Contents

 

 

 

 

 

 

Configuring System Alarm Settings

15-17

 

 

 

 

 

 

 

 

 

Configuring Alarm Syslog Targets

15-17

 

 

 

 

 

 

 

 

 

Configuring Remote Database Settings

15-17

 

 

 

 

 

Managing System Administrators

 

 

 

 

 

C H A P T E R

16

 

16-1

 

 

 

 

 

 

 

 

 

 

Understanding Administrator Roles and Accounts

16-2

 

 

 

 

 

 

 

Understanding Authentication

16-3

 

 

 

 

 

 

 

 

 

Configuring System Administrators and Accounts

16-3

 

 

 

 

 

 

 

Understanding Roles

16-3

 

 

 

 

 

 

 

 

 

 

 

 

Permissions

16-4

 

 

 

 

 

 

 

 

 

 

 

 

Predefined Roles

16-4

 

 

 

 

 

 

 

 

 

 

 

 

Changing Role Associations

16-5

 

 

 

 

 

 

 

 

 

 

Administrator Accounts and Role Association

16-6

 

 

 

 

 

 

 

Creating, Duplicating, Editing, and Deleting Administrator Accounts 16-6

 

 

 

 

 

 

Viewing Predefined Roles 16-8

 

 

 

 

 

 

 

 

 

 

 

Viewing Role Properties

16-8

 

 

 

 

 

 

 

 

 

 

 

Configuring Authentication Settings for Administrators 16-9

 

 

 

 

 

 

Configuring Session Idle Timeout

16-11

 

 

 

 

 

 

 

 

 

 

Configuring Administrator Access Settings

16-11

 

 

 

 

 

 

 

 

Resetting the Administrator Password

16-12

 

 

 

 

 

 

 

 

Changing the Administrator Password 16-13

 

 

 

 

 

 

 

 

Changing Your Own Administrator Password

16-13

 

 

 

 

 

 

 

Resetting Another Administrator’s Password

16-14

 

 

 

 

Configuring System Operations

 

 

 

 

 

C H A P T E R

17

 

17-1

 

 

 

 

 

 

 

 

 

 

Understanding Distributed Deployment

17-2

 

 

 

 

 

 

 

 

Activating Secondary Servers

17-3

 

 

 

 

 

 

 

 

 

 

Removing Secondary Servers

17-3

 

 

 

 

 

 

 

 

 

 

Promoting a Secondary Server

17-4

 

 

 

 

 

 

 

 

 

Understanding Local Mode

17-4

 

 

 

 

 

 

 

 

 

 

Understanding Full Replication

17-5

 

 

 

 

 

 

 

 

 

Specifying a Hardware Replacement

17-5

 

 

 

 

 

 

 

 

Scheduled Backups

 

17-6

 

 

 

 

 

 

 

 

 

 

 

 

Creating, Duplicating, and Editing Scheduled Backups 17-6

 

 

 

 

 

 

Backing Up Primary and Secondary Instances

17-8

 

 

 

 

 

 

 

 

Synchronizing Primary and Secondary Instances After Backup and Restore 17-9

 

 

 

 

 

 

Editing Instances

17-9

 

 

 

 

 

 

 

 

 

 

 

User Guide for Cisco Secure Access Control System 5.3

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

xvi

 

 

 

 

 

 

 

 

 

 

 

OL-24201-01

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Page 16
Image 16
Cisco Systems OL-24201-01 manual Managing System Administrators, Xvi