Cisco Systems 4.2 Configure the Logging Level, Configure Logs and Reports, Click Service Control

Models: 4.2

1 214
Download 214 pages 55.15 Kb
Page 136
Image 136

Chapter 9 NAC Configuration Scenario

Step 3: Set Up System Configuration

Step 8 Check the Accept client on authenticated provisioning and Require client certificate for provisioning check boxes.

Step 9 Check the check boxes for the EAP-GTC, EAP-MSCHAPv2, and EAP-TLSinner methods.

The EAP-FAST Master Server check box is automatically checked (enabled).

Check the Certificate SAN and Certificate Binary comparison check boxes to enable these EAP-TLS comparison methods.

Step 10 Click Submit + Restart.

Configure the Logging Level

To set ACS to full logging capabilities:

Step 1 In the navigation bar, click System Configuration.

The System Configuration page opens.

Step 2 Click Service Control.

Step 3 Under Level of Detail, click the Full radio button.

Note Setting the logging level to Full might affect system performance. Therefore, you should set the logging level to Full for an initial deployment when detailed troubleshooting is required. After the network has become stable, set the logging level to Normal.

Step 4 Check the Manage Directory check box and choose how many days of logging to keep. (Enter the number of days, based on how much space you have on your hard drive. Cisco recommends that you specify seven days.)

Step 5 Click Restart to restart ACS. (Wait until the browser’s progress bar shows that the page has reloaded completely.)

Configure Logs and Reports

ACS logs records of users who gain or are refused network access, as well as records of other actions. You can output the information in the logs to reports that you view in the ACS GUI, which you can then save or print out and review. These reports summarize the logs, and provide useful information for debugging and tracking problems.

For detailed information on ACS logs and reports, see Chapter 10 of the User Guide for Cisco Secure ACS. 4.2, “Logs and Reports.”

The Failed Attempts report and the RADIUS Accounting report are useful tools for monitoring the performance of the NAC/NAP network. And the Passed Authentications report is particularly useful in NAC-enabled networks; because, it shows the group mapping for each posture validation request. By default, the Passed Authentication report is unchecked (disabled).

 

Configuration Guide for Cisco Secure ACS 4.2

9-14

OL-14390-02

Page 136
Image 136
Cisco Systems 4.2 manual Configure the Logging Level, Configure Logs and Reports, Click Service Control

4.2 specifications

Cisco Systems, a global leader in IT and networking solutions, has consistently evolved to meet the demands of modern enterprises. One of its noteworthy offerings is Cisco Systems 4.2, a version that embodies a significant leap in networking technology and capability. With its rich set of features, Cisco Systems 4.2 caters to a wide range of industries, facilitating enhanced performance and security.

One of the main features of Cisco Systems 4.2 is its improved scalability. The architecture has been designed to support an ever-increasing number of devices and users, making it ideal for growing enterprises. The enhanced scalability allows organizations to expand their network capacities without compromising performance, ensuring seamless integration of new technologies and devices.

Another critical aspect of Cisco Systems 4.2 is its advanced security protocols. With cyber threats constantly evolving, Cisco prioritizes security in this version by offering robust features such as end-to-end encryption, improved firewall capabilities, and enhanced intrusion detection systems. These security enhancements provide organizations with peace of mind, knowing that their sensitive data and networks are well-protected from unauthorized access and potential threats.

Cisco Systems 4.2 also introduces intelligent automation features, which significantly streamline network management. Through the use of artificial intelligence and machine learning, Cisco enables organizations to automate routine tasks, reduce human error, and optimize performance. This automation not only enhances efficiency but also allows IT teams to focus on strategic initiatives rather than day-to-day maintenance.

Moreover, Cisco Systems 4.2 emphasizes infrastructure flexibility. The new architecture supports various deployment models, including on-premises, cloud, and hybrid environments. This flexibility enables organizations to adapt their networking strategies according to their specific needs and operational requirements, facilitating a more tailored approach to IT infrastructure.

Collaboration tools have also been enhanced in this version. Cisco Systems 4.2 integrates advanced communication solutions that empower teams to collaborate in real time, regardless of their geographical location. Features such as high-definition video conferencing, secure messaging, and file sharing enhance productivity and foster innovation across teams.

In summary, Cisco Systems 4.2 stands out as a forward-thinking networking solution with key features such as scalability, advanced security, intelligent automation, flexible infrastructure, and enhanced collaboration tools. These characteristics position Cisco Systems 4.2 as an invaluable asset for enterprises striving for digital transformation in an increasingly interconnected world. The ongoing innovation reflects Cisco's commitment to delivering cutting-edge technology solutions that drive business success and resilience.