Cisco Servers User Manual page 85

For windows 2000/nt servers
Table of Contents

Advertisement

Chapter 2
Deploying Cisco Secure ACS
78-13751-01, Version 3.0
Configure Administrators—You should configure at least one administrator
at the outset of deployment; otherwise, there is not remote administrative
access and all configuration activity must be done from the server. You
should also have a detailed plan for establishing and maintaining an
administrative policy.
For more information about setting up administrators, see
"Setting Up and Managing Administrators and Policy."
Configure the Cisco Secure ACS HTML Interface—You can configure
Cisco Secure ACS HTML interface to show only those features and controls
that you intend to use. This makes using Cisco Secure ACS less difficult than
it would be if you had to contend with multiple parts of the HTML interface
that you did not plan to use. The price of this convenience can sometimes be
frustration that features and controls do not appear because you failed to
configure them in the Interface Configuration section. For guidance on
configuring the HTML interface, see the
on page
3-2.
For information about configuring particular aspects of the HTML interface,
see the following sections of the interface configuration chapter:
User Data Configuration Options, page 3-3
Advanced Options, page 3-4
Protocol Configuration Options for TACACS+, page 3-7
Protocol Configuration Options for RADIUS, page 3-10
Configure System—There are more than a dozen functions within the
System Configuration section to be considered, from setting the format for
the display of dates and password validation to configuring settings for
database replication and RDBMS synchronization. These functions are
detailed in
Chapter 8, "Establishing Cisco Secure ACS System
Configuration."
Of particular note during initial system configuration is
setting up the logs and reports to be generated by Cisco Secure ACS; for
more information, see
Configure Network—You control distributed and proxied AAA functions in
the Network Configuration section of the HTML interface. From here, you
establish the identity, location, and grouping of AAA clients and servers, and
determine what authentication protocols each is to employ. For more
information, see
Chapter 4, "Setting Up and Managing Network
Configuration."
Cisco Secure ACS 3.0 for Windows 2000/NT Servers User Guide
"Interface Design Concepts" section
Chapter 9, "Working with Logging and Reports."
Suggested Deployment Sequence
Chapter 10,
2-19

Advertisement

Table of Contents
loading

This manual is also suitable for:

Secure acs 3.0

Table of Contents