Cisco 2509 - Router - EN Manuals

Manuals and User Guides for Cisco 2509 - Router - EN. We have 3 Cisco 2509 - Router - EN manuals available for free PDF download: User Manual, Getting Started Manual

Cisco 2509 - Router - EN User Manual

Cisco 2509 - Router - EN User Manual (686 pages)

User Guide  
Brand: Cisco | Category: Software | Size: 5.92 MB
Table of contents
Table Of Contents4................................................................................................................................................................
Related Documentation29................................................................................................................................................................
Obtaining Documentation30................................................................................................................................................................
World Wide Web30................................................................................................................................................................
Ordering Documentation30................................................................................................................................................................
Documentation Feedback31................................................................................................................................................................
Obtaining Technical Assistance31................................................................................................................................................................
Technical Assistance Center32................................................................................................................................................................
Aaa Protocols-tacacs+ And Radius40................................................................................................................................................................
Tacacs40................................................................................................................................................................
Radius40................................................................................................................................................................
Authentication41................................................................................................................................................................
Authentication Considerations42................................................................................................................................................................
Authentication And User Databases42................................................................................................................................................................
Authentication Protocol-database Compatibility43................................................................................................................................................................
Passwords44................................................................................................................................................................
Other Authentication-related Features49................................................................................................................................................................
Authorization49................................................................................................................................................................
Max Sessions50................................................................................................................................................................
Dynamic Usage Quotas51................................................................................................................................................................
Shared Profile Components51................................................................................................................................................................
Support For Cisco Device-management Applications52................................................................................................................................................................
Other Authorization-related Features53................................................................................................................................................................
Accounting54................................................................................................................................................................
Other Accounting-related Features54................................................................................................................................................................
Administration55................................................................................................................................................................
Http Port Allocation For Remote Administrative Sessions55................................................................................................................................................................
Network Device Groups56................................................................................................................................................................
Other Administration-related Features56................................................................................................................................................................
Cisco Secure Acs Html Interface57................................................................................................................................................................
About The Cisco Secure Acs Html Interface57................................................................................................................................................................
Html Interface Security58................................................................................................................................................................
Html Interface Layout59................................................................................................................................................................
Uniform Resource Locator For The Html Interface60................................................................................................................................................................
Network Environments And Remote Administrative Sessions61................................................................................................................................................................
Remote Administrative Sessions And Http Proxy61................................................................................................................................................................
Remote Administrative Sessions Through Firewalls62................................................................................................................................................................
Remote Administrative Sessions Through A Nat Gateway62................................................................................................................................................................
Accessing The Html Interface63................................................................................................................................................................
Logging Off The Html Interface63................................................................................................................................................................
Online Help And Online Documentation64................................................................................................................................................................
Using Online Help64................................................................................................................................................................
Using The Online Documentation65................................................................................................................................................................
Chapter 2 Deploying Cisco Secure Acs67................................................................................................................................................................
Basic Deployment Requirements For Cisco Secure Acs68................................................................................................................................................................
System Requirements68................................................................................................................................................................
Hardware Requirements68................................................................................................................................................................
Operating System Requirements68................................................................................................................................................................
Third-party Software Requirements69................................................................................................................................................................
Network Requirements70................................................................................................................................................................
Basic Deployment Factors For Cisco Secure Acs71................................................................................................................................................................
Network Topology71................................................................................................................................................................
Dial-up Topology71................................................................................................................................................................
Wireless Network74................................................................................................................................................................
Remote Access Using Vpn77................................................................................................................................................................
Remote Access Policy79................................................................................................................................................................
Security Policy80................................................................................................................................................................
Administrative Access Policy80................................................................................................................................................................
Separation Of Administrative And General Users82................................................................................................................................................................
Database83................................................................................................................................................................
Number Of Users83................................................................................................................................................................
Type Of Database83................................................................................................................................................................
Network Latency And Reliability84................................................................................................................................................................
Suggested Deployment Sequence84................................................................................................................................................................
Chapter 3 Setting Up The Cisco Secure Acs Html Interface87................................................................................................................................................................
Interface Design Concepts88................................................................................................................................................................
User-to-group Relationship88................................................................................................................................................................
Per-user Or Per-group Features88................................................................................................................................................................
User Data Configuration Options89................................................................................................................................................................
Defining New User Data Fields89................................................................................................................................................................
Advanced Options90................................................................................................................................................................
Setting Advanced Options For The Cisco Secure Acs User Interface92................................................................................................................................................................
Protocol Configuration Options For Tacacs93................................................................................................................................................................
Setting Options For Tacacs95................................................................................................................................................................
Protocol Configuration Options For Radius96................................................................................................................................................................
