Managing User Accounts: Setting Up User Permissions
Managing User Accounts: Setting Up User Permissions
To use Security Manager, users must log in to the product and create individual accounts for each user.
Either you can create accounts that are unique to Security Manager, which are defined on the Security
Manager server and are called local accounts, or you can use your enterprise ACS server to authenticate
users. The following topics describe how to create and manage user accounts, and how to integrate the
product with your ACS system:
Setting Up User Permissions, page 7-1
Integrating Security Manager with Cisco Secure ACS, page 7-8
Troubleshooting Security Manager-ACS Interactions, page 7-23
In some cases, you may want to use a CiscoWorks login module other than the CiscoWorks Local login
module or the ACS module. That approach is called using a non-ACS login module, and it is supported
by CiscoWorks. For example, you can use LDAP (Lightweight Directory Access Protocol). For
information on this approach, see Setting the Login Module to Non-ACS in the User Guide for
CiscoWorks Common Services 3.3 at the following URL:
http://www.cisco.com/en/US/docs/net_mgmt/ciscoworks_common_services_software/3.3/user/guide/a
dmin.html#wp320043
See also the more general section Setting up the AAA Mode in the User Guide for CiscoWorks
Common Services 3.3 at the following URL:
http://www.cisco.com/en/US/docs/net_mgmt/ciscoworks_common_services_software/3.3/user/guide/a
dmin.html#wp618133
The major advantages of using Cisco Secure ACS are the ability to create highly granular user roles with
specialized permissions sets (for example, allowing the user to configure certain policy types but not
others) and the ability to restrict users to certain devices by configuring network device groups (NDGs).
These granular privileges are not available for CiscoWorks local users.
Tip To view the complete Security Manager permissions tree, log in to Cisco Secure ACS, then click Shared
Profile Components on the navigation bar. For more information, see Customizing Cisco Secure ACS
Roles, page 7-6.
Modify > Policies. Allows you to modify the various types of policies. The folder contains
permissions for various policy classes.
Modify > Objects. Allows you to modify the various types of policy objects. The folder
contains permissions for each type of policy object.
Modify > Admin. Allows you to modify Security Manager administrative settings.
Modify > Config Archive. Allows you to modify the device configuration in the Configuration
Archive. In addition, it allows you to add configurations to the archive and customize the
Configuration Archive tool.
Modify > Devices. Allows you to add and delete devices, as well as modify device properties
and attributes. To discover the policies on the device being added, you must also enable the
Import permission. In addition, if you enable the Modify > Devices permission, make sure that
you also enable the Assign > Policies > Interfaces permission. You can limit device permissions
to particular sets of devices by configuring network device groups (NDGs).
Modify > Hierarchy. Allows you to modify device groups.
Modify > Topology. Allows you to modify maps in Map view.
AssignAllows you to assign the various types of policies to devices and VPNs. The folder
contains permissions for various policy classes.
ApproveAllows you to approve policy changes and deployment jobs.
ControlAllows you to issue commands to devices, such as ping. This permission is used for
connectivity diagnostics.
DeployAllows you to deploy configuration changes to the devices in your network and perform
rollback to return to a previously deployed configuration.
ImportAllows you to import the configurations that are already deployed on devices into Security
Manager. You must also have view device and modify device privileges.
SubmitAllows you to submit your configuration changes for approval.
Tips
When you select modify, assign, approve, import, control or deploy permissions, you must also
select the corresponding view permissions; otherwise, Security Manager will not function properly.
When you select modify policy permissions, you must also select the corresponding assign and view
policy permissions.
When you permit a policy that uses policy objects as part of its definition, you must also grant view
permissions to these object types. For example, if you select the permission for modifying routing
policies, you must also select the permissions for viewing network objects and interface roles, which
are the object types required by routing policies.
The same holds true when permitting an object that uses other objects as part of its definition. For
example, if you select the permission for modifying user groups, you must also select the
permissions for viewing network objects, ACL objects, and AAA server groups.
You can limit device permissions to particular sets of devices by configuring network device groups
(NDGs). NDGs have the following effects on policy permissions:
To view a policy, you must have permissions for at least one device to which the policy is
assigned.
To modify a policy, you must have permissions for all the devices to which the policy is
assigned.
To view, modify, or assign a VPN policy, you must have permissions for all the devices in the
VPN topology.
