Cisco Systems 3.5 manual GL-4

Page 70

Glossary

M

MIB

Management Information Base—Database of network management information used and maintained

 

by a network management protocol such as SNMP. The value of a MIB object can be changed or

 

retrieved using SNMP commands. MIB objects are organized in a tree structure that includes public

 

and private branches.

MPLS

MPLS VPN

MSO

Multi-Protocol Label Switching—

MPLS-based Virtual Private Networks

Multiple System Operators are typically cable companies that provide Internet access for regional independent operators.

N

NAS

Network Access Server is a device providing temporary, on-demand network access to users. This

 

access is point-to-point using PSTN or ISDN lines. A NAS operates as a client of RADIUS. The client

 

is responsible for passing user information to designated RADIUS servers.

 

In PPTP terminology, this is referred to as the PPTP Access Concentrator (PAC). In L2TP terminology,

 

the NAS is referred to as the L2TP Access Concentrator (LAC).

NCP

Network Control Protocol is responsible for negotiating the protocol-specific particulars of the

 

point-to-point protocol (PPP) link.

Network Access

In order to provide for the routing of RADIUS authentication and accounting requests, the UserID field

Identifier

used in PPP and in the subsequent RADIUS authentication and accounting requests, known as the

 

Network Access Identifier (NAI), may contain structure. This structure provides a means by which the

 

RADIUS proxy locates the RADIUS server that is to receive the request. This same structure may also

 

be used to locate the tunnel end point when domain-based tunneling is used.

O

ODBC

ODBC Driver

Open Database Connectivity—a standard set of application programming interface (API) function calls (supported by Microsoft and in general use) that can be used to access data store in both relational and non-relational database management systems (DBMSs).

Processes ODBC function calls, submits SQL requests to specific data source, and returns results to applications. ODBC drivers for specific types of data files, including database files, spreadsheet files, and text fields, are available from Microsoft Corporation.

Cisco Access Registrar 3.5 Concepts and Reference Guide

 

GL-4

OL-2683-02

 

 

 

Image 70
Contents Cisco Access Registrar 3.5 Concepts and Reference Guide Corporate HeadquartersCisco Access Registrar 3.5 Concepts and Reference Guide N T E N T S IiiSession-Service Service Step and Radius-Session Service Replication’s Impact on Request Processing IPAddress Port Understanding Snmp Accounting Start Data Flow ViiViii Obtaining Documentation World Wide WebDocumentation Feedback Obtaining Technical AssistanceOrdering Documentation Cisco.comTechnical Assistance Center Contacting TAC by Using the Cisco TAC WebsiteContacting TAC by Telephone Xii Overview Radius ProtocolSteps to Connection Packet Exchange Between User, NAS, and RadiusPacket Contents Types of Radius MessagesProxy Servers Attribute DictionaryBasic Authentication and Authorization Proxying to an Ldap Server for AuthenticationOverview Basic Authentication and Authorization Understanding Cisco Access Registrar Cisco Access Registrar HierarchyProfiles ServicesUserLists and Groups ScriptsSession Management Using Resource Managers Program Flow Cisco AR Directory StructureSubdirectory Description Cisco AR Server Action Explanation Scripting PointsClient or NAS Scripting Points Action ExplanationAuthentication and/or Authorization Scripting Points Radius/Advanced/RequireNASsBehindProxyBeInClieSession Management Failover by the NAS and Session ManagementScript Processing Hierarchy Authentication/Authorization ScriptsIncoming Scripts Overview Cross Server Session and Resource ManagementOutgoing Scripts Session-Service Service Step and Radius-Session Service Configuring a Front Line Cisco Access RegistrarConfigure Central AR OL-2683-02 ACMEOutgoingScript Using Cisco AR ScriptsAltigaIncomingScript ANAAAOutgoing AuthorizeServiceAltigaOutgoingScript AscendIncomingScriptCabletronOutgoing AuthorizeTelnetCabletronIncoming CiscoIncomingExecFilterRule ExecTimeRuleExecDNISRule ExecNASIPRuleParseAAARealm LDAPOutageMapSourceIPAddress ParseAAASRealmParseServiceAndAARealmHints ParseServiceAndAAARealmHintsParseServiceAndAAASRealmHints ParseServiceAndAASRealmHintsParseTranslationGroupsByDNIS ParseServiceHintsParseTranslationGroupsByCLID ParseTranslationGroupsByRealmUSROutgoingScript Understanding Replication Replication OverviewReplication Data Flow How Replication WorksMaster Server Ensuring Data Integrity SecurityReplication Archive Slave ServerTransaction Order Transaction Data VerificationAutomatic Resynchronization Full Resynchronization Replication Configuration SettingsUnderstanding Hot-Configuration Replication’s Impact on Request ProcessingRepTransactionArchiveLimit RepTypeRepTransactionSyncInterval MasterRepSecret RepIPAddressRepPort RepIPMasterName Rep Members SubdirectoryRep Members/Slave1 IPAddressOverview Supported MIBsSnmp Traps RADIUS-AUTH-SERVER-MIBCarServerStop Supported TrapsCarServerStart CarInputQueueFullCarOtherAuthServerResponding CarOtherAuthServerNotRespondingCarOtherAccServerNotResponding CarAccountingLoggingFailure Configuring TrapsCarOtherAccServerResponding Directories SearchedConfiguration File Types Switching Configuration Files in Mid-FileCommunity String OL-2683-02 Prepaid Billing Solution Measurements and Component Actions Configuring Prepaid Billing Generic Call Flow Call Flow DetailsAccess-Request Authentication Attribute Number Attribute Name DescriptionAccess-Request Authorization Access-Accept AuthenticationAccess-Accept Authorization Data Flow Accounting StartAttribute Number Attribute Name Access-Request Quota Depleted Accept-Accept Quota DepletedAccounting Stop Session End Accounting Response Final StatusVendor-Specific Attributes Source VSA Name Type Call Flow DescriptionTotal Volume quota received by Crbprivate O S S a R Y GL-1Scalable wholesale access/open access solution GL-2GL-3 GL-4 GL-5 GL-6 GL-7 GL-8 GL-9 GL-10 Radius IN-1RFC IN-2IN-3 IN-4
Related manuals
Manual 180 pages 47.88 Kb

