Skip to Main Content
AAA Identity Management Security
book

AAA Identity Management Security

by Vivek Santuka, - CCIE #17621, Premdeep Banga, - CCIE #21713, Brandon J. Carroll, - CCIE #23837
December 2010
Intermediate to advanced content levelIntermediate to advanced
480 pages
11h 9m
English
Cisco Press
Content preview from AAA Identity Management Security

Chapter 10. Cut-Through Proxy AAA on PIX/ASA

This chapter covers the following subjects:

• Overview of Cut-Through Proxy AAA

• Configuring PIX/ASA for Cut-Through Proxy AAA

• Downloadable Access Lists

• Configuring ACS 4.2 to Support Cut-Through Proxy Authentication and Authorization

• Configuring ACS 5.1 to Support Cut-Through Proxy Authentication and Authorization

Traditionally, access control lists (ACLs) have been used to restrict access to network resources. Although effective, ACLs are static in nature. ACLs cannot be used in environments where the source and/or destination address of the traffic is not known or is not static. For example, consider a network where an IP address is assigned dynamically using Dynamic Host Configuration ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Strategic Security Management

Strategic Security Management

Karim Vellani
Security on the IBM Mainframe: Volume 1 A Holistic Approach to Reduce Risk and Improve Security

Security on the IBM Mainframe: Volume 1 A Holistic Approach to Reduce Risk and Improve Security

Axel Buecker, Boudhayan Chakrabarty, Lennie Dymoke-Bradshaw, Cesar Goldkorn, Brian Hugenbruch, Madhukar Reddy Nali, Vinodkumar Ramalingam, Botrous Thalouth, Jan Thielmann

Publisher Resources

ISBN: 9781587141560Purchase book