- Cisco Secure ACS Introduction
- Installing Cisco Secure ACS 3.0 for Windows 2000/NT Servers
- Administering and Troubleshooting Cisco Secure ACS for Windows
- TACACS+ Overview
- RADIUS Overview
- Kerberos Overview
- Chapter Summary
- Cisco IOS Commands Presented in This Chapter
- Chapter Review Questions
- Case Study
Chapter Review Questions
The following review questions cover some of the key facts and concepts that were introduced in this chapter. Answers to these questions can be found in Appendix A, "Answers to Chapter Review Questions."
What authentication protocols are supported by Cisco Secure ACS for Windows?
Cisco Secure ACS for Windows can communicate with other ACS servers as masters, clients, or peers to enable what three strong distributed system features?
Which Windows NT service module has the primary responsibility for determining whether access should be granted and for defining the privileges associated with each user?
List the six steps required to install Cisco Secure ACS for Windows?
What protocol must you use to perform the configuration of Cisco Secure ACS for Windows?
When you want to configure reusable sets of authorization components to apply to one or more users or groups of users, which option from the Cisco Secure ACS for Windows main menu would you choose?
What system administration capabilities does the Cisco Secure ACS for UNIX enable for UNIX 2.3 DSM?
What operating system supports Cisco Secure ACS for Unix 2.3?
What are the first steps that are required to configure a Cisco IOS router to use TACACS+ with a Cisco Secure ACS for Windows server?
You will be configuring your Cisco IOS router for access to three different Cisco Secure ACS for Windows servers using TACACS+. What must you keep in mind as you prepare to configure the router for AAA service?
Which Cisco IOS command can you use to get a more meaningful output from debug commands?