QUICK START GUIDE Quick Start Guide for Cisco Secure Access Control Server View 4.0 10. 11. 12. 13.



Similar documents
Cisco ISE Command-Line Interface

Symantec Database Security and Audit 3100 Series Appliance. Getting Started Guide

Enterprise Manager to Enterprise Console upgrade guide. Sophos Enterprise Manager version 4.7 Sophos Enterprise Console version 4.7.

HIGHSEC eid App Administration User Manual

RSA Security Analytics. S4 Broker Setup Guide

Integrated Citrix Servers

[The BSD License] Copyright (c) Jaroslaw Kowalski

McAfee Firewall Enterprise

Release Notes for. CounterPath Bria iphone Edition CounterPath Bria ipad Edition Version 3.1.0

Installing and Using the vnios Trial

VERITAS Backup Exec TM 10.0 for Windows Servers

NetVault : SmartDisk v1.0.1 Release Notes Contents

Maintaining the Content Server

VERITAS Backup Exec 9.1 for Windows Servers Quick Installation Guide

Hyper V Windows 2012 and 8. Virtual LoadMaster for Microsoft Hyper V on Windows Server 2012, 2012 R2 and Windows 8. Installation Guide

NetIQ Sentinel Quick Start Guide

Quick Start Guide. Sendio System Protection Appliance. Sendio 5.0

CA DLP. Release Notes for Advanced Encryption. r12.0

Barracuda Link Balancer Administrator s Guide

Avalanche Remote Control User Guide. Version 4.1.3

RealPresence Platform Director

Vantage RADIUS 50. Quick Start Guide Version 1.0 3/2005

Installing, Uninstalling, and Upgrading Service Monitor

Setting Up a Unisphere Management Station for the VNX Series P/N Revision A01 January 5, 2010

Installation Guide Supplement

User Manual. (updated December 15, 2014) Information in this document is subject to change without notice.

Reboot the ExtraHop System and Test Hardware with the Rescue USB Flash Drive

Gigabyte Management Console User s Guide (For ASPEED AST 2400 Chipset)

Getting Started with Vision 6

Release Notes for CounterPath X-Lite 4 for Windows Version 4.8

Managing Cisco ISE Backup and Restore Operations

Server Installation ZENworks Mobile Management 2.7.x August 2013

HP IMC Firewall Manager

Managing Software and Configurations

How To Set Up A Thermal Cycler With Veritilink Remote Management Software

HP A-IMC Firewall Manager

Altiris Task Server 6.0 Help

Configuring Virtual Blades

Administering Cisco ISE

Sharp Remote Device Manager (SRDM) Server Software Setup Guide

Transaction Vault Credit Card Driver for 3700 POS

Installing the Operating System or Hypervisor

Getting Started. Websense V10000 Appliance. v1.1

Symantec Integrated Enforcer for Microsoft DHCP Servers Getting Started Guide

User Manual. Page 2 of 38

Server Management 2.0


The SSL device also supports the 64-bit Internet Explorer with new ActiveX loaders for Assessment, Abolishment, and the Access Client.

JP1/Automatic Job Management System 3 - Definition Assistant Description, Operator's Guide and Reference

Heroix Longitude Quick Start Guide V7.1

FWS WiTDM Series KWA-O8800-I User Manual

Configuring SSL VPN on the Cisco ISA500 Security Appliance

Gigabyte Content Management System Console User s Guide. Version: 0.1


Symantec Backup Exec TM 11d for Windows Servers. Quick Installation Guide

Contents Notice to Users

HOMEROOM SERVER INSTALLATION & NETWORK CONFIGURATION GUIDE

Metalogix SharePoint Backup. Advanced Installation Guide. Publication Date: August 24, 2015

Synchronizer Installation

USER GUIDE WEB-BASED SYSTEM CONTROL APPLICATION. August 2014 Phone: Publication: , Rev. C

formerly Help Desk Authority Upgrade Guide

insync Installation Guide

Virtual LoadMaster for Microsoft Hyper-V

Web Remote Access. User Guide

Sophos Enterprise Console quick startup guide. Product version: 5.1 Document date: June 2012

Symantec Backup Exec 2010 R2. Quick Installation Guide

Dell Statistica Statistica Enterprise Installation Instructions

Installing and Configuring vcenter Support Assistant

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream

Backup Exec 15. Quick Installation Guide

Clearswift SECURE Exchange Gateway Installation & Setup Guide. Version 1.0

Server Installation Guide ZENworks Patch Management 6.4 SP2

Veritas Cluster Server Database Agent for Microsoft SQL Configuration Guide

CA Nimsoft Monitor. Probe Guide for IIS Server Monitoring. iis v1.5 series

PHD Virtual Backup for Hyper-V

Symbian User Guide for Cisco AnyConnect Secure Mobility Client, Release 2.4

Dell Statistica Document Management System (SDMS) Installation Instructions

Set Up Panorama. Palo Alto Networks. Panorama Administrator s Guide Version 6.0. Copyright Palo Alto Networks

Starting a Management Session

How To Set Up A Firewall Enterprise, Multi Firewall Edition And Virtual Firewall

Symantec NetBackup Backup, Archive, and Restore Getting Started Guide. Release 7.5

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

PC-Duo Web Console Installation Guide

Avaya VPN Client Software Release (build 022)

Backup & Disaster Recovery Appliance User Guide

DameWare Server. Administrator Guide

Minor corrective content service pack to address customer and software issues. * This release is no longer available.

SecureLinx Spider Duo Quick Start Guide

Installing Management Applications on VNX for File

Administrators Help Manual

VeriSign PKI Client Government Edition v 1.5. VeriSign PKI Client Government. VeriSign PKI Client VeriSign, Inc. Government.

