Other features enabled by system distribution, Network device searches, Network device search criteria – Cisco 3.3 User Manual
Page 124
Chapter 4 Network Configuration
Network Device Searches
4-8
User Guide for Cisco Secure ACS for Windows Server
78-16592-01
You can also choose to have Voice-over-IP (VoIP) accounting information logged
remotely, either appended to the RADIUS Accounting log, in a separate VoIP
Accounting log, or both.
Other Features Enabled by System Distribution
Beyond basic proxy and fallback features, configuring a Cisco Secure ACS to
interact with distributed systems enables several other features that are beyond the
scope of this chapter. These features include the following:
•
Replication—For more information, see
CiscoSecure Database Replication,
•
RDBMS synchronization—For more information, see
.
•
Remote and centralized logging—For more information, see
.
Network Device Searches
You can search for any network device configured in the Network Configuration
section of the Cisco Secure ACS HTML interface.
This section contains the following topics:
•
Network Device Search Criteria, page 4-8
•
Searching for Network Devices, page 4-9
Network Device Search Criteria
You can specify search criteria for network device searches. Cisco Secure ACS
provides the following search criteria:
•
Name—The name assigned to the network device in Cisco Secure ACS. You
can use asterisks (*) as wildcard characters. For example, if you wanted to
find all devices with names starting with the letter M, you would enter “M*”