Skip to Main Content
AAA Identity Management Security
book

AAA Identity Management Security

by Vivek Santuka, - CCIE #17621, Premdeep Banga, - CCIE #21713, Brandon J. Carroll, - CCIE #23837
December 2010
Intermediate to advanced content levelIntermediate to advanced
480 pages
11h 9m
English
Cisco Press
Content preview from AAA Identity Management Security

Chapter 11. Router

This chapter covers the following subjects:

• Authentication Proxy on IOS Routers

Authentication Proxy Authorization

• Configuring Downloadable ACLs for Authentication Proxy

Authentication Proxy Accounting

Chapter 10, “Cut-Through Proxy AAA on Pix/ASA,” covered the limitations of IP address-based restrictions and the need for per-user based access restriction. Similar to the cut-through proxy authentication method on ASA/PIX, IOS-based routers provide the Authentication Proxy feature to restrict access based on user profiles.

When Authentication Proxy is enabled, traffic flowing through the router is intercepted and the authentication cache is checked to see whether the user is already authenticated. If a valid authentication ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Strategic Security Management

Strategic Security Management

Karim Vellani
Security on the IBM Mainframe: Volume 1 A Holistic Approach to Reduce Risk and Improve Security

Security on the IBM Mainframe: Volume 1 A Holistic Approach to Reduce Risk and Improve Security

Axel Buecker, Boudhayan Chakrabarty, Lennie Dymoke-Bradshaw, Cesar Goldkorn, Brian Hugenbruch, Madhukar Reddy Nali, Vinodkumar Ramalingam, Botrous Thalouth, Jan Thielmann

Publisher Resources

ISBN: 9781587141560Purchase book