cisco acs
TRANSCRIPT
7/23/2019 Cisco ACS
http://slidepdf.com/reader/full/cisco-acs 1/12
Configure Windows TACACS+ Servers using
Cisco Secure ACSThe Packeteer TACACS+ client has been tested with Cisco Secure Access Control Server (ACS)
4.2. This section includes instructions on configuring a indows TACACS+ server with Packeteer!s"ecific infor#ation. These ste"s should be "erfor#ed before $ou configure the TACACS+
authentication and TACACS+ accounting services via the Packetise browser or co##and!line
interfaces. %or #ore infor#ation on the general setu" and configuration of these servers& refer to the
docu#entation included with the "roduct.
Configure the Cisco Secure ACS Application
%ollow the "rocedure below to configure grou"!level access attributes.
'. aunch the Cisco Secure ACS a""lication.
2. Click Interface configuration in the toolbar on the left side of the screen to o"en the
Interface Configuration window.
. Click the TACACS+ (Cisco *S) link.
7/23/2019 Cisco ACS
http://slidepdf.com/reader/full/cisco-acs 2/12
4. The TACACS+ services window o"ens. *n the to" "ane of this window& there are two
colu#ns for grou" and user configuration settings. Check the shell (exec) checkbo, in the
User colu#n.
7/23/2019 Cisco ACS
http://slidepdf.com/reader/full/cisco-acs 3/12
-. Click Subit to save $our changes.
Configure Cisco Secure ACS !etwor" Settings
efine network clients that can be accessed using TACACS+ authentication and authori/ation.
'. Click the !etwor" Configuration button in the left toolbar.
7/23/2019 Cisco ACS
http://slidepdf.com/reader/full/cisco-acs 4/12
2. Click Add #ntr$.
7/23/2019 Cisco ACS
http://slidepdf.com/reader/full/cisco-acs 5/12
. The Add AAA Client window o"ens.
7/23/2019 Cisco ACS
http://slidepdf.com/reader/full/cisco-acs 6/12
0nter a AAA Client %ostnae& AAA Client I& address and a Shared Secret ("assword)
for the PacketSha"er or Polic$Center server $ou want to access using TACACS+
authentication.
4. Click the Authenticate Using dro"!down list and select TACACS+ (Cisco I'S).
-. Click Subit + Appl$.
Configure Cisco Secure ACS Users
1e,t& $ou #ust configure settings for $our TACACS+ users.
'. Click the User Setup button in the toolbar on the left side of the screen to o"en the Select
window.
7/23/2019 Cisco ACS
http://slidepdf.com/reader/full/cisco-acs 7/12
2. 0nter a na#e for the new user in the User !ae field& then click Add#dit.
7/23/2019 Cisco ACS
http://slidepdf.com/reader/full/cisco-acs 8/12
. The Edit window o"ens.
7/23/2019 Cisco ACS
http://slidepdf.com/reader/full/cisco-acs 9/12
*n the Suppleentar$ User Info section& enter a eal !ae for the user and a
*escription of that user.
4. *n the User Setup section& click the &assword Authentication dro"!down list and select
7/23/2019 Cisco ACS
http://slidepdf.com/reader/full/cisco-acs 10/12
ACS Internal *atabase.
-. 0nter and confir# a "assword for Cisco Secure PAPC3APS!C3APA5AP in the to"
&assword and Confir &assword fields.
6. (Optional) To use the "assword $ou 7ust defined for PAP onl$& click the Separate
(C%A&S,C%A&AA&) checkbo,& and define a se"arate "assword for those
authentication "rotocols.8. 9se the scroll bar on the right side of the Edit window to scroll down to the TACACS+
Settings section.
7/23/2019 Cisco ACS
http://slidepdf.com/reader/full/cisco-acs 11/12
:. Select the Shell (exec) checkbo,.
;. Select the Custo# Attributes checkbo,& then enter one of the following custo# Packeteer
attributes.
7/23/2019 Cisco ACS
http://slidepdf.com/reader/full/cisco-acs 12/12
attribute *escription
access<touch =ives the user touch access to a PacketSha"er
access<look =ives the user look access to a PacketSha"er
role<<org>>touch
here <org> is a Polic$Center organi/ation na#e. This
attribute gives the user touch access to a Polic$Centerorgani/ation& #ost t$"icall$ the ad#inistrator?s &C
organi/ation.
role<<org>>l
ook
here <org> is a Polic$Center organi/ation na#e. This
attribute gives the look touch access to a Polic$Center
organi/ation.
'@. Click Subit to save $our settings.