Setting Protocol Configuration Options For Ietf Radius Attributes101................................................................................................................................................................
Setting Protocol Configuration Options For Non-ietf Radius Attributes102................................................................................................................................................................
C H A P T E R 4 Setting Up And Managing Network Configuration106................................................................................................................................................................
About Network Configuration106................................................................................................................................................................
About Distributed Systems107................................................................................................................................................................
Aaa Servers In Distributed Systems107................................................................................................................................................................
Default Distributed System Settings108................................................................................................................................................................
Proxy In Distributed Systems108................................................................................................................................................................
Fallback On Failed Connection110................................................................................................................................................................
Character String110................................................................................................................................................................
Stripping110................................................................................................................................................................
Proxy In An Enterprise111................................................................................................................................................................
Remote Use Of Accounting Packets111................................................................................................................................................................
Other Features Enabled By System Distribution112................................................................................................................................................................
Network Device Searches112................................................................................................................................................................
Network Device Search Criteria113................................................................................................................................................................
Searching For Network Devices114................................................................................................................................................................
Aaa Client Configuration115................................................................................................................................................................
Aaa Client Configuration Options115................................................................................................................................................................
Adding A Aaa Client119................................................................................................................................................................
Editing A Aaa Client122................................................................................................................................................................
Deleting A Aaa Client123................................................................................................................................................................
Aaa Server Configuration124................................................................................................................................................................
Aaa Server Configuration Options125................................................................................................................................................................
Adding A Aaa Server127................................................................................................................................................................
Editing A Aaa Server129................................................................................................................................................................
Deleting A Aaa Server131................................................................................................................................................................
Network Device Group Configuration131................................................................................................................................................................
Adding A Network Device Group132................................................................................................................................................................
Assigning An Unassigned Aaa Client Or Aaa Server To An Ndg133................................................................................................................................................................
Reassigning A Aaa Client Or Aaa Server To An Ndg134................................................................................................................................................................
Renaming A Network Device Group135................................................................................................................................................................
Deleting A Network Device Group135................................................................................................................................................................
Proxy Distribution Table Configuration136................................................................................................................................................................
About The Proxy Distribution Table136................................................................................................................................................................
Adding A New Proxy Distribution Table Entry137................................................................................................................................................................
Sorting The Character String Match Order Of Distribution Entries139................................................................................................................................................................
Editing A Proxy Distribution Table Entry139................................................................................................................................................................
Deleting A Proxy Distribution Table Entry140................................................................................................................................................................
Chapter 5 Setting Up And Managing Shared Profile Components141................................................................................................................................................................
About Shared Profile Components141................................................................................................................................................................
Downloadable Pix Acls142................................................................................................................................................................
About Downloadable Pix Acls142................................................................................................................................................................
Downloadable Pix Acl Configuration144................................................................................................................................................................
Adding A Downloadable Pix Acl144................................................................................................................................................................
Editing A Downloadable Pix Acl145................................................................................................................................................................
Deleting A Downloadable Pix Acl145................................................................................................................................................................
Network Access Restrictions146................................................................................................................................................................
About Network Access Restrictions146................................................................................................................................................................
Shared Network Access Restrictions Configuration148................................................................................................................................................................
Adding A Shared Network Access Restriction149................................................................................................................................................................
Editing A Shared Network Access Restriction149................................................................................................................................................................
Deleting A Shared Network Access Restriction149................................................................................................................................................................
Command Authorization Sets153................................................................................................................................................................
About Command Authorization Sets154................................................................................................................................................................
About Pattern Matching155................................................................................................................................................................
Command Authorization Sets Configuration156................................................................................................................................................................
Adding A Command Authorization Set156................................................................................................................................................................
Editing A Command Authorization Set159................................................................................................................................................................
Deleting A Command Authorization Set160................................................................................................................................................................
Chapter 6 Setting Up And Managing User Groups161................................................................................................................................................................
User Group Setup Features And Functions162................................................................................................................................................................
Default Group162................................................................................................................................................................
Group Tacacs+ Settings162................................................................................................................................................................
Common User Group Settings163................................................................................................................................................................
Enabling Voip Support For A User Group164................................................................................................................................................................
Setting Default Time-of-day Access For A User Group165................................................................................................................................................................
Setting Callback Options For A User Group166................................................................................................................................................................
Setting Network Access Restrictions For A User Group167................................................................................................................................................................
Setting Max Sessions For A User Group171................................................................................................................................................................
Setting Usage Quotas For A User Group173................................................................................................................................................................
Configuration-specific User Group Settings175................................................................................................................................................................
Setting Token Card Settings For A User Group176................................................................................................................................................................
