Cisco Systems 3.3 Manual De Usuario
Chapter 4 Network Configuration
Network Device Searches
4-8
User Guide for Cisco Secure ACS for Windows Server
78-16592-01
You can also choose to have Voice-over-IP (VoIP) accounting information logged
remotely, either appended to the RADIUS Accounting log, in a separate VoIP
Accounting log, or both.
remotely, either appended to the RADIUS Accounting log, in a separate VoIP
Accounting log, or both.
Other Features Enabled by System Distribution
Beyond basic proxy and fallback features, configuring a Cisco Secure ACS to
interact with distributed systems enables several other features that are beyond the
scope of this chapter. These features include the following:
interact with distributed systems enables several other features that are beyond the
scope of this chapter. These features include the following:
•
Replication—For more information, see
•
RDBMS synchronization—For more information, see
.
•
Remote and centralized logging—For more information, see
.
Network Device Searches
You can search for any network device configured in the Network Configuration
section of the Cisco Secure ACS HTML interface.
section of the Cisco Secure ACS HTML interface.
This section contains the following topics:
•
•
Network Device Search Criteria
You can specify search criteria for network device searches. Cisco Secure ACS
provides the following search criteria:
provides the following search criteria:
•
Name—The name assigned to the network device in Cisco Secure ACS. You
can use asterisks (*) as wildcard characters. For example, if you wanted to
find all devices with names starting with the letter M, you would enter “M*”
can use asterisks (*) as wildcard characters. For example, if you wanted to
find all devices with names starting with the letter M, you would enter “M*”