6-4
User Guide for Cisco Secure Access Control System 5.4
OL-26225-01
Chapter6 Post-Installation Configuration Tasks
Configuring ACS to Manage Access Policies
Configuring ACS to Manage Access Policies
Table 6 -3 lists the set of tasks that you must perf orm to manage access restrictions and permissions.
Configuring ACS to Monitor and Troubleshoot Problems in the Network
Table 6 -4 lists a set of configuration tasks that you must perform to troubleshoot the Monitoring and
Report Viewer.
Table6-3 Managing Access Policies
Step No. Task Drawer Refer to...
Step 1 Define policy conditions. Policy Elements > Session
Conditions
Managing Policy Conditions,
page 9-1.
Step 2 Define authorization and
permissions.
Policy Elements > Authorization
and Permissions
Managing Authorizations and
Permissions, page 9-17.
Step 3 Define access services and
service selection policies.
Access Policies > Access
Services
To configure access
services:
Configuring Access
Services, page 10-11.
To configure access service
policies:
Configuring Access
Service Policies,
page 10-22.
To configure compound
conditions:
Configuring Compound
Conditions, page 10-41.
Table6-4 Monitoring and Troubleshooting Configuration
Step No. Task Drawer Refer to...
Step 1 Configure data purge and
backup.
Monitoring Configuration >
System Operations > Data
Management > Removal and
Backup
Configuring Data Purging and
Incremental Backup, page 15-3.
Step 2 Specify e-mail settings. Monitoring Configuration >
System Configuration > Email
Settings
Specifying E-Mail Settings,
page 15-16.
Step 3 Configure collection filters. Monitoring Configuration >
System Configuration >
Collection Filters
Understanding Collection
Filters, page 15-17.