CommandCenter Secure Gateway

Forcepoint Sidewinder, Virtual Appliance Evaluation for Desktop. Installation Guide 8.x. Revision A

Dominion KX II-101-V2

Freshservice Discovery Probe User Guide

Ekran System Help File

EMC Data Domain Management Center

Configuration Guide. Websense Web Security Solutions Version 7.8.1

The Tor VM Project. Installing the Build Environment & Building Tor VM. Copyright The Tor Project, Inc. Authors: Martin Peck and Kyle Williams

BaseManager & BACnet Manager VM Server Configuration Guide

Transcription:

QUICK START GUIDE Quick Start Guide for Cisco Secure Access Control Server View 4.0 This guide provides you with the information that you need to set up, install, and configure Cisco Secure Access Control Server (ACS) View. It contains: 1. Supplemental License Agreement, page 2 2. Notices, page 3 3. About Cisco Secure Access Control Server View, page 5 4. Licensing, page 6 5. System Specifications, page 11 6. Package Contents, page 12 7. Safety and Regulatory Compliance Information, page 12 8. Before Configuring ACS View, page 12 9. Running Setup to Configure ACS View, page 14 10. Accessing the ACS View CLI, page 16 11. Working with ACS View, page 19 12. Re-imaging the ACS View Appliance, page 41 13. FAQs, page 42

14. Related Documentation, page 42 15. Obtaining Documentation and Submitting a Service Request, page 42 1 Supplemental License Agreement SUPPLEMENTAL LICENSE AGREEMENT FOR CISCO SYSTEMS NETWORK MANAGEMENT SOFTWARE RUNNING ON THE CISCO 2120 HARDWARE PLATFORM IMPORTANT READ CAREFULLY: This Supplemental License Agreement (SLA) contains additional limitations on the license to the Software provided to Customer under the End User License Agreement between Customer and Cisco. Capitalized terms used in this SLA and not otherwise defined herein shall have the meanings assigned to them in the Software License Agreement. To the extent that there is a conflict among any of these terms and conditions applicable to the Software, the terms and conditions in this SLA shall take precedence. By installing, downloading, accessing or otherwise using the Software, Customer agrees to be bound by the terms of this SLA. If Customer does not agree to the terms of this SLA, Customer may not install, download, or otherwise use the Software. ADDITIONAL LICENSE RESTRICTIONS Installation and Use. The Cisco Secure Access Control Server View Software component of the Cisco 2120 Hardware Platform is pre-installed. CDs containing tools to restore this Software to the 2120 hardware are provided to Customer for reinstallation purposes only. Customer may only run the supported Cisco Secure Access Control Server View Software on the Cisco 2120 Hardware Platform designed for its use. No unsupported Software product or component may be installed on the Cisco 2120 Hardware Platform. Software Upgrades, Major and Minor Releases. Cisco may provide Cisco Secure Access Control Server View Software updates and new version releases for the Cisco ADE 2120 Hardware Platform. If the Software update and new version releases can be purchased through Cisco or a recognized partner or reseller, the Customer should purchase one Software update for each Cisco ADE 2120 Platform. If the Customer is eligible to receive the Software update or new version release through a Cisco extended service program, the Customer should request to receive only one Software update or new version release per valid service contract. 2

Reproduction and Distribution. Customer may not reproduce nor distribute software. DESCRIPTION OF OTHER RIGHTS AND LIMITATIONS Please refer to the Cisco Systems, Inc., End User License Agreement. http://www.cisco.com/en/us/docs/general/warranty/english/eu1ken_.html 2 Notices The following notices pertain to this software license. OpenSSL/Open SSL Project This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit (http://www.openssl.org/). This product includes cryptographic software written by Eric Young (eay@cryptsoft.com). This product includes software written by Tim Hudson (tjh@cryptsoft.com). License Issues The OpenSSL toolkit stays under a dual license, i.e. both the conditions of the OpenSSL License and the original SSLeay license apply to the toolkit. See below for the actual license texts. Actually both licenses are BSD-style Open Source licenses. In case of any license issues related to OpenSSL please contact openssl-core@openssl.org. OpenSSL License: Copyright 1998-2007 The OpenSSL Project. All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions, and the following disclaimer in the documentation and/or other materials provided with the distribution. 3

3. All advertising materials mentioning features or use of this software must display the following acknowledgment: This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit (http://www.openssl.org/). 4. The names OpenSSL Toolkit and OpenSSL Project must not be used to endorse or promote products derived from this software without prior written permission. For written permission, please contact openssl-core@openssl.org. 5. Products derived from this software may not be called OpenSSL nor may OpenSSL appear in their names without prior written permission of the OpenSSL Project. 6. Redistributions of any form whatsoever must retain the following acknowledgment: This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit (http://www.openssl.org/). THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT AS IS ' AND ANY EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. This product includes cryptographic software written by Eric Young (eay@cryptsoft.com). This product includes software written by Tim Hudson (tjh@cryptsoft.com). Original SSLeay License: Copyright 1995-1998 Eric Young (eay@cryptsoft.com). All rights reserved. This package is an SSL implementation written by Eric Young (eay@cryptsoft.com). The implementation was written so as to conform with Netscapes SSL. This library is free for commercial and non-commercial use as long as the following conditions are adhered to. The following conditions apply to all code found in this distribution, be it the RC4, RSA, lhash, DES, etc., code; not just the SSL code. The SSL documentation included with this distribution is covered by the same copyright terms except that the holder is Tim Hudson (tjh@cryptsoft.com). Copyright remains Eric Young s, and as such any Copyright notices in the code are not to be removed. If this package is used in a product, Eric Young should be given attribution as the author of the parts of the library used. This can be in the form of a textual message at program startup or in documentation (online or textual) provided with the package. 4

Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. 3. All advertising materials mentioning features or use of this software must display the following acknowledgement: This product includes cryptographic software written by Eric Young (eay@cryptsoft.com). The word cryptographic can be left out if the routines from the library being used are not cryptography-related. 4. If you include any Windows specific code (or a derivative thereof) from the apps directory (application code) you must include an acknowledgement: This product includes software written by Tim Hudson (tjh@cryptsoft.com). THIS SOFTWARE IS PROVIDED BY ERIC YOUNG AS IS AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. The license and distribution terms for any publicly available version or derivative of this code cannot be changed. i.e. this code cannot simply be copied and put under another distribution license [including the GNU Public License]. 3 About Cisco Secure Access Control Server View ACS View is a comprehensive reporting and event notification application that extracts core logging information from ACS servers. It retrieves log and configuration data from one or more ACS servers in your network to provide reports and event notification. 5

Key Features of ACS View Table 1 lists the key features of ACS View. Table 1 Key Features of ACS View Feature Report Generation Configurable triggers or threshold conditions against ACS data to generate alerts Troubleshooting Real-Time and Historical Data Collection Description Provides a variety of interactive reports, which are formatted as tables, graphs, and charts, that help you analyze and correlate log, configuration, and diagnostic data from ACS servers. Allows you to schedule reports to be generated at specific periods, and to design your own dynamic reports based on your requirements. Triggers alerts based on data thresholds that you define to track critical conditions in ACS servers. Provides reports, tools, and utility that help troubleshooting ACS servers. Collects live as well as historical data from ACS servers on demand and at scheduled intervals. 4 Licensing You must have a valid license to add the ACS servers in your network to ACS View. ACS View performs a license check to verify that the total number of ACS servers that are registered with ACS View falls within the number of ACS servers specified in the license file. If the number of ACS servers registered with ACS View is higher than the ACS servers that you are licensed to use, ACS View stops collecting data from the additional ACS servers, starting from the first ACS server that you registered with ACS View. ACS View supports two types of licenses: Evaluation Offers a free 90-day trial. ACS View stops collecting data from ACS serves after the evaluation period of 90 days. You do not require the Unique Device Identifier (UDI) for obtaining an evaluation license. Purchase Offers a permanent, node-locked license that you can install only on the appliance for which the license was issued, by using its UDI. 6

