Chapter 4 Network Configuration
Network Device Searches
4-8
User Guide for Cisco Secure ACS for Windows Server
78-16592-01
You can also choose to have Voice-over-IP (VoIP) accounting information logged
remotely, either appended to the RADIUS Accounting log, in a separate VoIP
Accounting log, or both.
Other Features Enabled by System Distribution
Beyond basic proxy and fallback features, configuring a Cisco Secure ACS to
interact with distributed systems enables several other features that are beyond the
scope of this chapter. These features include the following:
• Replication—For more information, see CiscoSecure Database Replication,
page 9-1.
• RDBMS synchronization—For more information, see RDBMS
Synchronization, page 9-25.
• Remote and centralized logging—For more information, see Remote
Logging, page 11-26.
Network Device Searches
You can search for any network device configured in the Network Configuration
section of the Cisco Secure ACS HTML interface.
This section contains the following topics:
• Network Device Search Criteria, page 4-8
• Searching for Network Devices, page 4-9
Network Device Search Criteria
You can specify search criteria for network device searches. Cisco Secure ACS
provides the following search criteria:
• Name—The name assigned to the network device in Cisco Secure ACS. You
can use asterisks (*) as wildcard characters. For example, if you wanted to
find all devices with names starting with the letter M, you would enter “M*”