To assign a policy to a device, you need permissions only for that device, regardless of whether
you have permissions for any other devices to which the policy is assigned. (VPN policies are
an exception, as noted above.) However, if a user assigns a policy to a device for which you do
not have permissions, you cannot modify that policy.
Note Cisco Secure ACS features a default role called Network Administrator that contains a
different set of permissions. For more information, see Understanding Cisco Secure ACS
Roles, page 7-5.
Tips
Additional roles, such as Export Data, might be displayed in Common Services if additional
applications are installed on the server. The Export Data role is for third-party developers and is not
used by Security Manager.
Although you cannot change the definition of CiscoWorks roles, you can define which roles are
assigned to each user. For more information, see Assigning Roles to Users in CiscoWorks Common
Services, page 7-5.
To generate a permissions table in CiscoWorks, select Server > Reports > Permission Report and
click Generate Report.
Tip You must restart Security Manager after making changes to user permissions.
Related Topics
Security Manager ACS Permissions, page 7-2
Default Associations Between Permissions and Roles in Security Manager, page 7-7
Understanding CiscoWorks Roles, page 7-4
Step 1 In Common Services, select Server > Security, then select Single-Server Trust Management > Local
User Setup from the table of contents.
Tip To reach the Local User Setup page from within Security Manager, select Tools > Security
Manager Administration > Server Security, then click Local User Setup.
In addition, you can assign these roles to Cisco Secure ACS device groups, allowing permissions to be
differentiated on different sets of devices.
Note Cisco Secure ACS device groups are independent of Security Manager device groups.
Note The permissions contained in the Cisco Secure ACS network administrator role are different
from those contained in the CiscoWorks network administrator role. For more information,
see Understanding CiscoWorks Roles, page 7-4.
Unlike CiscoWorks, Cisco Secure ACS enables you to customize the permissions associated with each
Security Manager role. For more information about modifying the default roles, see Customizing Cisco
Secure ACS Roles, page 7-6.
For details about which Security Manager permissions are associated with each Cisco Secure ACS role,
see Default Associations Between Permissions and Roles in Security Manager, page 7-7.
Related Topics
Integrating Security Manager with Cisco Secure ACS, page 7-8
Setting Up User Permissions, page 7-1
Note You must restart Security Manager after making changes to user permissions.
Related Topics
Security Manager ACS Permissions, page 7-2
Default Associations Between Permissions and Roles in Security Manager, page 7-7
Step 1 In Cisco Secure ACS, click Shared Profile Components on the navigation bar.
Step 2 Click Cisco Security Manager on the Shared Components page. The roles that are configured for
Security Manager are displayed.
Step 3 Do one of the following:
To create a role, click Add. Enter a name for the role and, optionally, a description.
To modify an existing role, click the role.
Step 4 Check and uncheck the check boxes in the permissions tree to define the permissions for this role.
Checking the check box for a branch of the tree selects all permissions in that branch. For example,
selecting the Assign checkbox selects all the assign permissions.
Descriptions of the individual permissions are included in the window. For additional information, see
Security Manager ACS Permissions, page 7-2.
Tip When you select modify, approve, assign, import, control or deploy permissions, you must also
select the corresponding view permissions; otherwise, Security Manager does not function
properly.
Roles
Security Security Network Network
System Admin. Approver Admin. Admin. Network Help
Permissions Admin. (ACS) (ACS) (CW) (ACS) Approver Operator Desk
View Permissions
View Device Yes Yes Yes Yes Yes Yes Yes Yes
View Policy Yes Yes Yes Yes Yes Yes Yes Yes
View Objects Yes Yes Yes Yes Yes Yes Yes Yes
View Topology Yes Yes Yes Yes Yes Yes Yes Yes
View CLI Yes Yes Yes Yes Yes Yes Yes No
Roles
Security Security Network Network
System Admin. Approver Admin. Admin. Network Help
Permissions Admin. (ACS) (ACS) (CW) (ACS) Approver Operator Desk
View Admin Yes Yes Yes Yes Yes Yes Yes No
View Config Archive Yes Yes Yes Yes Yes Yes Yes Yes
View Device Managers Yes Yes Yes Yes Yes Yes Yes No
Modify Permissions
Modify Device Yes Yes No Yes No No No No
Modify Hierarchy Yes Yes No Yes No No No No
Modify Policy Yes Yes No Yes No No No No
Modify Image Yes Yes No Yes No No No No
Modify Objects Yes Yes No Yes No No No No
Modify Topology Yes Yes No Yes No No No No
Modify Admin Yes No No No No No No No
Modify Config Archive Yes Yes No Yes Yes No Yes No
Additional Permissions
Assign Policy Yes Yes No Yes No No No No
Approve Policy Yes No Yes No No No No No
Approve CLI Yes No No No No Yes No No
Discover (Import) Yes Yes No Yes No No No No
Deploy Yes No No Yes Yes No No No
Control Yes No No Yes Yes No Yes No
Submit Yes Yes No Yes No No No No
Note For an understanding of TACACS+ security advantages, see User Guide for Cisco Secure Access Control
Server.