Each ACS server in your network counts as one license in ACS View. A secondary or backup ACS server also counts as one license. If you have an ACS server in your network that sends logs to a remote ACS server, this remote ACS server also counts as one license. The license file that you receive indicates the number of servers that you are licensed to use, in the ACS count (COUNT) column. The ACS Count column in the license file appears: For an Evaluation license: INCREMENT ACSCOUNT cisco 4.0 31-may-2008 uncounted \ VENDOR_STRING="<COUNT>10</COUNT> <UDI>ANY</UDI>" HOSTID=ANY \ NOTICE="<LicFileID>12345</LicFileID><LicLineID>0</LicLineID> \ <PAK>dummyPak</PAK>" SIGN="0059 E534 CBFF A6AC F1C0 7F48 A8F4 \ 024A 7DA9 83CE EC3E C807 480E 83F0 4E81 0403 20F5 DB68 D50A \ 74C6 8AD8 CB4D 9988 ED15 218D E90C 49DA 0C2A 9E46 5615" For a Purchase license: INCREMENT ACSCOUNT cisco 4.0 permanent uncounted \ VENDOR_STRING="<COUNT>10</COUNT> <UDI>ADE-1010123455</UDI>" \ HOSTID=ANY \ NOTICE="<LicFileID>23456</LicFileID><LicLineID>0</LicLineID> \ <PAK>dummyPak</PAK>" SIGN="0ED3 F00C 2175 6EDA EF19 199C 33D6 \ 0DFD A880 7640 96CC E3FC 81D0 A122 E03A 0C14 FF72 8037 3497 \ 266D E669 3B36 17D2 9823 0357 50FD 03A2 14CE FDCD DA39" Note Ensure that you back up a version of your license file for use if you have to re-image your ACS View appliance. For more information, see: Evaluation License Purchase License How to Obtain and Install Your Licenses Evaluation License An Evaluation license is a trial license that you can use to evaluate ACS View over a period of 90 days. Using the ACS View evaluation license, you can manage up to 10 ACS servers. After the 90-day validity period expires, you cannot use the data-collection feature. You can, however, log in to ACS View and generate reports on the available data. To continue to effectively use ACS View, you must obtain a Purchase license. 7

Note If you overwrite an evaluation license with a purchase license, the evaluation license is deactivated. You cannot install more than one evaluation license on ACS View. Purchase License A Purchase license is a permanent license that you can use to deploy ACS View. This license is node-locked with the UDI of the appliance; it ensures that this license is used only on the appliance for which it is issued. The two types of purchase licenses are: Base When you obtain a base purchase license, you can collect data from two ACS servers in your network. Add-On After you receive a base purchase license, you must purchase an add-on license to collect and process data from more ACS servers in your network. You can request any number of licenses to match your server requirements. How to Obtain and Install Your Licenses This section describes how you can obtain an Evaluation or a Purchase license and deploy it in your network: Obtaining Licenses Installing Licenses Obtaining Licenses To obtain your license file, you must provide the UDI. However, you do not require the UDI for obtaining an evaluation license. Follow this procedure to obtain your UDI from the CLI, and generate a license file. Step 1 Step 2 Access the ACS View CLI. In the exec mode, enter: acsview/admin# show udi This command returns information on the Serial Product ID (SPID), Version ID (VPID), and the appliance serial number. 8

For example: acsview/admin# show udi SPID: CiscoAcsView VPID: V01 Serial: 123455 Here, the UDI is CiscoAcsView123455. Note The UDI includes SPID and the serial number of the appliance. It does not include the Version ID. Step 3 Decide if you want to obtain an Evaluation license or a Purchase license. To obtain an Evaluation license, follow this: a. Access this link: http://www.cisco.com/go/license. You must have a valid Cisco.com account to log in to this site. The Product License Registration website appears. b. Click the link under the Licenses Not Requiring a Product Authorization Key (PAK) section. c. From the list of available licenses, choose the Evaluation license for ACS View. d. Review the information, and click Submit. After you complete the procedure, an evaluation license is generated and sent to you by e-mail. To obtain a Purchase license, follow this procedure: a. Keep your PAK handy. The PAK is an alphanumeric number that is available on the Claims Certificate. b. Access this link: http://www.cisco.com/go/license. Step 4 You must have a valid Cisco.com account to log in to this site. The Product License Registration website appears. c. Complete the steps on the Product License Registration page. After you provide your PAK, UDI, and e-mail address in the Product License Registration page, a license file is generated and sent to you by e-mail. After you receive your license file, log in to ACS View and install the license file by using the procedure in the subsequent section. Installing Licenses After obtaining a license file, you must install the file on the ACS View server. 9

Note Before installing your license file, ensure that you back up your licenses in case you have to re-image ACS View. To install an Evaluation or a Purchase license file: Step 1 Step 2 Step 3 Once you receive your license file, save each file to the server on which you plan to access the ACS View GUI. Launch your web browser on that system. In the browser address bar, enter: https://{servername.domain ip_address} Step 4 Step 5 Step 6 servername Identifies the server on which you installed ACS View by its hostname. domain Identifies the domain name. Enter this parameter only when you specify the ACS View server by its hostname. ip_address Identifies the server on which you installed ACS View by its IP address. Log in with the administrator credentials. Choose System Administration > Server Management > License. Enter the path to the local directory in which you saved the license file; optionally, click Browse. Step 7 Click Upload. The License Details area summarizes your: License ID Your unique license ID. Licensed Host The UDI of the ACS View appliance. ACS Server Count The number of ACS servers the license supports. Expiry Days The license expiry period. An Evaluation license expires in 90 days; a Purchase license never expires. Note You can view the number of ACS Server licensed in a ACS View server by clicking About on the top-right corner of the ACS View Dashboard. 10

