1-2
Configuration Guide for Cisco Secure ACS 4.2
OL-14390-02
Chapter 1 Overview of ACS Configuration
Summary of Configuration Steps
b. For each administrator, specify administrator privileges.
c. As needed, configure the following optional administrative policies:
–
Access Policy—Specify IP address limitations, HTTP port restrictions, and secure socket layer
(SSL) setup.
–
Session Policy—Specify timeouts, automatic local logins, and response to invalid IP address
connections.
–
Password Policy—Configure the password policy for administrators.
For detailed information, see Chapter 5, “Password Policy Configuration Scenario.”
Step 4 Configure the Web Interface:
a. Add AAA clients and specify the authorization protocols that the clients will use.
b. Click Interface Configuration.
c. On the Interface Configuration page, configure the interface to include one or more of:
–
RADIUS Configuration Options—For detailed information, see “Displaying RADIUS
Configuration Options” in Chapter 2 of the User Guide for Cisco Secure ACS 4.2, “Using the
Web Interface.”
–
TACACS+ Configuration Options—For detailed information, see “Displaying TACACS+
Configuration Options” in Chapter 2 of the User Guide for Cisco Secure ACS 4.2, “Using the
Web Interface.”
–
Advanced Options—For detailed information, see “Displaying RADIUS Configuration
Options” in Chapter 2 of the User Guide for Cisco Secure ACS 4.2, “Using the Web Interface.”
–
Customized User Options—For detailed information, see “Displaying RADIUS Configuration
Options” in Chapter 2 of the User Guide for Cisco Secure ACS 4.2, “Using the Web Interface.”
Step 5 Configure Basic ACS System Settings:
a. Click System Configuration.
b. Configure:
–
Service Control
–
Logging
–
Date Format Control
–
Local Password Management
–
ACS Backup
–
ACS Restore
–
ACS Service Management
–
(optional) IP Pools Server
–
(optional) IP Pools Address Recovery
For detailed instructions, see “Displaying RADIUS Configuration Options” in Chapter 2 of the User
Guide for Cisco Secure ACS 4.2, “Using the Web Interface.”
Step 6 Configure Users:
a. As required for your network security setup, configure users. You can configure users:
–
Manually, by using the ACS web interface
–
By using the CSUtil utility to import users from an external database