beautypg.com

Proxy distribution table configuration, About the proxy distribution table, Proxy distribution table – Cisco 3.3 User Manual

Page 150

background image

Chapter 4 Network Configuration

Proxy Distribution Table Configuration

4-34

User Guide for Cisco Secure ACS for Windows Server

78-16592-01

Proxy Distribution Table Configuration

This section describes the Proxy Distribution Table and provides procedures for
working with the Proxy Distribution Table.

This section contains the following topics:

About the Proxy Distribution Table, page 4-34

Adding a New Proxy Distribution Table Entry, page 4-35

Sorting the Character String Match Order of Distribution Entries, page 4-36

Editing a Proxy Distribution Table Entry, page 4-37

Deleting a Proxy Distribution Table Entry, page 4-38

About the Proxy Distribution Table

If you have Distributed Systems Settings enabled, when you click Network
Configuration, you will see the Proxy Distribution Table.

Tip

To enable Distributed Systems Settings in the Cisco Secure ACS, click Interface
Configuration
, click Advanced Options, and then select the Distributed
System Settings
check box.

The Proxy Distribution Table includes entries that show the character strings on
which to proxy, the AAA servers to proxy to, whether to strip the character string,
and where to send the accounting information (Local/Remote, Remote, or Local).
For more information about the proxy feature, see

Proxy in Distributed Systems,

page 4-4

.

The entries you define and place in the Proxy Distribution Table can be considered
turnstiles for each authentication request that Cisco Secure ACS receives from the
AAA client. The authentication request is defined in the Proxy Distribution Table
according to where it is to be forwarded. If a match to an entry in the Proxy
Distribution Table that contains proxy information is found, Cisco Secure ACS
forwards the request to the appropriate AAA server.

The Character String column in the Proxy Distribution Table always contains an
entry of “(Default)”. The “(Default)” entry matches authentication requests
received by the local Cisco Secure ACS that do not match any other defined