5 System Specifications ACS View comprises an appliance, the Cisco Application Deployment Engine (ADE) 2120, which runs on a Linux operating system, and the ACS View server software. The software for ACS View is preloaded on the appliance. Table 2 lists the system specifications for ACS View: Table 2 System Specifications for ACS View Component Hard Disk Drive System Memory Microprocessor I/O Ports Media Server Requirements Specification 500 GB 4 GB Intel Core 2 Duo 2.13-GHz processor with an 1066-MHz front side bus (FSB) and 2 MB of Layer 2 cache USB and Serial Ports DVD-ROM N/A Table 3 lists the operating systems and browsers that support ACS View. Table 3 Supported Operating Systems and Browsers Component Version Client Operating System Windows XP Windows Vista Business Edition Supported Browsers Windows Vista Business Edition Mozilla Firefox 2.0.0.11 Microsoft Internet Explorer Version 7.0 Windows XP Mozilla Firefox 2.0.0.11 Microsoft Internet Explorer Version 6.0 and 7.0 11

6 Package Contents The package includes: ACS View appliance that is loaded with the software Power cord Rack mount kit A Recovery CD-ROM Regulatory Compliance and Safety Information (RCSI) Document Cisco Information Packet Warranty Card Quick Start Guide 7 Safety and Regulatory Compliance Information Before working with ACS View, read the Regulatory Compliance and Safety Information (RCSI) for the Application Deployment Engine 1010/2120 document that ships with your appliance. This document is also available on Cisco.com at: http://www.cisco.com/en/us/docs/net_mgmt/application_deployment_engine/ade/1010_2120/regulat ory/compliance/adercsi.html 8 Before Configuring ACS View You will need to use a serial console, or keyboard and monitor that are connected to the appliance to set up the Cisco Secure ACS View appliance. Figure 1 shows the front panel of the ACS View appliance. 12

Figure 1 Front Panel View of ACS View Appliance 1 2 4 6 3 5 231108 1 USB port 4 Hard disk drive activity LED 2 Power button 5 NIC1 LED 3 ACS View appliance power LED 6 NIC2 LED Note The unlabeled LED to the left of the callout #3 is the hazard or warning light. 13

Figure 2 shows the cable connectors that are available on the rear panel of the ACS View appliance. Figure 2 Cable Connectors on Rear of ACS View Appliance 1 2 4 7 8 10 11 3 5 6 9 231107 1 AC power receptacle 7 Network Interface Card 2 port LED (activity) 2 Mouse receptacle 8 Network Interface Card 2 port LED (link) 3 Keyboard receptacle 9 Two USB ports 4 Serial console port (EIA/TIA-232) 10 Network Interface Card 1 port (10/100/1000 Mbps) or Ethernet 0 5 Video (VGA) port 11 PCI adapter card slot (expansion) 6 Network Interface Card 2 (10/100/1000 Mbps) port or Ethernet 1 Push the power button (See callout #2 in Figure 1) on the front panel of the appliance to power up the appliance. After the appliance boots, you can run setup to configure basic bootstrap parameters. For more information on installing the ACS View appliance, see the Installation and Setup Guide for ACS View 4.0; pay special attention to the safety warnings and safety guidelines in the document. 9 Running Setup to Configure ACS View The setup process is a one-time configuration task. You must power up the appliance before you configure ACS View. 14

To configure ACS View appliance: Step 1 Step 2 Power up the ACS View appliance. The login prompt appears: localhost login Enter setup at the login prompt. Enter the relevant information as described in Table 4. Table 4 Setup Command Parameters Setup Command Parameters Hostname IP Address Network Mask Default Gateway IP Domain Name Name Server Address Username Password Description Enter the hostname of the ACS View server. Enter the IP address. Enter a valid mask. Enter a valid IP address of the default gateway of your subnet or network. Enter the domain name of the ACS View server. Enter the IP address of the name server of your network. Enter username. Enter the password for the administrator user. Figure 3 shows a sample output of the setup command. Figure 3 Sample Output of the Setup Command localhost login: setup Enter hostname[]: acs-view-1 Enter IP address[]: 209.165.200.225 Enter IP default netmask[]: 255.255.255.0 Enter IP default gateway[]: 209.165.200.1 Enter IP default DNS domain[]: yourcompany.com Enter Primary nameserver[]: 209.165.200.254 Add/Edit another nameserver? Y/N : n Enter username [admin]: admin Enter password: Enter password again: 15

Pinging the gateway... Pinging the primary nameserver... Do not use Ctrl-C from this point on... Appliance is configured Installing applications... Installing acsview... Generating configuration... Rebooting... The appliance reboots with the application loaded. You can now start working with ACS View. Note If you enter an incorrect value, exit the setup by pressing Ctrl-C, and then rerun the setup. 10 Accessing the ACS View CLI Before accessing the ACS View CLI, review the tasks that you should have completed during hardware installation, including starting up the ACS View server. Complete these tasks before you configure the ACS View appliance. For information on this process, see the Installation and Setup Guide for Cisco Secure Access Control Server View 4.0. After you set up the ACS View server, log in. To log in to ACS View and access the CLI, use a Secure Shell (SSH) client or the console port. You can log in from a Windows PC running Windows XP/Vista, from a PC running Linux, or from any terminal device that is compatible with VT100 or ANSI characteristics. VT100-type and ANSI devices let you use cursor-control and cursor-movement keys: Left Arrow, Up Arrow, Down Arrow, Right Arrow, Delete, and Backspace. The CLI detects the use of the cursor-control keys and automatically uses the optimal device characteristics (see the subsequent section for more information). To exit the CLI, enter the exit command from the EXEC mode. If you are currently in one of the configuration modes and you want to exit the CLI, use end, exit, or Ctrl-Z to return to the EXEC mode, and then enter the exit command. This section describes: Supported Hardware and Software Platforms, page 17 Opening the CLI with Secure Shell, page 17 Opening the CLI by Using a PC Locally, page 18 16

Supported Hardware and Software Platforms The following valid terminal types can access the ACS View appliance running the ACS View server: 1178 2621 5051 6053 8510 altos5 amiga ansi apollo Apple_Terminal att5425 ibm327x kaypro vt100 and so on (see the terminfo database for a complete listing). You can also access the ACS View server via an SSH client or through a console. Opening the CLI with Secure Shell The following example shows you how to log in with a Secure Shell (SSH) client (connecting to a wired WAN) via a PC by using Windows XP. Assuming that the ACS View server has already been preconfigured through the setup utility to accept an Admin user, log in as Admin. To log in: Step 1 Step 2 Step 3 Step 4 Use any SSH client and start an SSH session. The SSH window appears. Press Enter or the Spacebar to connect. The Connect to Remote Host window appears. Enter the Host Name, User Name, Port Number, and Authentication Method. Click Connect, or press Enter. The Enter Password window appears overlapping the Connect to Remote Host window. 17

