Register your product to gain access to bonus material or receive a coupon.
Cisco's complete, authoritative guide to Authentication, Authorization, and Accounting (AAA) solutions with CiscoSecure ACS
This is the first complete, authoritative, single-source guide to implementing, configuring, and managing Authentication, Authorization and Accounting (AAA) identity management with CiscoSecure Access Control Server (ACS) 4 and 5. Written by three of Cisco's most experienced CiscoSecure product support experts, it covers all AAA solutions (except NAC) on Cisco routers, switches, access points, firewalls, and concentrators. It also thoroughly addresses both ACS configuration and troubleshooting, including the use of external databases supported by ACS. Each of this book's six sections focuses on specific Cisco devices and their AAA configuration with ACS. Each chapter covers configuration syntax and examples, debug outputs with explanations, and ACS screenshots. Drawing on the authors' experience with several thousand support cases in organizations of all kinds, AAA Identity Management Security presents pitfalls, warnings, and tips throughout. Each major topic concludes with a practical, hands-on lab scenario corresponding to a real-life solution that has been widely implemented by Cisco customers. This book brings together crucial information that was previously scattered across multiple sources. It will be indispensable to every professional running CiscoSecure ACS 4 or 5, as well as all candidates for CCSP and CCIE (Security or R and S) certification.
Part I - AAA and CiscoSecure ACS
1 Authentication Authorization Accounting (AAA) Authentication
2 CiscoSecure ACS Introduction to ACS
3 Getting Familiar with ACS 4.2 The 7 ACS Services
4 Getting Familiar with ACS 5.1 Differences between ACS 4 and ACS 5
5 Configuring External Databases with ACS Unknown User Policy
Part II - Administrative AAA
6 IOS Based Devices The Lines and Default Login
7 PIX and ASA Local Authentication of Telnet/SSH/HTTP
8 IOS Switches Introduction to 802.1x
9 Access Points Configuring SSID for Dot1x Authentication
10 Pix/ASA Introduction to Cut-through Proxy Authentication
11 Router Introduction to Auth-proxy
Part V - Remote Access
12 Routers and Access Servers Authenticating Remote Access VPN Sessions
13 Pix/ASA Authentication of Remote Access VPN Sessions
Part VI - ACS Advanced Configuration
14 ACS 4.2 Network Access Restriction
15 ACS 5.1 Replication
Includes EPUB, MOBI, and PDF
About Watermarked eBooks
This eBook includes the following formats, accessible from your Account page after purchase:
EPUBThe open industry format known for its reflowable content and usability on supported mobile devices.
MOBIThe eBook format compatible with the Amazon Kindle and Amazon Kindle applications.
PDFThe popular standard, used most often with the free Adobe® Reader® software.
This eBook requires no passwords or activation to read. We customize your eBook by discretely watermarking it with your name, making it uniquely yours.
Also available in other formats.
Get access to thousands of books and training videos about technology, professional development and digital media from more than 40 leading publishers, including Addison-Wesley, Prentice Hall, Cisco Press, IBM Press, O'Reilly Media, Wrox, Apress, and many more. If you continue your subscription after your 30-day trial, you can receive 30% off a monthly subscription to the Safari Library for up to 12 months. That's a total savings of $199.