Index
IN-22
User Guide for Cisco Secure ACS for Windows Server
78-16592-01

S

search order of external user databases 15-15
security policies 2-15
security protocols
Cisco AAA client devices 1-2
CSRadius G-8
CSTacacs G-8
interface options 3-9
RADIUS 1-6, C-1
TACACS+
custom commands 3-9
overview 1-6
time-of-day access 3-8
server certificate installation 10-35
service control in System Configuration 11-33
Service Monitoring logs
See Cisco Secure ACS Service Monitoring
logs
services
determining status of 8-2
logs
configuring 11-33
list of logs generated 11-32
management 8-17
overview 1-4, G-1
starting 8-2
stopping 8-2
session policies
configuring 12-17
options 12-16
overview 12-16
shared profile components
See also command authorization sets
See also downloadable IP ACLs
See also network access filters
See also network access restrictions
overview 5-1
shared secret G-8
shell command authorization sets
See also command authorization sets
in Group Setup 6-33
in User Setup 7-26
single password configurations 1-14
SMTP (simple mail-transfer protocol) G-7
specifications
RADIUS
RFC2138 1-7
RFC2139 1-7
system performance 1-3
TACACS+ 1-7
SSL (secure socket layer) 12-13
starting services 8-2
static IP addresses 7-10
stopping services 8-2
stored procedures
CHAP authentication
configuring 13-73
input values 13-66