Chapter 4 Managing GSS User Accounts Through a Server
Overview
4-2
Cisco Global Site Selector Administration Guide
OL-10410-01
•
Clearing Statistics on the GSS
•
Disabling on a GSS
Overview
The protocol is a security application that provides centralized
validation of users who are attempting to gain access to the GSS.
services are maintained in a relational database on a security daemon
running on a UNIX or Windows NT/Windows 2000 server.
provides for separate authentication, authorization, and accounting
(AAA) facilities between a GSS and the server. allows for
multiple access control servers (the security daemon) to provide the
AAA services. The Cisco Secure Access Control Server (ACS) is an example of
an AAA access control server.
uses TCP as the transport protocol for reliable delivery. Optionally,
you can configure the GSS to encrypt all traffic transmitted between the GSS
device and the server in the form of a shared secret.
When a user attempts to access a GSS device that is operating as a
client, the GSS forwards the user authentication request to the server
(containing the username and password). The server returns either a
success or failure response depending on the information in the server’s database.
Figure 4-1
shows a client GSS and a server configuration.
Figure 4-1
Simplified Example of Traffic Flow Between a GSS Client and a
Server
119124
Client Name
Server
(D-Proxy)
GSS 1
Protocol
Server
Client