Cisco 3.3 User Manual
Page 30
Preface
Organization
xxx
User Guide for Cisco Secure ACS for Windows Server
78-16592-01
•
Chapter 5, “Shared Profile Components”
—Concepts and procedures
regarding Cisco Secure ACS shared profile components: downloadable IP
acls, network access filters, network access restrictions, and device command
sets.
•
Chapter 6, “User Group Management”
—Concepts and procedures for
establishing and maintaining Cisco Secure ACS user groups.
•
—Concepts and procedures for
establishing and maintaining Cisco Secure ACS user accounts.
•
Chapter 8, “System Configuration: Basic”
—Concepts and procedures
regarding the basic features found in the System Configuration section of
Cisco Secure ACS.
•
Chapter 9, “System Configuration: Advanced”
—Concepts and procedures
regarding RDBMS Synchronization, CiscoSecure Database Replication, and
IP pools, found in the System Configuration section of Cisco Secure ACS.
•
Chapter 10, “System Configuration: Authentication and
Certificates”
—Concepts and procedures regarding the Global
Authentication and ACS Certificate Setup pages, found in the System
Configuration section of Cisco Secure ACS.
•
Chapter 11, “Logs and Reports”
—Concepts and procedures regarding
Cisco Secure ACS logging and reports.
•
Chapter 12, “Administrators and Administrative Policy”
—Concepts and
procedures for establishing and maintaining Cisco Secure ACS
administrators.
•
—Concepts about user databases and
procedures for configuring Cisco Secure ACS to perform user authentication
with external user databases.
•
Chapter 14, “Network Admission Control”
—Concepts and procedures for
implementing Network Admission Control (NAC) and configuring NAC
databases, policies, and rules.
•
Chapter 15, “Unknown User Policy”
—Concepts and procedures about
using the Unknown User Policy with posture validation and unknown user
authentication.
•
Chapter 16, “User Group Mapping and Specification”
—Concepts and
procedures regarding the assignment of groups for users authenticated by an
external user database.