3.5 specifications

Cisco Systems 3.5 is an advanced version of Cisco's renowned networking and security solutions. This iteration showcases significant enhancements in performance, scalability, and security, making it a preferred choice for enterprises aiming to optimize their network operations and bolster their cybersecurity posture.

One of the main features of Cisco Systems 3.5 is its enhanced network automation capabilities. Automation streamlines network management, allowing organizations to apply consistent policies across their infrastructure while minimizing human error. This version employs advanced algorithms and machine learning to predict and rectify network issues proactively. With automation tools, network administrators can configure, monitor, and troubleshoot their networks with unprecedented efficiency.

Another notable characteristic of Cisco Systems 3.5 is its integration of artificial intelligence and machine learning into networking processes. The incorporation of AI enhances decision-making by analyzing vast amounts of network data, identifying patterns, and offering insights that help ensure optimal performance. This predictive analytics capability allows organizations to predict potential disruptions before they impact operations.

Security is a major focus in Cisco Systems 3.5. The platform introduces advanced threat detection and response systems that utilize deep learning to identify and mitigate emerging threats in real-time. Enhanced encryption protocols ensure that data transmitted over the network remains secure, protecting sensitive information from cyber threats. The integrated security features ensure compliance with various regulatory standards, a crucial requirement for businesses across multiple sectors.

The platforms' support for Software-Defined Networking (SDN) allows for dynamic resource allocation and traffic management. This flexibility enables organizations to adjust their network resources quickly in response to changing demands, leading to improved efficiency and reduced operational costs. Cisco Systems 3.5 also supports multicloud environments, facilitating seamless integration with cloud services such as AWS, Google Cloud, and Microsoft Azure.

Moreover, Cisco Systems 3.5 offers robust telemetry features, providing detailed real-time insights into network performance and health. This data-driven approach allows organizations to make informed decisions regarding capacity planning and resource optimization.

In summary, Cisco Systems 3.5 combines cutting-edge technologies such as AI, machine learning, and SDN to deliver a comprehensive networking solution. With its focus on automation, enhanced security, and multicloud support, this version is well-suited for modern enterprises looking to enhance their network infrastructure and security measures. As organizations continue to evolve in a digital-centric world, Cisco Systems 3.5 stands out as a critical tool to achieve connectivity and security goals effectively.