Cisco Systems 4.2 manual Configure Logging and Reports, Configuring Reports for MAB Processing

Models: 4.2

1 214
Download 214 pages 55.15 Kb
Page 109
Image 109

Chapter 6 Agentless Host Support Configuration Scenario

Basic Configuration Steps for Agentless Host Support

Step 7: Configure Logging and Reports

By default, the following information about MAB processing is logged to the CSAuth log file:

The start of MAB request handling and what trigger is used to initiate MAB.

The format of this message is:

Performing Mac Authentication Bypass on <MAC_address>

where MAC_address is the MAC address that triggered the processing.

User group mapping actions that indicate which MAC address in the authentication database was mapped to what user group. The format of this message is:

<MAC_address> was (not) found in <DB_name> and mapped to <user_group> user-group

where MAC_address is the MAC address that was mapped, DB_name is the name of the database that was used to match the MAC_address, and user_group is the name of the user group to which the MAC address was mapped.

Note Because the results of MAC address lookup can influence the response that ACS returns to the NAD, the success or failure of the MAC address lookup has an effect on the user group that is mapped to an access request. Therefore, the MAC address lookup result might be listed in the Passed Authentications or Failed attempts report.

Configuring Reports for MAB Processing

When you configure reports, you can add a new attribute called Bypass info to the Passed

Authentications and Failed Attempts reports.

To add this attribute:

Step 1 In the navigation bar, click System Configuration.

The System Configuration page opens.

Step 2 Click Logging.

The Logging Configuration page opens.

The Logging Configuration page shows three columns of ACS reports: CSV, ODBC, and syslog.

Step 3 To add the Bypass attribute to a specified report:

a.Click Configure under the report type for one of the reports that you want to modify; for example, click the CSV report for the Passed Authentications report.

The Enable Logging page for the specified report opens.

b.Check the check box in the Enable Logging section.

c.In the Attributes column of the Select Columns to Log section, select the Bypass Info attribute.

d.Click the right arrow icon to move this attributed to the Logged Attributes column.

e.Select any other attributes that you want to log.

f.Set the other values on the Logging Configuration page as required.

g.Click Submit.

 

 

Configuration Guide for Cisco Secure ACS 4.2

 

 

 

 

 

 

OL-14390-02

 

 

6-23

 

 

 

 

 

Page 109
Image 109
Cisco Systems 4.2 manual Configure Logging and Reports, Configuring Reports for MAB Processing

4.2 specifications

Cisco Systems, a global leader in IT and networking solutions, has consistently evolved to meet the demands of modern enterprises. One of its noteworthy offerings is Cisco Systems 4.2, a version that embodies a significant leap in networking technology and capability. With its rich set of features, Cisco Systems 4.2 caters to a wide range of industries, facilitating enhanced performance and security.

One of the main features of Cisco Systems 4.2 is its improved scalability. The architecture has been designed to support an ever-increasing number of devices and users, making it ideal for growing enterprises. The enhanced scalability allows organizations to expand their network capacities without compromising performance, ensuring seamless integration of new technologies and devices.

Another critical aspect of Cisco Systems 4.2 is its advanced security protocols. With cyber threats constantly evolving, Cisco prioritizes security in this version by offering robust features such as end-to-end encryption, improved firewall capabilities, and enhanced intrusion detection systems. These security enhancements provide organizations with peace of mind, knowing that their sensitive data and networks are well-protected from unauthorized access and potential threats.

Cisco Systems 4.2 also introduces intelligent automation features, which significantly streamline network management. Through the use of artificial intelligence and machine learning, Cisco enables organizations to automate routine tasks, reduce human error, and optimize performance. This automation not only enhances efficiency but also allows IT teams to focus on strategic initiatives rather than day-to-day maintenance.

Moreover, Cisco Systems 4.2 emphasizes infrastructure flexibility. The new architecture supports various deployment models, including on-premises, cloud, and hybrid environments. This flexibility enables organizations to adapt their networking strategies according to their specific needs and operational requirements, facilitating a more tailored approach to IT infrastructure.

Collaboration tools have also been enhanced in this version. Cisco Systems 4.2 integrates advanced communication solutions that empower teams to collaborate in real time, regardless of their geographical location. Features such as high-definition video conferencing, secure messaging, and file sharing enhance productivity and foster innovation across teams.

In summary, Cisco Systems 4.2 stands out as a forward-thinking networking solution with key features such as scalability, advanced security, intelligent automation, flexible infrastructure, and enhanced collaboration tools. These characteristics position Cisco Systems 4.2 as an invaluable asset for enterprises striving for digital transformation in an increasingly interconnected world. The ongoing innovation reflects Cisco's commitment to delivering cutting-edge technology solutions that drive business success and resilience.