When Security Manager initially communicates with Cisco Secure ACS, it dictates to Cisco ACS the
creation of default roles, which appear in the Shared Profile Components section of the Cisco Secure
ACS HTML interface. It also dictates a custom service to be authorized by TACACS+. This custom
service appears on the TACACS+ (Cisco IOS) page in the Interface Configuration section of the HTML
interface. You can then modify the permissions included in each Security Manager role and apply these
roles to users and user groups.
The following topics describe how to use Cisco Secure ACS with Security Manager:
ACS Integration Requirements, page 7-9
Procedural Overview for Initial Cisco Secure ACS Setup, page 7-10
Integration Procedures Performed in Cisco Secure ACS, page 7-11
Integration Procedures Performed in CiscoWorks, page 7-17
Restarting the Daemon Manager, page 7-20
Assigning Roles to User Groups in Cisco Secure ACS, page 7-21
Tips
We highly recommend that you create a fault-tolerant infrastructure that utilizes multiple Cisco
Secure ACS servers. Having multiple servers helps to ensure your ability to continue work in
Security Manager even if connectivity is lost to one of the ACS servers.
You can integrate only one version of Security Manager with a Cisco Secure ACS. Therefore, if your
organization is using two different versions of Security Manager at the same time, you must perform
integration with two different Cisco Secure ACS servers. You can, however, upgrade to a new
version of Security Manager without having to use a different ACS.
Even when Cisco Secure ACS authentication is used, CiscoWorks Common Services software uses
local authorization for CiscoWorks Common Services-specific utilities, such as Compact Database
and Database Checkpoint. To use these utilities, you must be defined locally and be assigned the
appropriate permissions.
Related Topics
Procedural Overview for Initial Cisco Secure ACS Setup, page 7-10
Integrating Security Manager with Cisco Secure ACS, page 7-8
Related Topics
ACS Integration Requirements, page 7-9
Integrating Security Manager with Cisco Secure ACS, page 7-8
Tip When defining the roles and permissions of potential administrators, you should also consider
whether to enable Workflow. This selection affects how you can restrict access.
For more information, see Integration Procedures Performed in CiscoWorks, page 7-17.
Step 5 Restart the Daemon Manager.
You must restart the Security Manager server Daemon Manager for the AAA settings you configured to
take effect.
For more information, see Restarting the Daemon Manager, page 7-20.
Step 6 Assign roles to user groups in Cisco Secure ACS.
Assign roles to each user group configured in Cisco Secure ACS. The procedure you should use depends
on whether you have configured network device groups (NDGs).
For more information, see Assigning Roles to User Groups in Cisco Secure ACS, page 7-21.
Tip This procedure explains how to create user accounts during the initial Cisco Secure ACS integration.
After you complete the integration, when you create a user account, you can assign it to the appropriate
group as you create the account.
Related Topics
ACS Integration Requirements, page 7-9
Procedural Overview for Initial Cisco Secure ACS Setup, page 7-10
Assigning Roles to User Groups in Cisco Secure ACS, page 7-21
Tip Do not create a user named admin. The admin user is the fall-back user in Security Manager. If
the ACS system stops working for some reason, you can still log in to CiscoWorks Common
Services on the Security Manager server using the admin account to change the AAA mode to
CiscoWorks local authentication and continue using the product.
c. Select an authentication method from the Password Authentication list under User Setup.
d. Enter and confirm the password for the new user.
e. Select Group 1 as the group to which the user should be assigned.
f. Click Submit to create the user account.
Step 3 Repeat this process for each Security Manager user. We recommend dividing the users into groups based
on the role each user will be assigned:
Group 1System Administrators
Group 2Security Administrators
Group 3Security Approvers
Group 4Network Administrators
Group 5Approvers
Group 6Network Operators
Group 7Help Desk
For more information about the default permissions associated with each role, see Default Associations
Between Permissions and Roles in Security Manager, page 7-7. For more information about customizing
user roles, see Customizing Cisco Secure ACS Roles, page 7-6.
