Chapter 14. Identity on Cisco Firewalls
This chapter covers the following topics:
• Selecting the Authentication Protocol
• ASA User-level control with Cut-Through Proxy
• IOS User-level control with Auth-Proxy
• User-based Zone Policy Firewall
“One may understand the cosmos, but never the ego; the self is more distant than any star.” —G. K. Chesterton
The IP address is a basic piece of information associated with computer systems that rely on the TCP/IP protocol stack to establish network connectivity. In this book, you studied in detail how to define access control rules based upon attributes present in the IP, TCP, UDP, and application headers. Although this ...
Get Cisco Firewalls now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.