2
    Sep 30 00:55:39 cd-acs5-13-179 sshd(pam_unix)[21038]: session opened for user admin by 
    (uid=0)
    Sep 30 00:55:40 cd-acs5-13-179 debugd[2597]: hangup signal caught, configuration read
    Sep 30 00:55:40 cd-acs5-13-179 debugd[2597]: successfully loaded debug config
    Sep 30 00:55:40 cd-acs5-13-179 debugd[2597]: [21043]: utils: cars_shellcfg.c[118] [admin]: 
    Invoked carsGetConsoleConfig 
    Sep 30 00:55:40 cd-acs5-13-179 debugd[2597]: [21043]: utils: cars_shellcfg.c[135] [admin]: 
    No Config file, returning defaults 
    Sep 30 01:22:20 cd-acs5-13-179 sshd[21038]: Received disconnect from 10.77.137.95: 11: 
    Connection discarded by broker
    Sep 30 01:22:20 cd-acs5-13-179 sshd(pam_unix)[21038]: session closed for user admin
    Sep 30 01:22:22 cd-acs5-13-179 debugd[2597]: hangup signal caught, configuration read
    Sep 30 01:22:22 cd-acs5-13-179 debugd[2597]: successfully loaded debug config
    Sep 30 02:48:54 cd-acs5-13-179 sshd[22500]: Accepted password for admin from 10.77.137.58 
    port 4527 ssh2
    Sep 30 02:48:54 cd-acs5-13-179 sshd(pam_unix)[22504]: session opened for user admin by 
    (uid=0)
    Sep 30 02:48:55 cd-acs5-13-179 debugd[2597]: hangup signal caught, configuration read
    Sep 30 02:48:55 cd-acs5-13-179 debugd[2597]: successfully loaded debug config
    You can view the logs grouped by the module that they belong to. For example, the monitoring and 
    troubleshooting logs contain the string MSGCAT and the debug logs contain the string debug.
    From the ACS CLI, you can enter the following two commands to view the monitoring and 
    troubleshooting logs and the administrative logs respectively:
    show logging system | include MSGCAT
    show logging system | include debug
    The output of the show logging system | include MSGCAT would be similar to:
    Sep 27 13:00:02 cd-acs5-13-103 MSGCAT58010/root: info:[ACS backup] ACS backup completed
    Sep 28 13:00:03 cd-acs5-13-103 MSGCAT58010/root: info:[ACS backup] ACS backup completed
    Sep 29 06:28:17 cd-acs5-13-103 MSGCAT58007: Killing Tomcat 8363 
    						
    							18-29
    User Guide for Cisco Secure Access Control System 5.3
    OL-24201-01
    Chapter 18      Managing System Administration Configurations
      Configuring Logs
    Sep 29 06:28:28 cd-acs5-13-103 MSGCAT58004/admin: ACS Stopped
    Sep 29 06:31:41 cd-acs5-13-103 MSGCAT58037/admin: Installing ACS
    Sep 29 09:52:35 cd-acs5-13-103 MSGCAT58007: Killing Tomcat 32729
    Sep 29 09:52:46 cd-acs5-13-103 MSGCAT58004/admin: ACS Stopped
    Sep 29 09:53:29 cd-acs5-13-103 MSGCAT58004/admin: ACS Starting
    Sep 29 10:37:45 cd-acs5-13-103 MSGCAT58018/admin: [ACS-modify-migration-state] completed 
    successfully - interface migration enable
    Sep 29 13:00:02 cd-acs5-13-103 MSGCAT58010/root: info:[ACS backup] ACS backup completed
    Sep 29 13:56:36 cd-acs5-13-103 MSGCAT58018/admin: [ACS-modify-migration-state] completed 
    successfully - interface migration disable
    Sep 29 13:57:02 cd-acs5-13-103 MSGCAT58018/admin: [ACS-modify-migration-state] completed 
    successfully - interface migration disable
    Sep 29 13:57:25 cd-acs5-13-103 MSGCAT58018/admin: [ACS-modify-migration-state] completed 
    successfully - interface migration enable
    Sep 30 10:57:10 cd-acs5-13-103 MSGCAT58010/admin: info:[ACS backup] ACS backup completed
    For more information on the show logging command, refer to 
    http://www.cisco.com/en/US/docs/net_mgmt/cisco_secure_access_control_system/5.3/command/
    reference/cli_app_a.html#wp1917127.
    Configuring Per-Instance Logging Categories
    You can define a custom logging category configuration for specific, overridden ACS instances, or return 
    all instances to the default global logging category configuration.
    To view and configure per-instance logging categories:
    Step 1Select System Administration > Configuration > Log Configuration > Logging Categories > 
    Per-Instance.
    The Per-Instance page appears; from here, you can view the individual ACS instances of your 
    deployment.
    Step 2Click the radio button associated with the name of the ACS instance you want to configure, and choose 
    one of these options:
    Click Override to override the current logging category configuration for selected ACS instances.
    Click Configure to display the Logging Categories page associated with the ACS instance. You can 
    then edit the logging categories for the ACS instance. See Displaying Logging Categories, 
    page 18-32 for field descriptions.
    Click Restore to Global to restore selected ACS instances to the default global logging category 
    configuration.
    Your configuration is saved and the Per-Instance page is refreshed.
    Related Topic
    Configuring Per-Instance Security and Log Settings, page 18-30 
    						
