Proxy Distribution Table Configuration; About The Proxy Distribution Table; Adding A New Proxy Distribution Table Entry; Sorting The Character String Match Order Of Distribution Entries - Cisco Servers User Manual

For windows 2000/nt servers
Table of Contents

Advertisement

Chapter 4
Setting Up and Managing Network Configuration

Proxy Distribution Table Configuration

About the Proxy Distribution Table

Tip
78-13751-01, Version 3.0
This section begins with a description of the Proxy Distribution Table and then
details the following Proxy Distribution Table configuration procedures:
Adding a New Proxy Distribution Table Entry, page 4-26
Sorting the Character String Match Order of Distribution Entries, page 4-28
Editing a Proxy Distribution Table Entry, page 4-28
Deleting a Proxy Distribution Table Entry, page 4-29
If you have Distributed Systems Settings enabled, when you click Network
Configuration, you will see the Proxy Distribution Table.
To enable Distributed Systems Settings in the Cisco Secure ACS, click
Interface Configuration, click Advanced Options, and then select the
Distributed System Settings check box.
The Proxy Distribution Table comprises entries that show the character strings on
which to proxy, the AAA Servers to proxy to, whether to strip the character string,
and where to send the accounting information (Local/Remote, Remote, or Local).
For more information about the proxy feature, see the
Systems" section on page
The entries you define and place in the Proxy Distribution Table can be considered
turnstiles for each authentication request that Cisco Secure ACS receives from the
AAA client. How the authentication request is defined in the Proxy Distribution
Table depends on where it is to be forwarded. If a match to an entry in the Proxy
Distribution Table that contains proxy information is found, Cisco Secure ACS
forwards the request to the appropriate AAA server.
The Character String column in the Proxy Distribution Table always contains an
entry of "(Default)". The "(Default)" entry matches authentication requests
received by the local Cisco Secure ACS server that do not match any other defined
character strings. While you cannot change the character string definition for the
"(Default)" entry, you can change the distribution of authentication requests
matching the "(Default)" entry. At installation, the AAA server associated with
Cisco Secure ACS 3.0 for Windows 2000/NT Servers User Guide
Proxy Distribution Table Configuration
4-4.
"Proxy in Distributed
4-25

Advertisement

Table of Contents
loading

This manual is also suitable for:

Secure acs 3.0

Table of Contents