Cisco Systems Servers Server User Manual


 
4-25
Cisco Secure ACS 3.0 for Windows 2000/NT Servers User Guide
78-13751-01, Version 3.0
Chapter 4 Setting Up and Managing Network Configuration
Proxy Distribution Table Configuration
Proxy Distribution Table Configuration
This section begins with a description of the Proxy Distribution Table and then
details the following Proxy Distribution Table configuration procedures:
Adding a New Proxy Distribution Table Entry, page 4-26
Sorting the Character String Match Order of Distribution Entries, page 4-28
Editing a Proxy Distribution Table Entry, page 4-28
Deleting a Proxy Distribution Table Entry, page 4-29
About the Proxy Distribution Table
If you have Distributed Systems Settings enabled, when you click Network
Configuration, you will see the Proxy Distribution Table.
Tip To enable Distributed Systems Settings in the Cisco Secure ACS, click
Interface Configuration, click Advanced Options, and then select the
Distributed System Settings check box.
The Proxy Distribution Table comprises entries that show the character strings on
which to proxy, the AAA Servers to proxy to, whether to strip the character string,
and where to send the accounting information (Local/Remote, Remote, or Local).
For more information about the proxy feature, see the Proxy in Distributed
Systems section on page 4-4.
The entries you define and place in the Proxy Distribution Table can be considered
turnstiles for each authentication request that Cisco Secure ACS receives from the
AAA client. How the authentication request is defined in the Proxy Distribution
Table depends on where it is to be forwarded. If a match to an entry in the Proxy
Distribution Table that contains proxy information is found, Cisco Secure ACS
forwards the request to the appropriate AAA server.
The Character String column in the Proxy Distribution Table always contains an
entry of (Default). The (Default) entry matches authentication requests
received by the local Cisco Secure ACS server that do not match any other defined
character strings. While you cannot change the character string definition for the
(Default) entry, you can change the distribution of authentication requests
matching the (Default) entry. At installation, the AAA server associated with