Setting up Authorization

Setting up authorization is similar to setting up authentication. For authorization to function, authentication needs to be set up first and must be functional. After authentication has been set up, setting up authorization consists of setting up an authorization method list and then applying it to an interface or line (if it is not defined as the default method list). Please note that just like the default authentication method list, the default authorization method list is automatically applied to all interfaces and lines unless there is another named method list defined and specifically applied to a line or interface. In this case the named method list, applied to the line or interface, takes precedence over a default ...

Get Network Security Principles and Practices now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.