Setting Enable Privilege Options For A User Group178................................................................................................................................................................
Enabling Password Aging For The Ciscosecure User Database180................................................................................................................................................................
Enabling Password Aging For Users In Windows Databases185................................................................................................................................................................
Setting Ip Address Assignment Method For A User Group187................................................................................................................................................................
Assigning A Downloadable Pix Acl To A Group188................................................................................................................................................................
Configuring Tacacs+ Settings For A User Group189................................................................................................................................................................
Configuring A Shell Command Authorization Set For A User Group191................................................................................................................................................................
Configuring A Pix Command Authorization Set For A User Group193................................................................................................................................................................
Configuring Device-management Command Authorization For A User Group195................................................................................................................................................................
Configuring Ietf Radius Settings For A User Group197................................................................................................................................................................
Configuring Cisco Ios/pix Radius Settings For A User Group198................................................................................................................................................................
Configuring Cisco Aironet Radius Settings For A User Group199................................................................................................................................................................
Configuring Ascend Radius Settings For A User Group201................................................................................................................................................................
Configuring Cisco Vpn 3000 Concentrator Radius Settings For A User Group202................................................................................................................................................................
Configuring Cisco Vpn 5000 Concentrator Radius Settings For A User Group203................................................................................................................................................................
Configuring Microsoft Radius Settings For A User Group205................................................................................................................................................................
Configuring Nortel Radius Settings For A User Group206................................................................................................................................................................
Configuring Juniper Radius Settings For A User Group208................................................................................................................................................................
Configuring Bbsm Radius Settings For A User Group209................................................................................................................................................................
Configuring Custom Radius Vsa Settings For A User Group210................................................................................................................................................................
Group Setting Management211................................................................................................................................................................
Listing Users In A User Group212................................................................................................................................................................
Resetting Usage Quota Counters For A User Group212................................................................................................................................................................
Renaming A User Group213................................................................................................................................................................
Saving Changes To User Group Settings213................................................................................................................................................................
Chapter 7 Setting Up And Managing User Accounts215................................................................................................................................................................
User Setup Features And Functions216................................................................................................................................................................
About User Databases216................................................................................................................................................................
Basic User Setup Options218................................................................................................................................................................
Adding A Basic User Account219................................................................................................................................................................
Setting Supplementary User Information221................................................................................................................................................................
Setting A Separate Chap/ms-chap/arap Password222................................................................................................................................................................
Assigning A User To A Group223................................................................................................................................................................
Setting User Callback Option224................................................................................................................................................................
Assigning A User To A Client Ip Address225................................................................................................................................................................
Setting Network Access Restrictions For A User226................................................................................................................................................................
Setting Max Sessions Options For A User230................................................................................................................................................................
Setting User Usage Quotas Options232................................................................................................................................................................
Setting Options For User Account Disablement234................................................................................................................................................................
Assigning A Pix Acl To A User235................................................................................................................................................................
Advanced User Authentication Settings236................................................................................................................................................................
Tacacs+ Settings (user)236................................................................................................................................................................
Configuring Tacacs+ Settings For A User237................................................................................................................................................................
Configuring A Shell Command Authorization Set For A User239................................................................................................................................................................
Configuring A Pix Command Authorization Set For A User242................................................................................................................................................................
Configuring Device Management Command Authorization For A User244................................................................................................................................................................
Configuring The Unknown Service Setting For A User246................................................................................................................................................................
Advanced Tacacs+ Settings (user)247................................................................................................................................................................
Setting Enable Privilege Options For A User247................................................................................................................................................................
Setting Tacacs+ Enable Password Options For A User249................................................................................................................................................................
Setting Tacacs+ Outbound Password For A User250................................................................................................................................................................
Radius Attributes251................................................................................................................................................................
Setting Ietf Radius Parameters For A User252................................................................................................................................................................
Setting Cisco Ios/pix Radius Parameters For A User253................................................................................................................................................................
Setting Cisco Aironet Radius Parameters For A User254................................................................................................................................................................
Setting Ascend Radius Parameters For A User256................................................................................................................................................................
User257................................................................................................................................................................
Setting Microsoft Radius Parameters For A User260................................................................................................................................................................
Setting Nortel Radius Parameters For A User262................................................................................................................................................................
Setting Juniper Radius Parameters For A User263................................................................................................................................................................
Setting Bbsm Radius Parameters For A User265................................................................................................................................................................
Setting Custom Radius Attributes For A User266................................................................................................................................................................
User Management267................................................................................................................................................................
Listing All Users268................................................................................................................................................................
Finding A User268................................................................................................................................................................
Disabling A User Account269................................................................................................................................................................
Deleting A User Account270................................................................................................................................................................
