Chapter 2 Deploying Cisco Secure ACS
Basic Deployment Requirements for Cisco Secure ACS
2-4
User Guide for Cisco Secure ACS for Windows Server
78-14696-01, Version 3.1
For the latest information about tested browsers and other third-party
applications, see the Release Notes. The latest version of the Release Notes are
posted on Cisco.com at
http://www.cisco.com/univercd/cc/td/doc/product/access/acs_soft/csacs4nt/
index.htm.
Network Requirements
Your network should meet the following requirements before you begin
deploying Cisco Secure ACS.
• For full TACACS+ and RADIUS support on Cisco IOS devices, AAA clients
must run Cisco IOS Release 11.2 or later.
• Non-Cisco IOS AAA clients must be configured with TACACS+ and/or
RADIUS.
• Dial-in, VPN, or wireless clients must be able to connect to the applicable
AAA clients.
• The computer running Cisco Secure ACS must be able to ping all AAA
clients.
• Gateway devices between AAA clients and Cisco Secure ACS must permit
communication over the ports needed to support the applicable AAA protocol
(RADIUS or TACACS+). For information about ports used by AAA
protocols, see AAA Protocols—TACACS+ and RADIUS, page 1-6.
• Make sure a compatible web browser is installed on the computer that runs
Cisco Secure ACS. For more information, see Third-Party Software
Requirements, page 2-3.
• To have Cisco Secure ACS use the Grant Dial-in Permission to User feature
in Windows when authorizing network users, enable this option for the
applicable user accounts in the relevant Active Directory or Windows
Security Accounts Manager (SAM) database.