06.05.2013 Views

User Guide for Cisco Secure Access Control Server - Stewing Home

User Guide for Cisco Secure Access Control Server - Stewing Home

User Guide for Cisco Secure Access Control Server - Stewing Home

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Configuration-Specific <strong>User</strong> Group Settings<br />

5-12<br />

Note Up to five characters are allowed in the to x sessions box.<br />

c. Select the period <strong>for</strong> which the session quota is effective:<br />

per Day—From 12:01 a.m. until midnight.<br />

per Week—From 12:01 a.m. Sunday until midnight Saturday.<br />

<strong>User</strong> <strong>Guide</strong> <strong>for</strong> <strong>Cisco</strong> <strong>Secure</strong> <strong>Access</strong> <strong>Control</strong> <strong>Server</strong> 4.2<br />

Chapter 5 <strong>User</strong> Group Management<br />

per Month—From 12:01 a.m. on the first of the month until midnight on the last day of the<br />

month.<br />

Total—An ongoing count of session, with no end.<br />

Step 5 To save the group settings, that you have just made, click Submit.<br />

For more in<strong>for</strong>mation, see Saving Changes to <strong>User</strong> Group Settings, page 5-41.<br />

Step 6 To continue specifying other group settings, per<strong>for</strong>m other procedures in this chapter, as applicable.<br />

Configuration-Specific <strong>User</strong> Group Settings<br />

This section details procedures that you per<strong>for</strong>m only as applicable to your particular network-security<br />

configuration. For instance, if you have no token server configured, you do not have to set token card<br />

settings <strong>for</strong> each group.<br />

Note When you configure a vendor-specific variety of RADIUS <strong>for</strong> use by network devices, the RADIUS<br />

(IETF) attributes are available because they are the base set of attributes, that all RADIUS vendors use<br />

per the RADIUS IETF specifications.<br />

The web interface content corresponding to these procedures is dynamic and its appearance is based on:<br />

For a particular protocol (RADIUS or TACACS+) to be listed, at least one AAA client entry in the<br />

Network Configuration section of the web interface must use that protocol. For more in<strong>for</strong>mation,<br />

see Configuring AAA Clients, page 3-8.<br />

For specific protocol attributes to appear on a group profile page, you must enable the display of<br />

those attributes in the Interface Configuration section of the web interface. For more in<strong>for</strong>mation,<br />

see Displaying TACACS+ Configuration Options, page 2-6, or Displaying RADIUS Configuration<br />

Options, page 2-7.<br />

Caution If you are using SRACs in 4.0, you should be aware of certain issues regarding attribute merging, and<br />

overwriting DACLs and RADIUS attributes on a user or group level. You should not assign RADIUS<br />

attributes to an individual user (only as a last resort). Use group or SRACs to assign RADIUS attributes<br />

in the user’s group or profile levels. For more in<strong>for</strong>mation on how to select RAC, the authorization rules<br />

that you use to set up your network profiles, see Configuring an Authorization Rule, page 14-36.<br />

This section contains:<br />

Setting Enable Privilege Options <strong>for</strong> a <strong>User</strong> Group, page 5-13<br />

Setting Enable Privilege Options <strong>for</strong> a <strong>User</strong> Group, page 5-13<br />

Enabling Password Aging <strong>for</strong> the ACS Internal Database, page 5-15<br />

OL-14386-02

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!