Note At this stage, the groups themselves are collections of users without any role definitions. You
assign roles to each group after you complete the integration process. See Assigning Roles to
User Groups in Cisco Secure ACS, page 7-21.
Step 4 Create an additional user that you will use as the system identity user in CiscoWorks Common Services.
Assign this user to the system administrators group and grant all privileges to devices. The credentials
established for this user are later used on the System Identity Setup page in CiscoWorks. See Defining
the System Identity User, page 7-18.
Step 5 Continue with Adding Managed Devices as AAA Clients in Cisco Secure ACS, page 7-13.
This procedure describes how to add devices as AAA clients of a Cisco Secure ACS. For complete
information about all available options, see User Guide for Cisco Secure Access Control Server.
Related Topics
ACS Integration Requirements, page 7-9
Procedural Overview for Initial Cisco Secure ACS Setup, page 7-10
Step 1 Click Network Configuration on the Cisco Secure ACS navigation bar.
Step 2 Click Add Entry beneath the AAA Clients table.
Step 3 Enter the AAA client hostname (up to 32 characters) on the Add AAA Client page. The hostname of the
AAA client must match the display name you plan to use for the device in Security Manager.
For example, if you intend to append a domain name to the device name in Security Manager, the AAA
client hostname in ACS must be <device_name>.<domain_name>.
When naming the CiscoWorks server, we recommend using the fully qualified hostname. Be sure to spell
the hostname correctly. (The hostname is not case sensitive.)
Additional naming conventions include:
PIX or ASA security context, or FWSM security context when discovered through the FWSM:
<parent_display_name>_<context_name>
FWSM blade: <chassis_name>_FW_<slot_number>
FWSM security context when discovered through the chassis:
<chassis_name>_FW_<slot_number>_<context_name>
IPS sensor: <IPSParentName>_<virtualSensorName>
Step 4 Enter the IP address of the network device in the AAA Client IP Address field. If the device does not
have an IP address (for example, a virtual sensor or a virtual context), enter the word dynamic instead
of an address.
Note If you are adding a multi-homed device (a device with multiple NICs), enter the IP address of
each NIC. Press Enter between each address. In addition, you must modify the gatekeeper.cfg
file on the Security Manager server.
Cisco Secure ACS enables you to configure network device groups (NDGs) that contain specific devices
to be managed. For example, you can create NDGs for each geographic region or NDGs that match your
organizational structure. When used with Security Manager, NDGs enable you to provide users with
different levels of permissions, depending on the devices they need to manage. For example, by using
NDGs you can assign User A system administrator permissions to the devices located in Europe and
Help Desk permissions to the devices located in Asia. You can then assign the opposite permissions to
User B.
NDGs are not assigned directly to users. Rather, NDGs are assigned to the roles that you define for each
user group. Each NDG can be assigned to a single role only, but each role can include multiple NDGs.
These definitions are saved as part of the configuration for the selected user group.
Tips
Each device can be a member of only one NDG.
NDGs are not related to the device groups that you can configure in Security Manager.
For complete details about managing NDGs, see User Guide for Cisco Secure Access Control
Server.
The following topics outline the basic information and steps for configuring NDGs:
NDGs and User Permissions, page 7-14
Activating the NDG Feature, page 7-15
Creating NDGs, page 7-15
Associating NDGs and Roles with User Groups, page 7-22
Because NDGs limit users to particular sets of devices, they affect policy permissions, as follows:
To view a policy, you must have permissions for at least one device to which the policy is assigned.
To modify a policy, you must have permissions for all the devices to which the policy is assigned.
To view, modify, or assign a VPN policy, you must have permissions for all the devices in the VPN
topology.
To assign a policy to a device, you need permissions only for that device, regardless of whether you
have permissions for any other devices to which the policy is assigned. (VPN policies are an
exception, as noted above.) However, if a user assigns a policy to a device for which you do not have
permissions, you cannot modify that policy.
Note To modify an object, a user does not need modify permissions for all the devices that are using the object.
However, a user must have modify permissions for a particular device in order to modify a device-level
object override defined on that device.
Related Topics
Configuring Network Device Groups for Use in Security Manager, page 7-14
Setting Up User Permissions, page 7-1
You must activate the NDG feature before you can create NDGs and populate them with devices.
