beautypg.com

Other features enabled by system distribution, Network device searches, Network device search criteria – Cisco 3.3 User Manual

Page 124

background image

Chapter 4 Network Configuration

Network Device Searches

4-8

User Guide for Cisco Secure ACS for Windows Server

78-16592-01

You can also choose to have Voice-over-IP (VoIP) accounting information logged
remotely, either appended to the RADIUS Accounting log, in a separate VoIP
Accounting log, or both.

Other Features Enabled by System Distribution

Beyond basic proxy and fallback features, configuring a Cisco Secure ACS to
interact with distributed systems enables several other features that are beyond the
scope of this chapter. These features include the following:

Replication—For more information, see

CiscoSecure Database Replication,

page 9-1

.

RDBMS synchronization—For more information, see

RDBMS

Synchronization, page 9-25

.

Remote and centralized logging—For more information, see

Remote

Logging, page 11-26

.

Network Device Searches

You can search for any network device configured in the Network Configuration
section of the Cisco Secure ACS HTML interface.

This section contains the following topics:

Network Device Search Criteria, page 4-8

Searching for Network Devices, page 4-9

Network Device Search Criteria

You can specify search criteria for network device searches. Cisco Secure ACS
provides the following search criteria:

Name—The name assigned to the network device in Cisco Secure ACS. You
can use asterisks (*) as wildcard characters. For example, if you wanted to
find all devices with names starting with the letter M, you would enter “M*”