Resetting User Session Quota Counters271................................................................................................................................................................
Resetting A User Account After Login Failure272................................................................................................................................................................
Saving User Settings273................................................................................................................................................................
C H A P T E R 8 Establishing Cisco Secure Acs System Configuration276................................................................................................................................................................
Service Control276................................................................................................................................................................
Determining The Status Of Cisco Secure Acs Services276................................................................................................................................................................
Stopping, Starting, Or Restarting Services276................................................................................................................................................................
Logging277................................................................................................................................................................
Date Format Control277................................................................................................................................................................
Setting The Date Format278................................................................................................................................................................
Local Password Management279................................................................................................................................................................
Configuring Local Password Management281................................................................................................................................................................
Ciscosecure Database Replication283................................................................................................................................................................
About Ciscosecure Database Replication283................................................................................................................................................................
Replication Process286................................................................................................................................................................
Replication Frequency288................................................................................................................................................................
Important Implementation Considerations289................................................................................................................................................................
Database Replication Versus Database Backup290................................................................................................................................................................
Database Replication Logging291................................................................................................................................................................
Replication Options291................................................................................................................................................................
Replication Components Options291................................................................................................................................................................
Outbound Replication Options292................................................................................................................................................................
Inbound Replication Options294................................................................................................................................................................
Cisco Secure Acses294................................................................................................................................................................
Configuring A Secondary Cisco Secure Acs295................................................................................................................................................................
Replicating Immediately298................................................................................................................................................................
Scheduling Replication300................................................................................................................................................................
Disabling Ciscosecure Database Replication303................................................................................................................................................................
Database Replication Event Errors303................................................................................................................................................................
Rdbms Synchronization303................................................................................................................................................................
About Rdbms Synchronization304................................................................................................................................................................
Users305................................................................................................................................................................
User Groups306................................................................................................................................................................
Network Configuration306................................................................................................................................................................
Custom Radius Vendors And Vsas307................................................................................................................................................................
Rdbms Synchronization Components307................................................................................................................................................................
About Csdbsync307................................................................................................................................................................
About The Accountactions Table308................................................................................................................................................................
Cisco Secure Acs Database Recovery Using The Accountactions Table310................................................................................................................................................................
Reports And Event (error) Handling311................................................................................................................................................................
Preparing To Use Rdbms Synchronization311................................................................................................................................................................
Considerations For Using Csv-based Synchronization312................................................................................................................................................................
Preparing For Csv-based Synchronization313................................................................................................................................................................
Configuring A System Data Source Name For Rdbms Synchronization314................................................................................................................................................................
Rdbms Synchronization Options315................................................................................................................................................................
Rdbms Setup Options315................................................................................................................................................................
Synchronization Scheduling Options316................................................................................................................................................................
Synchronization Partners Options316................................................................................................................................................................
Performing Rdbms Synchronization Immediately317................................................................................................................................................................
Scheduling Rdbms Synchronization318................................................................................................................................................................
Disabling Scheduled Rdbms Synchronizations320................................................................................................................................................................
Cisco Secure Acs Backup321................................................................................................................................................................
About Cisco Secure Acs Backup321................................................................................................................................................................
Backup File Locations322................................................................................................................................................................
Directory Management322................................................................................................................................................................
Components Backed Up322................................................................................................................................................................
Reports Of Cisco Secure Acs Backups323................................................................................................................................................................
Backup Options323................................................................................................................................................................
Performing A Manual Cisco Secure Acs Backup324................................................................................................................................................................
Scheduling Cisco Secure Acs Backups324................................................................................................................................................................
Disabling Scheduled Cisco Secure Acs Backups325................................................................................................................................................................
Cisco Secure Acs System Restore326................................................................................................................................................................
About Cisco Secure Acs System Restore326................................................................................................................................................................
Backup File Names And Locations327................................................................................................................................................................
Components Restored328................................................................................................................................................................
Reports Of Cisco Secure Acs Restorations328................................................................................................................................................................
Restoring Cisco Secure Acs From A Backup File328................................................................................................................................................................
Cisco Secure Acs Active Service Management329................................................................................................................................................................
System Monitoring330................................................................................................................................................................
System Monitoring Options330................................................................................................................................................................
Setting Up System Monitoring331................................................................................................................................................................
Event Logging332................................................................................................................................................................
Setting Up Event Logging332................................................................................................................................................................
Ip Pools Server333................................................................................................................................................................
About Ip Pools Server334................................................................................................................................................................
Allowing Overlapping Ip Pools Or Forcing Unique Pool Address Ranges335................................................................................................................................................................
Refreshing The Aaa Server Ip Pools Table336................................................................................................................................................................