Step 5 Step 6 Enter your assigned password for the administrator. The SSH with the Add Profile window appears. You can also enter a profile name in the text box and click Add to Profile. Otherwise, click the Close button on the Add Profile window. The ACS View server prompt acsview/admin# appears. You can now enter ACS View CLI commands. Opening the CLI by Using a PC Locally If you need to configure the ACS View appliance locally (without connecting to a wired LAN), you can connect a PC to the ACS View appliance console port by using a null-modem cable. To open the CLI by connecting to the console port: Step 1 Step 2 Step 3 Step 4 Step 5 Connect a null-modem cable to the console port on the ACS View server and to COM port on your PC. Set up a terminal emulator to communicate with the ACS View server. Use the following settings for the terminal emulator connection: 9600 baud, 8 data bits, no parity, 1 stop bit, and no flow control. When the terminal emulator appears, press Enter. At the window, enter your username, then press Enter. Enter the password, then press Enter. When the CLI appears, you can enter CLI commands to configure the ACS View appliance. Note For more information on the ACS View commands, see the User Guide for Cisco Secure Access Control Server View 4.0. 18

11 Working with ACS View This section describes various functionalities available in ACS View. It contains: Getting Started with ACS View, page 19 Configuring ACS View for Data Collection, page 33 Generating Reports and Alerts in ACS View, page 39 Managing Data, page 39 Getting Started with ACS View This section describes how to get started with ACS View. It contains: Logging In and Logging Out, page 19 Installing Licenses, page 20 Adding ACS Servers to ACS View, page 21 Checking Status of ACS Servers, page 24 Generating Certificates, page 25 Adding Users to ACS View, page 28 Defining Password Policy, page 30 Configuring ACS View for E-mail Notifications, page 31 Logging In and Logging Out To log in to ACS View: Step 1 Step 2 Launch a web browser. In the browser address bar, enter: https://{servername.domain ip_address} servername Identifies the server on which you installed ACS View using its hostname. domain Identifies the domain name. You must mention this parameter only when you specify the hostname of the ACS View server. ip_address Identifies the server on which you installed ACS View using IP address. 19

Figure 4 shows the ACS View login screen that appears. Figure 4 Login Screen 203827 Step 3 Log in with the administrator credentials that you entered while initially configuring ACS View. To log out, click Logout in the upper-right corner of the ACS View window. Installing Licenses Before installing your license file, ensure that you back up your licenses in case you have to re-image ACS View. To install an Evaluation or a Purchase license file: Step 1 Step 2 Step 3 Choose System Administration > Server Management > License. Enter the path to the local directory in which you saved the license file; or, click Browse. Click Upload. 20

Figure 5 shows the License page. Figure 5 Installing License Adding ACS Servers to ACS View To add ACS servers to ACS View: Step 1 Step 2 Choose System Administration > ACS Servers Configuration > Server List. The ACS Servers page appears. Click Add. 21

Figure 6 shows the Add ACS Server page that appears. Figure 6 Add ACS servers Step 3 Enter the relevant information as described in Table 5. 22

Table 5 Add ACS Server Page Parameters Server Name IP Address Admin Username Description Enter the name of the ACS server. Enter the IP Address of the ACS server. Enter a valid username with administrator privilege. Note Ensure that the ACS admin user has the Administrator privileges for Support Operations enabled in the ACS. For more information, see the User Guide for Cisco Secure Access Control Server View 4.0. Admin User password ACS Time zone ACS Platform Transport for Administration Access Configuration Master ACS Log Settings Remote Logging Configuration Date Format for CSV log Enter the password of the specified administrator user. Choose the appropriate time zone from the list. This is the Time Zone configured in ACS. This is the time zone of the Windows application on which ACS runs. Specify if you are using ACS Solution Engine or ACS Windows. Choose the web access mode (HTTP or HTTPS) as configured in the ACS server. Click Yes if you want to consider this ACS server as the master ACS configuration server; otherwise, click No. Specify if the ACS server stores the logs in a remote server. Click the Does not log remotely radio button if the ACS server stores the logs in itself. Click the Logs remotely to ACS radio button if the ACS server redirects the logs to a remote server. Then, choose the remote server from the drop-down list. Click the appropriate date format as configured in ACS at System Configuration > Date Format Control > Date Format Selection. 23

Table 5 Add ACS Server Page (continued) Parameters Time Zone for Syslog Description Click GMT Time or Local Time for syslog depending on the time zone as configured in the ACS server at System Configuration > Date Format Control > Time Zone Selection For Syslog. This version is only available from ACS 4.2 onwards. For earlier ACS versions, choose GMT. Note You must configure the Date Format and the Syslog Time Zone in ACS View as configured in ACS. If you click the wrong options, the data that ACS View generates will be skewed. For more information, see the User Guide for Cisco Secure Access Control Server 4.2. Step 4 Click Save to finish. Checking Status of ACS Servers After you add an ACS server to ACS View, we recommend that you verify the connectivity of the ACS server. To verify the status: Step 1 Step 2 Choose System Administration > ACS Server Configuration > Server List. The ACS Servers page appears. Click the radio button corresponding to the ACS server whose status you want to verify. 24

Step 3 Click Get Status. Figure 7 shows a sample of the Server Connectivity page that appears. Figure 7 ACS Server Status Generating Certificates The initial installation and setup process for ACS View creates a self-signed certificate that the ACS View server uses for secure SSL communication with the client browser. This certificate uses the hostname of the ACS View appliance as the common name (issuer and subject). During the initial setup process, only the hostname is populated in the certificate. Subsequently, you can update other certificate parameters, such as country, state, hostname, and e-mail address, from the GUI. The certificate that ACS View generates is valid for five years. If you are an admin user, you can also install a signed certificate that a third-party Certification Authority (CA) might issue. This section describes: Generating a Self-Signed Certificate, page 26 Installing a Third-Party Certificate, page 27 25

Generating a Self-Signed Certificate To generate a self-signed certificate: Step 1 Step 2 Choose System Administration > Server Management > Certificate. The Certificate page appears. Click Generate Self-Signed Certificate. Figure 8 shows the Generate Certificate page that appears. Figure 8 Generate Certificate Step 3 Enter the relevant information as shown in Table 6. Table 6 Generating a Self-signed a Certificate Field Common Name Organization Name Organization Unit Output Password Challenge Password Description Enter your hostname Enter the name of the organization Enter the unit of the organization Enter the password that you want to assign for this certificate. Confirm the output password again Step 4 Click Generate. 26

