Cisco Systems OL-24201-01 Camera Accessories User Manual


 
6-4
User Guide for Cisco Secure Access Control System 5.3
OL-24201-01
Chapter 6 Post-Installation Configuration Tasks
Configuring ACS to Manage Access Policies
Configuring ACS to Manage Access Policies
Table 6-3 lists the set of tasks that you must perform to manage access restrictions and permissions.
Configuring ACS to Monitor and Troubleshoot Problems in the
Network
Table 6-4 lists a set of configuration tasks that you must perform to get the Monitoring & Report Viewer
up and running.
Table 6-3 Managing Access Policies
Step No. Task Drawer Refer to...
Step 1 Define policy conditions. Policy Elements > Session
Conditions
Managing Policy Conditions,
page 9-1.
Step 2 Define authorization and
permissions.
Policy Elements > Authorization
and Permissions
Managing Authorizations and
Permissions, page 9-17.
Step 3 Define access services and
service selection policies.
Access Policies > Access
Services
To configure access
services:
Configuring Access
Services, page 10-11.
To configure access service
policies:
Configuring Access
Service Policies,
page 10-21.
To configure compound
conditions:
Configuring Compound
Conditions, page 10-40.
Table 6-4 Monitoring and Troubleshooting Configuration
Step No. Task Drawer Refer to...
Step 1 Configure data purge and
backup.
Monitoring Configuration >
System Operations > Data
Management > Removal and
Backup
Configuring Data Purging and
Incremental Backup, page 15-3.
Step 2 Specify e-mail settings. Monitoring Configuration >
System Configuration > Email
Settings
Specifying E-Mail Settings,
page 15-15.
Step 3 Configure collection filters. Monitoring Configuration >
System Configuration >
Collection Filters
Understanding Collection
Filters, page 15-16.