In this book, you use ASDM to implement authentication on the ASA/PIX Security Appliance. The following list of authentication tasks are performed:
Secure Telnet security appliance access
Secure SSH security appliance access
Secure ASDM/HTTPS security appliance access
Secure inbound and outbound web users (optional)
Authorize security appliance users
Securing Access to the Security Appliance
Now that you have a basic understanding of both authentication and its importance, you can start ASDM and follow these procedures to deploy authentication.
This step-by-step procedure leverages off of the configuration work that you have already done on your ASA/PIX Security Appliance in Chapter 5, “Deploying Secure Internet Connectivity,” ...