beautypg.com

Cisco 3.3 User Manual

Page 30

background image

Preface

Organization

xxx

User Guide for Cisco Secure ACS for Windows Server

78-16592-01

Chapter 5, “Shared Profile Components”

Concepts and procedures

regarding Cisco Secure ACS shared profile components: downloadable IP
acls, network access filters, network access restrictions, and device command
sets.

Chapter 6, “User Group Management”

—Concepts and procedures for

establishing and maintaining Cisco Secure ACS user groups.

Chapter 7, “User Management”

Concepts and procedures for

establishing and maintaining Cisco Secure ACS user accounts.

Chapter 8, “System Configuration: Basic”

—Concepts and procedures

regarding the basic features found in the System Configuration section of
Cisco Secure ACS.

Chapter 9, “System Configuration: Advanced”

—Concepts and procedures

regarding RDBMS Synchronization, CiscoSecure Database Replication, and
IP pools, found in the System Configuration section of Cisco Secure ACS.

Chapter 10, “System Configuration: Authentication and
Certificates”

Concepts and procedures regarding the Global

Authentication and ACS Certificate Setup pages, found in the System
Configuration section of Cisco Secure ACS.

Chapter 11, “Logs and Reports”

—Concepts and procedures regarding

Cisco Secure ACS logging and reports.

Chapter 12, “Administrators and Administrative Policy”

Concepts and

procedures for establishing and maintaining Cisco Secure ACS
administrators.

Chapter 13, “User Databases”

Concepts about user databases and

procedures for configuring Cisco Secure ACS to perform user authentication
with external user databases.

Chapter 14, “Network Admission Control”

Concepts and procedures for

implementing Network Admission Control (NAC) and configuring NAC
databases, policies, and rules.

Chapter 15, “Unknown User Policy”

Concepts and procedures about

using the Unknown User Policy with posture validation and unknown user
authentication.

Chapter 16, “User Group Mapping and Specification”

Concepts and

procedures regarding the assignment of groups for users authenticated by an
external user database.