Step 5 To activate the certificate, restart all the processes on the ACS View server. To restart the server from the: GUI Choose System Administration > System Reports > Process Status, and click Restart ACS View Server. CLI Access the CLI in the EXEC mode, and run these commands: process stop all process start all Note The process start all command may at times span more than one instance of the same process. We recommend, therefore, that to restart all processes, you enter: process stop all process start AppServer By using the process start AppServer command, you can restart all processes related to the ACS View server. Installing a Third-Party Certificate You can install a security certificate that a third-party Certification Authority might have issued. This ACS View release only supports PKCS12 certificates. Before installing a third-party certificate, ensure that the certificate is of this type. To install a signed third-party certificate: Step 1 Step 2 Choose System Administration > Server Management > Certificate. The Certificate page appears. Click Install Certificate. 27

Figure 9 shows the Install Certificate page that appears. Figure 9 Install Certificate Step 3 Enter the relevant information as described in Table 7. Table 7 Installing a Third-Party Certificate Field Server Certificate Format Server Certificate File Private Key Password Confirm Private Key Password Description Display only. Shows the PKCS12 certificate type. Enter the path to the local directory in which you saved the certificate file; or, click Browse. Enter a private password key, which can be up to 32 characters. Confirm the private key password. Step 4 Click Install. Adding Users to ACS View ACS View supports two kinds of user roles: Administrator and operator. While the administrator can perform all the tasks in ACS View, the operator can only configure thresholds for alerts and run reports. 28

To add a new user to ACS View: Step 1 Step 2 Choose System Administration > User Management > Users. The User Management page appears. Click the Add. Figure 10 shows the User Information dialog box that appears. Figure 10 Add User Step 3 Enter the relevant information as described in Table 8. Table 8 Adding Users Parameters Name Password Confirm Password State Role E-mail Address Descriptions Specify a username. Username is an alphanumeric string that can take up to 31 characters. Specify a password. Password should comply to the password policy as described in the Defining Password Policy, page 30. Specify the password that you entered in the password field. Select Enable to enable this user. Else, select Disable. Select a role from the drop-down list. Specify the e-mail address of the user. 29

Step 4 Click Save to finish. Defining Password Policy Password policy configuration is stored in the ACS View server. You can use ACS View to define and update the password policy information. To define a password policy: Step 1 Choose System Administration > User Management > Password Policy. Figure 11 shows the Password Policy page that appears. Figure 11 Password Policy Step 2 Enter the relevant information as described in Table 9. 30

Table 9 Password Policy Password Policy Minimum length Required Characters Password Never Expiry Password Validity Password Expiry Warning Days Previous Password Allowed Password never locked out Number of Invalid logins Description Specifies the minimum length of the password. The password can contain up to 40 alphanumeric characters. Specifies that the password must: Not contain the username as part of it. Contain lowercase and uppercase characters. Contain numeric characters. Contain non-alphanumeric characters. Check the check boxes to select each option. Check the check box to set the password never to expire. Enter the validity of the password in terms of the number of days. For an Evaluation license it is by default 90 days. Enter the number of days in advance you require to be warned on password expiry to take the necessary action. Check the check box to allow login using the previous password. Check the check box to not to lock the account following invalid logins. Enter the number of invalid logins allowed before the account is locked. Step 3 Click Save to finish. Configuring ACS View for E-mail Notifications You can configure ACS View to notify you via e-mail when reports are generated based on a schedule, when alerts are generated based on a threshold condition, or both. 31

To configure ACS View for e-mail notifications: Step 1 Choose System Administration > Server Management > System Settings. Figure 12 shows the System Settings page appears. Figure 12 Configure E-Mail Step 2 Step 3 Step 4 Step 5 In the Session Idle Timeout filed, enter the duration at the end of which you want to set the session timed out. In the Mail Server field, enter the IP address or the hostname of the outgoing mail server. In the From Address field, enter the e-mail address from which you want to receive notifications. To select the users to whom to send the e-mail notifications, click Select. A dialog box appears with a list of available users. Note Step 6 The users who do not have e-mail addresses will not receive e-mail notifications from ACS View. Using the forward arrows, click the usernames to move them from the Available pane to the Selected pane. You can also double-click the usernames to move them between the panes. Note To select multiple users, press Ctrl as you click them with the mouse. You can also move the entire list of users from the Available pane to the Selected pane, and vice versa, using the double arrows. Step 7 Click Submit. The usernames that you select appear in the Notify Users field. 32

Step 8 Click Save to finish. You have now configured ACS View to send e-mail to the specified users. Configuring ACS View for Data Collection ACS View collects log and configuration data from ACS servers. ACS View retrieves: Log data via syslog, which is the primary mechanism for data retrieval. Log and configuration data via package.cab downloads by using HTTP. Log data refers to information related to the functioning of ACS servers, such as starting or stopping of the server, requests to the server, and internal events. Some events that the ACS logs capture are failed attempts, passed authentication, RADIUS accounting, and TACACS accounting. Configuration data refers to information on ACS configuration that ACS View retrieves from the ACS server that is designated as Config Master. Configuration data includes Network Access Profile (NAP), Network Access Device (NAD), Network Device Group (NDG), and information on ACS users and administrators. ACS View does not receive any configuration data if you do not specify any ACS server as Config Master. ACS View stores log and configuration data in its database, and uses it to generate various reports and alerts. Caution You need to configure syslogs and comma-separated value CSV logs properly in ACS. Else, the report that you get will contain wrong data. For ACS View to collect data, you must also enable the mandatory attributes in ACS. For more information, see the User Guide for Cisco Secure Access Control Server View 4.0. This section describes: Data Collection Using Syslog, page 33 Data Collection Using package.cab, page 34 Data Collection Using Syslog Syslog is the primary mechanism that ACS View uses to collect dynamic data from ACS servers. The ACS servers that are configured in ACS View sends syslogs to ACS View for every new log record in ACS servers. You need to configure syslog in ACS for this. You need to configure ACS View in ACS to receive syslog messages for every new log record from ACS servers. 33

To configure ACS to send syslog messages to ACS View: Step 1 Log in to ACS 4.1.4 or ACS 4.2. Step 2 Choose System Configuration > Logging. The Logging Configuration page appears. Step 3 In the Syslog column of the ACS Reports area, click Configure corresponding to the specific report. The Edit page appears. Step 4 For each syslog report that you enable, check the check box in the Enable Logging area. For example, when configuring the Failed Attempts report, check the Log to Syslog Failed Attempts Report check box. Note Step 5 Step 6 Step 7 We recommend that you enable all syslog reports in ACS. In the Select Columns To Log area, choose an attribute from the Attributes column, and move it to the Logged Attributes column. For a list of the mandatory attributes that you must enable for ACS View, see Mandatory ACS Attributes for ACS View, page A-1. In the Syslog Servers area, enter: IP Enter the ACS View IP address to configure ACS View as a syslog server for receiving this syslog report. Port Enter the port number. The default port for syslog is 514. Max Message Length Enter the length of the syslog message in bytes. The recommended length is 1024 bytes. Click Submit. ACS View can now collect data from the ACS server using syslog. Note Ensure that you choose all the mandatory attributes from the ACS logging page for syslog. See the User Guide for Cisco Secure Access Control Server View 4.0, for further information. Data Collection Using package.cab ACS View might lose some syslog messages from ACS servers due to network problem, or when ACS View is unreachable. In such events, the package.cab files serve as a backup option through which you can retrieve any missing information on any log that ACS View collects via syslog. 34