Adding A New Ip Pool337................................................................................................................................................................
Editing An Ip Pool Definition338................................................................................................................................................................
Resetting An Ip Pool339................................................................................................................................................................
Deleting An Ip Pool340................................................................................................................................................................
Ip Pools Address Recovery341................................................................................................................................................................
Enabling Ip Pool Address Recovery341................................................................................................................................................................
Voip Accounting Configuration342................................................................................................................................................................
Configuring Voip Accounting342................................................................................................................................................................
Cisco Secure Acs Certificate Setup343................................................................................................................................................................
Background On Protocols And Certification343................................................................................................................................................................
Digital Certificates343................................................................................................................................................................
About The Eap-tls Protocol344................................................................................................................................................................
About The Peap Protocol346................................................................................................................................................................
Installing A Cisco Secure Acs Server Certificate348................................................................................................................................................................
Adding A Certificate Authority Certificate350................................................................................................................................................................
Editing The Certificate Trust List351................................................................................................................................................................
Generating A Certificate Signing Request352................................................................................................................................................................
Updating Or Replacing A Cisco Secure Acs Certificate354................................................................................................................................................................
Global Authentication Setup355................................................................................................................................................................
Configuring Authentication Options355................................................................................................................................................................
Logging Formats359................................................................................................................................................................
Special Logging Attributes360................................................................................................................................................................
Chapter 9 Working With Logging And Report361................................................................................................................................................................
Update Packets In Accounting Logs362................................................................................................................................................................
About Cisco Secure Acs Logs And Reports362................................................................................................................................................................
Accounting Logs363................................................................................................................................................................
Dynamic Administration Reports365................................................................................................................................................................
Viewing The Logged-in Users Report366................................................................................................................................................................
Deleting Logged-in Users367................................................................................................................................................................
Viewing The Disabled Accounts Report368................................................................................................................................................................
Cisco Secure Acs System Logs369................................................................................................................................................................
Configuring The Administration Audit Log370................................................................................................................................................................
Working With Csv Logs371................................................................................................................................................................
Csv Log File Names371................................................................................................................................................................
Csv Log File Locations371................................................................................................................................................................
Enabling Or Disabling A Csv Log372................................................................................................................................................................
Viewing A Csv Report373................................................................................................................................................................
Configuring A Csv Log374................................................................................................................................................................
Working With Odbc Logs377................................................................................................................................................................
Preparing For Odbc Logging377................................................................................................................................................................
Configuring A System Data Source Name For Odbc Logging378................................................................................................................................................................
Configuring An Odbc Log378................................................................................................................................................................
Remote Logging381................................................................................................................................................................
About Remote Logging381................................................................................................................................................................
Implementing Centralized Remote Logging382................................................................................................................................................................
Remote Logging Options383................................................................................................................................................................
Enabling And Configuring Remote Logging384................................................................................................................................................................
Disabling Remote Logging386................................................................................................................................................................
Service Logs386................................................................................................................................................................
Services Logged387................................................................................................................................................................
Configuring Service Logs388................................................................................................................................................................
Administrator Accounts391................................................................................................................................................................
C H A P T E R 10 Setting Up And Managing Administrators And Policy392................................................................................................................................................................
About Administrator Accounts392................................................................................................................................................................
Administrator Privileges393................................................................................................................................................................
Adding An Administrator Account396................................................................................................................................................................
Editing An Administrator Account398................................................................................................................................................................
Unlocking A Locked Out Administrator Account400................................................................................................................................................................
Deleting An Administrator Account401................................................................................................................................................................
Access Policy401................................................................................................................................................................
Access Policy Options402................................................................................................................................................................
Setting Up Access Policy404................................................................................................................................................................
Session Policy406................................................................................................................................................................
Session Policy Options406................................................................................................................................................................
Setting Up Session Policy407................................................................................................................................................................
Audit Policy408................................................................................................................................................................
Ciscosecure User Database410................................................................................................................................................................
About The Ciscosecure User Database410................................................................................................................................................................
Chapter 11 Working With User Database411................................................................................................................................................................
User Import And Creation411................................................................................................................................................................
About External User Databases412................................................................................................................................................................
Authenticating With External User Databases413................................................................................................................................................................
External User Database Authentication Process414................................................................................................................................................................
Windows Nt/2000 User Database415................................................................................................................................................................
What's Supported With Windows Nt/2000 User Databases416................................................................................................................................................................
Databases417................................................................................................................................................................
Trust Relationships417................................................................................................................................................................
Windows Dial-up Networking Clients418................................................................................................................................................................
Windows Dial-up Networking Clients With A Domain Field418................................................................................................................................................................
Windows Dial-up Networking Clients Without A Domain Field419................................................................................................................................................................