    							18-30
    User Guide for Cisco Secure Access Control System 5.3
    OL-24201-01
    Chapter 18      Managing System Administration Configurations
      Configuring Logs
    Configuring Per-Instance Security and Log Settings
    You can configure the severity level and local log settings in a logging category configuration for a 
    specific overridden or custom ACS instance. Use this page to:
    View a tree of configured logging categories for a specific ACS instance.
    Open a page to configure a logging category’s severity level, log target, and logged attributes for a 
    specific ACS instance.
    Step 1Select System Administration > Configuration > Log Configuration > Logging Categories > 
    Per-Instance, then click Configure.
    The Per-Instance: Configuration page appears as described in Table 18-23:
    Step 2Do one of the following:
    Click the name of the logging category you want to configure.
    Select the radio button associated with the name of the logging category you want to configure, and 
    click Edit.
    The Per-Instance: General page appears.
    From here, you can configure the security level and local log settings in a logging category configuration 
    for a specific ACS instance. See Table 18-24:
    Table 18-23 Per-Instance: Configuration Page
    Option Description
    Name Expandable tree structure of AAA service logging categories.
    Edit Click to display a selected Logging Categories > Edit: “lc_name” page, where lc_name 
    is the name of the logging category. 
    						
    							18-31
    User Guide for Cisco Secure Access Control System 5.3
    OL-24201-01
    Chapter 18      Managing System Administration Configurations
      Configuring Logs
    Configuring Per-Instance Remote Syslog Targets 
    Use this page to configure remote syslog targets for logging categories.
    Step 1Select System Administration > Configuration > Log Configuration > Logging Categories > 
    Per-Instance, then click Configure.
    The Per-Instance: Configuration page appears as described in Table 18-23.
    Step 2Do one of the following actions:
    Click the name of the logging category you want to configure.
    Select the radio button associated with the name of the logging category you want to configure, and 
    click Edit.
    Step 3Click the Remote Syslog Target tab. 
    The Per-Instance: Remote Syslog Targets page appears as described in Table 18-25:
    Table 18-24 Per-Instance: General Page
    Option Description
    Configure Log Category
    Log Severity Use the list box to select the severity level for diagnostic logging categories. 
    (For audit and accounting categories, there is only one severity, NOTICE, 
    which cannot be modified.) Valid options are:
    FATAL—Emergency. The ACS is not usable and you must take action 
    immediately.
    ERROR—Critical or error condition.
    WARN—Normal, but significant condition. (Default)
    INFO—Informational message.
    DEBUG—Diagnostic bug message.
    Configure Local Setting for Category
    Log to Local Target Check to enable logging to the local target. 
    For administrative and operational audit logging category types, logging to 
    local target is enabled by default and cannot be disabled.
    Local Target is 
    CriticalUsable for accounting and for passed authentication logging category types 
    only. Check the check box to make this local target the critical target.
    For administrative and operational audit logging category types, the check box 
    is checked by default and cannot be unchecked; the local target is the critical 
    target.
    If you make local target as the critical target and the logging operation fails, the 
    authentication request will be rejected and accounting response will not be sent 
    to the device.
    Configure Logged Attributes
    —Display only. All attributes are logged to the local target. 
    						