The package.cab file contains: Logs related to AAA, such as TACACS+ accounting, RADIUS accounting, passed authentication, and failed attempts. ACS audit logs, such as those related to ACS backup and restore, RDBMS synchronization, and database replication. Configuration information of ACS, if you chose to download configuration information from ACS servers. You can download package.cab to the ACS View database, which in turn processes the downloads to identify and retrieve the missing logs. Additionally, you can upload package.cab files to ACS View. To upload package.cab files, you must first have downloaded these files from an ACS server that is registered to ACS View. This section describes: Downloading Data from ACS Servers, page 35 Uploading package.cab to ACS View Servers, page 38 Downloading Data from ACS Servers ACS View collects historical data from ACS servers using package.cab. You can configure ACS View to collect this data at specified intervals, or as and when you require data (also known as collecting data on demand). This section describes: Enabling CSV Logging in ACS, page 35 Collecting Data At Scheduled Intervals, page 37 Collecting Data On Demand, page 38 Enabling CSV Logging in ACS For ACS View to extract the package.cab files from ACS, you must enable CSV logging in ACS. CSV logging in ACS servers is enabled by default. Note If you are installing the ACS server for the first time, ensure that you enable CSV logging. Ensure that you choose all the mandatory attributes from the ACS logging page for CSV. See the User Guide for Cisco Secure Access Control Server View 4.0, for further information. 35

To schedule CSV logging in ACS: Step 1 Log in to ACS 4.1.4 or ACS 4.2. Step 2 Choose System Configuration > Logging. The Logging Configuration page appears. Step 3 In the CSV column of the ACS Reports area, click Configure corresponding to a specific report. The Edit page appears. Note Step 4 Step 5 Step 6 Step 7 We recommend that you enable all CSV reports in ACS. For each CSV report that you enable, check the check box in the Enable Logging area. For example when configuring the Failed Attempts report check the Log to CSV Failed Attempts Report check box. In the Select Columns To Log area, choose an attribute from the Attributes column, and move it to the Logged Attributes column. For a list of the mandatory attributes that you must enable for ACS View, see User Guide for Cisco Secure Access Control Server View 4.0. In the Log File Management area: Under Generate New File, click one of the options to configure when ACS should generate a new log file Under Directory, enter the full path to the directory where you want ACS to place the log files. If you want ACS to control which log files are retained, check the Manage Directory check box and then click either of these radio buttons: Keep only the last X files Enter the maximum number of log files that ACS should retain in the log directory. The default is 7 files. Delete files older than X days Enter the maximum number of days that ACS should retain the log files in the log directory. The default is 7 days. For AAA-related reports, configure the attributes that you want ACS to log. For information about the mandatory attributes, see User Guide for Cisco Secure Access Control Server View 4.0. Note When you use ACS Windows, ensure that you specify file management options for the CSV files. 36

Step 8 Click Submit. Collecting Data At Scheduled Intervals You can configure ACS View to download the package.cab at specific intervals. By default, this runs at 12.01 am. To change the default schedule of data collection from ACS servers: Step 1 Choose System Administration > ACS Servers Configuration > Data Collection. Figure 13 shows the Data Collection page that appears. Figure 13 Collecting Data Step 2 Step 3 In the Daily Schedule area, specify the time (24-hour format). The schedule that you specify is based on the ACS View system time zone. Click Update. Note To disable a scheduled job, click the Disable radio button in the Daily Schedule area, and click Update. 37

Collecting Data On Demand To download package.cab on demand: Step 1 Step 2 Step 3 Step 4 Step 5 Choose System Administration > ACS Servers Configuration > Data Collection. Figure 13 shows the Data Collection page that appears. In the On Demand area, choose Download package.cab from the Choose Action drop-down list. This downloads package.cab from all individual and remote logging ACS servers. In the ACS Server field, click Select; a list of available ACS servers appears. Click the right arrow to transfer a server name from the Available to the Selected list. You can choose multiple servers here. Based on the data that you want to download, whether log or configuration data, check one or both of these check boxes: Retrieve ACS Logs for For ACS log data. Also, specify the number of days in the corresponding field. Retrieve ACS Config For ACS configuration data. Click Collect to download package.cab. Uploading package.cab to ACS View Servers You can upload the package.cab files that you have previously generated to ACS View. To upload package.cab: Step 1 Step 2 Step 3 Step 4 Step 5 Choose System Administration > ACS Servers Configuration > Data Collection. Figure 13 shows the Data Collection page that appears. In the On Demand area, choose Upload Package.cab from the drop-down list. In the Local Directory, click Browse and navigate to the package.cab file on your system. Based on the data that you want to upload, whether log or configuration data, check one or both of these check boxes: Retrieve ACS Logs For ACS log data. Retrieve ACS Config For ACS configuration data. Click Collect to upload package.cab to all ACS servers that are registered with ACS View. 38

Generating Reports and Alerts in ACS View ACS View generates various reports based on the log and configuration data that it receives from ACS servers. ACS View generates alerts when a threshold condition, which you can configure, is met on ACS servers. This section gives an overview of: Generating Reports in ACS View, page 39 Generating Alerts in ACS View, page 39 Generating Reports in ACS View Generating reports is the most important function of ACS View. You can generate various types of reports in ACS View. ACS View generates reports based on the log and configuration data of the ACS server. You can generate two kinds of reports: system and custom. Based on your requirement, you can run either immediate reports or scheduled reports. Additionally, you can save these reports for future use. Note To know how to generate various reports in ACS View, see the Reports section in the User Guide for Cisco Secure Access Control Server View 4.0. Generating Alerts in ACS View You can configure alerts to be triggered when a rule or a threshold is met. The ACS View generates alerts based on: ACS server data The ACS View system Note For more information about configuring thresholds and generating alerts in ACS View, see the User Guide for Cisco Secure Access Control Server View 4.0. Managing Data Using ACS View, you can back up, restore, or delete data from ACS servers. You can back up the database and restore this data to ACS View. Optionally, you can back up the data before deleting(or purging) it. 39