Related Topics
Creating NDGs, page 7-15
Associating NDGs and Roles with User Groups, page 7-22
NDGs and User Permissions, page 7-14
Configuring Network Device Groups for Use in Security Manager, page 7-14
Step 1 Click Interface Configuration on the Cisco Secure ACS navigation bar.
Step 2 Click Advanced Options.
Step 3 Scroll down, then check the Network Device Groups check box.
Step 4 Click Submit.
Step 5 Continue with Creating NDGs, page 7-15.
Creating NDGs
This procedure describes how to create NDGs and populate them with devices. Each device can belong
to only one NDG.
Tip We highly recommend creating a special NDG that contains the CiscoWorks/Security Manager servers.
Related Topics
Associating NDGs and Roles with User Groups, page 7-22
NDGs and User Permissions, page 7-14
Configuring Network Device Groups for Use in Security Manager, page 7-14
Tip You can associate roles with each NDG only after completing the integration procedures in
Cisco Secure ACS and CiscoWorks Common Services. See Associating NDGs and Roles with
User Groups, page 7-22.
Related Topics
ACS Integration Requirements, page 7-9
Procedural Overview for Initial Cisco Secure ACS Setup, page 7-10
Step 1 Click Administration Control on the Cisco Secure ACS navigation bar.
Step 2 Click Add Administrator.
Step 3 On the Add Administrator page, enter a name and password for the administrator.
Related Topics
ACS Integration Requirements, page 7-9
Procedural Overview for Initial Cisco Secure ACS Setup, page 7-10
Tip To get to this page from the Security Manager client, select Tools > Security Manager
Administration > Server Security and click Local User Setup.
Step 4 Enter the same name and password that you entered when creating the system identity user in Cisco
Secure ACS. See Defining Users and User Groups in Cisco Secure ACS, page 7-11.
Step 5 Check all check boxes under Roles.
Step 6 Click OK to create the user.
Related Topics
ACS Integration Requirements, page 7-9
Procedural Overview for Initial Cisco Secure ACS Setup, page 7-10
Step 1 In Common Services, select Server > Security, then select Multi-Server Trust Management > System
Identity Setup from the TOC.
Tip To get to this page from the Security Manager client, select Tools > Security Manager
Administration > Server Security and click System Identity Setup.
Step 2 Enter the name of the system identity user that you created in Cisco Secure ACS. See Defining Users
and User Groups in Cisco Secure ACS, page 7-11.
Step 3 Enter and verify the password for this user.
Step 4 Click Apply.
This procedure performs the actual registration of CiscoWorks and Security Manager (and optionally,
Auto Update Server) into Cisco Secure ACS.
Tip The AAA setup configured here is not retained if you uninstall CiscoWorks Common Services or Cisco
Security Manager. In addition, this configuration cannot be backed up and restored after re-installation.
Therefore, if you upgrade to a new version of either application, you must reconfigure the AAA setup
mode and reregister Security Manager with ACS. This process is not required for incremental updates.
If you install additional applications, such as AUS, on top of CiscoWorks, you must reregister the new
applications and Cisco Security Manager.
Related Topics
ACS Integration Requirements, page 7-9
Procedural Overview for Initial Cisco Secure ACS Setup, page 7-10
Step 1 In Common Services, select Server > Security, then select AAA Mode Setup from the TOC.
Tip To get to this page from the Security Manager client, select Tools > Security Manager
Administration > Server Security and click AAA Mode Setup.
Note If all the configured TACACS+ servers fail to respond, you must log in using the admin
CiscoWorks Local account, then change the AAA mode back to Non-ACS/CiscoWorks Local.
After the TACACS+ servers are restored to service, you must change the AAA mode back to
ACS.
Step 5 In the Login area, enter the name of the administrator that you defined on the Administration Control
page of Cisco Secure ACS. For more information, see Creating an Administration Control User in Cisco
Secure ACS, page 7-16.
Step 6 Enter and verify the password for this administrator.
Step 7 Enter and verify the shared secret key that you entered when you added the Security Manager server as
a AAA client of Cisco Secure ACS. See Adding Devices as AAA Clients Without NDGs, page 7-13.
Step 8 Check the Register all installed applications with ACS check box to register Security Manager and
any other installed applications with Cisco Secure ACS.
Step 9 Click Apply to save your settings. A progress bar displays the progress of the registration. A message is
displayed when registration is complete.
Step 10 Restart the Cisco Security Manager Daemon Manager service. See Restarting the Daemon Manager,
page 7-20.