Windows Authentication419................................................................................................................................................................
User-changeable Passwords With Windows Nt/2000 User Databases421................................................................................................................................................................
Preparing Users For Authenticating With Windows Nt/2000422................................................................................................................................................................
Configuring A Windows Nt/2000 External User Database422................................................................................................................................................................
Generic Ldap424................................................................................................................................................................
Multiple Ldap Instances425................................................................................................................................................................
Ldap Organizational Units And Groups426................................................................................................................................................................
Domain Filtering426................................................................................................................................................................
Ldap Failover428................................................................................................................................................................
Successful Previous Authentication With The Primary Ldap Server429................................................................................................................................................................
Unsuccessful Previous Authentication With The Primary Ldap Server429................................................................................................................................................................
Ldap Configuration Options430................................................................................................................................................................
Configuring A Generic Ldap External User Database436................................................................................................................................................................
Novell Nds Database441................................................................................................................................................................
About Novell Nds User Databases442................................................................................................................................................................
User Contexts443................................................................................................................................................................
Novell Nds External User Database Options444................................................................................................................................................................
Configuring A Novell Nds External User Database445................................................................................................................................................................
Odbc Database447................................................................................................................................................................
What Is Supported With Odbc User Databases448................................................................................................................................................................
Implementation Of Stored Procedures For Odbc Authentication451................................................................................................................................................................
Type Definitions452................................................................................................................................................................
Microsoft Sql Server And Case-sensitive Passwords452................................................................................................................................................................
Sample Routine For Generating A Pap Authentication Sql Procedure453................................................................................................................................................................
Procedure454................................................................................................................................................................
Pap Authentication Procedure Input454................................................................................................................................................................
Pap Procedure Output455................................................................................................................................................................
Chap/ms-chap/arap Authentication Procedure Input456................................................................................................................................................................
Chap/ms-chap/arap Procedure Output456................................................................................................................................................................
Result Codes457................................................................................................................................................................
Configuring An Odbc External User Database459................................................................................................................................................................
Leap Proxy Radius Server Database462................................................................................................................................................................
Configuring A Leap Proxy Radius Server External User Database463................................................................................................................................................................
Token Server User Databases465................................................................................................................................................................
About Token Servers And Cisco Secure Acs465................................................................................................................................................................
Token Servers And Isdn466................................................................................................................................................................
Radius-enabled Token Servers467................................................................................................................................................................
About Radius-enabled Token Servers467................................................................................................................................................................
Token Server Radius Authentication Request And Response Contents468................................................................................................................................................................
Configuring A Radius Token Server External User Database468................................................................................................................................................................
Rsa Securid Token Servers472................................................................................................................................................................
Configuring An Rsa Securid Token Server External User Database473................................................................................................................................................................
Deleting An External User Database Configuration474................................................................................................................................................................
Unknown User Processing477................................................................................................................................................................
C H A P T E R 12 Administering External User Databases478................................................................................................................................................................
Known, Unknown, And Discovered Users478................................................................................................................................................................
General Authentication Request Handling And Rejection Mode479................................................................................................................................................................
Authentication Request Handling And Rejection Mode With The Windows Nt/2000 User Database480................................................................................................................................................................
Windows Authentication With A Domain Specified481................................................................................................................................................................
Windows Authentication With Domain Omitted482................................................................................................................................................................
Performance Of Unknown User Authentication483................................................................................................................................................................
Added Latency483................................................................................................................................................................
Authentication Timeout Value On Aaa Clients483................................................................................................................................................................
Network Access Authorization484................................................................................................................................................................
Unknown User Policy484................................................................................................................................................................
Database Search Order485................................................................................................................................................................
Configuring The Unknown User Policy485................................................................................................................................................................
Turning Off External User Database Authentication487................................................................................................................................................................
Database Group Mappings487................................................................................................................................................................
Group Mapping By External User Database488................................................................................................................................................................
Database, Or Leap Proxy Radius Server Database489................................................................................................................................................................
Group Mapping By Group Set Membership490................................................................................................................................................................
Group Mapping Order491................................................................................................................................................................
No Access Group For Group Set Mappings491................................................................................................................................................................
Default Group Mapping For Windows Nt/2000492................................................................................................................................................................
Novell Nds, Or Generic Ldap Groups492................................................................................................................................................................
Mapping494................................................................................................................................................................
Configuration496................................................................................................................................................................
Changing Group Set Mapping Order497................................................................................................................................................................
Radius-based Group Specification498................................................................................................................................................................
Administration Issues502................................................................................................................................................................
A P P E N D I X A Troubleshooting Information For Cisco Secure Acs503................................................................................................................................................................
