Chapter 5. Security and Access Configuration
Solutions in this chapter:
- Managing Accounts and Passwords
- Managing Groups and Access
- Configuring Authentication, Authorization, and Accounting (AAA)
- Configuring IPSO VPN
- Solutions Fast Track
- Frequently Asked Questions
Shin had configured the first system but, at Marty's request, let Mark and Ming configure the other appliances.
“Wow,” said Mark after he finished his configuration, “that was easy.” Ming nodded in agreement. “Now that we have the base system configured, how do we manage the security and access settings?” Mark turned to Shin. “And how would we go about creating a site-to-site VPN tunnel between HQ and the remote offices?”
Marty looked at Mark with a surprised ...