Common User Group Settings - Cisco 2509 - Router - EN User Manual

User guide
Hide thumbs Also See for 2509 - Router - EN:
Table of Contents

Advertisement

Chapter 6
Setting Up and Managing User Groups

Common User Group Settings

78-14696-01, Version 3.1
Cisco Secure ACS also enables you to enter and configure new TACACS+
services. For information about how to configure a new TACACS+ service to
appear on the group setup page, see
TACACS+, page
3-7.
If you have configured Cisco Secure ACS to interact with a Cisco
device-management application, new TACACS+ services may appear
automatically, as needed, to support the device-management application. For
more information about Cisco Secure ACS interaction with device-management
applications, see
Support for Cisco Device-Management Applications, page
You can use the Shell Command Authorization Set feature to configure TACACS+
group settings. This feature enables you to apply shell commands to a particular
user group in the following ways:
Assign a shell command authorization set, which you have already
configured, for any network device.
Assign a shell command authorization set, which you have already
configured, to particular NDGs.
Permit or deny specific shell commands, which you define, on a per-group
basis.
For more information about shell command authorization sets, see
"Setting Up and Managing Shared Profile Components."
This section presents the basic activities you perform when configuring a new
user group. This section contains the following procedures:
Enabling VoIP Support for a User Group, page 6-4
Setting Default Time-of-Day Access for a User Group, page 6-5
Setting Callback Options for a User Group, page 6-6
Setting Network Access Restrictions for a User Group, page 6-7
Setting Max Sessions for a User Group, page 6-11
Setting Usage Quotas for a User Group, page 6-13
Protocol Configuration Options for
User Guide for Cisco Secure ACS for Windows Server
Common User Group Settings
1-18.
Chapter 5,
6-3

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Secure acs

Table of Contents