RS,
Hi here is the guide that helps you configure the cut-through proxy from the ASA this is a good example:
http://www.cisco.com/en/US/docs/security/asa/asa84/configuration/guide/access_fwaaa.html
When configuring the ACS portion you can use two methods: "Cisco ACS" downloadable access-lists, "Any Radius Server" downloadable access-lists (my favorite), or you can send the filter attribute which points the user to a defined acl on the ASA. Either way you choose, you will have to first create a network authorization profile which will have the radius attributes in the formats that are outlined in this guide. You will create an authorization policy that will call this authorization policy as the result when they meet this condition.
Let me know how things go, if you get stuck, please posts screenshots so I can help you further.
Thanks,
Tarik admani
Tarik Admani
*Please rate helpful posts*