Index
IN-18
User Guide for Cisco Secure ACS for Windows Server
78-14696-01, Version 3.1
cascading
8-18
certificates
8-10
client configuration
8-22
components
overwriting (Caution)
8-22
overwriting (Note)
8-17
selecting
8-18
configuring
8-26
corrupted backups (Caution)
8-16
custom RADIUS dictionaries
8-10
disabling
8-29
external user databases
8-10
frequency
8-14
group mappings
8-10
immediate
8-24
implementing primary and secondary
setups
8-20
important considerations
8-15
in System Configuration
8-26
interface configuration
3-5
IP pools
8-10, 8-60
logging
8-17
manual initiation
8-24
master AAA servers
8-11
notifications
8-29
overview
8-9
partners
configuring
8-28
options
8-18
scheduling
8-26
scheduling options
8-18
selecting data
8-18
unsupported
8-10
user-defined RADIUS vendors
8-16
vs. backup
8-16
reports
See logging
Reports and Activity
configuring
9-17
CSV (comma-separated values) logs
9-11
in interface
1-26
See also logging
request handling
general
12-3
Windows NT/2000 user databases
12-4
requirements
hardware
2-2
network
2-4
operating system
2-2
system
2-2
third-party software
2-3
resource consumption
G-6
restarting services
8-2
restore
components restored
configuring
8-54
overview
8-54
filenames
8-53
in System Configuration
8-52