cisco acs

12
7/23/2019 Cisco ACS http://slidepdf.com/reader/full/cisco-acs 1/12 Configure Windows TACACS+ Servers using Cisco Secure ACS The Packeteer TACACS+ client has been tested with Cisco Secure Access Control Server (ACS) 4.2. This section includes instructions on configuring a indows TACACS+ server with Packeteer! s"ecific infor#ation. These ste"s should be "erfor#ed before $ou configure the TACACS+ authentication and TACACS+ accounting services via the Packetise browser or co##and!line interfaces. %or #ore infor#ation on the general setu" and configuration of these servers& refer to the docu#entation included with the "roduct. Configure the Cisco Secure ACS Application %ollow the "rocedure below to configure grou"!level access attributes. '. aunch the Cisco Secure ACS a""lication. 2. Click Interface configuration in the toolbar on the left side of the screen to o"en the  Interface Configuration window. . Click the TACACS+ (Cisco *S) link.

Upload: helison-queiroz

Post on 17-Feb-2018

216 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Cisco ACS

7/23/2019 Cisco ACS

http://slidepdf.com/reader/full/cisco-acs 1/12

Configure Windows TACACS+ Servers using

Cisco Secure ACSThe Packeteer TACACS+ client has been tested with Cisco Secure Access Control Server (ACS)

4.2. This section includes instructions on configuring a indows TACACS+ server with Packeteer!s"ecific infor#ation. These ste"s should be "erfor#ed before $ou configure the TACACS+

authentication and TACACS+ accounting services via the Packetise browser or co##and!line

interfaces. %or #ore infor#ation on the general setu" and configuration of these servers& refer to the

docu#entation included with the "roduct.

Configure the Cisco Secure ACS Application

%ollow the "rocedure below to configure grou"!level access attributes.

'. aunch the Cisco Secure ACS a""lication.

2. Click Interface configuration in the toolbar on the left side of the screen to o"en the

 Interface Configuration window.

. Click the TACACS+ (Cisco *S) link.

Page 2: Cisco ACS

7/23/2019 Cisco ACS

http://slidepdf.com/reader/full/cisco-acs 2/12

4. The TACACS+ services window o"ens. *n the to" "ane of this window& there are two

colu#ns for grou" and user configuration settings. Check the shell (exec) checkbo, in the

User colu#n.

Page 3: Cisco ACS

7/23/2019 Cisco ACS

http://slidepdf.com/reader/full/cisco-acs 3/12

-. Click Subit to save $our changes.

Configure Cisco Secure ACS !etwor" Settings

efine network clients that can be accessed using TACACS+ authentication and authori/ation.

'. Click the !etwor" Configuration button in the left toolbar.

Page 4: Cisco ACS

7/23/2019 Cisco ACS

http://slidepdf.com/reader/full/cisco-acs 4/12

2. Click Add #ntr$.

Page 5: Cisco ACS

7/23/2019 Cisco ACS

http://slidepdf.com/reader/full/cisco-acs 5/12

. The Add AAA Client  window o"ens.

Page 6: Cisco ACS

7/23/2019 Cisco ACS

http://slidepdf.com/reader/full/cisco-acs 6/12

 0nter a AAA Client %ostnae& AAA Client I& address and a Shared Secret ("assword)

for the PacketSha"er or Polic$Center server $ou want to access using TACACS+

authentication.

4. Click the Authenticate Using dro"!down list and select TACACS+ (Cisco I'S).

-. Click Subit + Appl$.

Configure Cisco Secure ACS Users

 1e,t& $ou #ust configure settings for $our TACACS+ users.

'. Click the User Setup button in the toolbar on the left side of the screen to o"en the Select  

window.

Page 7: Cisco ACS

7/23/2019 Cisco ACS

http://slidepdf.com/reader/full/cisco-acs 7/12

2. 0nter a na#e for the new user in the User !ae field& then click Add#dit.

Page 8: Cisco ACS

7/23/2019 Cisco ACS

http://slidepdf.com/reader/full/cisco-acs 8/12

. The Edit  window o"ens.

Page 9: Cisco ACS

7/23/2019 Cisco ACS

http://slidepdf.com/reader/full/cisco-acs 9/12

 *n the Suppleentar$ User Info section& enter a eal !ae for the user and a

*escription of that user.

4. *n the User Setup section& click the &assword Authentication dro"!down list and select

Page 10: Cisco ACS

7/23/2019 Cisco ACS

http://slidepdf.com/reader/full/cisco-acs 10/12

ACS Internal *atabase.

-. 0nter and confir# a "assword for Cisco Secure PAPC3APS!C3APA5AP in the to"

&assword and Confir &assword fields.

6.  (Optional) To use the "assword $ou 7ust defined for PAP onl$& click the Separate

(C%A&S,C%A&AA&) checkbo,& and define a se"arate "assword for those

authentication "rotocols.8. 9se the scroll bar on the right side of the Edit  window to scroll down to the TACACS+

Settings section.

Page 11: Cisco ACS

7/23/2019 Cisco ACS

http://slidepdf.com/reader/full/cisco-acs 11/12

:. Select the Shell (exec) checkbo,.

;. Select the Custo# Attributes checkbo,& then enter one of the following custo# Packeteer

attributes.

Page 12: Cisco ACS

7/23/2019 Cisco ACS

http://slidepdf.com/reader/full/cisco-acs 12/12

attribute *escription

access<touch =ives the user touch access to a PacketSha"er

access<look =ives the user look access to a PacketSha"er

role<<org>>touch

here <org> is a Polic$Center organi/ation na#e. This

attribute gives the user touch access to a Polic$Centerorgani/ation& #ost t$"icall$ the ad#inistrator?s &C 

organi/ation.

role<<org>>l

ook 

here <org> is a Polic$Center organi/ation na#e. This

attribute gives the look touch access to a Polic$Center

organi/ation.

'@. Click Subit to save $our settings.