Cisco Acs 5x User Guide
Here you can view all the pages of manual Cisco Acs 5x User Guide. The Cisco manuals for Control System are available online for free. You can easily download all the documents as PDF.
Page 41
2-9 User Guide for Cisco Secure Access Control System 5.3 OL-24201-01 Chapter 2 Migrating from ACS 4.x to ACS 5.3 Common Scenarios in Migration Step 3Perform bulk import of data into ACS 5.3. For more information on performing bulk import of ACS objects, see http://www.cisco.com/en/US/docs/net_mgmt/cisco_secure_access_control_system/5.3/sdk/ cli_imp_exp.html#wp1056244. The data from your other AAA servers is now available in ACS 5.3.
Page 42
2-10 User Guide for Cisco Secure Access Control System 5.3 OL-24201-01 Chapter 2 Migrating from ACS 4.x to ACS 5.3 Common Scenarios in Migration
Page 43
CH A P T E R 3-1 User Guide for Cisco Secure Access Control System 5.3 OL-24201-01 3 ACS 5.x Policy Model ACS 5.x is a policy-based access control system. The term policy model in ACS 5.x refers to the presentation of policy elements, objects, and rules to the policy administrator. ACS 5.x uses a rule-based policy model instead of the group-based model used in the 4.x versions. This section contains the following topics: Overview of the ACS 5.x Policy Model, page 3-1 Access Services, page 3-6 Service...
Page 44
3-2 User Guide for Cisco Secure Access Control System 5.3 OL-24201-01 Chapter 3 ACS 5.x Policy Model Overview of the ACS 5.x Policy Model For example, we use the information described for the group-based model: If identity-condition, restriction-condition then authorization-profile In ACS 5.3, you define conditions and results as global, shared objects. You define them once and then reference them when you create rules. ACS 5.3 uses the term policy elements for these shared objects, and they are...
Page 45
3-3 User Guide for Cisco Secure Access Control System 5.3 OL-24201-01 Chapter 3 ACS 5.x Policy Model Overview of the ACS 5.x Policy Model Policy Terminology Ta b l e 3 - 2 describes the rule-based policy terminology. Table 3-2 Rule-Based Policy Terminology Term Description Access service Sequential set of policies used to process access requests. ACS 5.x allows you to define multiple access services to support multiple, independent, and isolated sets of policies on a single ACS system. There...
Page 46
3-4 User Guide for Cisco Secure Access Control System 5.3 OL-24201-01 Chapter 3 ACS 5.x Policy Model Overview of the ACS 5.x Policy Model Simple Policies You can configure all of your ACS policies as rule-based policies. However, in some cases, you can choose to configure a simple policy, which selects a single result to apply to all requests without conditions. For example, you can define a rule-based authentication policy with a set of rules for different conditions; or, if you want to use...
Page 47
3-5 User Guide for Cisco Secure Access Control System 5.3 OL-24201-01 Chapter 3 ACS 5.x Policy Model Overview of the ACS 5.x Policy Model Types of Policies Ta b l e 3 - 3 describes the types of policies that you can configure in ACS. The policies are listed in the order of their evaluation; any attributes that a policy retrieves can be used in any policy listed subsequently. The only exception is the Identity group mapping policy, which uses only attributes from identity stores. Ta b l e 3 - 3...
Page 48
3-6 User Guide for Cisco Secure Access Control System 5.3 OL-24201-01 Chapter 3 ACS 5.x Policy Model Access Services Access Services Access services are fundamental constructs in ACS 5.x that allow you to configure access policies for users and devices that connect to the network and for network administrators who administer network devices. In ACS 5.x, authentication and authorization requests are processed by access services. An access service consists of the following elements: Identity...
Page 49
3-7 User Guide for Cisco Secure Access Control System 5.3 OL-24201-01 Chapter 3 ACS 5.x Policy Model Access Services Ta b l e 3 - 5 describes an example of a set of access services. Ta b l e 3 - 6 describes a service selection policy. If ACS 5.3 receives a TACACS+ access request, it applies Access Service A, which authenticates the request according to Identity Policy A. It then applies authorizations and permissions according to the shell/command authorization policy. This service handles all...
Page 50
3-8 User Guide for Cisco Secure Access Control System 5.3 OL-24201-01 Chapter 3 ACS 5.x Policy Model Access Services ACS accepts the results of the requests and returns them to the NAS. You must configure the external RADIUS and TACACS+ servers in ACS for ACS to forward requests to them. You can define the timeout period and the number of connection attempts. The ACS proxy remote target is a list of remote RADIUS and TACACS+ servers that contain the following parameters: IP Authentication port...