    							18-32
    User Guide for Cisco Secure Access Control System 5.3
    OL-24201-01
    Chapter 18      Managing System Administration Configurations
      Configuring Logs
    Displaying Logging Categories
    You can view a tree of configured logging categories for a specific ACS instance. In addition, you can 
    configure a logging category’s severity level, log target, and logged attributes for a specific ACS 
    instance.
    Step 1Select System Administration > Configuration > Log Configuration > Logging Categories > 
    Per-Instance, then click Configure.
    Step 2Complete the fields as described in Table 18-26:
    Table 18-25 Per-Instance: Remote Syslog Targets Page
    Option Description
    Configure Syslog Targets
    Available targets List of available targets. You can select a target from this list and move it to the 
    Selected Targets list.
    Selected targets List of selected targets. You can select a target from this list and move it to the 
    Available Targets list to remove it from your configuration.
    Table 18-26 Per-Instance: Configuration Page
    Option Description
    Name Expandable tree structure of AAA services logging categories.
    Edit Click to display a selected Logging Categories > Edit: “lc_name” page, where lc_name 
    is the name of the logging category. 
    						
    							18-33
    User Guide for Cisco Secure Access Control System 5.3
    OL-24201-01
    Chapter 18      Managing System Administration Configurations
      Configuring Logs
    Configuring the Log Collector
    Use the Log Collector page to select a log data collector and suspend or resume log data transmission.
    Step 1Select System Administration > Configuration > Log Configuration > Log Collector.
    The Log Collector page appears.
    Step 2Complete the Log Collector fields as described in Table 18-27:
    Step 3Do one of the following:
    Click Suspend to suspend the log data transmission to the configured log collector.
    Click Resume to resume the log data transmission to the configured log collector.
    Your configuration is saved and the Log Collector page is refreshed.
    Viewing the Log Message Catalog
    Use the Log Message Catalog page to view all possible log messages.
    Select System Administration > Configuration > Log Configuration > Log Message Catalog.
    The Log Message Catalog page appears, with the fields described in Table 18-28, from which you can 
    view all possible log messages that can appear in your log files.
    Table 18-27 Log Collector Page
    Option Description
    Log Data Collector
    Current Log 
    CollectorDisplay only. Identifies the machine on which the local log messages are sent.
    Select Log Collector Use the drop-down list box to select the machine on which you want local log 
    messages sent.
    Set Log Collector Click to configure the log collector according to the selection you make in the 
    Select Log Collector option.
    Table 18-28 Log Messages Page
    Option Description
    Message CodeDisplay only. A unique message code identification number associated with a 
    message.
    SeverityDisplay only. The severity level associated with a message. 
    CategoryDisplay only. The logging category to which a message belongs.
    Message ClassDisplay only. The group to which a message belongs.
    Message TextDisplay only. English language message text (name of the message).
    Description Display only. English language text that describes the associated message. 
    						
    							18-34
    User Guide for Cisco Secure Access Control System 5.3
    OL-24201-01
    Chapter 18      Managing System Administration Configurations
      Licensing Overview
    Licensing Overview
    To operate ACS, you must install a valid license. ACS prompts you to install a valid base license when 
    you first access the web interface. Each ACS instance (primary or secondary) in a distributed deployment 
    requires a unique base license. 
    NoteEach server requires a unique base license in a distributed deployment.
    Types of Licenses
    Table 18-29 shows the ACS 5.3 license support:
    .Table 18-29 ACS License Support
    License Description
    Base License Required for all software instances deployed, as well as for all appliances. The base license 
    enables you to use all the ACS functionality except license controlled features, and it enables all 
    reporting features. Base license is:
    Required for each ACS instance, primary and secondary.
    Required for all appliances.
    Supports deployments with up to 500 managed devices.
    Base licenses are of three types:
    Permanent—Supports up to 500 devices.
    Eval—Supports up to 50 devices and expires in 90 days.
    The number of devices is determined by the number of unique IP addresses that you configure. 
    This includes the subnet masks that you configure. For example, a subnet mask of 255.255.255.0 
    implies 256 unique IP addresses and hence the number of devices is 256.
    If your evaluation license expires or is about to expire, you cannot use another evaluation license 
    or extend your current license. Before your evaluation license expires, you must upgrade to a 
    Permanent license.
    Add-on Licenses Supports an unlimited number of managed devices. Requires an existing ACS permanent base 
    license. There are also evaluation-type licenses for add-on licenses.
    The Security Group Access feature licenses are of three types: Permanent, Eval, and NFR. 
    However, the permanent Security Group Access feature license can be used only with a permanent 
    base license.
    Also, the large deployment license can only be used only with a permanent base license.
    Evaluation License 
    (standard)Enables standard centralized reporting features.
    Cannot be reused on the same platform.
    You can only install one evaluation license per platform. You cannot install additional 
    evaluation licenses.
    Supports 50 managed devices.
    Expires 90 days from the time the license is installed. 
    						
