Proxy distribution table configuration, About the proxy distribution table, Proxy distribution table – Cisco 3.3 User Manual
Page 150
Chapter 4 Network Configuration
Proxy Distribution Table Configuration
4-34
User Guide for Cisco Secure ACS for Windows Server
78-16592-01
Proxy Distribution Table Configuration
This section describes the Proxy Distribution Table and provides procedures for
working with the Proxy Distribution Table.
This section contains the following topics:
•
About the Proxy Distribution Table, page 4-34
•
Adding a New Proxy Distribution Table Entry, page 4-35
•
Sorting the Character String Match Order of Distribution Entries, page 4-36
•
Editing a Proxy Distribution Table Entry, page 4-37
•
Deleting a Proxy Distribution Table Entry, page 4-38
About the Proxy Distribution Table
If you have Distributed Systems Settings enabled, when you click Network
Configuration, you will see the Proxy Distribution Table.
Tip
To enable Distributed Systems Settings in the Cisco Secure ACS, click Interface
Configuration, click Advanced Options, and then select the Distributed
System Settings check box.
The Proxy Distribution Table includes entries that show the character strings on
which to proxy, the AAA servers to proxy to, whether to strip the character string,
and where to send the accounting information (Local/Remote, Remote, or Local).
For more information about the proxy feature, see
The entries you define and place in the Proxy Distribution Table can be considered
turnstiles for each authentication request that Cisco Secure ACS receives from the
AAA client. The authentication request is defined in the Proxy Distribution Table
according to where it is to be forwarded. If a match to an entry in the Proxy
Distribution Table that contains proxy information is found, Cisco Secure ACS
forwards the request to the appropriate AAA server.
The Character String column in the Proxy Distribution Table always contains an
entry of “(Default)”. The “(Default)” entry matches authentication requests
received by the local Cisco Secure ACS that do not match any other defined