Cisco Systems Servers Manuale Utente

Pagina di 654
4-25
Cisco Secure ACS 3.0 for Windows 2000/NT Servers User Guide
78-13751-01, Version 3.0
Chapter 4      Setting Up and Managing Network Configuration
Proxy Distribution Table Configuration
Proxy Distribution Table Configuration 
This section begins with a description of the Proxy Distribution Table and then 
details the following Proxy Distribution Table configuration procedures:
 About the Proxy Distribution Table
 If you have Distributed Systems Settings enabled, when you click Network 
Configuration
, you will see the Proxy Distribution Table. 
Tip
To enable Distributed Systems Settings in the Cisco Secure ACS, click 
Interface Configuration, click Advanced Options, and then select the 
Distributed System Settings check box.
The Proxy Distribution Table comprises entries that show the character strings on 
which to proxy, the AAA Servers to proxy to, whether to strip the character string, 
and where to send the accounting information (Local/Remote, Remote, or Local). 
For more information about the proxy feature, see th
The entries you define and place in the Proxy Distribution Table can be considered 
turnstiles for each authentication request that Cisco Secure ACS receives from the 
AAA client. How the authentication request is defined in the Proxy Distribution 
Table depends on where it is to be forwarded. If a match to an entry in the Proxy 
Distribution Table that contains proxy information is found, Cisco Secure ACS 
forwards the request to the appropriate AAA server.
The Character String column in the Proxy Distribution Table always contains an 
entry of “(Default)”. The “(Default)” entry matches authentication requests 
received by the local Cisco Secure ACS server that do not match any other defined 
character strings. While you cannot change the character string definition for the 
“(Default)” entry, you can change the distribution of authentication requests 
matching the “(Default)” entry. At installation, the AAA server associated with