C H A P T E R 6

Post-Installation Configuration Tasks

This chapter provides a set of configuration tasks that you must perform to work with ACS. This chapter contains the following sections:

Configuring Minimal System Setup, page 6-1

Configuring ACS to Perform System Administration Tasks, page 6-2

Configuring ACS to Manage Access Policies, page 6-4

Configuring ACS to Monitor and Troubleshoot Problems in the Network, page 6-4

Configuring Minimal System Setup

Table 6-1lists the steps that you must follow for a minimal system setup to get ACS up and running quickly in a lab, evaluation, or demonstration environment.

Table 6-1

Minimal System Setup

 

 

 

 

 

 

 

Step No.

 

Task

Drawer

Refer to...

 

 

 

 

 

Step 1

 

Add network devices.

Network Resources >

Creating, Duplicating, and Editing

 

 

 

Network Devices and AAA

Network Devices, page 7-10.

 

 

 

Clients

 

 

 

 

 

 

Step 2

 

Add users.

Users and Identity Stores >

Creating Internal Users, page 8-11.

 

 

 

Internal Identity Stores >

 

 

 

 

Users

 

 

 

 

 

 

Step 3

 

Create authorization rules to

Policy Elements >

Managing Authorizations and

 

 

permit or deny access.

Authorization and

Permissions, page 9-17.

 

 

 

Permissions

 

 

 

 

 

 

User Guide for Cisco Secure Access Control System 5.3

 

OL-24201-01

6-1

 

 

 

Page 125
Image 125
Cisco Systems OL-24201-01 manual Configuring Minimal System Setup, Step No Task Drawer Refer to