Note You must have Administrator rights to perform these actions. For more information, see the User Guide for Cisco Secure ACS View 4.0. ACS View manages data by: Setting Up Repositories, page 40 Backing Up Data, page 40 Purging Data, page 40 Exporting the Data, page 40 Restoring Data, page 40 Setting Up Repositories The data in ACS View is backed up in repositories. Before you back up data, you must set up repositories from the GUI or the command-line interface (CLI). For more information on how to set up repositories, see the User Guide for Cisco Secure Access Control Server View 4.0. Backing Up Data You can back up the database, which includes log and configuration files, and the data related to scheduled reports. You can either schedule a backup or run it on demand. While you can schedule a backup or run it on demand using the GUI, you can only run a backup on demand using the CLI. Purging Data Purging data is the process of removing data from the ACS View database. When the disk-space reaches the size limit that you have configured, ACS View automatically removes the existing data to free space for incoming data. You can also run the database purge on demand. Exporting the Data You can export the logs in the ACS View database to a remote or local repository, in a CSV format. To do this, you must configure a repository in a remote or a local server before exporting the log data.you can then use the exported data as the basis for future reports. Restoring Data With restoring data, you can overwrite existing data with backed-up data. You can restore the data to ACS View only from the CLI. You can restore data only to an appliance from where you received it. 40

12 Re-imaging the ACS View Appliance While unlikely, the failure of the application software or hardware components requires that you restore the application on the appliance. Based on the nature of the system failure (application software corruption or hardware component failure), you will have to re-image the appliance to the system-configuration state or the out-of-the-box state. This section describes: Required Tools and Equipment, page 41 Re-imaging Process, page 41 Required Tools and Equipment To re-image your ACS View appliance, you need: ACS View Restore CD-ROM Peripherals Serial console; or, a keyboard and mouse. Re-imaging Process To re-image your appliance: Step 1 Step 2 Power up your appliance. Insert the ACS View Recovery CD to the CD drive. The appliance displays the Recovery CD message: Welcome to Cisco Secure ACS View 4.0 Recovery - Cisco ADE 2120 To boot from hard disk press <Enter> Available boot options: [1] Cisco Secure ACS View 4.0 Installation (Keyboard/Monitor) [2] Cisco Secure ACS View 4.0 Installation (Serial Console) [3] Reset Administrator Password (Keyboard/Monitor) [4] Reset Administrator Password (Serial Console) <Enter> Boot from hard disk Please enter boot option and press <Enter>. boot: Note You use: Option 1 to install the application through keyboard and monitor. Option 2 to install the application through an attached serial console. Option 3 to reset the administrator password through an attached keyboard and mouse. Option 4 to reset the administrator password through an attached serial console. 41

Step 3 Enter the bootup option and press Enter to re-image the application. 13 FAQs For the frequently asked questions, see the User Guide for Cisco Secure Access Control Server. View 4.0. 14 Related Documentation For more information, see: Installation and Setup Guide for Access Control Server View 4.0 at http://www.cisco.com/en/us/docs/net_mgmt/cisco_secure_access_control_server_view/4.0/ install/guide/acsviewig.html User Guide for Cisco Secure Access Control Server View 4.0 at http://www.cisco.com/en/us/docs/net_mgmt/cisco_secure_access_control_server_view/4.0/user/ guide/userguide40.html Release Notes for Cisco Secure Access Control Server View at http://www.cisco.com/en/us/docs/net_mgmt/cisco_secure_access_control_server_view/4.0/ release/notes/acsview4.0_rne.html Regulatory Compliance and Safety Information for the Cisco Application Deployment Engine (ADE) 1010 and 2120 Series Appliance at http://cisco.com/en/us/products/ps8340/prod_installation_guides_list.html Cisco Application Deployment Engine (ADE) 1010 and 2120 Series Appliance Hardware Installation Guide at http://cisco.com/en/us/products/ps8340/prod_installation_guides_list.html 15 Obtaining Documentation and Submitting a Service Request For information on obtaining documentation, submitting a service request, and gathering additional information, see the monthly What s New in Cisco Product Documentation, which also lists all new and revised Cisco technical documentation, at: http://www.cisco.com/en/us/docs/general/whatsnew/whatsnew.html 42

Subscribe to the What s New in Cisco Product Documentation as a Really Simple Syndication (RSS) feed and set content to be delivered directly to your desktop using a reader application. The RSS feeds are a free service and Cisco currently supports RSS version 2.0. 43

Americas Headquarters Cisco Systems, Inc. San Jose, CA Asia Pacific Headquarters Cisco Systems (USA) Pte. Ltd. Singapore Europe Headquarters Cisco Systems International BV Amsterdam, The Netherlands Cisco has more than 200 offices worldwide. Addresses, phone numbers, and fax numbers are listed on the Cisco Website at www.cisco.com/go/offices. CCDE, CCENT, Cisco Eos, Cisco Lumin, Cisco StadiumVision, the Cisco logo, DCE, and Welcome to the Human Network are trademarks; Changing the Way We Work, Live, Play, and Learn is a service mark; and Access Registrar, Aironet, AsyncOS, Bringing the Meeting To You, Catalyst, CCDA, CCDP, CCIE, CCIP, CCNA, CCNP, CCSP, CCVP, Cisco, the Cisco Certified Internetwork Expert logo, Cisco IOS, Cisco Press, Cisco Systems, Cisco Systems Capital, the Cisco Systems logo, Cisco Unity, Collaboration Without Limitation, EtherFast, EtherSwitch, Event Center, Fast Step, Follow Me Browsing, FormShare, GigaDrive, HomeLink, Internet Quotient, IOS, iphone, iq Expertise, the iq logo, iq Net Readiness Scorecard, iquick Study, IronPort, the IronPort logo, LightStream, Linksys, MediaTone, MeetingPlace, MGX, Networkers, Networking Academy, Network Registrar, PCNow, PIX, PowerPanels, ProConnect, ScriptShare, SenderBase, SMARTnet, Spectrum Expert, StackWise, The Fastest Way to Increase Your Internet Quotient, TransPath, WebEx, and the WebEx logo are registered trademarks of Cisco Systems, Inc. and/or its affiliates in the United States and certain other countries. All other trademarks mentioned in this document or Website are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (0804R) Quick Start Guide for Cisco Secure Access Control Server View 4.0 2008 Cisco Systems, Inc. All rights reserved. Printed in the USA on recycled paper containing 10% postconsumer waste. 78-18204-01