Chapter 6. Cisco IOS Firewall Authentication Proxy

Upon completion of this chapter, you will be able to perform the following tasks:

  • Define an Authentication Proxy

  • Describe How Users Authenticate to a Cisco IOS Firewall

  • Describe How Authentication Proxy Technology Works

  • Name the AAA Protocols Supported by the Cisco IOS Firewall

  • Configure AAA on a Cisco IOS Firewall

Trust is the defining element for most security requirements. As an administrator, you permit access for those you trust and deny access for those you distrust. It would be best if you could choose to trust authenticated individuals, but Cisco IOS access control lists permit or deny network access based on network or host addresses, not by individual user identity.

The Cisco IOS Firewall ...

Get CCSP Self-Study: Securing Cisco IOS Networks (SECUR) now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.