Browser Issues503................................................................................................................................................................
Cisco Ios Issues503................................................................................................................................................................
Database Issues505................................................................................................................................................................
Dial-in Connection Issues506................................................................................................................................................................
Debug Issues510................................................................................................................................................................
Proxy Issues511................................................................................................................................................................
Installation And Upgrade Issues511................................................................................................................................................................
Maxsessions Issues512................................................................................................................................................................
Report Issues512................................................................................................................................................................
Third-party Server Issues513................................................................................................................................................................
Pix Firewall Issues513................................................................................................................................................................
User Authentication Issues514................................................................................................................................................................
Tacacs+ And Radius Attribute Issues516................................................................................................................................................................
Cisco Ios Av Pair Dictionary517................................................................................................................................................................
Appendix B Tacac+ Attribute-value Pair518................................................................................................................................................................
Tacacs+ Av Pairs518................................................................................................................................................................
Tacacs+ Accounting Av Pairs520................................................................................................................................................................
Appendix C Radiu Attribute524................................................................................................................................................................
Cisco Ios Dictionary Of Radius Av Pairs525................................................................................................................................................................
Cisco Ios/pix Dictionary Of Radius Vsas528................................................................................................................................................................
Cisco Vpn 3000 Concentrator Dictionary Of Radius Vsas530................................................................................................................................................................
Cisco Vpn 5000 Concentrator Dictionary Of Radius Vsas533................................................................................................................................................................
Cisco Building Broadband Service Manager Dictionary Of Radius Vsa534................................................................................................................................................................
Ietf Dictionary Of Radius Av Pairs535................................................................................................................................................................
Microsoft Mppe Dictionary Of Radius Vsas549................................................................................................................................................................
Ascend Dictionary Of Radius Av Pairs552................................................................................................................................................................
Nortel Dictionary Of Radius Vsas564................................................................................................................................................................
Juniper Dictionary Of Radius Vsas565................................................................................................................................................................
A P P E N D I X D Cisco Secure Acs Command-line Database Utility568................................................................................................................................................................
Location Of Csutil.exe And Related Files568................................................................................................................................................................
Csutil.exe Syntax568................................................................................................................................................................
Csutil.exe Options569................................................................................................................................................................
Backing Up Cisco Secure Acs With Csutil.exe570................................................................................................................................................................
Restoring Cisco Secure Acs With Csutil.exe571................................................................................................................................................................
Creating A Ciscosecure User Database573................................................................................................................................................................
Creating A Cisco Secure Acs Database Dump File574................................................................................................................................................................
Loading The Cisco Secure Acs Database From A Dump File575................................................................................................................................................................
Compacting The Ciscosecure User Database577................................................................................................................................................................
User And Aaa Client Import Option579................................................................................................................................................................
Importing User And Aaa Client Information579................................................................................................................................................................
User And Aaa Client Import File Format581................................................................................................................................................................
About User And Aaa Client Import File Format581................................................................................................................................................................
Online Or Offline Statement581................................................................................................................................................................
Add Statements582................................................................................................................................................................
Update Statements584................................................................................................................................................................
Delete Statements586................................................................................................................................................................
Add_nas Statements587................................................................................................................................................................
Del_nas Statements588................................................................................................................................................................
Import File Example589................................................................................................................................................................
Exporting User List To A Text File589................................................................................................................................................................
Exporting Group Information To A Text File590................................................................................................................................................................
Exporting Registry Information To A Text File591................................................................................................................................................................
Decoding Error Numbers592................................................................................................................................................................
Recalculating Crc Values593................................................................................................................................................................
User-defined Radius Vendors And Vsa Sets593................................................................................................................................................................
About User-defined Radius Vendors And Vsa Sets594................................................................................................................................................................
Adding A Custom Radius Vendor And Vsa Set594................................................................................................................................................................
Deleting A Custom Radius Vendor And Vsa Set596................................................................................................................................................................
Listing Custom Radius Vendors597................................................................................................................................................................
Exporting Custom Radius Vendor And Vsa Sets598................................................................................................................................................................
Radius Vendor/vsa Import File599................................................................................................................................................................
About The Radius Vendor/vsa Import File599................................................................................................................................................................
Vendor And Vsa Set Definition600................................................................................................................................................................
Attribute Definition601................................................................................................................................................................
Enumeration Definition603................................................................................................................................................................
Example Radius Vendor/vsa Import File604................................................................................................................................................................
Vpdn Process607................................................................................................................................................................
A P P E N D I X E Cisco Secure Acs And Virtual Private Dial-up Networks608................................................................................................................................................................
Accountactions Specification613................................................................................................................................................................
A P P E N D I X F Rdbms Synchronization Import Definitions614................................................................................................................................................................
