![cisco secure acs versions cisco secure acs versions](https://www.cisco.com/c/dam/en/us/td/i/200001-300000/270001-280000/277001-278000/277272.tif/_jcr_content/renditions/277272.jpg)
The message in this field indicates whether all applicable NARs permitted the user access, all applicable NARs denied the user access, or more specific information about which NAR denied the user access. Filter Information-The result of network access restrictions (NARs) applied to the user, if any.Network Device Group-The network device group to which the access device (AAA client) belongs.Access Device-The name of the AAA client sending the logging data to Cisco Secure ACS.It does not list the database that failed the user authentication attempt. In entries in the Failed Attempts log, this attribute contains the database that last successfully authenticated the user.
Cisco secure acs versions windows#
In the case of a Windows user database, this attribute contains the name of the domain that authenticated the user.
Cisco secure acs versions how to#
For information about how to use a CSV file in a third-party application such as Microsoft Excel, please see the documentation supplied by the third-party vendor. After data from a CSV file is imported into such applications, you can prepare charts or perform queries, such as determining how many hours a user was logged in to the network during a given period. This format is easily imported into a variety of third-party applications, such as Microsoft Excel or Microsoft Access. Comma-separated value (CSV) files-The CSV format records data in columns separated by commas.
![cisco secure acs versions cisco secure acs versions](https://community.cisco.com/legacyfs/online/media/screen_shot_2014-05-27_at_2.44.08_pm.png)
Depending on the log, and how you have configured Cisco Secure ACS, logs can be recorded in one of two formats: About Cisco Secure ACS Logs and ReportsĬisco Secure ACS logs a variety of user and system activities.This chapter contains the following topics: Configuring a System Data Source Name for ODBC LoggingĬisco Secure ACS for Windows Server produces a variety of logs and provides a way to view most of these logs in the Cisco Secure ACS HTML interface as HTML reports.