Cisco Systems 4.2 Server User Manual


 
1-2
Configuration Guide for Cisco Secure ACS 4.2
OL-14390-02
Chapter 1 Overview of ACS Configuration
Summary of Configuration Steps
b. For each administrator, specify administrator privileges.
c. As needed, configure the following optional administrative policies:
Access Policy—Specify IP address limitations, HTTP port restrictions, and secure socket layer
(SSL) setup.
Session Policy—Specify timeouts, automatic local logins, and response to invalid IP address
connections.
Password Policy—Configure the password policy for administrators.
For detailed information, see Chapter 5, “Password Policy Configuration Scenario.”
Step 4 Configure the Web Interface:
a. Add AAA clients and specify the authorization protocols that the clients will use.
b. Click Interface Configuration.
c. On the Interface Configuration page, configure the interface to include one or more of:
RADIUS Configuration Options—For detailed information, see “Displaying RADIUS
Configuration Options” in Chapter 2 of the User Guide for Cisco Secure ACS 4.2, “Using the
Web Interface.”
TACACS+ Configuration Options—For detailed information, see “Displaying TACACS+
Configuration Options” in Chapter 2 of the User Guide for Cisco Secure ACS 4.2, “Using the
Web Interface.”
Advanced Options—For detailed information, see “Displaying RADIUS Configuration
Options” in Chapter 2 of the User Guide for Cisco Secure ACS 4.2, “Using the Web Interface.”
Customized User Options—For detailed information, see “Displaying RADIUS Configuration
Options” in Chapter 2 of the User Guide for Cisco Secure ACS 4.2, “Using the Web Interface.”
Step 5 Configure Basic ACS System Settings:
a. Click System Configuration.
b. Configure:
Service Control
Logging
Date Format Control
Local Password Management
ACS Backup
ACS Restore
ACS Service Management
(optional) IP Pools Server
(optional) IP Pools Address Recovery
For detailed instructions, see “Displaying RADIUS Configuration Options” in Chapter 2 of the User
Guide for Cisco Secure ACS 4.2, “Using the Web Interface.”
Step 6 Configure Users:
a. As required for your network security setup, configure users. You can configure users:
Manually, by using the ACS web interface
By using the CSUtil utility to import users from an external database