Step 11 Log back in to Cisco Secure ACS to assign roles to each user group. See Assigning Roles to User Groups
in Cisco Secure ACS, page 7-21.
Configuring an SMTP Server and System Administrator Email Address for ACS Status Notifications
If all the ACS servers become unavailable, users cannot perform tasks in Security Manager. Users who
are logged in can be abruptly logged out of the system (without an opportunity to save changes) if they
try to perform a task that requires ACS authorization.
If you configure Common Services settings to identify an SMTP server and a system administrator,
Security Manager sends an email message to the administrator if all ACS servers become unavailable.
This can alert you to a problem that needs immediate attention. The administrator might also receive
email messages from Common Services for non-ACS-related events.
Tip Security Manager can send email notifications for several other types of events such as deployment job
completion, activity approval, or ACL rule expiration. The SMTP server you configure here is also used
for these notifications, although the sender email address is set in Security Manager. For more
information about configuring these other email addresses, see the User Guide for Cisco Security
Manager for this version of the product, or the client online help.
Step 1 In Common Services, click Server > Admin, and select System Preferences from the table of contents.
Step 2 On the System Preferences page, enter the hostname or IP address of an SMTP server that Security
Manager can use. The SMTP server cannot require user authentication for sending email messages.
Step 3 Enter an email address that CiscoWorks can use for sending emails. This does not have to be the same
email address that you configure for Security Manager to use when sending notifications.
If the ACS server becomes unavailable, a message is sent to (and from) this account.
Step 4 Click Apply to save your changes.
Related Topics
Procedural Overview for Initial Cisco Secure ACS Setup, page 7-10
ACS Integration Requirements, page 7-9
Step 1 Log in to the machine on which the Security Manager server is installed.
Step 2 Select Start > Programs > Administrative Tools > Services to open the Services window.
Step 3 From the list of services displayed in the right pane, select Cisco Security Manager Daemon Manager.
Step 4 Click the Restart Service button on the toolbar.
Step 5 Continue with Assigning Roles to User Groups in Cisco Secure ACS, page 7-21.
Related Topics
Understanding CiscoWorks Roles, page 7-4
Understanding Cisco Secure ACS Roles, page 7-5
Tip You can rename the groups with a more meaningful name to make it easier to identify the correct
groups. Select a group and click Rename Group to change the name.
Related Topics
ACS Integration Requirements, page 7-9
Procedural Overview for Initial Cisco Secure ACS Setup, page 7-10
Tip You can rename the groups with a more meaningful name to make it easier to identify the correct
groups. Select a group and click Rename Group to change the name.
Step 4 Map NDGs and roles for use in Cisco Security Manager; you should create associations that match as
closely as possible the associations defined in the previous step:
a. On the Group Setup page, scroll down to the Cisco Security Manager area under TACACS+ Settings.
b. Select Assign a Cisco Security Manager on a per Network Device Group Basis.
c. Select an NDG from the Device Group list.
d. Select the role to which this NDG should be associated from the second list.
e. Click Add Association. The association appears in the Device Group box.
f. Repeat the process to create additional associations.
Note When you are selecting the Security Approver or Security Administrator roles in Cisco Secure
ACS, we recommend selecting Network Administrator as the closest equivalent CiscoWorks
role.
Note CiscoWorks Common Services has a default role called Network Administrator. Cisco Secure
ACS has a default role called Network Admin. These roles are not identical; they differ for a
few of the permissions in Cisco Security Manager.
Note You can configure the network devices (routers, switches, firewalls, and so on) managed
by Security Manager for either TACACS+ or RADIUS.
Note Although Cisco Secure ACS 3.3 is not supported, if you are using that version of ACS, you must open
Windows Services and restart the Cisco Security Manager Daemon Manager service to get the ACS
changes to appear in Security Manager.
Procedure
To change the AAA mode, follow these steps:
Step 1 Log in to Common Services using the admin CiscoWorks local account.
Step 2 Select Server > Security > AAA Mode Setup, then change the AAA mode back to
Non-ACS/CiscoWorks Local. This enables you to perform authentication and authorization using the
local Common Services database and its built-in roles. Bear in mind that you must create local users in
the AAA database to make use of local authentication.
Step 3 Click Change.
When a device is behind a NAT boundary, make sure to define all IP addresses, including pre-NAT and
post-NAT, for the device in the AAA client configuration settings in Cisco Secure ACS. For more
information on how to add AAA client settings to ACS, see User Guide for Cisco Secure Access Control
Server.