Chapter 6. Cisco IOS Firewall Authentication Proxy
Upon completion of this chapter, you will be able to perform the following tasks:
Define an Authentication Proxy
Describe How Users Authenticate to a Cisco IOS Firewall
Describe How Authentication Proxy Technology Works
Name the AAA Protocols Supported by the Cisco IOS Firewall
Configure AAA on a Cisco IOS Firewall
Trust is the defining element for most security requirements. As an administrator, you permit access for those you trust and deny access for those you distrust. It would be best if you could choose to trust authenticated individuals, but Cisco IOS access control lists permit or deny network access based on network or host addresses, not by individual user identity.
The Cisco IOS Firewall ...
Get CCSP Self-Study: Securing Cisco IOS Networks (SECUR) now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.