In terms of where to configure them in ACS, you would add them into the appropriate Authorization Profile that you are returning to your VPN clients. Go to Policy Elements > Authorization and Permissions > Network Access > Authorization Profiles, and create one (or edit one you already have). Go to the tab called Radius Attributes and pick the dictionary type "Radius-Cisco VPN 3000/ASA/PIX 7.x", and those attributes from the link above should be there to choose and you can enter your values.
Then assign that Authorization Profile to your Access Policy rule that is being matched for your connections.
Login to the FXOS chassis manager.
Direct your browser to https://hostname/, and log-in using the user-name and password.
Go to Help > About and check the current version:
Check the current version availa...
We have configured the outside and inside Interface with official ipv6 adresses, set a default route on outside Interface to our router, we also have definied a rule , which also gets hits, to permit tcp from inside Interface to any6.
In Syslog I also se...