Cisco Systems OL-24201-01 Camera Accessories User Manual


 
Contents
xix
User Guide for Cisco Secure Access Control System 5.3
OL-24201-01
Using Log Targets 19-2
Logging Categories 19-2
Global and Per-Instance Logging Categories 19-4
Log Message Severity Levels 19-4
Local Store Target 19-5
Critical Log Target 19-7
Remote Syslog Server Target 19-8
Monitoring and Reports Server Target 19-10
Viewing Log Messages 19-10
Debug Logs 19-11
ACS 4.x Versus ACS 5.3 Logging 19-12
APPENDIX
A AAA Protocols A-1
Typical Use Cases A-1
Device Administration (TACACS+) A-1
Session Access Requests (Device Administration [TACACS+]) A-2
Command Authorization Requests A-2
Network Access (RADIUS With and Without EAP) A-2
RADIUS-Based Flow Without EAP Authentication A-3
RADIUS-Based Flows with EAP Authentication A-3
Access Protocols—TACACS+ and RADIUS A-5
Overview of TACACS+ A-5
Overview of RADIUS A-6
RADIUS VSAs A-6
ACS 5.3 as the AAA Server A-7
RADIUS Attribute Support in ACS 5.3 A-8
RADIUS Access Requests A-9
APPENDIX
B Authentication in ACS 5.3 B-1
Authentication Considerations B-1
Authentication and User Databases B-1
PAP B-2
RADIUS PAP Authentication B-3
EAP B-3
EAP-MD5 B-5
Overview of EAP-MD5 B-5
EAP- MD5 Flow in ACS 5.3 B-5
EAP-TLS B-5