    							18-35
    User Guide for Cisco Secure Access Control System 5.3
    OL-24201-01
    Chapter 18      Managing System Administration Configurations
      Installing a License File
    Related Topics
    Licensing Overview, page 18-34
    Installing a License File, page 18-35
    Viewing the Base License, page 18-36
    Adding Deployment License Files, page 18-39
    Deleting Deployment License Files, page 18-40
    Installing a License File
    You can obtain a valid license file using the Product Activation Key (PAK) supplied with the product. 
    To install a license file:
    Step 1Log into the ACS web interface.
    The Initial Licenses page appears when you log in to the ACS machine for the first time.
    Step 2Click Cisco Secure ACS License Registration. 
    This link directs you to Cisco.com to purchase a valid license file from a Cisco representative.
    Step 3Click Install to install the license file that you purchased.
    The ACS web interface log in page reappears. You can now work with the ACS application.
    NoteYou cannot upgrade a base permanent license. You can only upgrade a base evaluation license.
    Related Topics
    Licensing Overview, page 18-34
    Viewing the Base License, page 18-36
    Adding Deployment License Files, page 18-39
    Deleting Deployment License Files, page 18-40 
    						
    							18-36
    User Guide for Cisco Secure Access Control System 5.3
    OL-24201-01
    Chapter 18      Managing System Administration Configurations
      Installing a License File
    Viewing the Base License
    To upgrade the base license:
    Step 1Select System Administration > Configuration > Licensing > Base Server License.
    The Base Server License page appears with a description of the ACS deployment configuration and a list 
    of the available deployment licenses. See Types of Licenses for a list of deployment licenses. 
    Table 18-30 describes the fields in the Base Server License page.
    You can select one or more radio buttons next to the instance whose license you want to upgrade. 
    Step 2Click Upgrade. See Upgrading the Base Server License, page 18-37 for valid field options.
    Table 18-30 Base Server License Page 
    Option Description
    ACS Deployment Configuration
    Primary ACS Instance Name of the primary instance created when you logged into the ACS 5.3 web interface.
    Number of Instances Current number of ACS instances (primary or secondary) in the ACS database.
    Current Number of 
    Configured IP Addresses 
    in Network DevicesTotal number of IP addresses in all the subnetworks that you have configured as part of network 
    device configuration.
    The number of devices is determined by the number of unique IP addresses that you configure. 
    This includes the subnet masks that you configure. For example, a subnet mask of 255.255.255.0 
    implies 256 unique IP addresses and hence the number of devices is 256.
    Maximum Number of IP 
    Addresses in Network 
    DevicesMaximum number of IP addresses that your license supports:
    Base License—Supports 500 IP addresses.
    The number of devices is determined by the number of unique IP addresses that you configure. 
    This includes the subnet masks that you configure. For example, a subnet mask of 255.255.255.0 
    implies 256 unique IP addresses and hence the number of devices is 256.
    Large Deployment—Supports an unlimited number of IP addresses.
    Use this link to obtain a 
    valid License FileDirects you to Cisco.com to generate a valid license file using the Product Activation Key (PAK) 
    Base License Configuration
    ACS Instance Name of the ACS instance, either primary or secondary.
    Identifier Name of the base license.
    License Type Specifies the base license type (permanent, evaluation).
    Expiration Specifies the expiration date for evaluation licenses. For permanent licenses, the expiration field 
    indicates permanent.
    Licensed to Name of the company that this product is licensed to.
    PAK Name of the Product Activation Key (PAK) received from Cisco.
    Version Current version of the ACS software. 
    						
    All Cisco manuals Comments (0)

    Related Manuals for Cisco Acs 5x User Guide