Accountactions Format614................................................................................................................................................................
Accountactions Mandatory Fields615................................................................................................................................................................
Accountactions Processing Order616................................................................................................................................................................
Action Codes617................................................................................................................................................................
Action Codes For Setting And Deleting Values618................................................................................................................................................................
Action Codes For Creating And Modifying User Accounts619................................................................................................................................................................
Action Codes For Initializing And Modifying Access Filters627................................................................................................................................................................
User Settings631................................................................................................................................................................
Settings632................................................................................................................................................................
Action Codes For Modifying Network Configuration637................................................................................................................................................................
Cisco Secure Acs Attributes And Action Codes645................................................................................................................................................................
User-specific Attributes646................................................................................................................................................................
User-defined Attributes648................................................................................................................................................................
Group-specific Attributes649................................................................................................................................................................
An Example Of Accountactions650................................................................................................................................................................
Windows 2000 Services653................................................................................................................................................................
Windows 2000 Registry654................................................................................................................................................................
Csadmin654................................................................................................................................................................
A P P E N D I X G Cisco Secure Acs Internal Architecture655................................................................................................................................................................
Csauth655................................................................................................................................................................
Csdbsync656................................................................................................................................................................
Cslog656................................................................................................................................................................
Csmon656................................................................................................................................................................
Monitoring657................................................................................................................................................................
Recording658................................................................................................................................................................
Notification659................................................................................................................................................................
Response659................................................................................................................................................................
Cstacacs And Csradius660................................................................................................................................................................

Advertisement

Cisco 2509 - Router - EN User Manual

Cisco 2509 - Router - EN User Manual (108 pages)

User Guide  
Brand: Cisco | Category: Network Router | Size: 1.16 MB
Table of contents
About This Guide1................................................................................................................................................................
Overview Of The Router5................................................................................................................................................................
Hardware Features6................................................................................................................................................................
Cisco Connection Online12................................................................................................................................................................
Ordering Documentation13................................................................................................................................................................
Preparing To Install The Router15................................................................................................................................................................
Safety Recommendations15................................................................................................................................................................
Maintaining Safety With Electricity16................................................................................................................................................................
Preventing Electrostatic Discharge Damage17................................................................................................................................................................
General Site Requirements18................................................................................................................................................................
Site Environment18................................................................................................................................................................
Preparing To Connect To A Network20................................................................................................................................................................
Isdn Connections21................................................................................................................................................................
Signaling Standards24................................................................................................................................................................
Ethernet Connections29................................................................................................................................................................
Token Ring Connections30................................................................................................................................................................
Where To Go Next31................................................................................................................................................................
Installing The Router33................................................................................................................................................................
Required Tools And Equipment34................................................................................................................................................................
Setting Up The Chassis35................................................................................................................................................................
Setting The Chassis On A Desktop35................................................................................................................................................................
Connecting The Dc Power Supply42................................................................................................................................................................
Connecting The Console Terminal And Modem50................................................................................................................................................................
Connecting To The Console Port50................................................................................................................................................................
Connecting A Modem To The Auxiliary Port52................................................................................................................................................................
Configuring The Router For The First Time59................................................................................................................................................................
Cisco Ios Software Basics68................................................................................................................................................................
Configuring Isdn76................................................................................................................................................................
Verifying Network Connectivity77................................................................................................................................................................
Isolating Problems79................................................................................................................................................................
Troubleshooting The Power And Cooling Systems80................................................................................................................................................................
Reading The Leds81................................................................................................................................................................
Console And Auxiliary Port Signals And Pinouts85................................................................................................................................................................
Cisco 2509 - Router - EN Getting Started Manual

Cisco 2509 - Router - EN Getting Started Manual (56 pages)

Wireless Controller  
Brand: Cisco | Category: Controller | Size: 3.86 MB
Table of contents
About This Guide2................................................................................................................................................................
Fcc Safety Compliance Statement2................................................................................................................................................................
Safety Information2................................................................................................................................................................
Safety Considerations3................................................................................................................................................................
Package Contents9................................................................................................................................................................
Unpacking And Preparing The Controller For Operation9................................................................................................................................................................
Installing The Controller11................................................................................................................................................................
Running The Bootup Script And Power-on Self Test23................................................................................................................................................................
Using The Startup Wizard29................................................................................................................................................................
Logging Into The Controller33................................................................................................................................................................
Connecting To The Network34................................................................................................................................................................
Using The Reset Button36................................................................................................................................................................
What's New In Cisco Product Documentation37................................................................................................................................................................
Translated Safety Warnings38................................................................................................................................................................

Advertisement

Share and save

Advertisement